Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

ISO 27K Best Practices

No description
by

Faham Usman

on 16 June 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of ISO 27K Best Practices

Information Security
ISO 27K Best Practices
Awareness Campaign
Agenda
Salim is your Cyber Security Advisor.
Aims at promoting, building and ensuring a safer & secure cyber environment and culture in the UAE.

About aeCERT
One of the initiatives of the UAE Telecommunications Regulatory Authority.
aeCERT is the United Arab Emirates Computer Emergency Response Team.
About aeCERT
ISO
Information Security Threats
ISMS
Asset Maanagement
Human Resources Security
Security Policy
ISO27002:2013 Clauses
ISO27001 Methodology
Access Control
Cryptography
Physical & Environment Security
Operations Security
Conclusion
Compliance
Business Continuity Management
Information Security Incident Management
Communication Security

aeCERT
Salim (aeCERT)
@salim_aecert
For more information
www.aecert.ae
info@aecert.ae
Questions
What is ISO and IEC
ISO 27001/27002 : The Basics
ISO / IEC 27001 & 27002 :
Definitions
The Certification Process
What is Information?
The Challenge
Information Security
Why Information Security?
Information Security Threats
Potential Issues
Information Security Objectives
Why ISMS?
ISMS Cycle
Who Needs ISMS?
Implementing ISMS
ISMS Process
ISMS Process – Plan Phase
ISMS Process – Check Phase
ISMS Process – Act Phase
ISMS Documentation
Steps Towards Certification
Benefits of ISMS
ISO27001 - Methodology
ISO27001 - Methodology
ISO27001 - Methodology
ISO27001 - Methodology
ISO27001 - Methodology
ISO27001 - Methodology
ISO27001 - Methodology
Creating Information Security Management System
Creating Information Security Management System
Control Selection & Prepare Statement of Applicability
Security Architecture Definition
Multi-layered Security Architecture
Contingency Planning Process
Contingency Plan Structure
ISO 27002:2013
ISO 27002:2013
Comparison ISO 27002:2005 & 27002:2013
Comparison ISO 27002:2005 & 27002:2013
ISO 27002:2013 Clauses & Objectives
Every organization which values their information needs enough to protect it;
People, Process & Technology Controls
ISO 27002:2013 Benefits
ISO 27002:2013 Clauses
ISO 27002:2013 Clauses
ISO 27002:2013 Clauses
Security Policy
Organization of Information Security
Organization of Information Security
Human Resources Security
Human Resources Security
Human Resources Security
Asset Management
Asset Management
Asset Management
Access Control
Access Control
Access Control
Access Control
Cryptography
Physical & Environment Security
Physical & Environment Security
Operations Security
Operations Security
Operations Security
Operations Security
Operations Security
Operations Security
Operations Security
Operations Security
Communication Security
Communication Security
Systems Acquisition, Development and Maintenance
Systems Acquisition, Development and Maintenance
Systems Acquisition, Development and Maintenance
Suppliers Relationship
Suppliers Relationship
Information Security Incident Management
Business Continuity Management
Business Continuity Management
Compliance
Compliance
Conclusion
Conclusion
ISMS
ISMS Process – Do Phase
Full transcript