C106: Demo Of The Information Security Management System - Iso 27001: .

Transcription

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENTSYSTEM - ISO 27001:2013 AWARENESS AND AUDITORTRAINING PPT PRESENTATION KIT Price 360 USDBuy: ortraining-ppt.htmC106- CONTENTS OF ISO 27001:2013 PPT PRESENTATIONS TRAINING KITA. The entire PPT presentation kit has 6 main directories as below.ISO 27001:2013 Awareness and auditor Training Presentation kit with auditor certificateSr.No.List of DirectoryPPT Presentation1.Document of DetailsNo. of Slides1.Overview of Information Security Management system322.ISO 27001-2013 requirements423.Information security related Definitions054.ISMS Documented information and 4 tier documentstructure155.ISO 27001 ISMS Internal auditing process606.Steps for ISO 27001 certification127.Risk assessment288.ISMS controls and control objectives339.Information Security management5210.Information security controls as per BS 7799-2 with pictures84Case Study06Work shop03Total no. of slides 3722.A trainer's guide and hand outs and editable form to understandISMS subject wellApprox. 70 Pages in Ms.word3.Work-shops and case studies to evaluate effectiveness oftraining.4.ISO/IEC 27001:2013, BS 7799-2 controls and Annexure A controlrelated ISMS audit checklist and questionsMore than 500 questions5.Sample copy of ISO/IEC 27001:2013 audit forms and templates tomaintain ISO/IEC 27001:2013 audit records.03 forms in Ms. Word6.Sample copy of certified ISO/IEC 27001:2013auditor trainingcertificate05 workshops and 02 casestudies01 file in Ms. Wordwww.globalmanagergroup.com E mail sales@globalmanagergroup.com Tele: 91-79-2656 5405Page 1 of 8

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENTSYSTEM - ISO 27001:2013 AWARENESS AND AUDITORTRAINING PPT PRESENTATION KIT Price 360 USDBuy: ortraining-ppt.htmPart: 1 Topic wise number of slides:Sr. No.Title of SlidesNo of Slide1.Overview of Information Security Management system322.ISO 27001-2013 requirements423.Information security related Definitions054.ISMS Documented information and 4 tier document structure155.ISO 27001 ISMS Internal auditing process606.Steps for ISO 27001 certification127.Risk assessment288.ISMS controls and control objectives as per Annexure A of ISo27001339.Information Security management5210.Information security controls as per BS 7799-2 with pictures84Case Study06Work shop03Total No. of Slides 372To get more information about ISO 27001 :2013 Training kit Click Here1. Presentation: Under this directory further files are made in power point presentation as per the chapterlisted below. Topic wise Power Point presentation in 10 modules as listed below.1. Overview of Information Security Management systemIt covers Overview of ISMS system, benefits and summary of overall system2. ISO 27001-2013 requirementsIt covers Information Security systems specifications, Requirements, Establishment, Implementand operate the ISMS, Monitor and review the ISMS, Maintain and improve the ISMS,3. ISO Information security related DefinitionsIt covers Information Security systems related definitionswww.globalmanagergroup.com E mail sales@globalmanagergroup.com Tele: 91-79-2656 5405Page 2 of 8

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENTSYSTEM - ISO 27001:2013 AWARENESS AND AUDITORTRAINING PPT PRESENTATION KIT Price 360 USDBuy: ortraining-ppt.htm4. ISMS Documented information and 4 tier document structureIt covers Information Security Management System documented information and 4 tierdocument structure.5. ISO 27001 ISMS Internal auditing processIt covers how to do the Internal Audit as per standard of ISO 27001 2013. it cover AuditPlanning, Steps of Audit etc. The details ISMS process is given6. Steps for ISO 27001 certificationIt covers Implementation Methodology, Steps for Installation, The top 10 non-conformances,Audit Process, What happens during a certification audit7. Risk assessmentIt covers the Risk assessment of ISMS ISO 27001 what is Risk assessment, Objective of Riskassessment.8. ISMS controls and control objectives as per ISO 27002 ( Annexure A)It covers the Information Security Management Systems controls and control objectives as perISO 27002 (Annexure A).The description is helpful for users to understand it9. Information Security managementIt covers the all information about Information Security Management in more than 50 PPTslides with all critical aspects of ISMS like risk assessment, treatment etc.10. Information security controls as per BS 7799-2 with picturesIt covers the overview, information security policy, Internal organisation tasks of ISM Forum,Asset management and asset inventory, personnel security, security areas, operationalprocesses, access administration and control, system development and maintenanceapplication security, Business continuity management, compliance issues and establishing theISMS. Also many places pictorial presentation is given for better understanding to usersThis part comprises more than 360 ppt presentations, each pleasingly presented presentationdesigned to get the message over, and establish a much better understanding. It alsodescribes how to tackle it and drills down into all these topics. No voice is put in thepresentation and user can edit it to suit his requirements in local languages.www.globalmanagergroup.com E mail sales@globalmanagergroup.com Tele: 91-79-2656 5405Page 3 of 8

