“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd 2013 - 2014 Introducing The definitive,

Slides:



Advertisements
Similar presentations
ISMS implementation and certification process overview
Advertisements

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 1 ECC International PHILIPPINES :: MALAYSIA :: VIETNAM © 2010.
WORLD SCIENTIFIC USER GUIDE. Learn all about the new World Scientific platform We are really excited to be launching our new platform as it will enable.
Copyright Hub Software Engineering Ltd 2010All rights reserved Hub Workflow Product Overview.
Copyright Hub Software Engineering Ltd 2010All rights reserved Hub Document Manager Product Overview.
BI Web Intelligence 4.0. Business Challenges Incorrect decisions based on inadequate data Lack of Ad hoc reporting and analysis Delayed decisions.
Demonstration Slides And Screen Shots for A Complete Guide to ISO 9001: 2008 Click this button below to view full screen 
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
Extracting data from reports into Excel What is involved in mining report data for Excel? What is involved in mining report data for Excel? Why export.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Acceleratio specializes in developing high-quality enterprise.
Introduction to EndNote Martin Snelling March 2007.
First Practice - Information Security Management System Implementation and ISO Certification.
Microsoft Office 2000 Introducing the Suite. Microsoft Word Key Features of Word: create & edit documents apply formatting features add visual elements.
Contact us: (Toll Free)
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
Exporting reports – Data Integration & Presentation What is involved in presenting report data in other ways? What is involved in presenting report data.
© Copyright 2003, Binomial International Inc. Phoenix Business Continuity and Disaster Recovery Planning Software Recovery Planning Software Tools Recovery.
A Product of Event Management, Register, Schedule & Report Entire Back to Back Event Management Solution Copyright © ANGLER.
Sage Asset Manager Léonie Brown Solution Sales. Agenda  Introduction to Sage Asset Manager  Demonstration  Making the choice  Summary.
Process Analysis & Automation Our research delivers the highest quality process analytical technology and lab automation solutions ISO 9001 : 2000 certified.
Assess, Qualify and Design your MPS Business. Welcome IN-MAP Overview What are the Key IN-MAP Features? -Assists with assessment of your customers current.
Proprietary and Confidential 1. College Registration 2. College as Receiver 3. College as Sender Postsecondary Demonstrations.
Integrate your people maximize your knowledge Tel SalesBase Customer.
SecureAware Building an Information Security Management System.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
PO Box 1508, Vancouver, WA (360) THE COMMERCIAL & INDUSTRIAL BILLING SOLUTION.
AFISS, ◊ Tel: (519) ◊ ◊ ◊ Web: ◊
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
ECM in SaaS mode to maximize information sharing in a globalized world Business case: bwin.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
SRDR Quarterly Training Brown Evidence-based Practice Center Brown University June 20 th, :00pm-2:00pm Entering Data Retrospectively into SRDR The.
INTRODUCTION UTUBUNTU Why use Ubuntu for desktops? Ubuntu is a Fast, Secure and Easy-to-use operating system used by millions of people around.
Proprietary and Confidential 1. College Registration 2. College as Receiver 3. College as Sender.
LUCIDITY SOFTWARE GREATER CLARITY MAKES ORGANISATIONS MORE INTELLIGENT.
HARRIET Hazard, Assessment, Risk Review Identification and Evaluation Tool.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
Self Service Reporting Portal for Business Cizer.Net Reporting 4.0 Business Overview.
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
What are Wikibooks? What is a wiki? Clicklaw Wikibooks: the origin story, featuring the first wikibook Legal Help for British Columbians Benefits of wikibooks:
Adapted from Auditing User-Developed Applications (UDA) End User Computing (EUC) Global Technology Audit Guide GTAG® 14.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Accurate  Consistent  Compliant Contact: i4i the structured content company the structured content company.
Learn Integrated Management System Documentation Process with Ready-to-use EQHSMS Documentation Kit
ISO :2015 Documentation kit for Accreditation of Certifying Body - by Global Manager Group
CloudKit 365 Office 365 reporting made easy. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Acceleratio.
Presents. Examination Admission Fee receipt Transportation Library Fee card Demand Register Fee Day Book Due List Summary An Enterprise Resource Planning.
CMMI Certification - By Global Certification Consultancy.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
How Sage ERP X3 Systems Can Benefit Businesses.  Sage X3 is an affordable and flexible ERP solution designed to help mid-sized companies manage business.
ISO Standard  ISO Standard is an international standard that help to describe the requirements of an information technology service management.
IS YOUR ORGANISATION’S INFORMATION SECURE?
WORLD SCIENTIFIC USER GUIDE
Start Why ISO In WWM CRC?.
Learn Your Information Security Management System
GRACE Governance, Risk and Control Evaluation.
ISO Certification ISO is global standard specification for an information security management system. ISO Certification is applicable.
ISO Certification ISO Standard is specifies the requirements for a management system to reduce the risks and ensure your business recovers.
COMP3357 Managing Cyber Risk
6 Benefits of Using Microsoft Access Database. Microsoft Access is an efficient program that helps companies to carry out complex business processes in.
WORLD SCIENTIFIC USER GUIDE
Excel Macros: Automation for FREE!
Why ISO 27001? Subtitle or presenter
The fast, easy to use assessment tool
Why ISO 27001? MARIANNE ENGELBRECHT
WORLD SCIENTIFIC USER GUIDE
A Complete Guide to ISO 9001: 2008
A Complete Guide to ISO 9001: 2008
Awareness and Auditor training kit
Click2Export Export & Dynamics 365/CRM Reports/Word/Excel Templates in 1 Click
Presentation transcript:

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Introducing The definitive, ISO compliant Information Security Risk Assessment Tool

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd What is vsRisk™ and what can it do for you? vsRisk 2.0, the industry-leading ISO27001-compliant information security risk assessment tool, is now in its sixth year of continuous product evolution. Key benefits to organisations world-wide include: Simplification: minimises the manual hassle and complexity of carrying out an information security risk assessment, saving time and resources. Replication: risk assessments can be repeated easily in a standard format year after year. Generates Reports: for exporting, editing sharing across the business and with auditors. Automation: the fast, simple and easy way to carry out a risk assessment. Take a look at some of the features of vsRisk 2.0….

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Launch panel Select the appropriate framework from a choice of 3 standards

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Populating asset details

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Setting risk acceptance criteria

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Simultaneously assess CIA & BCL of assets

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Searchable threats, vulnerabilities & controls

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Reports can be saved in Microsoft Word, Excel and Adobe PDF formats Produce & Export: Statement of Applicability

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Produce & Export the Risk Treatment Plan

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Tackle risk assessments in no time Asset-by-asset risk assessment approach – saves time and costs Simple and easy to use interface Assess confidentiality, integrity & availability (CIA) for each of business, legal and contractual (BLC) aspects of information assets at the same time Integrated security is enabled through a single sign-on process Searchable database of threats and vulnerabilities Choose from 3 different controls sets including ISO 27001:2013 Delivers audit ready, ISO compliant documents such as the Statement of Applicability and Risk Treatment Plan

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Please contact us with any questions or if you are interested in an online demonstration– we will be more than happy to help. Tel: (44) Contact Download your 15-day free trial version now15-day free trial version now

“The definitive risk assessment tool for ISO27001 implementation and certification” Copyright © Vigilant Software Ltd Vigilant Software Ltd Makes Information Security Risk Management straightforward and affordable for all. Vigilant is a subsidiary of… IT Governance Ltd Globally acknowledged as a leading authority on IT governance and information security.