Some organizations implement ISO/IEC Information security INTERNATIONAL

Size: px
Start display at page:

Download "Some 4 500 organizations implement ISO/IEC 27001. Information security INTERNATIONAL"

Transcription

1 Some organizations implement ISO/IEC for information security The author reports on global progress in the implementation of the international information security management system standard ISO/IEC 27001:2005, with testimonials from early adopters among the organizations now certified to the standard. by Edward Humphreys The author, Professor Edward Humphreys, is Convenor of ISO/IEC JTC 1/SC 27, Information technology, WG 1. [email protected] Most of us depend more than ever on IT systems, wireless and mobile telephone networks and increasing connectivity in today s business environment. But organizations are challenged with threats to these systems, exposing assets to risk. However, implementing and managing effective information security provides organizations with the means to minimise these risks while maximising business opportunities and investments. In addition to IT dependency, we also face greater government, legislative and regulatory requirements which often have information security consequences that add to our business challenges. International Standard ISO/ IEC 27001:2005, Information technology Security techniques Information security management systems Requirements, was developed as a common business language to help information security management address the needs of small, medium or large organizations from all business sectors. The business case for ISO/IEC Thousands of organizations around the world have already benefited from applying ISO/ IEC based information security management systems (ISMS), especially the to date that have become certified. The business drivers and benefits include : improved business performance from reduced operational risks ; enhanced customer confidence and trust from demonstrating fitness for purpose, by doing business securely ; decrease in negative business impacts and financial losses ; improved market positioning and competitive advantage ; greater protection of business continuity and availability of services. Limitless range The range of ISO/IEC implementers seems limitless, and includes such diverse organizations as tin mines, waxed carton producers, oil and gas suppliers, schools and universities, logistics companies, small businesses, low- to high-tech businesses, healthcare services, on-line banking, multinationals, governments, 20 ISO Management Systems July-August 2008

2 and international institutions such as the World Bank and the UN. Such diversification affects businesses and their customers, consumers and the general public. The following case studies reflect the widespread applicability of the standard. IWF and ISO/IEC The first features the Internet Watch Foundation (IWF), a self-regulatory body and charity operating the United Kingdom s Internet hotline for the public and IT professionals to report their inadvertent exposure to potentially illegal online content, primarily images of child sexual abuse. The IWF works to remove that content from the Internet and facilitates the initiative allowing UK Internet service providers to protect their customers from inadvertently accessing sexually abusive images of children. Fred Langford, IWF Director of Technology and Content, describes the organization s experiences with information security management and ISO/ IEC : The IWF receives significant attention both in the UK and overseas and is often subject to public, media and international scrutiny. As such there is a requirement to demonstrate to stakeholders, including the government, law enforcement, Fred Langford, Director of Technology and Content, IWF. Web charities, the online sector and others, that all possible steps are taken to ensure information security. Recent media attention on data breaches within the public and private sectors serve to underline the importance of this commitment to the highest possible standard in this area. We initially investigated ISO/ IEC certification in 2005 following advice from security advisors, 7Safe. Previously the IWF had internal controls, which were externally audited; however, these were not part of a company-wide system that managed the security of sensitive information and risk. Certification provided the IWF with a valuable framework that is now used to resolve security issues, ensuring that they remain visible and part of a review process. The adoption of an ongoing, robust process such as this also serves to enhance the security awareness of all employees ISO Management Systems July-August

