SlideShare a Scribd company logo
EBSL
           IT Operations


       EBSL Technologies Int'l
            www.ebsltechnologies.com
            internal consultant training


             Presented by

       Jon CRG Shende FBCS CITP
           Director IT Services
                        Part 1
                    June 19th 2008
Welcome to EBSL Technologies Int'l
    EBSL




Our following sessions will review principles of IT Operations
This will include :
โ€ข
     Technical and management concepts within IT (e.g. standards &
     preserving the C.I.A triad)
โ€ข
     Frameworks
โ€ข
     Planning for and Managing Risk with Disaster Recovery
โ€ข
     An Interactive Workshop in Management Consulting
โ€ข
     Metrics from 6 Sigma and Integrity Selling for your client facing
     duties.

                                                                         2
Frameworks Overview
  EBSL



ISO 27001:2005 & BS 17799 โ€“ ISO 27002:2005
CoBIT - Control Objectives for Information and Related Technology
ITIL     - IT Infrastructure Library
CMMi - Capability Maturity Model Integration
Firms need to be cognizant of framework overload
Organizations need to set implementation goals for frameworks with
adequate project management resources
 Proceed cautiously with any framework roll-out as the of-chance of an
incorrect categorization of control objectives and/or application can
defeat the purpose of a framework implementation & ROI assessment

                                                                         3
ISO 27001:2005 - basic overview
    EBSL




ISO -International Organization for Standardization
โ€ข
    ISO 27001/2 are management system standards that are applicable to
    all industry sectors
โ€ข
    ISO 27001 is a formal specification which defines specific
    requirements for establishing an Information Security Management
    System(ISMS).It is not a technical standard & emphasizes prevention
โ€ข
    It is a management system that should guide in an organizational
    balance of all aspects of security - physical,technical, procedural,
    and employee following a Plan-Do-Check-Act, Process Approach
โ€ข
    A Process Approach emphasizes user understanding of an
    organizationโ€™s information security requirements and can help define
    and establish information security policies and objectives.
                                                                           4
Summarizing ISO 27001
    EBSL




โ€ข
    It defines an information management framework which sets;
    directions, aims, objectives and defines a management approved
    policy which holds management commitment
โ€ข
    It's processes methodically identify security requirements by assessing
     security risks. The results of these assessments help guide the
    prioritizing of metrics to manage risks and the appropriate
    management action. This guides the selection and implementation of
    controls(policies, practices, procedures, organizational structures,
    software/hardware functions) and mechanisms.
โ€ข
    Controls implemented subjectively should follow the identification of
    security requirements. Their aim, to ensure that risks are reduced to an
    acceptable level while meeting an organization's security objectives.
                                                                               5
ISO 27001/2 - basic overview 2
    EBSL



ISO 27002
โ€ข
    Follows on the guideline of ISO27001's ISMS
โ€ข
    Can be regarded as a comprehensive collection of good security
    processes
โ€ข
    It is a standard code of practice which define techniques one can
    implement to secure data
โ€ข
    Both ISO 27001 & 27002 employs specific control statements which
    satisfy control objectives. We can group controls into six categories
โ€ข
    Detect, Protect, Deter, React, Avoid & Recover
โ€ข
    Per CoBIT โ€œControl objectives provide a complete set of high level
    requirements to be considered by managementโ€
                                                                            6
ISO 27001/2 generic controls
  EBSL




Control
 .                               Control Objectives
Detect    Identification of the occurrence of security event/s, then
          implement protective, reactive or recovery safeguard mitigation
Protect   Safeguarding vulnerable information assets and/or assets with
          exposures to adverse security events
Deter     Mitigate the possibility of undesirable events being attempted
React     Minimize the impact of a security event with an adequate
          response to ensure business continuity
Avoid     Eliminate known vulnerabilities via patches,software updates,
          signature updates and take steps to avoid new issues.
Recover   After an event ensure that confidentiality,integrity and         7
          availability of all information assets are restored to their
Controls
    EBSL




โ€ข
    Controls when properly implemented allow management to make well-
    informed risk management decisions.
โ€ข
    This leads to properly secured IT systems responsible for storing,
    processing, or transmitting organizational data
โ€ข
    Risk Management decisions justify IT related expenses via a
    cost/benefit analysis as well as assist management in supporting a
    system from it's documented risk management performance review
    which should be auditable
โ€ข
    Tying it together - for any one organization an integrated GRC mindset
    needs to sit in front of operations i.e. Governance, Risk Management
    and Compliance rather than being seen as three distinct entities

