SlideShare une entreprise Scribd logo
1  sur  63
Verônica Simões – Diretora Geral [email_address] ITIL V3 EXPERT COBIT  CGEIT ISO/IEC 27001 Lead Auditor ISO/IEC 20000 Lead Auditor itSMF Brasil Council Member PÓS- GRADUAÇÃO Gerência de Projetos PÓS- GRADUAÇÃO Gerência de Telecomunicações PÓS- GRADUAÇÃO E-Business COMO IMPLANTAR A GESTÃO DE INCIDENTES DE SEGURANÇA COM BASE NAS BOAS PRÁTICAS
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operações de TI BPM PMBOK/ PRINCE2 ISO 27000 ISO 19770 CMMI /  MPSBR CBTS/ SQA ISO 10006 ISO 9000/ SIX SIGMA Planejamento de TI E-SCM COBIT TOGAF ISO 38500 ISO 20000 ITIL Planejamento Estratégico MOF M_O_R ISO 31000 PORTER BSC – KAPLAN  &NORTON
Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define  Strategic  IT Plan Define IT  Processes Organisation  Relationships Manage IT Investment Determine Technological Direction Communicate  Aims &  Direction Manage IT Human Resource Manage Projects Manage Quality Identify  Automated  Solutions Acquire &  Maintain  Application  Software Acquire &  Maintain  Technology  Infrastructure Procure IT Resources Install &  Accredit  Solutions and Changes Manage  Changes Manage Performance  & Capacity Ensure  Continuous  Service Ensure  System  Security Identify  & Allocate  Costs Manage  Third-Party  Services Define & Manage  Service  Levels Educate  &  Train Users Manage  Configuration Manage  Service Desk & Incidents Manage Data Manage the Physical Environment Manage  Operations Monitor  and  Evaluate Performance Monitor  and  Evaluate  Internal  Control Ensure  Compliance with External  Requirements Provide IT  Gorvenance Define  Information Architecture Enable Operation  and Use Manage Problems Manage IT  Risks
Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define  Strategic  IT Plan Define IT  Processes Organisation  Relationships Manage IT Investment Determine Technological Direction Communicate  Aims &  Direction Manage IT Human Resource Manage Projects Manage Quality Identify  Automated  Solutions Acquire &  Maintain  Application  Software Acquire &  Maintain  Technology  Infrastructure Procure IT Resources Install &  Accredit  Solutions and Changes Manage  Changes Manage Performance  & Capacity Ensure  Continuous  Service Ensure  System  Security Identify  & Allocate  Costs Manage  Third-Party  Services Define & Manage  Service  Levels Educate  &  Train Users Manage  Configuration Manage  Service Desk & Incidents Manage Data Manage the Physical Environment Manage  Operations Monitor  and  Evaluate Performance Monitor  and  Evaluate  Internal  Control Ensure  Compliance with External  Requirements Provide IT  Gorvenance Define  Information Architecture Enable Operation  and Use Manage Problems ITIL V3 Manage IT  Risks
Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define  Strategic  IT Plan Define IT  Processes Organisation  Relationships Manage IT Investment Determine Technological Direction Communicate  Aims &  Direction Manage IT Human Resource Manage Projects Manage Quality Identify  Automated  Solutions Acquire &  Maintain  Application  Software Acquire &  Maintain  Technology  Infrastructure Procure IT Resources Install &  Accredit  Solutions and Changes Manage  Changes Manage Performance  & Capacity Ensure  Continuous  Service Ensure  System  Security Identify  & Allocate  Costs Manage  Third-Party  Services Define & Manage  Service  Levels Educate  &  Train Users Manage  Configuration Manage  Service Desk & Incidents Manage Data Manage the Physical Environment Manage  Operations Monitor  and  Evaluate Performance Monitor  and  Evaluate  Internal  Control Ensure  Compliance with External  Requirements Provide IT  Gorvenance Define  Information Architecture Enable Operation  and Use Manage Problems ITIL V3 Service  Desk Incident Management Change  Management Release  Management Problem  Management Configuration Management Service  Level  Management Availability Management Financial Management Continuity  Management Capacity Management PMBok Project Management Institute Manage IT  Risks
Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define  Strategic  IT Plan Define IT  Processes Organisation  Relationships Manage IT Investment Determine Technological Direction Communicate  Aims &  Direction Manage IT Human Resource Manage Projects Manage Quality Identify  Automated  Solutions Acquire &  Maintain  Application  Software Acquire &  Maintain  Technology  Infrastructure Procure IT Resources Install &  Accredit  Solutions and Changes Manage  Changes Manage Performance  & Capacity Ensure  Continuous  Service Ensure  System  Security Identify  & Allocate  Costs Manage  Third-Party  Services Define & Manage  Service  Levels Educate  &  Train Users Manage  Configuration Manage  Service Desk & Incidents Manage Data Manage the Physical Environment Manage  Operations Monitor  and  Evaluate Performance Monitor  and  Evaluate  Internal  Control Ensure  Compliance with External  Requirements Provide IT  Gorvenance Define  Information Architecture Enable Operation  and Use Manage Problems PMBok Project Management Institute CMM Manage IT  Risks ITIL V3 Service Delivery Service Support Service  Desk Incident Management Change  Management Release  Management Problem  Management Configuration Management Service  Level  Management Availability Management Financial Management Continuity  Management Capacity Management
Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define  Strategic  IT Plan Define IT  Processes Organisation  Relationships Manage IT Investment Determine Technological Direction Communicate  Aims &  Direction Manage IT Human Resource Manage Projects Manage Quality Identify  Automated  Solutions Acquire &  Maintain  Application  Software Acquire &  Maintain  Technology  Infrastructure Procure IT Resources Install &  Accredit  Solutions and Changes Manage  Changes Manage Performance  & Capacity Ensure  Continuous  Service Ensure  System  Security Identify  & Allocate  Costs Manage  Third-Party  Services Define & Manage  Service  Levels Educate  &  Train Users Manage  Configuration Manage  Service Desk & Incidents Manage Data Manage the Physical Environment Manage  Operations Monitor  and  Evaluate Performance Monitor  and  Evaluate  Internal  Control Ensure  Compliance with External  Requirements Provide IT  Gorvenance Define  Information Architecture Enable Operation  and Use Manage Problems CMM ISO 9000 Quality Management Manage IT  Risks ITIL V3 Service Delivery Service Support Service  Desk Incident Management Change  Management Release  Management Problem  Management Configuration Management Service  Level  Management Availability Management Financial Management Continuity  Management Capacity Management PMBok Project Management Institute
Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define  Strategic  IT Plan Define IT  Processes Organisation  Relationships Manage IT Investment Determine Technological Direction Communicate  Aims &  Direction Manage IT Human Resource Manage Projects Manage Quality Identify  Automated  Solutions Acquire &  Maintain  Application  Software Acquire &  Maintain  Technology  Infrastructure Procure IT Resources Install &  Accredit  Solutions and Changes Manage  Changes Manage Performance  & Capacity Ensure  Continuous  Service Ensure  System  Security Identify  & Allocate  Costs Manage  Third-Party  Services Define & Manage  Service  Levels Educate  &  Train Users Manage  Configuration Manage  Service Desk & Incidents Manage Data Manage the Physical Environment Manage  Operations Monitor  and  Evaluate Performance Monitor  and  Evaluate  Internal  Control Ensure  Compliance with External  Requirements Provide IT  Gorvenance Define  Information Architecture Enable Operation  and Use Manage Problems Manage IT  Risks PMBok Project Management Institute CMM ISO 9000 Quality Management ISO 20000 ITIL V3 Service  Desk Incident Management Change  Management Release  Management Problem  Management Configuration Management Service  Level  Management Availability Management Financial Management Continuity  Management Capacity Management
Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define  Strategic  IT Plan Define IT  Processes Organisation  Relationships Manage IT Investment Determine Technological Direction Communicate  Aims &  Direction Manage IT Human Resource Manage IT  Risks Manage Projects Manage Quality Identify  Automated  Solutions Acquire &  Maintain  Application  Software Acquire &  Maintain  Technology  Infrastructure Procure IT Resources Install &  Accredit  Solutions and Changes Manage  Changes Manage Performance  & Capacity Ensure  Continuous  Service Ensure  System  Security Identify  & Allocate  Costs Manage  Third-Party  Services Define & Manage  Service  Levels Educate  &  Train Users Manage  Configuration Manage  Service Desk & Incidents Manage Data Manage the Physical Environment Manage  Operations Monitor  and  Evaluate Performance Monitor  and  Evaluate  Internal  Control Ensure  Compliance with External  Requirements Provide IT  Gorvenance Define  Information Architecture Enable Operation  and Use Manage Problems PMBok Project Management Institute CMM ISO 9000 Quality Management ISO 20000 ISO 27000 ITIL V3 Service  Desk Incident Management Change  Management Release  Management Problem  Management Configuration Management Service  Level  Management Availability Management Financial Management Continuity  Management Capacity Management
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DIRETRIZES DO TCU “ NBRISO/IEC 27002, item 14.1.3  – Desenvolvimento e implementação de planos de continuidade relativos à segurança da informação:  convém que os planos sejam desenvolvidos e implementados para a manutenção ou recuperação das operações e para assegurar a disponibilidade da informação no nível requerido e na escala de tempo requerida , após a ocorrência de interrupções ou falhas dos processos críticos do negócio.” ACORDÃO Nº1.603/2008-TCU-PLENÁRIO:
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 27000 – O QUE É ? Um padrão britânico que trata da definição de requisitos para um Sistema de Gestão de Segurança da Informação - SGSI Confidencial
ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Vocabulário e definições a serem utilizadas pelas demais Normas ISO 27006
ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Define os requisitos para a implementação de um SGSI ISO 27006
ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Atual ISO-17799, Define boas práticas para a gestão da segurança da Informação ISO 27006
ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 É um Guia para a Implementação de um SGSI ISO 27006
ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Define métricas para avaliar a eficácia de um SGSI ISO 27006
ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Define linhas de orientação para a gestão de risco da segurança da  Informação ISO 27006
ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Um guia para o processo de acreditação de entidades certificadoras ISO 27006
ISO 27000 – O QUE É ? ISO 27007 ISO 27008 ISO 27011 ISO 27799 Um guia para auditoria do SGSI - 2009 Normas aprovadas para publicação Um guia para auditoria do com foco em  controles de segurança - 2011 Um guia para gerenciamento da segurança da informação com foco em telecomunicações - 2009 Um guia para gerenciamento da segurança da informação com foco em saúde com base na ISO/IEC 17799  - 2009
ISO 27000 – O QUE É ? ISO 27010 ISO 27031 ISO 27032 Um guia segurança do trabalho e comunicações Continuidade de negócio Cyber Security Normas aguardando confirmação ISO 27033 Segurança em rede / Detecção de Intrusos ISO 27034 Guia para Segurança em aplicações ISO 27051 Telecomunicações
ISO 27000 – O QUE É ? ISO 27012 ISO 27013 Finanças ou Industria Automativa Manufatura ou Loterias Normas em especulação – especificas para a industria
ISO 27000 – O QUE É ? ESTRUTURA  DA ISO 27001
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 27000 – PORQUE ADOTAR? INCIDENTES DE SEGURANÇA: 1999–2009
ISO 27000 – PORQUE ADOTAR? Quais são os incidentes mais comuns e quais as melhores práticas para PREVENÇÃO – CONTENÇÃO – REAÇÃO?
ISO 27000 – PORQUE ADOTAR? Quais são os incidentes mais comuns e quais as melhores práticas para PREVENÇÃO – CONTENÇÃO – REAÇÃO?
ISO 27000 – PORQUE ADOTAR?
ISO 27000 – PORQUE ADOTAR? Você já deu sua senha por prova de amor? Pense bem...
ISO 27000 – PORQUE ADOTAR? SUA SENHA É SUA IDENTIDADE DIGITAL!!! O login com a senha determinam AUTORIA! Se alguém utilizar sua senha para fazer algo de errado em ambiente eletrônico, como retirar conteúdos da rede ou enviar uma mensagem ofensiva,  O PRINCIPAL SUSPEITO SERÁ VOCÊ!
ISO 27000 – PORQUE ADOTAR?
ISO 27000 – PORQUE ADOTAR?
ISO 27000 – PORQUE ADOTAR?
ISO 27000 – PORQUE ADOTAR?
ISO 27000 – PORQUE ADOTAR? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PROVAS ELETRÔNICAS SÃO:
ISO 27000 – PORQUE ADOTAR? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PROVAS ELETRÔNICAS SÃO: 1 - ESTAMOS GUARDANDO OS DOCUMENTOS ORIGINAIS? 2 - TEMOS UMA POLÍTICA DE GESTÃO DOCUMENTAL QUE TRATE DE TODOS OS  CENÁRIOS (FÍSICOS, ELETRÔNICOS E DIGITALIZADOS)? 3 - QUEM IMPRIME EMAIL PARA GUARDAR POR QUE É  IMPORTANTE E APAGA O ORIGINAL NA CAIXA POSTAL? 4 - ESTAMOS GUARDANDO OS EMAILS? POR QUANTO TEMPO? 5 - ESTAMOS GUARDANDO OS LOGS? POR QUANTO TEMPO? 6 - QUAIS SÃO AS PROVAS ELETRÔNICAS QUE PRECISAM SER ARQUIVADAS? COMO DEVEM SER GUARDADAS? POR QUANTO TEMPO (CRITÉRIO PRAZO LEGAL OU PRAZO TI)?
ISO 27000 – PORQUE ADOTAR?
ISO 27000 – PORQUE ADOTAR? ,[object Object],[object Object],[object Object],[object Object]
ISO 27000 – PORQUE ADOTAR? ARQUITETURA DE REDE INSEGURA
ISO 27000 – PORQUE ADOTAR? FALTA DE MONITORAMENTO EM TEMPO REAL BOMBAS LÓGICAS
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 27000 – POR ONDE COMEÇAR ? DEFININDO UMA ESTRUTURA DE RESPOSTA A INCIDENTES DE SEGURANÇA
ISO 27000 – POR ONDE COMEÇAR ?
ISO 27000 – POR ONDE COMEÇAR ?
ISO 27000 – POR ONDE COMEÇAR ?
ISO 27000 – POR ONDE COMEÇAR ?
ISO 27000 – POR ONDE COMEÇAR ?
ISO 27000 – POR ONDE COMEÇAR ?
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 27000 – PRINCIPAIS DESAFIOS ,[object Object],[object Object],[object Object],[object Object],[object Object],Quais são os maiores desafios para aplicar as Boas Práticas da Segurança da Informação?
ISO 27000 – PRINCIPAIS DESAFIOS
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 27000 – PRÓXIMOS PASSOS
[object Object],[object Object],[object Object],[object Object],[object Object],Distributed Messaging (MQ) ,[object Object],[object Object],[object Object],[object Object],ISO 27000 – PRÓXIMOS PASSOS SEGURANÇA DE SERVIDORES E APLICATIVOS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VMware Citrix Custom Monitors  1
ISO 27000 – PRÓXIMOS PASSOS MAPEAR E MONITORAR A REDE E LINKS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ISO 27000 – PRÓXIMOS PASSOS MAPEAR E MONITORAR USUÁRIOS E INFRA-ESTRUTURA ,[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 27000 – PRÓXIMOS PASSOS
ISO 27000 – PRÓXIMOS PASSOS GERÊNCIA CENTRALIZADA DE LOGS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],REFLEXÃO
Verônica Simões – Diretora Geral [email_address] ITIL V3 EXPERT COBIT  CGEIT ISO/IEC 27001 Lead Auditor ISO/IEC 20000 Lead Auditor itSMF Brasil Council Member PÓS- GRADUAÇÃO Gerência de Projetos PÓS- GRADUAÇÃO Gerência de Telecomunicações PÓS- GRADUAÇÃO E-Business A Segurança só atinge os seus objetivos sob a forma de mobilização geral. Obrigada a todos!!!