3 and their role within the report and review cycle. Once certification was achieved, internal and external stakeholder confidence in, and perception of, the IWF increased and associated organizations have begun to show an interest in gaining similar accreditation. As the IWF is responsible for extremely sensitive data that must not be released into the public domain under any circumstances, ISO/IEC certification further increased client and associate confidence that risk is managed within exemplary internal security implementation. The process required to gain certification has helped us formalize good practice standards internally, following ISO/IEC principles. Effective information security provides organizations with the means to minimise risks An additional factor in the IWF pursuing certification was its worldwide relevance ; especially considering the global nature of the Internet, the area of criminality with which the IWF deals, and the international arena in which it provides intelligence, evidence and expertise. Security was always paramount to the IWF the high standards of the organization s processes, network and information security is now increased, formal and evident. PCCW and ISO/IEC The second case study features PCCW Limited, the largest communications provider in Hong Kong, and one of Asia s leading technology players in new generation fixedline telephony, broadband, IT, wireless and delivery of home entertainment, enabling organizations to bring their business to Asia and take Asian business to the rest of the world. Dale Johnstone, the company s Chief Security Officer, outlines PCCW s involvement in information security management and ISO/IEC 27001: Dale Johnstone, Chief Security Officer, PCCW Limited. Web PCCW applied international information security management standards prior to 2000 and has always considered the security of stored and communicated information assets a high priority of crucial importance to PCCW in protecting its own, customer, and business partner information assets in accordance with the interests of all stakeholders. In March 2002, PCCW became the first telecom operator in the greater China region to attain ISO/IEC certification, currently maintains four separate certifications in different business units and provides consulting services to other organizations to help them achieve and maintain their own ISO/IEC certifications. The range of ISO/IEC implementers seems limitless PCCW demonstrated a strong public commitment in achieving ISO/IEC certification, enshrining the fundamental principle that PCCW will at all times aim to protect information in its possession, in accordance with the highest levels of international standards a qualification all information and communication technology companies should strive to achieve. The benefits PCCW achieved through ISO/IEC certification include : enhanced cultural awareness of all PCCW stakeholders in understanding the need for information security ; an understanding of the true value of the information assets held in its possession ; an appreciation of the risk management approach to the protection of information assets ; increased PCCW compliance with government regulations, inclusive of privacy controls and how information is secured and protected. ISO/IEC certification has positioned PCCW well in responding effectively to the increasing complexity of government regulations in the countries in which PCCW operates throughout the world. Another major benefit of obtaining and maintaining its ISO/IEC certifications is the knowledge that, in doing so, PCCW is setting a trend for the Asia Pacific information and communication technology industry. GFI and ISO/IEC The final case study illustrates the worldwide influence of legislation and regulation on the implementation of information security, particularly regarding data protection and privacy. Also coming into force are governance regulations such as Sarbanes Oxley (SoX) and Basel II, and cyber laws on hacking and spam. Tokyo-based Global Friendship Inc. (GFI) develops privacy and information security technology to ensure compliance with Japanese regulations, and is itself compliant by virtue of ISO/IEC certification. Yutaka Yasukura, GFI CEO, explains: In 2003, Japan adopted the Protection of Personal Information Act (No. 57), now obligatory, which has led to increased awareness of data 22 ISO Management Systems July-August 2008

4 Regional adoption Yutaka Yashukura, CEO, Global Friendship Inc. Web management among every business and market in the country. GFI introduced an information security solution called GFI E-Tally, to help organizations comply with the Act. Implementation is driven by the need to provide confidence Instead of encryption, our software uses secret sharing technology which processes highly confidential information into meaningless decomposed data. This data is no longer considered to be personal information, as defined in the Act; thus, obligation to protect personal data no longer applies and helps save cost for data storage and management required by law. GFI E-Tally, which fulfils the requirements of CIA confidentiality, integrity and availability was developed primarily to ensure the confidentiality of files created by any entity. Figure 1 ISO/IEC certifications by sector. GFI was audited and certified to ISO/IEC by TÜV Rheinland Japan Ltd. using GFI E-Tally technology applied to our own information security management system. Third party review for ISMS certification gave us a better understanding of the risks related to product development, while achieving certification gives us confidence in the security of services provided by GFI. ISO/IEC certification led to the success of GFI E-Tally as an alternative to encryption, and helps us explain to clients that it is applicable to ISMS and has the potential for world-wide acceptance. Sector adoption The services, telecoms, financial services, manufacturing, healthcare, government and utilities sectors are the most dominant in ISO/IEC adoption. Figure 1 shows the breakdown of the current ISO/IEC certificates by sector, and Table 1 indicates the subdivision of the services, technology and finance and insurance sectors by specialization. Services Advertising Business solutions Consultancy services Consumer services Data collection services Distribution services Entertainment industry ICT services Information services Logistic services Managed data services Marketing services Music industry Outsourcing Postal services Publishing industry Recruitment services Research services Technology Table 1 Specializations of ISO/IEC certified organizations in three main sectors. Generally, implementation is driven by the need to provide customer assurance and confidence, i.e. fit for purpose, outsourcing arrangements, increasing information security risks, and governance, compliance, legislation and regulations. The design, development, manufacturing and selling of ICT such as : Asia represents over 66 % of the total number of ISO/IEC certificates issued to date, followed by Europe with 20 %. There are close similarities between the types of business in Asia and Europe that have pursued certification (see Figure 2, overleaf). Computer hardware Electrical goods Electronic goods Multimedia devices Communications devices Network equipment Scientific instruments Software Finance and Insurance Asset management Banking (wholesale) Banking (retail) Health insurance Insurance brokers Life insurance Medical insurance Mortgage investment Property management Real estate development Savings and loans Stock brokers The ICT sector is most prominent among certified organizations in Hong Kong, Malaysia and Singapore, while Telecoms sector representation is strong in Hong Kong but not yet in Malaysia. Conversely, 26 % of all certifications in ISO Management Systems July-August

