The risks weave back and forth affecting each other creating larger risks when viewed in a vacuum without looking at the 360 degree risk environment that can affect the organization. The traditional methods alone will not provide enterprise cost-effective controls based on enterprise risk, required security levels both physical and information and the associated cost controls. This session will give you an overview and you will receive valuable information that you can implement. This is a must in the new world that is facing new risks every year.
Objectives of the Presentation
Why Should you Attend
- Normative references
- Terms and definitions
- Service management system general requirements
- Design and transition of new or changed services
- Service delivery processes
- Relationship processes
- Resolution processes
- Control processes
Protecting your organization's information is critical for the successful management and smooth operation of your organization. By integrating ISO 20000-1 ITSM & ISO 27001 ISMS an organization is designing IT Service Management to incorporate Information Management Systems in a seamless Manner.
ISO/IEC 20000 reflects best practice guidance contained within the ITIL (Information Technology Infrastructure Library) framework, although it equally supports other IT service management frameworks and approaches including Microsoft Operations Framework and components of ISACA's COBIT framework. ISO/IEC 20000-1:2011 ('part 1') includes "the design, transition, delivery and improvement of services that fulfill service requirements and provide value for both the customer and the service provider.
ISO 27001 describes how to manage information security in a company. According to its documentation, ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system." By applying ISO 27001 standards effectively in your ERM system you can ensure a robust security for your organization's vital information assets.
Utilizing ISO/IEC 27001 information security management systems aid your organization in managing and protecting your valuable data and information assets. ISO 27001 not only helps to keep your confidential information secure but also provides customers and stakeholders with a confidence in your risk management system while ensuring you are meeting legal obligations.
Who can Benefit
- Risk assessment
- Security policy
- Organization of information security
- Asset management
- Human resources security
- Physical and environmental security
- Communications and operations management
- Access control
- Information systems acquisition, development and maintenance
- Information security incident management
- Business continuity management
Security Planners, CEOs, CFOs, CIOs, COOs, Technology Managers, Compliance, Auditors, All Large Corporations, ISSA, ISACA, Association of Contingency Planners, Audit Associations, Internal Auditors Association, Continuity Planners, Business Continuity Planners, Disaster Recovery Continuity Planners, Risk Managers and Internal Auditors