Contenu connexe

Tendances

Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major IncidentNUS-ISS
 
ITIL V3 and Service Operation - ITSM Academy Webinar
ITIL V3 and Service Operation - ITSM Academy WebinarITIL V3 and Service Operation - ITSM Academy Webinar
ITIL V3 and Service Operation - ITSM Academy WebinarITSM Academy, Inc.
 
Actionable Steps to Elevating your IT Service Management
Actionable Steps to Elevating your IT Service ManagementActionable Steps to Elevating your IT Service Management
Actionable Steps to Elevating your IT Service ManagementIvanti
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
Integrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User AdoptionIntegrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User AdoptionCA Technologies
 
The Service Management Office - Driving it performance in the face of rising ...
The Service Management Office - Driving it performance in the face of rising ...The Service Management Office - Driving it performance in the face of rising ...
The Service Management Office - Driving it performance in the face of rising ...3gamma
 
Management of Risk and its integration within ITIL
Management of Risk and its integration within ITILManagement of Risk and its integration within ITIL
Management of Risk and its integration within ITILhdoornbos
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...PECB
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties SolutionsAhmed Abdul Hamed
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL IntroductionRavi Kiran
 
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Abdulaziz AlFaify
 
Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityitSMF UK
 

Tendances (20)

Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major Incident
 
IT Service's Improvement Plan
IT Service's Improvement PlanIT Service's Improvement Plan
IT Service's Improvement Plan
 
ITIL V3 and Service Operation - ITSM Academy Webinar
ITIL V3 and Service Operation - ITSM Academy WebinarITIL V3 and Service Operation - ITSM Academy Webinar
ITIL V3 and Service Operation - ITSM Academy Webinar
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
Actionable Steps to Elevating your IT Service Management
Actionable Steps to Elevating your IT Service ManagementActionable Steps to Elevating your IT Service Management
Actionable Steps to Elevating your IT Service Management
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
Integrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User AdoptionIntegrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User Adoption
 
CISA Review Course Slides - Part1
CISA Review Course Slides - Part1CISA Review Course Slides - Part1
CISA Review Course Slides - Part1
 
The Service Management Office - Driving it performance in the face of rising ...
The Service Management Office - Driving it performance in the face of rising ...The Service Management Office - Driving it performance in the face of rising ...
The Service Management Office - Driving it performance in the face of rising ...
 
Ch2 2009 cisa
Ch2 2009 cisaCh2 2009 cisa
Ch2 2009 cisa
 
Management of Risk and its integration within ITIL
Management of Risk and its integration within ITILManagement of Risk and its integration within ITIL
Management of Risk and its integration within ITIL
 
ITSM Presentation
ITSM PresentationITSM Presentation
ITSM Presentation
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
Service operations
Service operationsService operations
Service operations
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
 
CISA Review Courses - Slides Part2
CISA Review Courses - Slides Part2CISA Review Courses - Slides Part2
CISA Review Courses - Slides Part2
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL Introduction
 
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
 
Martin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No SecurityMartin Huddleston: No Service Management, No Security
Martin Huddleston: No Service Management, No Security
 

En vedette

Política de segurança inteligente final
Política de segurança inteligente finalPolítica de segurança inteligente final
Política de segurança inteligente finalcadpart
 
Actividad2a2b3a Nelson Urbina
Actividad2a2b3a Nelson UrbinaActividad2a2b3a Nelson Urbina
Actividad2a2b3a Nelson UrbinaCesar David
 
2014-2023 LqP County Water Plan
2014-2023 LqP County Water Plan2014-2023 LqP County Water Plan
2014-2023 LqP County Water PlanAnn Treacy
 
Bonsai arte viviente
Bonsai arte viviente  Bonsai arte viviente
Bonsai arte viviente Oliver Six
 
Psp sociocomunitaria en Chile
Psp sociocomunitaria en ChilePsp sociocomunitaria en Chile
Psp sociocomunitaria en Chilecesar villegas
 
Arquitectura manierista
Arquitectura manieristaArquitectura manierista
Arquitectura manieristavanessa brito
 
CCW Interview: Tom Feeney, Safelite
CCW Interview: Tom Feeney, SafeliteCCW Interview: Tom Feeney, Safelite
CCW Interview: Tom Feeney, SafeliteCCW Digital
 
Social Media Marketing for Small Buiness BlogWorld '09
Social Media Marketing for Small Buiness BlogWorld '09Social Media Marketing for Small Buiness BlogWorld '09
Social Media Marketing for Small Buiness BlogWorld '09Webgrrls International
 
The global, continental & national adoption of performance-based financing: e...
The global, continental & national adoption of performance-based financing: e...The global, continental & national adoption of performance-based financing: e...
The global, continental & national adoption of performance-based financing: e...Lara Gautier
 
Derechos humanos de libertad expo
Derechos humanos de libertad expoDerechos humanos de libertad expo
Derechos humanos de libertad expoAlejandro Blnn
 