                                                                             8
ISO 27001 questions
    EBSL




Q. How does the ISO 27001/2 Series benefit our clients ?
โ€ข
    It provides a uniform an effective information security management
    process for an organization
โ€ข
    Proper implementation provides protection of organizational interests
    and that of their affiliates (subsidiaries, partners, vendors, customers)
โ€ข
    It is the aim of senior management to ensure an organization's IT goals
    align with it's business goals.
โ€ข
    By implementing the metrics within 27001/2 senior management can
    ensure that IT investments delivers value. Performance is accurately
    measured and resources allocated in a manner to ensure effective risk
    mitigation

                                                                                9
ISO 27001 questions
    EBSL




Q. What is an ISMS ?
โ€ข
    The Information Security Management System(ISMS) specifies
    requirements for establishing, implementing, operating, monitoring,
    reviewing, maintaining and improving an organization's documented
    ISMS.
โ€ข
    It should maintain an overview of the organization's overall business
    risks and specify requirements for the implementation of security
    controls. Controls should be customized to the needs of the whole or
    part of the organization.



                                                                            10
Why a Risk Assessment Methodology(RAM)?
    EBSL




   Assuring information security is a portion of the larger subject of Risk
Mitigation & Management. The most important takeaway from ISO 27001
should be establishing a risk assessment methodology (RAM)


โ€ข
 A RAM enables an IT Manager to secure data in a manner that      enables
security
Implementing a RAM ensures controls necessary to protect the business are
โ€ข


defined and implemented
RAM Provides metrics: results that are repeatable and comparable which
โ€ข


can measure controls effectiveness


                                                                          11
Why a Risk Assessment Methodology(RAM)?
EBSL




  A RAM ensures that controls implemented will not be overly
  complex,over-reaching or costly but rather tailored to organizational
  needs.
  ISO 27001/2 emphasizes the importance of controls which when
  implemented, impacts an organization's security statically.
  Controls need to be reassessed and at times either retired or improved
  as necessary
  A risk assessment methodology when properly implemented will
  ensure that an organization has the means to protect it's business
  functions at all times.


                                                                           12
Risk Relationships
       EBSL




Source SQUARE Process Nancy R. Mead, Software Engineering Institute                 13
https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/requirements/232-
BSI.html
Importance of Risk Management
    EBSL




Organizations should
โ€ข
    Establish and use a risk assessment methodology that takes into
    consideration all legal and regulatory responsibilities in addition to
    information security
โ€ข
    Implement a framework for Conducting Risk Assessments
โ€ข
    Quantify it's risks and either accept individual risks, or prioritize the
    implementation of security controls to mitigate (or not ) these risks in
    order of severity by developing a Risk Treatment Plan (RTP) which
    either
โ€ข
    Accepts, Avoids or Transfers Risk; or Implement pertinent security
    controls.
                                                                                14
Where do we go?
    EBSL




โ€ข
    Q1. How secure is the client if there are no metrics to measure
    security ?
โ€ข
    Q2. Is a system secure if it has never been breached ?
โ€ข
    Q3. The aim of a business is to realize a return on investment ( ROI);
    should ROI be more important than Risk Reduction Factor ?
โ€ข
    Q4. How secure are e-business partners?
โ€ข
    Q5. Are all the assets of an organization identified, listed and have
    proper ownership ?
โ€ข
    Q6 Does the organization have a reactive or proactive stance ?


                                                                             15
EBSL
       End of Part 1




          Questions ?




                        16

More Related Content

PDF
Five principles for improving your cyber security
WGroup
ย 
PPT
Use of the COBIT Security Baseline
Barry Caplin
ย 
PPT
Information Security Management Systems(ISMS) By Dr Wafula
Discover JKUAT
ย 
PDF
Implementing a Security Framework based on ISO/IEC 27002
pgpmikey
ย 
PPT
ISMS Part I
khushboo
ย 
PPTX
Isms
penetration Tester
ย 
DOCX
Iso 27001 2013 Standard Requirements
Uppala Anand
ย 
PDF
Isms awareness presentation
Pranay Kumar
ย 
Five principles for improving your cyber security
WGroup
ย 
Use of the COBIT Security Baseline
Barry Caplin
ย 
Information Security Management Systems(ISMS) By Dr Wafula
Discover JKUAT
ย 
Implementing a Security Framework based on ISO/IEC 27002
pgpmikey
ย 
ISMS Part I
khushboo
ย 
Iso 27001 2013 Standard Requirements
Uppala Anand
ย 
Isms awareness presentation
Pranay Kumar
ย 