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENTSYSTEM - ISO 27001:2013 AWARENESS AND AUDITORTRAINING PPT PRESENTATION KIT Price 360 USDBuy: ortraining-ppt.htm2. A trainer's guide and hand outs and editable form to understand ISMSsubject well:This topic covers write up for the ready reference to the participant for understandingreading the subject to get in depth knowledge on the subjectandIt is given in word. You may also use it for further reading and circulations within audienceChapter No.SECTION1.Overview of Security Management Standard (ISO 27001:2013)2.ISO 27001 requirements3.Assets Lists4.ISO 27001:2013 certification methodology5.Approach Paper for ISMS Implementation6.Risk assessment and risk management7.Information Security management System Audit8.Information Security Management system Audit reports9.Work shopsWork Shop- 1Work Shop- 2 (a),(b),(c)Work Shop- 3Work Shop- 4Work Shop- 5Case Study – 110.Case Study – 23. Work-shops and case studies to evaluate effectiveness of training9 workshops & 2 case study):This topic covers workshops and case studies to evaluate effectiveness of training. Eachparticipant needs to solve this work shop and case study after undergoing the training.After successful completion of work shop and case study the ISO 27001 internal auditortraining certificate is given.Total workshop 6 Case study 2www.globalmanagergroup.com E mail sales@globalmanagergroup.com Tele: 91-79-2656 5405Page 4 of 8

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENTSYSTEM - ISO 27001:2013 AWARENESS AND AUDITORTRAINING PPT PRESENTATION KIT Price 360 USDBuy: ortraining-ppt.htm4. ISMS ready to use auditaudit questions):-checklist and questions (More than 600This topic covers ISO/IEC 27001:2013, BS 7700-2 controls and annexure A control related auditchecklist and questions. It also includes questions for good system implementation and readytool kit for the ISMS auditor to be effective auditora. ISO 27001 -2013 requirement wise audit checklistb. ISO 27001 controls audit checklistc. BS 7799 –Good practices audit checklist5. Sample copy of ISO/IEC 27001:2013 audit forms and templates tomaintain ISO/IEC 27001:2013 audit records ( 3 forms):This topic covers ISO/IEC 27001:2013 audit forms and templates to maintain ISO/IEC27001:2013 audit records.a. Audit plan/Programmeb. Internal ISMS audit non conformity reportc. ISO 27001-2013 Audit checklist report (clause wise)6. Sample ortrainingThe sample copy of certified internal auditor is given in word edit form. So aftersuccessful completion of workshops and case study the training certificate can begiven to the trained internal auditor for ISO 27001-2013 auditor training certificate.www.globalmanagergroup.com E mail sales@globalmanagergroup.com Tele: 91-79-2656 5405Page 5 of 8