5 Malaysia are from the financial services sector, but only 6 % and 8 % respectively in Hong Kong and Singapore. Government departments on the other hand are just starting on the road to ISMS certification (see Table 2). ISMS adoption in important sectors such as healthcare is currently lagging behind that of Japan, Korea and Europe. In addition, representation of professional and information services remains low compared with Europe. Africa and Middle East ISO/IEC/ implementation in Africa and the Middle East is starting to grow, with banks, telecoms, oil and gas companies leading the way. Dr. Angelika Plate, ISMS Consultant for Aexis Security Consultants, comments on progress : Information security is becoming a hot topic in the Middle East, particularly in Bahrain, Oman, Saudi Arabia and the United Arab Emirates as the dependency being placed on information processing and Dr. Angelika Plate, ISMS Consultant, Aexis Security Consultants. Web IT services continues to accelerate. More and more organizations in the region are adopting ISO/IEC to manage their information security and benefit from applying such best practice standards that have already proven useful around the world. Interest in certification continues to grow (the numbers have doubled in the last year) and more are in the pipeline. There is also interest in integrated management systems combining, for example, ISO/ IEC with the service management standard ISO/ IEC Figure 2 ISO/IEC certifications by region. Hong Kong Malaysia Singapore ICT 32 % 50 % 41 % Telecoms 25 % 11 % Financial services 6 % 26 % 8 % Manufacturing 4 % 5 % 8 % Government 4 % 9 % 8 % Professional services 11 % 8 % Information services 4 % 15 % Education 5 % Engineering 6 % 5 % Healthcare 4 % Logistics and transportation 4 % 5 % Table 2 ISO/IEC certifications in Hong Kong, Malaysia and Singapore. 24 ISO Management Systems July-August 2008

Preparing yourself for ISO/IEC 27001 2013

Preparing yourself for ISO/IEC 27001 2013 Preparing yourself for ISO/IEC 27001 2013 2013 a Vintage Year for Security Prof. Edward (Ted) Humphreys ([email protected]) [Chair of the ISO/IEC and UK BSI Group responsible for the family of ISMS standards,

More information

How to implement an ISO/IEC 27001 information security management system

How to implement an ISO/IEC 27001 information security management system How to implement an ISO/IEC 27001 information security management system The March-April issue of ISO Management Systems reported positive user feedback on the new ISO/IEC 27001:2005 standard for information

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

opinion piece IT Security and Compliance: They can Live Happily Ever After

opinion piece IT Security and Compliance: They can Live Happily Ever After opinion piece IT Security and Compliance: They can Live Happily Ever After Contents Pitfalls, misconceptions and mistakes 01 It s not all doom and gloom 01 Take the right steps towards compliance and IT