What's hot (19)

PPT
Security policy
Dhani Ahmad
ย 
PPTX
Iso 27001 2013 clause 6 - planning - by Software development company in india
iFour Consultancy
ย 
PDF
How the the 2013 update of ISO 27001 Impacts your Risk Management
Lars Neupart
ย 
PDF
Transitioning to iso 27001 2013
SAIGlobalAssurance
ย 
PPT
The best way to use ISO 27001
powertech
ย 
PDF
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
Lars Neupart
ย 
PPTX
Presentation on iso 27001-2013, Internal Auditing and BCM
Shantanu Rai
ย 
PPTX
Iso 27001 awareness
รƒsฤงรขr รƒรขlรขm
ย 
PPTX
CISSP Online & Classroom Training & Certification Course - ievision.org
IEVISION IT SERVICES Pvt. Ltd
ย 
PDF
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
Lloyd's Register Quality Assurance Nederland
ย 
PDF
Rob kloots auditingforscyandbcm
Robert Kloots
ย 
PPT
Implementing security
Dhani Ahmad
ย 
DOC
The security risk management guide
Sergey Erohin
ย 
PPTX
Information Security Governance and Strategy - 3
Dam Frank
ย 
PDF
Iso 27001 Checklist
Craig Willetts ISO Expert
ย 
PPTX
D1 security and risk management v1.62
AlliedConSapCourses
ย 
PPT
Is awareness government
Hamisi Kibonde
ย 
PDF
Whitepaper iso 27001_isms | All about ISO 27001
Chandan Singh Ghodela
ย 
PDF
ISO 27001 (v2013) Checklist
Ivan Piskunov
ย 
Security policy
Dhani Ahmad
ย 
Iso 27001 2013 clause 6 - planning - by Software development company in india
iFour Consultancy
ย 
How the the 2013 update of ISO 27001 Impacts your Risk Management
Lars Neupart
ย 
Transitioning to iso 27001 2013
SAIGlobalAssurance
ย 
The best way to use ISO 27001
powertech
ย 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
Lars Neupart
ย 
Presentation on iso 27001-2013, Internal Auditing and BCM
Shantanu Rai
ย 
CISSP Online & Classroom Training & Certification Course - ievision.org
IEVISION IT SERVICES Pvt. Ltd
ย 
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
Lloyd's Register Quality Assurance Nederland
ย 
Rob kloots auditingforscyandbcm
Robert Kloots
ย 
Implementing security
Dhani Ahmad
ย 
The security risk management guide
Sergey Erohin
ย 
Information Security Governance and Strategy - 3
Dam Frank
ย 
Iso 27001 Checklist
Craig Willetts ISO Expert
ย 
D1 security and risk management v1.62
AlliedConSapCourses
ย 
Is awareness government
Hamisi Kibonde
ย 
Whitepaper iso 27001_isms | All about ISO 27001
Chandan Singh Ghodela
ย 
ISO 27001 (v2013) Checklist
Ivan Piskunov
ย 
Ad

Viewers also liked (19)