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENTSYSTEM - ISO 27001:2013 AWARENESS AND AUDITORTRAINING PPT PRESENTATION KIT Price 360 USDBuy: ortraining-ppt.htmChapter-2.0 ABOUT COMPANYGlobal manager group is a progressive company and promoted by a group of qualifiedengineers and management graduates having rich experience of 20 years in ISOconsultancy and management areas. The company serves the global customers throughon-site and off-site modes of service delivery systems. We offer a full range of consultingservices geared towards helping all types of organizations to achieve competitiveness,certifications and compliance to international standards and regulations. So far we hadmore than 1200 clients in more than 45 countries. Our readymade training andeditable document kit helps the client in making their documents easy and makethem complying to related standard faster with the establishment of best processes.It helps the organization to make the best system with process improvementconcepts and helps the organization to get best performances in terms of reductionin costing, efforts and get the things done timely with Quality product. Thus it helpsthe organization to give full value for money and pay back of our product is lessthan 2 month.1. Our promoters and engineers have experience of more than 1200 companies globally formanagement training, ISO consultancy, process improvement concept implementation andISO series consultancy. We had clients in more than 45 countries.2. Highly qualified 40 team members (M.B.A., Degree engineers) and owner is having richprofessional experience (since 1991).3. We have 100% success rate for global standards certification including ISO of our clientsfrom reputed certifying body and branded image and leading name in the market.4. Suggest continual improvement and cost reduction measures as well as highly informativetraining presentations and other products gives payback within 2 months against our cost.5. So far more than 50000 employees are trained by us in ISO series certification in last 20years.6. We had spent more than 60000 man-days (170 man years) in preparing ISOdocuments and training slides.7. Our product gives lot of opportunity for process improvements and gives full benefits to theusers.Global Manager Group is committed for:1.2.3.4.5.Personal involvement & commitment from first dayOptimum chargesProfessional approachHard work and update the knowledge of team membersStrengthening clients by system establishment and providing best training materials in anyareas of management to make their house in proper manner6. To establish strong internal control with the help of system and use of the latestmanagement techniqueswww.globalmanagergroup.com E mail sales@globalmanagergroup.com Tele: 91-79-2656 5405Page 6 of 8

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENTSYSTEM - ISO 27001:2013 AWARENESS AND AUDITORTRAINING PPT PRESENTATION KIT Price 360 USDBuy: ortraining-ppt.htmChapter-3.0 USER FUNCTION3.1 Hardware and Software RequirementsA. Hardware: Our document kit can be better performed with the help of P3 and above computerswith a minimum 10 GB hard disk space. For better visual impact of the power point Document you may keep the setting ofcolour image at high colour.B. Software used in Document kit Hand-outs written in word 2003 and 2007 and window XP and Presentation made inPower point programs you are therefore required to have office 2003 and office 2007.3.2 Features of Document kit:- It will save much time in typing and preparation of presentation alone. Written in Plain English Easily customized by you to add audio clips in the local language etc to preparepresentation for any other groups and user can easily customize it for own use. Good guide for training of all the group members for ISO 27001:2013 awareness andauditor training. User-friendly and easy to learn. Developed under the guidance of experienced experts.www.globalmanagergroup.com E mail sales@globalmanagergroup.com Tele: 91-79-2656 5405Page 7 of 8

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENTSYSTEM - ISO 27001:2013 AWARENESS AND AUDITORTRAINING PPT PRESENTATION KIT Price 360 USDBuy: ortraining-ppt.htmChapter-4.0 WHAT THE BENEFITS ARE TO IMPLEMENTS ISMS ASPER ISO 27001:2013?Implementation of proper Information Security Management System as per requirement ofISO 27001:2013 standard improves organization to design and formulate its specific set ofsecurity requirements and desired objective. Organizations can use this standard to providerelevant information about information security policies, directives, standards and proceduresto its trading partners as well as any other organization that they interact with for operationalor commercial purposes. ISO 27001:2013 guidelines provide a comprehensive model forinformation security management systems that can make any company competitive. Amongthe wide advantages of the ISO 27001:2013 standard some of as follows: Lower Expenses – through avoided risksIncrease information security level within the organizationEnhance the knowledge and importance of security-related issues at all level andimprove information security controlsImproved visibility into your information security program & better securityawarenessEnhancement of client and partner confidence & perception of your organizationBetter alignment within your organizationAssists in the development of best information security practicewww.globalmanagergroup.com E mail sales@globalmanagergroup.com Tele: 91-79-2656 5405Page 8 of 8

Punyam Management Services Pvt. itlestylestyle ylesSecond– SecondlevellevelSecondlevelThirdlevel ThirdlevelFourth levelFourth– levelThirdlevel» Fifth levelFifth level FourthlevelFifth levelGMGCopy # 81 copyright @Global Manager Group; E-mail: sales@globalmanagergroup.comCopyrights 2013 @ I Global Manager Group sales@globalmanagergroup.com 11

Punyam Management Services Pvt. Ltd.PotentialEffectsGMGSelection ditMastertextstylesSecond– evel ThirdlevelControlFourth levelFourth– levelThirdlevel» Fifth levelFifth level FourthlevelIS-Policy Risk AnalysisIS - titletitlestylestylePunyamFifth levelEffectivenessCopy # 81 copyright @Global Manager Group; E-mail: sales@globalmanagergroup.comCopyrights 2013 @ I Global Manager Group sales@globalmanagergroup.com 22