More information

Information Security Management System Policy

Information Security Management System Policy Information Security Management System Policy Public Version 3.3 Issued Document Name Owner P079A ISMS Security Policy Information Security Security Policies, Standards and Procedures emanate from the

More information

Software-as-a-service Delivery: The Build vs. Buy Decision

Software-as-a-service Delivery: The Build vs. Buy Decision white paper Software-as-a-service Delivery: The Build vs. Buy Decision Introduction In order to deliver software on-demand, companies must either build and manage an infrastructure capable of supporting

More information

Security in Fax: Minimizing Breaches and Compliance Risks

Security in Fax: Minimizing Breaches and Compliance Risks Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information

More information

Information Security Management System Information Security Policy

Information Security Management System Information Security Policy Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been

More information

The quality assurance of transnational education: challenges and solutions. Carolyn Campbell Head of International Affairs [email protected].

The quality assurance of transnational education: challenges and solutions. Carolyn Campbell Head of International Affairs c.campbell@qaa.ac. The quality assurance of transnational education: challenges and solutions Carolyn Campbell Head of International Affairs [email protected] Transnational education (TNE).where the learners are located

More information

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

AN OVERVIEW OF INFORMATION SECURITY STANDARDS AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

How To Manage An Ip Telephony Service For A Business

How To Manage An Ip Telephony Service For A Business Enabling organisations to focus on core revenue generating activities Your business needs reliable, flexible and secure communication tools to enable better connectivity and collaboration with your employees,

More information

+20. Outsourcing feature STEPHEN MALLON/GETTY IMAGES

+20. Outsourcing feature STEPHEN MALLON/GETTY IMAGES +20 Outsourcing feature STEPHEN MALLON/GETTY IMAGES [ 20 ] A Plus + September 2007 Outsourcing to Asia Business outsourcing to Asia is a fast growing trend what does this mean for Hong Kong accountants?

More information

Dow Jones Titans Indices Methodology

Dow Jones Titans Indices Methodology Dow Jones Titans Indices Methodology S&P Dow Jones Indices: Index Methodology May 2016 Table of Contents Introduction 3 Highlights and Index Family 3 Eligibility Criteria and Index Construction 5 Dow Jones

More information

360 o View of. Global Immigration

360 o View of. Global Immigration 360 o View of Global Immigration In a fast moving global economy, remaining compliant with immigration laws, being informed and in control is more challenging than ever before. We are a globally linked

More information

Championing the region since 1815. NECC International Trade

Championing the region since 1815. NECC International Trade Championing the region since 1815 NECC International Trade Imports Customs Obligations Payment Methods Incoterms 2010 Documentation Export Control VAT Issues Origin North East Chamber of Commerce has supported

More information

Four steps to improving cloud security and compliance

Four steps to improving cloud security and compliance white paper Four steps to improving cloud security and compliance Despite the widespread proliferation of cloud computing, IT decision makers still express major concerns about security, compliance, and

More information

ISO/IEC Information & ICT Security and Governance Standards in practice. Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT

ISO/IEC Information & ICT Security and Governance Standards in practice. Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT ISO/IEC Information & ICT Security and Governance Standards in practice Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT June 4, 2009 ISO and IEC ISO (the International Organization for Standardization)

More information

Corporate Presentation

Corporate Presentation Corporate Presentation XcellHost Cloud Services India Dubai Singapore Experience High Touch Support Reliable Secure Speed Scalable Manageable Value XcellHost About Us Founded in 1999. Global Reach Personal

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.