Summer Infant (SUMR) Investor Presentation - Feb 2017
Summer Infant (SUMR) Investor Presentation - Feb 2017Summer Infant (SUMR) Investor Presentation - Feb 2017
Summer Infant (SUMR) Investor Presentation - Feb 2017summerinfant
 
Dr. Sally Gainsbury
Dr. Sally Gainsbury Dr. Sally Gainsbury
Dr. Sally Gainsbury Horizons RG
 
01 mar-17 rdc investor-presentation - final
01 mar-17 rdc investor-presentation - final01 mar-17 rdc investor-presentation - final
01 mar-17 rdc investor-presentation - finalRowanCompanies
 

En vedette (20)

Política de segurança inteligente final
Política de segurança inteligente finalPolítica de segurança inteligente final
Política de segurança inteligente final
 
Actividad2a2b3a Nelson Urbina
Actividad2a2b3a Nelson UrbinaActividad2a2b3a Nelson Urbina
Actividad2a2b3a Nelson Urbina
 
2014-2023 LqP County Water Plan
2014-2023 LqP County Water Plan2014-2023 LqP County Water Plan
2014-2023 LqP County Water Plan
 
Bonsai arte viviente
Bonsai arte viviente  Bonsai arte viviente
Bonsai arte viviente
 
Psp sociocomunitaria en Chile
Psp sociocomunitaria en ChilePsp sociocomunitaria en Chile
Psp sociocomunitaria en Chile
 
Arquitectura manierista
Arquitectura manieristaArquitectura manierista
Arquitectura manierista
 
Colombia
ColombiaColombia
Colombia
 
CCW Interview: Tom Feeney, Safelite
CCW Interview: Tom Feeney, SafeliteCCW Interview: Tom Feeney, Safelite
CCW Interview: Tom Feeney, Safelite
 
Aporte individual _Viky González
Aporte individual  _Viky GonzálezAporte individual  _Viky González
Aporte individual _Viky González
 
Social Media Marketing for Small Buiness BlogWorld '09
Social Media Marketing for Small Buiness BlogWorld '09Social Media Marketing for Small Buiness BlogWorld '09
Social Media Marketing for Small Buiness BlogWorld '09
 
The global, continental & national adoption of performance-based financing: e...
The global, continental & national adoption of performance-based financing: e...The global, continental & national adoption of performance-based financing: e...
The global, continental & national adoption of performance-based financing: e...
 
Derechos humanos de libertad expo
Derechos humanos de libertad expoDerechos humanos de libertad expo
Derechos humanos de libertad expo
 
wikispaces
wikispaceswikispaces
wikispaces
 
61000135 dod 1
61000135 dod 161000135 dod 1
61000135 dod 1
 
Teorias organizativas
Teorias organizativasTeorias organizativas
Teorias organizativas
 
Summer Infant (SUMR) Investor Presentation - Feb 2017
Summer Infant (SUMR) Investor Presentation - Feb 2017Summer Infant (SUMR) Investor Presentation - Feb 2017
Summer Infant (SUMR) Investor Presentation - Feb 2017
 
Dr. Sally Gainsbury
Dr. Sally Gainsbury Dr. Sally Gainsbury
Dr. Sally Gainsbury
 
Apresentação1
Apresentação1Apresentação1
Apresentação1
 
Iso 27002-2013
Iso 27002-2013Iso 27002-2013
Iso 27002-2013
 
01 mar-17 rdc investor-presentation - final
01 mar-17 rdc investor-presentation - final01 mar-17 rdc investor-presentation - final
01 mar-17 rdc investor-presentation - final
 

Similaire à Palestra Gestão de Incidentes de Segurança

Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overviewThierry Brunet
 
Msp It Goverance And Service Delivery Process
Msp It Goverance And Service Delivery ProcessMsp It Goverance And Service Delivery Process
Msp It Goverance And Service Delivery Processkadhar_masthan
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictabilitytlknecht
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation OverviewAlan McSweeney
 
Seioglobal Profile
Seioglobal ProfileSeioglobal Profile
Seioglobal ProfileMichael S.
 
GLOPORE IMS RIMS Presentation
GLOPORE IMS RIMS PresentationGLOPORE IMS RIMS Presentation
GLOPORE IMS RIMS PresentationGLOPORE IMS
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
Managed it services
Managed it servicesManaged it services
Managed it servicesGss America
 
Managed It Services
Managed It ServicesManaged It Services
Managed It ServicesGss America
 
Experis Engineering
Experis EngineeringExperis Engineering
Experis Engineeringmichaeltn
 
Service Management
Service ManagementService Management
Service Managementjbruk
 
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarRole with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarITSM Academy, Inc.
 