PPT
LeverX SAP PLM 7.0 Webinar
Eric Stajda
ย 
PPT
A2 media studies advanced portfolio evaluation
mattwinfield
ย 
PPT
Evaluation
mattwinfield
ย 
PPT
National Parks
Rubรฉn
ย 
PDF
Ebsl Technologies Jon Shende- Sas 70
Publicly traded global multi-billion services company
ย 
PPT
A&M
guest2a406
ย 
PPT
Endeavor Media
mattwinfield
ย 
PDF
Methods To Leverage SAP Workflow
Eric Stajda
ย 
PDF
LeverX - Making Use of SAP Guided Structure Synchronization In Your Environment
Eric Stajda
ย 
PDF
SAP StreamWork Webinar
Eric Stajda
ย 
PPT
Bury Tomorrow
mattwinfield
ย 
PPT
This Is Hell
mattwinfield
ย 
PPT
Preso
frijole
ย 
PDF
Integrating SAP EasyDMS With cProjects
Eric Stajda
ย 
PPT
Set Your Goals
mattwinfield
ย 
PDF
LeverX SAP PLM Rapid Prototype Case Study
Eric Stajda
ย 
PDF
LeverX SAP DMS Webinar
Eric Stajda
ย 
PDF
SAP Product Lifecycle Management: Implementation Tip, Tricks and Lessons
Eric Stajda
ย 
PDF
SAP PLM BOM (Bill of Material) Redlining
Eric Stajda
ย 
LeverX SAP PLM 7.0 Webinar
Eric Stajda
ย 
A2 media studies advanced portfolio evaluation
mattwinfield
ย 
Evaluation
mattwinfield
ย 
National Parks
Rubรฉn
ย 
Ebsl Technologies Jon Shende- Sas 70
Publicly traded global multi-billion services company
ย 
A&M
guest2a406
ย 
Endeavor Media
mattwinfield
ย 
Methods To Leverage SAP Workflow
Eric Stajda
ย 
LeverX - Making Use of SAP Guided Structure Synchronization In Your Environment
Eric Stajda
ย 
SAP StreamWork Webinar
Eric Stajda
ย 
Bury Tomorrow
mattwinfield
ย 
This Is Hell
mattwinfield
ย 
Preso
frijole
ย 
Integrating SAP EasyDMS With cProjects
Eric Stajda
ย 
Set Your Goals
mattwinfield
ย 
LeverX SAP PLM Rapid Prototype Case Study
Eric Stajda
ย 
LeverX SAP DMS Webinar
Eric Stajda
ย 
SAP Product Lifecycle Management: Implementation Tip, Tricks and Lessons
Eric Stajda
ย 
SAP PLM BOM (Bill of Material) Redlining
Eric Stajda
ย 
Ad

Similar to Ebsl Technologies It Operations Internal Presentation (20)

PPTX
FRAMEWORKS AND STANDARDS-GRC,GDPR,SOX,PCI DSS,SOX,ISO
alexangelmary99
ย 
PPTX
the role of 27001 in cybersecurity pp.pptx
floresmika308
ย 
PDF
G12: Implementation to Business Value
HyTrust
ย 
PDF
How to implement a robust information security management system?
ESET
ย 
PDF
Implementing ISO 27001: A Step-by-Step Guide
Ahad
ย 
PDF
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Alan Yau Ti Dun
ย 
PDF
Solve the exercise in security management.pdf
sdfghj21
ย 
PPTX
english_bok_ismp_202306.pptx
ssuser00d6eb
ย 
PPTX
20220911-ISO27000-SecurityStandards.pptx
Suman Garai
ย 
DOC
ISO27001
Ruchit Ahuja
ย 
PPT
Unit 4 standards.ppt
ClashWithGROUDON
ย 
PPTX
DOC-20250530-WA0008.pptx.................
salmannawaz6566504
ย 
PPTX
8 requirements to get iso 27001 certification in sri lanka
Anoosha Factocert
ย 
PDF
CISSP 8 Domains.pdf
dotco
ย 
PPTX
Governance and management of IT.pptx
Prashant Singh
ย 
PDF
Planning for-and implementing ISO 27001
Yerlin Sturdivant
ย 
PDF
IT General Controls (ITGC) - A Brief Overview
harinderrastogi884
ย 
PDF
Top 25 ISO 27001 Lead Auditor Interview Questions.pdf
infosec train
ย 
PPTX
ISO27001_COBIT_Students.pptx
jojo82637
ย 
DOCX
A Comprehensive Guide to ISO 27001 Standard for Information Security
4C Consulting Private Limited
ย 
FRAMEWORKS AND STANDARDS-GRC,GDPR,SOX,PCI DSS,SOX,ISO
alexangelmary99
ย 
the role of 27001 in cybersecurity pp.pptx
floresmika308
ย 
G12: Implementation to Business Value
HyTrust
ย 
How to implement a robust information security management system?
ESET
ย 
Implementing ISO 27001: A Step-by-Step Guide
Ahad
ย 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Alan Yau Ti Dun
ย 
Solve the exercise in security management.pdf
sdfghj21
ย 
english_bok_ismp_202306.pptx
ssuser00d6eb
ย 
20220911-ISO27000-SecurityStandards.pptx
Suman Garai
ย 
ISO27001
Ruchit Ahuja
ย 
Unit 4 standards.ppt
ClashWithGROUDON
ย 
DOC-20250530-WA0008.pptx.................
salmannawaz6566504
ย 
8 requirements to get iso 27001 certification in sri lanka
Anoosha Factocert
ย 
CISSP 8 Domains.pdf
dotco
ย 
Governance and management of IT.pptx
Prashant Singh
ย 
Planning for-and implementing ISO 27001
Yerlin Sturdivant
ย 
IT General Controls (ITGC) - A Brief Overview
harinderrastogi884
ย 
Top 25 ISO 27001 Lead Auditor Interview Questions.pdf
infosec train
ย 
ISO27001_COBIT_Students.pptx
jojo82637
ย 
A Comprehensive Guide to ISO 27001 Standard for Information Security
4C Consulting Private Limited
ย 