More information

best practice guide 7 Best Practices to Make Telecom Expense Management Work for Your Business

best practice guide 7 Best Practices to Make Telecom Expense Management Work for Your Business best practice guide 7 Best Practices to Make Telecom Expense Management Work for Your Business With a global economy that remains under pressure, organisations around the world are looking for reliable

More information

HKCS RESPONSE COMMONLY ACCEPTED AUDIT OR ASSESSMENT MECHANISM TO CERTIFY INFORMATION SECURITY STANDARDS

HKCS RESPONSE COMMONLY ACCEPTED AUDIT OR ASSESSMENT MECHANISM TO CERTIFY INFORMATION SECURITY STANDARDS Hong Kong Computer Society Room 1915, 19/F, China Merchants Tower, Shun Tak Centre, 168 Connaught Road Central, Hong Kong Tel: 2834 2228 Fax: 2834 3003 URL: http://www.hkcs.org.hk Email: [email protected]

More information

Dimension Data s Uptime Maintenance Service

Dimension Data s Uptime Maintenance Service Dimension Data s Uptime Maintenance Service The pace of business today simply doesn t allow for downtime. When systems go off-line, productivity drops, time and money go to waste and opportunities are

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

Dow Jones Titans Indices Methodology

Dow Jones Titans Indices Methodology Dow Jones Titans Indices Methodology March 2014 S&P Dow Jones Indices: Index Methodology Table of Contents Introduction 4 Highlights and Index Family 4 Eligibility Criteria and Index Construction 7 Dow

More information

RESEARCH Recruiting Online

RESEARCH Recruiting Online RESEARCH Recruiting Online A Guide for Decision Makers Introduction This guide is intended to provide employers with an overview of online recruitment and how it can be utilised to attract top talent effectively

More information

Japan 94% of parents think that their children s safety has improved since moving. China is home to the highest earning expats in the world

Japan 94% of parents think that their children s safety has improved since moving. China is home to the highest earning expats in the world Explorer Survey 2014 - life worldwide Canada is the most popular destination for retired expats UK expats spend more time socialising with locals than with other expats Switzerland comes top as an all-round

More information

The Information Security Management System According ISO 27.001 The Value for Services

The Information Security Management System According ISO 27.001 The Value for Services I T S e r v i c e M a n a g e m e n t W h i t e P a p e r The Information Security Management System According ISO 27.001 The Value for Services Author: Julio José Ballesteros Garcia Introduction Evolution

More information

Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy

Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management

More information

ISO/IEC 27001:2013 Your implementation guide

ISO/IEC 27001:2013 Your implementation guide ISO/IEC 27001:2013 Your implementation guide What is ISO/IEC 27001? Successful businesses understand the value of timely, accurate information, good communications and confidentiality. Information security

More information

Governance, Risk and Compliance Assessment

Governance, Risk and Compliance Assessment Governance, Risk and Compliance Assessment Information security is a pervasive business requirement and one that no organisation can afford to get wrong. If it s not handled properly, your business could

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance

Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance Partner Capability Contents Company overview Partnering with CCE Service offerings Accreditations Service coverage ISO compliance Company overview About us CCE is one of the UK s largest independent IT

More information

BT Conferencing Business Continuity Management. Planning to stay in business

BT Conferencing Business Continuity Management. Planning to stay in business BT Conferencing Business Continuity Management Planning to stay in business Planning for the unexpected In today s connected world, businesses are increasingly dependent on their communications and networked

More information

Randstad MENA Salary Survey 2016

Randstad MENA Salary Survey 2016 The Randstad MENA Salary Survey 2016 Based on salaries throughout the Middle East and North Africa With the oil prices at their lowest point since 2009, the Middle East is having to find strategic ways

More information

Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment

Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment OVERVIEW Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Rising medical

More information

The Value of Information Security Certifications

The Value of Information Security Certifications The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials

More information

Application management services that power business transformation

Application management services that power business transformation SOLUTION MAP Application management services that power business transformation Protecting business reputation and revenue through superior application performance Application management for IT and business

More information

NSW Government Digital Information Security Policy

NSW Government Digital Information Security Policy NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core

More information

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9

More information

Why Join BSA? A Vital Resource for Software Companies. The many reasons why software companies join BSA OUR VALUE PROPOSITION

Why Join BSA? A Vital Resource for Software Companies. The many reasons why software companies join BSA OUR VALUE PROPOSITION Why Join BSA? The many reasons why software companies join BSA OUR VALUE PROPOSITION A membership in BSA The Software Alliance provides you a seat at the table with the world s leading software companies.