Punyam Management Services Pvt. Ltd.Requirements of Standards as perISO/IEC titletitlestylestyle10 Improvement9 Performance MonitoringMeasurement, analysisand evaluation Internal audit Management review yles Second4 Context of the– SecondlevellevelOrganizationSecondlevel Thirdlevel Thirdlevel8 Operation5 leadership– levelFourth levelPlanning Leadership and OperationFourthThirdlevel& controlcommitment» Fifth levelrisk assessment Policy ISISFifthlevel Fourthrisk treatmentlevel Roles,responsibility &authority7 Support6 PlanningFifth level ntedinformation Actions, risksand opportunity IS Objectives &PlanningCopy # 81 copyright @Global Manager Group; E-mail: sales@globalmanagergroup.comCopyrights 2013 @ I Global Manager Group sales@globalmanagergroup.com 33

Punyam Management Services Pvt. Ltd.5.2 etitlestylestyle Establish an information security policy : Appropriate to the purpose of the organization Click to edit Master text styles Includes information security objectivesSecondlevel– Secondlevel Providetheframework for setting information security objectivesThirdlevel ThirdlevelFourth level Includesto satisfy applicable requirementsFourtha–commitmentlevel» Fifth level to continual improvement for ISMS Includes a commitment Fifth level Communicate within the organization Provide to interested parties, as hird levelFourthlevelFifth levelThe information security policy is documented and kept in ISMSmanualGMGCopy # 81 copyright @Global Manager Group; E-mail: sales@globalmanagergroup.comCopyrights 2013 @ I Global Manager Group sales@globalmanagergroup.com 44

Punyam Management Services Pvt. Ltd.Management rtitletitlestylestyle Approve the ISMS Policy Ensure that security goals and Objectives are included in planning.Click to edit Master text stylesClicktoeditMastertextstyles Secondlevel–Secondlevel Setup IS related positionsand assignroles,responsibilitiesSecondlevel andThirdlevel Thirdlevelauthorities– levelFourth level FourthThirdlevel Conduct IS Marketingwithintheorganisation» Fifth level Fifth level Fourthlevel Ensure that enoughresourcesarepresent to operateand enhance the ISMSFifth level Define levels of risk acceptance Trigger / Execute ISMS reviewsGMGCopy # 81 copyright @Global Manager Group; E-mail: sales@globalmanagergroup.comCopyrights 2013 @ I Global Manager Group sales@globalmanagergroup.com 55

Punyam Management Services Pvt. Ltd.DepartmentProcedure No. : PRO/OO/XYNAME OF THE COMPANYIssue No. : 1.0ISMS PROCEDUREPunyamDate : lestylestyle1.0 PURPOSE :2.0Give Statement of the Specific Purpose of the Procedure to Know Why This Procedure Is BeingFollowed.SCOPE :Mention the Department and the Area of Personnel Where the Procedure Applies.RESPONSIBILITY :Write Down Responsibility for Different Level of Persons for Different Activities Mention in ThisProcedure.DESCRIPTION OF ACTIVITIES :This Section Should Contain Details of the Activities Step by Step With Sub Title of Paragraphs and– Fourth levelthe Action to Be Taken. They Contain How the Actions Will Be Taken.» Fifth levelREFERENCE :Give Reference of Internal and External Documents Used in ProcedureENCLOSURES :List Out Any Tables or Flowcharts Enclosed With the Procedure As a Part of Procedure.FORMATS / EXHIBITS :List Out Them in Proper Manner. 3.0 4.0 5.0 textstylesSecond– SecondlevellevelSecondlevelThirdlevel ThirdlevelFourth levelThird levelFifth level FourthlevelOriginatorGMGFifth levelApproved BySignatureCopy # 81 copyright @Global Manager Group; E-mail: sales@globalmanagergroup.comCopyrights 2013 @ I Global Manager Group sales@globalmanagergroup.com PageOf66

Punyam Management Services Pvt. Ltd.Device l6 esMaintenanceSecond– SecondlevellevelSecondlevelThirdlevel Thirdlevel MobileDevices–FourthlevelFourth levelThirdlevel» Fifth levelFifth level FourthlevelSecure CablingGMGFifth levelRecyclingor ReuseCopy # 81 copyright @Global Manager Group; E-mail: sales@globalmanagergroup.comCopyrights 2013 @ I Global Manager Group sales@globalmanagergroup.com UPS77