Recently uploaded (20)

PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
ย 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
ย 
PPTX
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
ย 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
ย 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
ย 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
ย 
PDF
This slide provides an overview Technology
mineshkharadi333
ย 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
ย 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
ย 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
ย 
PDF
Doc9.....................................
SofiaCollazos
ย 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
ย 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
ย 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
ย 
PPTX
Dev Dives: Automate, test, and deploy in one placeโ€”with Unified Developer Exp...
AndreeaTom
ย 
PPTX
How to Build a Scalable Micro-Investing Platform in 2025 - A Founderโ€™s Guide ...
Third Rock Techkno
ย 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
ย 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
ย 
PDF
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
ย 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
ย 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
ย 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
ย 
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
ย 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
ย 
REPORT: Heating appliances market in Poland 2024
SPIUG
ย 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
ย 
This slide provides an overview Technology
mineshkharadi333
ย 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
ย 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
ย 
cloud computing vai.pptx for the project
vaibhavdobariyal79
ย 
Doc9.....................................
SofiaCollazos
ย 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
ย 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
ย 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
ย 
Dev Dives: Automate, test, and deploy in one placeโ€”with Unified Developer Exp...
AndreeaTom
ย 
How to Build a Scalable Micro-Investing Platform in 2025 - A Founderโ€™s Guide ...
Third Rock Techkno
ย 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
ย 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
ย 
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
ย 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
ย 