Measuring Business Value of IT
Measuring Business Value of ITMeasuring Business Value of IT
Measuring Business Value of ITAyelet Baron
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
The IQ Business Group
The IQ Business GroupThe IQ Business Group
The IQ Business Groupmbeck94
 
The IQ Business Group
The IQ Business GroupThe IQ Business Group
The IQ Business Groupkejensen810
 

Similaire à Palestra Gestão de Incidentes de Segurança (20)

Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overview
 
Msp It Goverance And Service Delivery Process
Msp It Goverance And Service Delivery ProcessMsp It Goverance And Service Delivery Process
Msp It Goverance And Service Delivery Process
 
Process, People & Tools in ITILV3
Process, People & Tools in ITILV3Process, People & Tools in ITILV3
Process, People & Tools in ITILV3
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation Overview
 
Seioglobal Profile
Seioglobal ProfileSeioglobal Profile
Seioglobal Profile
 
Kudakwashe Mautsahuku CV
Kudakwashe Mautsahuku CVKudakwashe Mautsahuku CV
Kudakwashe Mautsahuku CV
 
GLOPORE IMS RIMS Presentation
GLOPORE IMS RIMS PresentationGLOPORE IMS RIMS Presentation
GLOPORE IMS RIMS Presentation
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
Experis Engineering
Experis EngineeringExperis Engineering
Experis Engineering
 
Service Management
Service ManagementService Management
Service Management
 
Sacrum It Solutions
Sacrum It SolutionsSacrum It Solutions
Sacrum It Solutions
 
Ca Service Desk Presentation
Ca Service Desk PresentationCa Service Desk Presentation
Ca Service Desk Presentation
 
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy WebinarRole with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
Role with IT(IL) - V3 Roles and Responsibilities - ITSM Academy Webinar
 
Measuring Business Value of IT
Measuring Business Value of ITMeasuring Business Value of IT
Measuring Business Value of IT
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
The IQ Business Group
The IQ Business GroupThe IQ Business Group
The IQ Business Group
 
The IQ Business Group
The IQ Business GroupThe IQ Business Group
The IQ Business Group
 