More information

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market May 2015 1 Contents Section Slide Number Executive Summary 3 Market Overview 9 Total Web

More information

Singapore as the global wealth hub of the future?

Singapore as the global wealth hub of the future? essential for banking FEATURE ARTICLE Singapore as the global wealth hub of the future? Asia s allure in the private banking sector goes without saying. But the extent to which Singapore, specifically,

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

ISO/IEC/IEEE 29119 The New International Software Testing Standards

ISO/IEC/IEEE 29119 The New International Software Testing Standards ISO/IEC/IEEE 29119 The New International Software Testing Standards Stuart Reid Testing Solutions Group 117 Houndsditch London EC3 UK Tel: 0207 469 1500 Fax: 0207 623 8459 www.testing-solutions.com 1 Stuart

More information

QFBS WAIVE TRANSACTION FEE ON SHARED ATM NETWORK - atm 5

QFBS WAIVE TRANSACTION FEE ON SHARED ATM NETWORK - atm 5 QFBS WAIVE TRANSACTION FEE ON SHARED ATM NETWORK - atm 5 4 April 2006, Singapore - In a move to provide greater convenience, the five Qualifying Full Banks (QFBs) - ABN AMRO, Citibank, HSBC, Maybank and

More information

Quality Management System Certification. Understanding Quality Management System (QMS) certification

Quality Management System Certification. Understanding Quality Management System (QMS) certification Quality Management System Certification Understanding Quality Management System (QMS) certification The medical device manufacturing sector is one of the most regulated sectors in which significant quality

More information

opinion piece Eight Simple Steps to Effective Software Asset Management

opinion piece Eight Simple Steps to Effective Software Asset Management opinion piece Eight Simple Steps to Effective Software Asset Management Contents Step 1: Collate your licence agreements 01 Step 2: Determine your actual licence position 01 Step 3: Understand your existing

More information

ISO/IEC 27001 Information Security Management. Securing your information assets Product Guide

ISO/IEC 27001 Information Security Management. Securing your information assets Product Guide ISO/IEC 27001 Information Security Management Securing your information assets Product Guide What is ISO/IEC 27001? ISO/IEC 27001 is the international standard for information security management and details

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries

INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries INFORMATION ECONOMY REPORT 2015: Unlocking The E-commerce Potential For Developing Countries Torbjörn Fredriksson ([email protected]) Chief, ICT Analysis Section, UNCTAD Commonwealth Cybersecurity

More information

AACSB International Accreditation and Joint Programs

AACSB International Accreditation and Joint Programs AACSB International Accreditation and Joint Programs Lucienne Mochel Assistant Vice President for Accreditation Services The AACSB Mission To advance quality management education worldwide through accreditation

More information

ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR

ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR Knowledge RECOGNITION Skills retention Further excellence behaviour Ability COMPETENCE QUALIFICATION ISO 9001 Training services SGS ACADEMY www.sgs.com sgs academy transforming people and businesses As

More information

The Advanced Cyber Attack Landscape

The Advanced Cyber Attack Landscape The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational

More information

Welcome to UL Protecting People, Products and Places

Welcome to UL Protecting People, Products and Places Welcome to UL Protecting People, Products and Places A symbol 22 billion ul marks appear on 69,795 manufacturers produced ul certified * 23,612 certified for energy star* of trust Facts & Figures 2014

More information

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 How consumers in 12 countries feel about: Personal data security, ranked by industry Region-specific security perceptions Research by

More information

Schedule of Accreditation issued by United Kingdom Accreditation Service 2 Pine Trees, Chertsey Lane, Staines-upon-Thames, TW18 3HR, UK

Schedule of Accreditation issued by United Kingdom Accreditation Service 2 Pine Trees, Chertsey Lane, Staines-upon-Thames, TW18 3HR, UK 2 Pine Trees, Chertsey Lane, Staines-upon-Thames, TW18 3HR, UK ISO/IEC 17021:2011 to provide quality management systems Stocking Lane High Wycombe Buckinghamshire HP14 4ND Contact: Mr Alan Gower Tel: +44

