Www.tms-ua.com TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC 27001 & ISO/IEC 20000-1.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Service Delivery – your ticket to play
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Chapter 10 Accounting Information Systems and Internal Controls
IT Governance Infocom India Presentation December 6, 2006.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Dr. Julian Lo Consulting Director ITIL v3 Expert
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Security Controls – What Works
Adopt & Adapt Tips on Enterprise Data Management Annette Pence September 10, 2009 MITRE.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Environmental Management Systems Refresher
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
First Practice - Information Security Management System Implementation and ISO Certification.
Remedy, a BMC Software company Change Management Maximize Speed and Minimize Risk in the Change Process.
Session 3 – Information Security Policies
Presentation on Integrating Management Systems
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Fraud Prevention and Risk Management
Information Technology Service Management
Viktorija Donceva Trajkovski & Partners Management Consulting Ohrid, May 2009.
ISO 9000 Introduction Imran Hussain.
Welcome ISO9001:2000 Foundation Workshop.
Medicare Certification Systems Thilak Wickremasinghe, Director/CEO Sri Lanka Accreditation Board.
Effective Methods for Software and Systems Integration
SEC835 Database and Web application security Information Security Architecture.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information ITIL Technology Infrastructure Library ITIL.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
GRC - Governance, Risk MANAGEMENT, and Compliance
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Roles and Responsibilities
ITIL and the Help Desk Craig Bennion University of Utah
Challenges in Infosecurity Practices at IT Organizations
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
IT SERVICE MANAGEMENT (ITSM). ITIL\ITSM OVERVIEW  ITIL Framework.
Database Administration
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
State of Georgia (GTA) Asset Management Services Overview IBM Global Services December 11, 2008 © 2008 IBM Corporation Catherine Seats Asset Management.
State of Georgia Release Management Training
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
The Service Monitoring and Control Toolkit 1 Protect your business with an effective alert management system and high service availability.
Introduction to ITSM processes. CONFIDENTIAL Agenda Problem Management  Overview  High Level process Change Management  Overview  High Level process.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Information Security tools for records managers Frank Rankin.
ITIL® Service Asset & Configuration Management Foundations Service Transition Thatcher Deane 02/17/2010.
Models of Security Management Matt Cupp. Overview What is Security Management? What is Security Management? ISO/IEC ISO/IEC NIST Special Publication.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Information ITIL Technology Infrastructure Library ITIL.
COMP532 IT INFRASTRUCTURE
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
A Governance and Management System for POPI, ISO 27001, CGICT, King IV
Learn Your Information Security Management System
Information Technology Service Management
ITIL Service Transition - Invensis Learning
LM 8 Data Administration & Database Administration
Awareness and Auditor training kit
Presentation transcript:

TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC

TMS - Cooperation partner of TÜV SÜD INTRODUCTION A Management System is the framework of policies, processes and procedures used to ensure that an organization can fulfill all tasks required to achieve its objectives. Management responsibility Document management Resource management Management review Internal audit Continuous improvement Information security policy Risk management Information security controls Security incident management ISO 9001 Qualitymanagement Qualitymanagement ISO/IEC IT Service management ISO/IEC IT Service management ISO/IEC Information security management ISO/IEC Information security management

TMS - Cooperation partner of TÜV SÜD ISO/IEC IT SERVICE MANAGEMENT ISO is a global standard that describes the requirements for an information technology service management (ITSM) system. The standard was developed to mirror the best practices described within the IT Infrastructure Library (ITIL) framework. An IT Service organization can use ITIL to implement ITSM processes according to best practices, and ISO can be used for implementation and measurement of essential processes. ISO/IEC Specification ISO/IEC Code of Practice ITIL, CobiT, etc. Best practices Processes, Policies, Procedures, Instructions Requirements Management Overview Process definitions Deployed In-House

TMS - Cooperation partner of TÜV SÜD ISO/IEC INFORMATION SECURITY MANAGEMENT ISO is a specification for an information security management system (ISMS). An ISMS is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organisation's information risk management processes. Managements commitment to a management system providing governance over information company wide, data governance Asset inventory allowing the formal identification of information repositories in addition to software, hardware, people, telecommunications and physical property Information classification identifying the categories of information and what controls need to be applied during the course of regular business activities Continuous improvement allowing management to address quality, which translates into cost savings by supporting and following up on defects in service delivery impacting availability, software, information repositories impacting data integrity and confidentiality enforcing security standards and processes, etc.

TMS - Cooperation partner of TÜV SÜD INTEGRATED MANAGEMENT SYSTEM An Integrated Management System (IMS) combines all related components of a business into one system for easier management and operations. IT Service and Information Security management systems can be combined and managed as an IMS. These systems will be not separate systems that joined together, rather they will be integrated with linkages so that similar processes will seamlessly managed and executed without duplication. Cost and resource saving Risk management Finance performance Corporate reputation Improved communication Streamlined business operations

TMS - Cooperation partner of TÜV SÜD ISO AND ISO Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Context of the organization 5 Leadership 6 Planning 7 Support 8 Operation 9 Performance evaluation 10 Improvement Introduction 1 Scope 2 Normative references 3 Terms and definitions 7 Relationship processes c) & d) Information security policy 6 Service delivery processes 6.6 Information security management Maintain and improve the SMS Monitor and review the SMS 4.1 Management responsibility 4 Service management system general requirements Implement and operate the ISMS 6.3 Service continuity and availability management 5.2 Plan new or changed services Plan the SMS 4.5 Establish and improve the SMS Policy Definition of objectives Definition of roles and responsibilities Awareness Communications Control of documents and records Management of metrics Internal audit Management review Corrective/Preventive actions and continual improvement

TMS - Cooperation partner of TÜV SÜD TECHNICAL TOOLS Change management database system Management and planning Configuration identification Configuration control Status accounting Verification & audit Help desk system Knowledge Management Problem Management Access Management Service Catalog Data loss prevention system Discover where data is stored Monitor how data is being used Protect data from being leaked or stolen Security information and event management system Log management Turn data into useful information The automated events analysis Dashboards Gathering of compliance data (security, governance and auditing processes) Long-term storage of historical data Forensic analysis

TMS - Cooperation partner of TÜV SÜD SUCCESS STORY

TMS - Cooperation partner of TÜV SÜD TMS LLC 04070, Kyiv, Ukraine 9 Naberezhno-Khreschatitskaya str. Tel.: Fax: Management Systems Ltd. N4 Bokhua str. Tbilisi, Georgia Tel: ( ) TMS LLC 04070, Kyiv, Ukraine 9 Naberezhno-Khreschatitskaya str. Tel.: Fax: Management Systems Ltd. N4 Bokhua str. Tbilisi, Georgia Tel: ( )