Palestra Gestão de Incidentes de Segurança

  • 1. Verônica Simões – Diretora Geral [email_address] ITIL V3 EXPERT COBIT CGEIT ISO/IEC 27001 Lead Auditor ISO/IEC 20000 Lead Auditor itSMF Brasil Council Member PÓS- GRADUAÇÃO Gerência de Projetos PÓS- GRADUAÇÃO Gerência de Telecomunicações PÓS- GRADUAÇÃO E-Business COMO IMPLANTAR A GESTÃO DE INCIDENTES DE SEGURANÇA COM BASE NAS BOAS PRÁTICAS
  • 2.
  • 3.
  • 4. Operações de TI BPM PMBOK/ PRINCE2 ISO 27000 ISO 19770 CMMI / MPSBR CBTS/ SQA ISO 10006 ISO 9000/ SIX SIGMA Planejamento de TI E-SCM COBIT TOGAF ISO 38500 ISO 20000 ITIL Planejamento Estratégico MOF M_O_R ISO 31000 PORTER BSC – KAPLAN &NORTON
  • 5. Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define Strategic IT Plan Define IT Processes Organisation Relationships Manage IT Investment Determine Technological Direction Communicate Aims & Direction Manage IT Human Resource Manage Projects Manage Quality Identify Automated Solutions Acquire & Maintain Application Software Acquire & Maintain Technology Infrastructure Procure IT Resources Install & Accredit Solutions and Changes Manage Changes Manage Performance & Capacity Ensure Continuous Service Ensure System Security Identify & Allocate Costs Manage Third-Party Services Define & Manage Service Levels Educate & Train Users Manage Configuration Manage Service Desk & Incidents Manage Data Manage the Physical Environment Manage Operations Monitor and Evaluate Performance Monitor and Evaluate Internal Control Ensure Compliance with External Requirements Provide IT Gorvenance Define Information Architecture Enable Operation and Use Manage Problems Manage IT Risks
  • 6. Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define Strategic IT Plan Define IT Processes Organisation Relationships Manage IT Investment Determine Technological Direction Communicate Aims & Direction Manage IT Human Resource Manage Projects Manage Quality Identify Automated Solutions Acquire & Maintain Application Software Acquire & Maintain Technology Infrastructure Procure IT Resources Install & Accredit Solutions and Changes Manage Changes Manage Performance & Capacity Ensure Continuous Service Ensure System Security Identify & Allocate Costs Manage Third-Party Services Define & Manage Service Levels Educate & Train Users Manage Configuration Manage Service Desk & Incidents Manage Data Manage the Physical Environment Manage Operations Monitor and Evaluate Performance Monitor and Evaluate Internal Control Ensure Compliance with External Requirements Provide IT Gorvenance Define Information Architecture Enable Operation and Use Manage Problems ITIL V3 Manage IT Risks
  • 7. Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define Strategic IT Plan Define IT Processes Organisation Relationships Manage IT Investment Determine Technological Direction Communicate Aims & Direction Manage IT Human Resource Manage Projects Manage Quality Identify Automated Solutions Acquire & Maintain Application Software Acquire & Maintain Technology Infrastructure Procure IT Resources Install & Accredit Solutions and Changes Manage Changes Manage Performance & Capacity Ensure Continuous Service Ensure System Security Identify & Allocate Costs Manage Third-Party Services Define & Manage Service Levels Educate & Train Users Manage Configuration Manage Service Desk & Incidents Manage Data Manage the Physical Environment Manage Operations Monitor and Evaluate Performance Monitor and Evaluate Internal Control Ensure Compliance with External Requirements Provide IT Gorvenance Define Information Architecture Enable Operation and Use Manage Problems ITIL V3 Service Desk Incident Management Change Management Release Management Problem Management Configuration Management Service Level Management Availability Management Financial Management Continuity Management Capacity Management PMBok Project Management Institute Manage IT Risks
  • 8. Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define Strategic IT Plan Define IT Processes Organisation Relationships Manage IT Investment Determine Technological Direction Communicate Aims & Direction Manage IT Human Resource Manage Projects Manage Quality Identify Automated Solutions Acquire & Maintain Application Software Acquire & Maintain Technology Infrastructure Procure IT Resources Install & Accredit Solutions and Changes Manage Changes Manage Performance & Capacity Ensure Continuous Service Ensure System Security Identify & Allocate Costs Manage Third-Party Services Define & Manage Service Levels Educate & Train Users Manage Configuration Manage Service Desk & Incidents Manage Data Manage the Physical Environment Manage Operations Monitor and Evaluate Performance Monitor and Evaluate Internal Control Ensure Compliance with External Requirements Provide IT Gorvenance Define Information Architecture Enable Operation and Use Manage Problems PMBok Project Management Institute CMM Manage IT Risks ITIL V3 Service Delivery Service Support Service Desk Incident Management Change Management Release Management Problem Management Configuration Management Service Level Management Availability Management Financial Management Continuity Management Capacity Management
  • 9. Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define Strategic IT Plan Define IT Processes Organisation Relationships Manage IT Investment Determine Technological Direction Communicate Aims & Direction Manage IT Human Resource Manage Projects Manage Quality Identify Automated Solutions Acquire & Maintain Application Software Acquire & Maintain Technology Infrastructure Procure IT Resources Install & Accredit Solutions and Changes Manage Changes Manage Performance & Capacity Ensure Continuous Service Ensure System Security Identify & Allocate Costs Manage Third-Party Services Define & Manage Service Levels Educate & Train Users Manage Configuration Manage Service Desk & Incidents Manage Data Manage the Physical Environment Manage Operations Monitor and Evaluate Performance Monitor and Evaluate Internal Control Ensure Compliance with External Requirements Provide IT Gorvenance Define Information Architecture Enable Operation and Use Manage Problems CMM ISO 9000 Quality Management Manage IT Risks ITIL V3 Service Delivery Service Support Service Desk Incident Management Change Management Release Management Problem Management Configuration Management Service Level Management Availability Management Financial Management Continuity Management Capacity Management PMBok Project Management Institute