More information

Sustainable Solutions. Switch to future thinking

Sustainable Solutions. Switch to future thinking Switch to future thinking Increased global competition, rapid advances in technology, risks from natural disasters, resource shortages today s business leaders must adapt to operating in a changing world,

More information

Burning Dollars Top Five Trends in US Telecom Spend

Burning Dollars Top Five Trends in US Telecom Spend white paper Burning Dollars Top Five Trends in US Telecom Spend Telecom costs are among the largest operating expenses for organizations worldwide. Yet, they re often the most inconsistently managed. So

More information

Measures to Make Japan Asia s Center for Business February 2011 Ministry o f of Economy T, rade Trade and Industry

Measures to Make Japan Asia s Center for Business February 2011 Ministry o f of Economy T, rade Trade and Industry Measures to Make Japan Asia s s Center for Business February 2011 Ministry of Economy, Trade and Industry Overview of the Bill on Special Measures for the Promotion of Research and Development by Certified

More information

The Changing Data Centre Landscape in APAC. Saravanan Govindan Associate, BroadGroup

The Changing Data Centre Landscape in APAC. Saravanan Govindan Associate, BroadGroup The Changing Data Centre Landscape in APAC Saravanan Govindan Associate, BroadGroup BROADGROUP CONSULTING PRACTICES CONTENT SERVICES EVENTS & TRAINING DIVISION Leading content driven Brands engaging audiences

More information

Personalised recruitment and search services

Personalised recruitment and search services Today, progressive organisations sustain a competitive edge and add value to their business by having the best people in the right positions. We can source those people for you. Tony Andony, the Principal,

More information

CRYOVIVA SINGAPORE REACHES SETTLEMENT WITH CORDLIFE

CRYOVIVA SINGAPORE REACHES SETTLEMENT WITH CORDLIFE PRESS RELEASE CRYOVIVA SINGAPORE REACHES SETTLEMENT WITH CORDLIFE - Cryoviva passed off and infringed Cordlife's registered trademarks and copyrights - Cryoviva to pay Cordlife damages and legal costs

More information

CORPORATE PRESENTATION

CORPORATE PRESENTATION CORPORATE PRESENTATION WHO WE ARE. WHAT WE DO. GER is a specialist engineering staffing, consultancy services and outsourcing business - providing industry focused human capital solutions. Industry Focused

More information

WELCOME MIKE STRAWSON LEAD ASSOCIATE CHAMBER INTERNATIONAL

WELCOME MIKE STRAWSON LEAD ASSOCIATE CHAMBER INTERNATIONAL WELCOME MIKE STRAWSON LEAD ASSOCIATE CHAMBER INTERNATIONAL Premier Farnell Chamber International Rob Rospedzihowski, Director - Global Supplier Management Slide 3 Slide 4 Our Premier Farnell Brands Our

More information

An Overview of ISO/IEC 27000 family of Information Security Management System Standards

An Overview of ISO/IEC 27000 family of Information Security Management System Standards What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information

More information

IBM Global Process Services. Next-generation business process outsourcing for Natural Resources

IBM Global Process Services. Next-generation business process outsourcing for Natural Resources IBM Global Process Services Next-generation business process outsourcing for Natural Resources 2 IBM Global Process Services Australia s mining, petroleum, and LNG companies across the Natural Resources

More information

Radio Spectrum and Technical Standards Advisory Committee

Radio Spectrum and Technical Standards Advisory Committee Radio Spectrum and Technical Standards Advisory Committee SSAC Paper 7/2015 for information Update on Testing and Certification of Telecommunications Equipment Office of the Communications Authority 15

More information

INTERNATIONAL EMPLOYMENT GROUP. Employment Services in Oman

INTERNATIONAL EMPLOYMENT GROUP. Employment Services in Oman INTERNATIONAL EMPLOYMENT GROUP Employment Services in Oman We continue to recommend them to others because of their strength in dealing with detail CHAMBERS GLOBAL 2015 10-5112821-9 0 Addleshaw Goddard's

