Information Security based on International Standard ISO 27001

Slides:



Advertisements
Similar presentations
Innovation or Necessity? ISM 158 By: Sepehr Saeb.
Advertisements

Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
“Limiting electronic fraud through an Information Security Management System (ISMS): An Introduction to ISO 27001" Presented to the ICGFM Annual Conference.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Computer Security: Principles and Practice
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Session 3 – Information Security Policies
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Adaptive Processes Simpler, Faster, Better 1 Adaptive Processes Understanding Information Security ISO / BS7799.
Agenda  Introduce key concepts in information security from the practitioner’s viewpoint.  Discuss identifying and prioritizing information assets through.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
Data Protection in Financial Services Are you Seeing the Bigger Picture? 17 September 2008.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Evolving IT Framework Standards (Compliance and IT)
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
GRC - Governance, Risk MANAGEMENT, and Compliance
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Internal/External Audit Corporate Governance part 5.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
Protecting your Managed Services Practice: Are you at Risk?
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
E-FINANCE CHAPTER 6 RISK AND CHALLENGES Risk and Challenges, V.C joshi (2004), E-finance Log into the future, 2nd Edition, Thousand Oakes, London, E-finance:
Information Management System Ali Saeed Khan 29 th April, 2016.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Auditors’ Dilemma – reporting requirements on Internal Financial Controls under the Companies Act 2013 and Clause 49 of the Listing agreement V. Venkataramanan.
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Securing Information Systems
Unit 4: Impact of the Use of IT on Business Systems
Security Management in Practice
CPA Gilberto Rivera, VP Compliance and Operational Risk
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
Lecture 09 Network Security Management through the ISMS
Learn Your Information Security Management System
Current ‘Hot Topics’ in Information Security Governance Auditing
GDPR Awareness and Training Workshop
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Group No.2 Sagar 07 Husain 08 Sunil 09 Arup 10 Rahul 11 Saad 12
Chapter 9 Control, security and audit
Securing Information Systems
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
Tony Chebli.
QUALITY MATTERS - OVERVIEW OF ISO QUALITY MANAGEMENT SYSTEM
INFORMATION SYSTEMS SECURITY and CONTROL
ISO/IEC BRIEFING..
Chapter # 3 COMPUTER AND INTERNET CRIME
Explain the role of ethics in financial- information management
Accounting Information Systems & Computer Fraud
Presentation transcript:

Information Security based on International Standard ISO 27001 September 17, 2018 Information Security based on International Standard ISO 27001 Tony Chebli, CISSP Credit Libanais Head of Information Security

September 17, 2018 Our Mission “INFORMATION is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably PROTECTED” “…...Whatever form the information takes, or means by which it is shared or stored, it should always be appropriately protected”

Information Security Objectives

The Pain

Vulnerabilities! Lack of appreciation of threats Arrogance: It won’t happen to us Staff / Contractors / Employees E-mail and Internet access Physical Security Outsourcing Remote working Rush to market Growth in networking and distributed computing Low awareness of security issues Poor Controls

Shareholder Relations Legal and Regulatory action Business Risks! Fraud Disclosure Denial of Service Damage to Reputation Loss of Customers Shareholder Relations Legal and Regulatory action = Financial Loss

Cost of none Compliance! Regulatory fines Loss of information Unauthorized disclosure of intellectual property Loss of customers Loss of business Damage to Image

When it happens! Who is responsible for appropriately protecting information? Who will be held accountable if information is inappropriately protected and disclosed? What would be the impact on the Banks/Organizations?

The Medicine

What is ISO 27002? ISO 27002 is the only internationally accepted standard for information security management ISO 27002 is about safeguarding your business information ISO 27002 is a Code of Practice for Information Security Management and may be regarded as a starting point for developing organization specific guidance. 114 controls +

What is ISO 27001? ISO 27001 is a process to develop and implement an information security management system (ISMS) ISO 27001 is the only auditing specification for information security management systems

What is ISO 27001? It does not insist that organizations should have firewalls or even computers. It does not say that organizations’ systems are the same It does not dictate anything. ‘precautions are required to prevent and detect the introduction of malicious software’ ‘It is essential that organizations identifies their own security requirements’

Information Security Management System (ISMS) What is ISO 27001? is a management tool…! To manage problems with an: Information Security Management System (ISMS)

What is ISMS? The ISO27001 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. The International Standard also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in the Standard are generic and are intended to be applicable to all organizations, regardless of type, size or nature.

The roadmap

Benefits

Benefits Confidence Competitive Edge Enforced regulations Gain new customers Focused staff responsibilities Survival IMAGE Profitability $

Benefits Provides excellent checklist of available controls Forms a sound basis for Information Security Policy Tangible demonstration of appropriate practices To business clients To end-user clients To auditors To Regulators

Benefits Safeguard information assets appropriately Controls driven by risk No under protection No over protection

Demand for Certification Financial Services, Banking Telecommunications IT sector- outsourcing E-commerce Networking Public Service Authorities Police Force

References: ISO27001-2013 Pictures from the Internet