Ebsl Technologies It Operations Internal Presentation

  • 1. EBSL IT Operations EBSL Technologies Int'l www.ebsltechnologies.com internal consultant training Presented by Jon CRG Shende FBCS CITP Director IT Services Part 1 June 19th 2008
  • 2. Welcome to EBSL Technologies Int'l EBSL Our following sessions will review principles of IT Operations This will include : โ€ข Technical and management concepts within IT (e.g. standards & preserving the C.I.A triad) โ€ข Frameworks โ€ข Planning for and Managing Risk with Disaster Recovery โ€ข An Interactive Workshop in Management Consulting โ€ข Metrics from 6 Sigma and Integrity Selling for your client facing duties. 2
  • 3. Frameworks Overview EBSL ISO 27001:2005 & BS 17799 โ€“ ISO 27002:2005 CoBIT - Control Objectives for Information and Related Technology ITIL - IT Infrastructure Library CMMi - Capability Maturity Model Integration Firms need to be cognizant of framework overload Organizations need to set implementation goals for frameworks with adequate project management resources Proceed cautiously with any framework roll-out as the of-chance of an incorrect categorization of control objectives and/or application can defeat the purpose of a framework implementation & ROI assessment 3
  • 4. ISO 27001:2005 - basic overview EBSL ISO -International Organization for Standardization โ€ข ISO 27001/2 are management system standards that are applicable to all industry sectors โ€ข ISO 27001 is a formal specification which defines specific requirements for establishing an Information Security Management System(ISMS).It is not a technical standard & emphasizes prevention โ€ข It is a management system that should guide in an organizational balance of all aspects of security - physical,technical, procedural, and employee following a Plan-Do-Check-Act, Process Approach โ€ข A Process Approach emphasizes user understanding of an organizationโ€™s information security requirements and can help define and establish information security policies and objectives. 4
  • 5. Summarizing ISO 27001 EBSL โ€ข It defines an information management framework which sets; directions, aims, objectives and defines a management approved policy which holds management commitment โ€ข It's processes methodically identify security requirements by assessing security risks. The results of these assessments help guide the prioritizing of metrics to manage risks and the appropriate management action. This guides the selection and implementation of controls(policies, practices, procedures, organizational structures, software/hardware functions) and mechanisms. โ€ข Controls implemented subjectively should follow the identification of security requirements. Their aim, to ensure that risks are reduced to an acceptable level while meeting an organization's security objectives. 5
  • 6. ISO 27001/2 - basic overview 2 EBSL ISO 27002 โ€ข Follows on the guideline of ISO27001's ISMS โ€ข Can be regarded as a comprehensive collection of good security processes โ€ข It is a standard code of practice which define techniques one can implement to secure data โ€ข Both ISO 27001 & 27002 employs specific control statements which satisfy control objectives. We can group controls into six categories โ€ข Detect, Protect, Deter, React, Avoid & Recover โ€ข Per CoBIT โ€œControl objectives provide a complete set of high level requirements to be considered by managementโ€ 6
  • 7. ISO 27001/2 generic controls EBSL Control . Control Objectives Detect Identification of the occurrence of security event/s, then implement protective, reactive or recovery safeguard mitigation Protect Safeguarding vulnerable information assets and/or assets with exposures to adverse security events Deter Mitigate the possibility of undesirable events being attempted React Minimize the impact of a security event with an adequate response to ensure business continuity Avoid Eliminate known vulnerabilities via patches,software updates, signature updates and take steps to avoid new issues. Recover After an event ensure that confidentiality,integrity and 7 availability of all information assets are restored to their
  • 8. Controls EBSL โ€ข Controls when properly implemented allow management to make well- informed risk management decisions. โ€ข This leads to properly secured IT systems responsible for storing, processing, or transmitting organizational data โ€ข Risk Management decisions justify IT related expenses via a cost/benefit analysis as well as assist management in supporting a system from it's documented risk management performance review which should be auditable โ€ข Tying it together - for any one organization an integrated GRC mindset needs to sit in front of operations i.e. Governance, Risk Management and Compliance rather than being seen as three distinct entities 8
  • 9. ISO 27001 questions EBSL Q. How does the ISO 27001/2 Series benefit our clients ? โ€ข It provides a uniform an effective information security management process for an organization โ€ข Proper implementation provides protection of organizational interests and that of their affiliates (subsidiaries, partners, vendors, customers) โ€ข It is the aim of senior management to ensure an organization's IT goals align with it's business goals. โ€ข By implementing the metrics within 27001/2 senior management can ensure that IT investments delivers value. Performance is accurately measured and resources allocated in a manner to ensure effective risk mitigation 9
  • 10. ISO 27001 questions EBSL Q. What is an ISMS ? โ€ข The Information Security Management System(ISMS) specifies requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's documented ISMS. โ€ข It should maintain an overview of the organization's overall business risks and specify requirements for the implementation of security controls. Controls should be customized to the needs of the whole or part of the organization. 10
  • 11. Why a Risk Assessment Methodology(RAM)? EBSL Assuring information security is a portion of the larger subject of Risk Mitigation & Management. The most important takeaway from ISO 27001 should be establishing a risk assessment methodology (RAM) โ€ข A RAM enables an IT Manager to secure data in a manner that enables security Implementing a RAM ensures controls necessary to protect the business are โ€ข defined and implemented RAM Provides metrics: results that are repeatable and comparable which โ€ข can measure controls effectiveness 11
  • 12. Why a Risk Assessment Methodology(RAM)? EBSL A RAM ensures that controls implemented will not be overly complex,over-reaching or costly but rather tailored to organizational needs. ISO 27001/2 emphasizes the importance of controls which when implemented, impacts an organization's security statically. Controls need to be reassessed and at times either retired or improved as necessary A risk assessment methodology when properly implemented will ensure that an organization has the means to protect it's business functions at all times. 12
  • 13. Risk Relationships EBSL Source SQUARE Process Nancy R. Mead, Software Engineering Institute 13 https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/requirements/232- BSI.html
  • 14. Importance of Risk Management EBSL Organizations should โ€ข Establish and use a risk assessment methodology that takes into consideration all legal and regulatory responsibilities in addition to information security โ€ข Implement a framework for Conducting Risk Assessments โ€ข Quantify it's risks and either accept individual risks, or prioritize the implementation of security controls to mitigate (or not ) these risks in order of severity by developing a Risk Treatment Plan (RTP) which either โ€ข Accepts, Avoids or Transfers Risk; or Implement pertinent security controls. 14
  • 15. Where do we go? EBSL โ€ข Q1. How secure is the client if there are no metrics to measure security ? โ€ข Q2. Is a system secure if it has never been breached ? โ€ข Q3. The aim of a business is to realize a return on investment ( ROI); should ROI be more important than Risk Reduction Factor ? โ€ข Q4. How secure are e-business partners? โ€ข Q5. Are all the assets of an organization identified, listed and have proper ownership ? โ€ข Q6 Does the organization have a reactive or proactive stance ? 15
  • 16. EBSL End of Part 1 Questions ? 16