Punyam Management Services Pvt. Ltd.Media tletitlestylestyleCorporation Specific Definition of MediaMediaDisposal rtextstyles SecureSecondlevel– Secondlevelstorage andtransport, according to classification of dataSecondlevelcontained Thirdlevel Thirdlevel– levelFourthlevel FormalFourthprocedureformediadisposalThirdlevel» Fifth level CoordinationFifth levelof h levelStorage of media according to manufacturer‘sspecificationsLabeling of mediaGMGCopy # 81 copyright @Global Manager Group; E-mail: sales@globalmanagergroup.comCopyrights 2013 @ I Global Manager Group sales@globalmanagergroup.com 88

Punyam Management Services Pvt. Ltd.PunyamInformation Security etitlestylestyleFirewallsPrivacy complianceUseraccountRemoteaccess Clicktoadministrationedit Master textstylesIntrusion detection andDigital signature Secondlevel–Secondlevelintrusion preventionElectronic data interchange Third levelAntivirus Third level(EDI) and electronic funds– levelFourth level FourthPublic key infrastructure (PKI) transfer (EFT)» Fifth levelVirtual private networks FifthlevelSecureSocketsLayer (SSL)(VPNs)Single sign-on (SSO)ForensicsBiometricsMonitoring econdlevelThird levelFourthlevelFifth levelGMGCopy # 81 copyright @Global Manager Group; E-mail: sales@globalmanagergroup.comCopyrights 2013 @ I Global Manager Group sales@globalmanagergroup.com 99

Punyam Management Services Pvt. Ltd.STEPS FOR INSTALLATION OF ISO:27001-2013 INFORMATIONPunyamSECURITYAL MANAGEMENT stylestyle Conduct ISO:27001 awareness program (top middle bottom level). Form a steering committee and task force for documentation Identification of All Possible INFORMATION SECURITY risks to the company.Establish risk assessment study and make risk treatment plan Click toSecurityeditPolicy,Mastertext styles DefineInformationObjectivesand Targets.ClicktoeditMastertextstyles Preparedocuments oflevelINFORMATION SECURITY management system, Records, Legal Requirements.Second–Secondlevel Train all for Information Security Management system for achieving Objectives & Targets.SecondlevelThirdlevel ThirdlevelSuppliers and Interested parties. Communicationto all including Implementation & train all personnel in the use of procedures & formats.– levelFourth level Fourth Preparation and ImplementationofThirdsystem to establishlevelsystem for ISMS controls.»Fifthlevel Train internal auditors. Fifthlevel Assess the system through first internalaudit.Fourthlevel Take corrective actions for non-conformities. Apply for certification. Assess the system through second round of internal audit. Avail onsite document adequacy audit of certifying body. Take actions on suggestions given by them Final audit by certifying body.GMGFifth levelCopy # 81 copyright @Global Manager Group; E-mail: sales@globalmanagergroup.comCopyrights 2013 @ I Global Manager Group sales@globalmanagergroup.com 1010

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENTSYSTEM - ISO 27001:2013 AWARENESS AND AUDITORTRAINING PRESENTATION KIT Price 360 USDBuy: ortraining-ppt.htmChapter-5.0 BENEFITS OF USING OUR PRESENTATION KIT By using these slides, you can save a lot of your precious time while preparing the ISO27001:2013 awareness training course materials for in-house training programs. To provide you with the Presentation Materials and hand-outs that you need for aneffective presentation on ISO 27001:2013 awareness training, what it is, and what itrequires Present the basics of ISO 27001:2013 awareness training to Management or other groups To deliver ISO 27001:2013 awareness training in a group, using a PowerPointpresentation Take care for all the section and sub sections of ISO 27001:2013 awareness training andgive better understanding at all the levels during ISO 27001:2013 awareness trainingimplementation and sharpen the awareness of ISO 27001:2013 awareness trainingrequirements for all employees within organization.For purchase Click HereBUYVisit our web site for more ISO Auditor Training www.globalmanagergroup.com E mail sales@globalmanagergroup.com Tele: 91-79-2656 5405Page 1 of 1

2. ISO 27001-2013 requirements 42 3. Information security related Definitions 05 4. ISMS Documented information and 4 tier document structure 15 5. ISO 27001 ISMS Internal auditing process 60 6. Steps for ISO 27001 certification 12 7. Risk assessment 28 8. ISMS controls and control objectives as per Annexure A of ISo 27001 33 9.