  • 10. Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define Strategic IT Plan Define IT Processes Organisation Relationships Manage IT Investment Determine Technological Direction Communicate Aims & Direction Manage IT Human Resource Manage Projects Manage Quality Identify Automated Solutions Acquire & Maintain Application Software Acquire & Maintain Technology Infrastructure Procure IT Resources Install & Accredit Solutions and Changes Manage Changes Manage Performance & Capacity Ensure Continuous Service Ensure System Security Identify & Allocate Costs Manage Third-Party Services Define & Manage Service Levels Educate & Train Users Manage Configuration Manage Service Desk & Incidents Manage Data Manage the Physical Environment Manage Operations Monitor and Evaluate Performance Monitor and Evaluate Internal Control Ensure Compliance with External Requirements Provide IT Gorvenance Define Information Architecture Enable Operation and Use Manage Problems Manage IT Risks PMBok Project Management Institute CMM ISO 9000 Quality Management ISO 20000 ITIL V3 Service Desk Incident Management Change Management Release Management Problem Management Configuration Management Service Level Management Availability Management Financial Management Continuity Management Capacity Management
  • 11. Deliver & Support Monitor & Evaluate Acquire & Implement Plan & Organise Define Strategic IT Plan Define IT Processes Organisation Relationships Manage IT Investment Determine Technological Direction Communicate Aims & Direction Manage IT Human Resource Manage IT Risks Manage Projects Manage Quality Identify Automated Solutions Acquire & Maintain Application Software Acquire & Maintain Technology Infrastructure Procure IT Resources Install & Accredit Solutions and Changes Manage Changes Manage Performance & Capacity Ensure Continuous Service Ensure System Security Identify & Allocate Costs Manage Third-Party Services Define & Manage Service Levels Educate & Train Users Manage Configuration Manage Service Desk & Incidents Manage Data Manage the Physical Environment Manage Operations Monitor and Evaluate Performance Monitor and Evaluate Internal Control Ensure Compliance with External Requirements Provide IT Gorvenance Define Information Architecture Enable Operation and Use Manage Problems PMBok Project Management Institute CMM ISO 9000 Quality Management ISO 20000 ISO 27000 ITIL V3 Service Desk Incident Management Change Management Release Management Problem Management Configuration Management Service Level Management Availability Management Financial Management Continuity Management Capacity Management
  • 12.
  • 13. DIRETRIZES DO TCU “ NBRISO/IEC 27002, item 14.1.3 – Desenvolvimento e implementação de planos de continuidade relativos à segurança da informação: convém que os planos sejam desenvolvidos e implementados para a manutenção ou recuperação das operações e para assegurar a disponibilidade da informação no nível requerido e na escala de tempo requerida , após a ocorrência de interrupções ou falhas dos processos críticos do negócio.” ACORDÃO Nº1.603/2008-TCU-PLENÁRIO:
  • 14.
  • 15. ISO 27000 – O QUE É ? Um padrão britânico que trata da definição de requisitos para um Sistema de Gestão de Segurança da Informação - SGSI Confidencial
  • 16. ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Vocabulário e definições a serem utilizadas pelas demais Normas ISO 27006
  • 17. ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Define os requisitos para a implementação de um SGSI ISO 27006
  • 18. ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Atual ISO-17799, Define boas práticas para a gestão da segurança da Informação ISO 27006
  • 19. ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 É um Guia para a Implementação de um SGSI ISO 27006
  • 20. ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Define métricas para avaliar a eficácia de um SGSI ISO 27006
  • 21. ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Define linhas de orientação para a gestão de risco da segurança da Informação ISO 27006
  • 22. ISO 27000 – O QUE É ? ISO 27000 ISO 27001 ISO 27002 ISO 27003 ISO 27004 ISO 27005 Um guia para o processo de acreditação de entidades certificadoras ISO 27006
  • 23. ISO 27000 – O QUE É ? ISO 27007 ISO 27008 ISO 27011 ISO 27799 Um guia para auditoria do SGSI - 2009 Normas aprovadas para publicação Um guia para auditoria do com foco em controles de segurança - 2011 Um guia para gerenciamento da segurança da informação com foco em telecomunicações - 2009 Um guia para gerenciamento da segurança da informação com foco em saúde com base na ISO/IEC 17799 - 2009
  • 24. ISO 27000 – O QUE É ? ISO 27010 ISO 27031 ISO 27032 Um guia segurança do trabalho e comunicações Continuidade de negócio Cyber Security Normas aguardando confirmação ISO 27033 Segurança em rede / Detecção de Intrusos ISO 27034 Guia para Segurança em aplicações ISO 27051 Telecomunicações
  • 25. ISO 27000 – O QUE É ? ISO 27012 ISO 27013 Finanças ou Industria Automativa Manufatura ou Loterias Normas em especulação – especificas para a industria
  • 26. ISO 27000 – O QUE É ? ESTRUTURA DA ISO 27001
  • 27.
  • 28. ISO 27000 – PORQUE ADOTAR? INCIDENTES DE SEGURANÇA: 1999–2009
  • 29. ISO 27000 – PORQUE ADOTAR? Quais são os incidentes mais comuns e quais as melhores práticas para PREVENÇÃO – CONTENÇÃO – REAÇÃO?
  • 30. ISO 27000 – PORQUE ADOTAR? Quais são os incidentes mais comuns e quais as melhores práticas para PREVENÇÃO – CONTENÇÃO – REAÇÃO?
  • 31. ISO 27000 – PORQUE ADOTAR?
  • 32. ISO 27000 – PORQUE ADOTAR? Você já deu sua senha por prova de amor? Pense bem...
  • 33. ISO 27000 – PORQUE ADOTAR? SUA SENHA É SUA IDENTIDADE DIGITAL!!! O login com a senha determinam AUTORIA! Se alguém utilizar sua senha para fazer algo de errado em ambiente eletrônico, como retirar conteúdos da rede ou enviar uma mensagem ofensiva, O PRINCIPAL SUSPEITO SERÁ VOCÊ!
  • 34. ISO 27000 – PORQUE ADOTAR?
  • 35. ISO 27000 – PORQUE ADOTAR?
  • 36. ISO 27000 – PORQUE ADOTAR?
  • 37. ISO 27000 – PORQUE ADOTAR?
  • 38.
  • 39.
  • 40. ISO 27000 – PORQUE ADOTAR?
  • 41.
  • 42. ISO 27000 – PORQUE ADOTAR? ARQUITETURA DE REDE INSEGURA
  • 43. ISO 27000 – PORQUE ADOTAR? FALTA DE MONITORAMENTO EM TEMPO REAL BOMBAS LÓGICAS
  • 44.
  • 45. ISO 27000 – POR ONDE COMEÇAR ? DEFININDO UMA ESTRUTURA DE RESPOSTA A INCIDENTES DE SEGURANÇA
  • 46. ISO 27000 – POR ONDE COMEÇAR ?
  • 47. ISO 27000 – POR ONDE COMEÇAR ?
  • 48. ISO 27000 – POR ONDE COMEÇAR ?
  • 49. ISO 27000 – POR ONDE COMEÇAR ?
  • 50. ISO 27000 – POR ONDE COMEÇAR ?
  • 51. ISO 27000 – POR ONDE COMEÇAR ?
  • 52.
  • 53.
  • 54. ISO 27000 – PRINCIPAIS DESAFIOS
  • 55.
  • 56. ISO 27000 – PRÓXIMOS PASSOS
  • 57.
  • 58. ISO 27000 – PRÓXIMOS PASSOS MAPEAR E MONITORAR A REDE E LINKS
  • 59.
  • 60. ISO 27000 – PRÓXIMOS PASSOS
  • 61. ISO 27000 – PRÓXIMOS PASSOS GERÊNCIA CENTRALIZADA DE LOGS
  • 62.
  • 63. Verônica Simões – Diretora Geral [email_address] ITIL V3 EXPERT COBIT CGEIT ISO/IEC 27001 Lead Auditor ISO/IEC 20000 Lead Auditor itSMF Brasil Council Member PÓS- GRADUAÇÃO Gerência de Projetos PÓS- GRADUAÇÃO Gerência de Telecomunicações PÓS- GRADUAÇÃO E-Business A Segurança só atinge os seus objetivos sob a forma de mobilização geral. Obrigada a todos!!!