SecureAware Building an Information Security Management System.

Slides:



Advertisements
Similar presentations
COSO I COSO II. Meycor COSO, a Comprehensive Solution for Enterprise Risk Management (ERM)
Advertisements

I-Secure Product Overview © 2010 ECC International. All Rights Reserved 1 ECC International PHILIPPINES :: MALAYSIA :: VIETNAM © 2010.
Is your company drowning in a sea of documents and regulations ? Quality Systems Integrators presents... TMSWeb Quality Management Compliance System.
PhoenixPro Procurement. technology. contracts. projects.
Presentation by Priyanka Sawarkar
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Optimos Solutions – Working For You Presented to JMATE 2006.
Security Controls – What Works
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Copyright © 2007 Advantica Inc. (USA Only) and Advantica Ltd. (Outside USA). All rights reserved by the respective owner. Benefits of an Integrated Compliance.
First Practice - Information Security Management System Implementation and ISO Certification.
Business Driven Technology Unit 3
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
1 Michele Todd Microsoft Alliance Manager, Quest Member since 1996 Competencies including: Gold ISV competency Silver Virtualization competency Presenter.
Product Offering Overview CONFIDENTIAL AND PROPRIETARY Copyright ©2004 Universal Business Matrix, LLC All Rights Reserved The duplication in printed or.
Accounts Payables Invoice Automation for SharePoint.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
GyanSys Contact: Phone: Simplified Document Management Faster, Better, Stronger Search Integration - Site Mailbox.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Consultancy.
A Product of Copyright © ANGLER Technologies AURA – Quality Compliance Monitoring & Process Management System.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
MethodGXP The Solution for the Confusion.
IS 466 ADVANCED TOPICS IN INFORMATION SYSTEMS LECTURER : NOUF ALMUJALLY 3 – 10 – 2011 College Of Computer Science and Information, Information Systems.
The power of thought Misys Asset Management Systems Enterprise Application Integration.
Management Information Systems
Business Analysis: A Business Unit Perspective International Institute of Business Analysis January 18, 2012.
Unify and Simplify: Security Management
GRC - Governance, Risk MANAGEMENT, and Compliance
Challenges in Infosecurity Practices at IT Organizations
Information Asset Classification Strategy
Module N° 8 – SSP implementation plan. SSP – A structured approach Module 2 Basic safety management concepts Module 2 Basic safety management concepts.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
March 2014 Basic Content Management Tuffolo Group Perspective TUFFOLO.
Module 9 Configuring Messaging Policy and Compliance.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Providing Exclusive Services: Business Oriented Document Management Solution for Enterprise Alexander Mitrovich, Director Corporate Clients Nikolay Priezhiy.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 12 Integrating the Organization from End to End – Enterprise Resource Planning.
Module 7 Planning and Deploying Messaging Compliance.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
6 November 2013 Created for IEA Conference Presented by: M. Cristina Ferrari NAVFAC SW Environmental Program Manager Naval Facilities Engineering Command.
Solutions4Business Inc. “Your Consulting Partner for Strategic Supply Chain Initiatives” Mark Hehl Senior Consultant Solutions4Business Inc.
Comprehensive Project Management Solutions with the.NET Server family.
Microsoft ® Official Course Implementing Enterprise Content Management Microsoft SharePoint 2013 SharePoint Practice.
Modern Challenges for IT Governance, Risk, and Compliance in the Enterprise Brian Robison Product Manager McAfee Eric Fredericksen, PhD Solutions Architect.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Momentum. Strategy & Roadmapping Business Analysis Information Architecture Usability / User Experience Rich Media Social Media (Web 2.0) Interface Design.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
GRC: Aligning Policy, Risk and Compliance
Accurate  Consistent  Compliant Contact: i4i the structured content company the structured content company.
6/13/2015 Visit the Sponsor tables to enter their end of day raffles. Turn in your completed Event Evaluation form at the end of the day in the Registration.
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
ProcessFrame QMS Is a Quality Management System that Supports ISO 9001:2015 Standard and Runs on the Microsoft Azure Cloud Platform MICROSOFT AZURE ISV.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Primary Steps for Achieving ISO Certification.
Records Management with MOSS, K2, & PsiGen Deepa Patadia
On completion of the scenario, students will be able to: Learning Outcomes 1 Critically analyse and prioritise information security risks. 2 Systematically.
Compliance Management System. Intelex System Overview Focus Modules: –Permits Management –Monitoring & Measurement –Training Management –Document Control.
Articulate the major security risks and legal compliance issues for a Fire and Rescue Service. Identify and justify technical controls for securing remote.
IS YOUR ORGANISATION’S INFORMATION SECURE?
Start Why ISO In WWM CRC?.
Data Architecture World Class Operations - Impact Workshop.
92% of the world’s data was created in the past 2 years
Learn Your Information Security Management System
IT Considerations for CPT TEE Implementation
Presentation transcript:

SecureAware Building an Information Security Management System

Challenges  Complying with multiple regulations, requirements and best practices  Documenting compliance and security activities  Creating, managing and disseminating effective policies  Tracking policy knowledge, understanding and awareness

Trends  Complex Global Regulations  Legal liability risks  Supply chain and B2B trust  Maturing standards  Risk Management increasingly part of IT Security

The SecureAware Solution  SecureAware enables your organization to:  Have efficient compliance management  Create and disseminate rational policies  Ensure organizational accountability through unique user awareness programs tied directly to your policies and process  The Human Firewall  Perform Enterprise Risk Management (ERM)  Build an Information Security Management System (ISMS) aligned directly to your business

SecureAware Modules

SecureAware Platform

Key Technical Specifications  Java 2 Platform Enterprise Edition  Major SQL Platforms Supported  Hypersonic SQL included  LDAP and Active Directory Integration  XML, Web Services, and CSV for data exchange  Microsoft SharePoint Integration

Certify Once, Comply Many

Policy Management  Create Policies with Expert Guidance  Leverage ISO or your own policy  Link to or import related documents  Extend with industry specific standards

SecureAware Automatically  Generates PDF, Word and HTML Versions  Creates Policy Quizzes  Maps Policy again Standards and Regulations  Creates Custom role-based reports  Records who read the policy  Tracks training and awareness progress

Policy Management

Compliance Workflow Module  Fully integrated into Policy Module  Mange compliance oriented projects  Policy Development  Internal Audit  External Audit  Distributes tasks to owners  Integrates with and Active Directory

Compliance Gap Analysis Module  Check lists similar to controls in ISO & BS7799  Complete questionnaire including:  135 Controls  ~600 implementation guidelines  Role based compliance assessments  Individuals are assigned to different parts of compliance assessments  PDF reports with overview and details

Audit Questionnaire

Detailed Management Reporting

Risk Assessment Module  Business Impact Assessments  Vulnerability Assessments  Interest Level Assessment  Role-based Interviews  Archive for assets, systems and business processes and their relationships  PDF reporting

Risk Assessment Module  System Oriented Assessment  Qualitative Method  Use your own numerical weighting  Based on  Confidentiality  Integrity  Availability  Outcomes relates to business processes

Multi-lingual Reporting

Risk Assessments – 5 Quick Steps! 1. Business Processes and IT System 1. ID and dependencies 2. Assign Assessment Roles 3. Create and Start and Assessment Instance 4. Interviews 5. Review Draft Report

Awareness Program Module  Animated films for end users  Test for best practices and company policies  What makes a good password  What is the company policy for password storage  Management Reporting

Customize all Awareness Components

Animated Courseware

SecureAware Skins

Thank you