More information

Strategy Implementation. Graham Levinsohn Group Strategy and Development Director

Strategy Implementation. Graham Levinsohn Group Strategy and Development Director Strategy Implementation Graham Levinsohn Group Strategy and Development Director 1 Strategy to drive organic growth Net Promoter Update Sector Strategy Update Solutions Strategy in Developed Markets New

More information

ISO/IEC 90003:2004 covers all aspects

ISO/IEC 90003:2004 covers all aspects Huge potential user base for ISO/IEC 90003 the state of the art for improving quality in software engineering ISO/IEC 90003:2004, Software engineering Guidelines for the application of ISO 9001: 2000 to

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

MANAGING DIRECTOR S LETTER

MANAGING DIRECTOR S LETTER SUPPLY CHAIN & PROCUREMENT SALARY SURVEY GUIDE UAE 2014 CONTENTS MANAGING DIRECTOR S LETTER 2 SUPPLY CHAIN & PROCUREMENT 3 MARKET INSIGHT 4 SALARY GUIDE 5 UNDERSTANDING THIS GUIDE 6 TALK TO US 7 MANAGING

More information

Rouse. The right mix of intellectual property specialists. www.rouse.com

Rouse. The right mix of intellectual property specialists. www.rouse.com Rouse The right mix of intellectual property specialists www.rouse.com Welcome to Rouse A leading global intellectual property firm. Established in 1990, we now have a team of more than 600 (including

More information

Hexaware UN Partnership

Hexaware UN Partnership www.hexaware.com Hexaware UN Partnership 29 th Jan 2015 Process Results Hexaware Technologies. All rights reserved. Hexaware at a glance Complete End-to-End Technology, Process & Consulting Service Provider

More information

Vietnam. companies and retailers might consider individuals with complementary FMCG experience whose skills can be refined internally.

Vietnam. companies and retailers might consider individuals with complementary FMCG experience whose skills can be refined internally. Vietnam 2015 WAS A POSITIVE YEAR FOR RECRUITMENT IN VIETNAM. STRONG LEVELS OF DEMAND WERE DRIVEN BY NEW BUSINESSES ENTERING THE MARKET, INCLUDING THE ARRIVAL OF MAJOR COMPANIES FROM AUSTRALIA, THE US AND

More information

C L A R I D E N 19 21 August 2014

C L A R I D E N 19 21 August 2014 C L A R I D E N 19 21 August 2014 Knowledge for the world business leaders Shangri-La Hotel, Jakarta, Indonesia Certified Human Resource Manager (CHRM) TM CHRM is certified by the International Academy

More information

International Education Index comparative perspective from 21 countries. Janet Ilieva, PhD EDUCATION INTELLIGENCE

International Education Index comparative perspective from 21 countries. Janet Ilieva, PhD EDUCATION INTELLIGENCE International Education Index comparative perspective from 21 countries Janet Ilieva, PhD Background Rapid growth in participation in tertiary education across the world, in the number of students pursuing

More information

The value of accredited certification

The value of accredited certification Certified Once Accepted Everywhere The value of accredited certification Survey Report Published May 212 In 21/11, the IAF carried out a global survey to capture market feedback on the value of certification.

More information

Ethics Everywhere Jones Lang LaSalle Incorporated Annual Report for Calendar Year 2013 Program

Ethics Everywhere Jones Lang LaSalle Incorporated Annual Report for Calendar Year 2013 Program Ethics Everywhere Jones Lang LaSalle Incorporated Annual Report for Calendar Year 2013 Program Introduction JLL is committed to a corporate culture that embraces and promotes strong principles of business

More information

Corporate Jet & Helicopter Finance Asia 2013

Corporate Jet & Helicopter Finance Asia 2013 Corporate Jet & Helicopter Finance Asia 2013 State of the market: Where are we now and which way is the market going? 25 th June 2013 Agenda 1. The Global UHNW Population 2. UHNWIs in Asia 3. The Chinese

More information