Download presentation
Presentation is loading. Please wait.
Published byDarrell Sherman Modified over 9 years ago
1
SME Security
2
Articulate the major security risks and legal compliance issues for an SME.Explain and justify approaches of investment on InfoSec controls, including ROSI.Explain the key features of ISO 27001 and risk assessment. Explain key features and requirements for an Information Security culture and suggest activities for developing it. Analyse and discuss the relevance of Cyber Essentials and BMIS to the scenario.Identify and outline key policies required and HR processes. Identify and justify technical controls for securing remote access and data governance. Learning Outcomes
3
1.Information security concepts / controls including: Confidentiality, integrity, availability Information assets, threat, vulnerability, impact, likelihood, risk 2.Teamwork. Pre-Requisite Knowledge
4
Quiz Introduction
5
Quiz Click the Quiz button to edit this quiz
6
SME Security Leading Edge Removals is an SME based locally in Skelmersdale. Provides high quality services both to and from the UK and international destinations. Grown from a local and regional removals company to starting international removals. The company is ambitious and sees opportunities to expand. SME Security
7
Information Security The management team does not fully appreciate the information security risks or the measures needed. The company has limited financial and technical resources and the most important thing for them is their need must fit their revenue. Security Measures in place Leading Edge Removals Adequate Security Information Security: Not Appreciated?
8
Interview Video Transcript
9
Your Task: Stage 1
10
Your Task: Stage 2
11
You have articulated the major security risks and legal compliance issues for an SME. Explained and justified the approaches of investment on InfoSec controls, including ROSI. Explained the key features of ISO 27001 and Risk Assessment. Explained key features and requirements for an Information Security culture and suggest activities for developing it. Analysed and discussed the relevance of Cyber Essentials and BMIS to the scenario.Identified and outlined key policies required and HR processes. Identified and justified technical controls for securing remote access and data governance. Summary
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.