SlideShare a Scribd company logo
Challenges and Benefits of Information Security Management
Challenges and Benefits of Information Security Management
!



Information Security
              !

 "
         "#




     "

          " !
          $ %"
          "
            &
            &'
" #$ #                               #%
                                      ##
&       %   ' '"
             (          ) %                  %
        *   *  #          +#

&   $ ) %       *       ,   %#       -
    .       #   #   #                # !#
         % #/
    .    %# #
            #      * /
    . #
      $   *      #   *#     #            #   #
       #             /
    .         # !#   #
    0
    .      #     #          #    #       #
#                   01 #                           $

An 27001 Certified Lead Auditor


                                        Audit
                Aspectos essenciais BS ISO/IEC 17799 e 27001
                Implantação BS ISO/IEC 27001
                Auditorias Internas à BS ISO/IEC 27001
                Auditor Coordenador BS ISO/IEC 27001 (IRCA)
  Trainning
                                                               Consultancy
#                           01 #  $
" #$ #                              #%
                                     ##
& "         2 4
             3
    .                  !

    .             "        !#

& 1         5 6
              "       5(7
                      ((
    .             !

    .                          "     !#

&       8
    .             !

    . $%          &             &         #   !
             #     '       #     (
#         #
&,'  #
&9 %#
 .         " +   :
     1 #
       %   0
Challenges and Benefits of Information Security Management
.       #      %#
                          !
                # !#

&              # !#        "
        2 4
         3    9 '

&;       #!    #    #
                    $"   2 4 '9(
                          3  9(
    .         " #   #
Natural Disasters                                                                   Acoustic
     (Flood, Lightning,
      Earthquake, ...)
                                                                                   Information
                                                                               (Telephone conversations,
                                                                                       in public,
                                                                                    in meetings, ...)



Technical failures
                                                           Logical                                      Physical


                               17799 * 27001
                               17799 * 27001
    (Communication,
     Lack of energy,                                     Information                                  Information
Equipment break-down, ...)                                                                             (Faxs, contracts,



                                           BS ISO/IEC
                                           BS ISO/IEC
                                                        (electronic records)
                                                                                                     reports, manuals, ...)


                                                                               Business
  Human Failure
   (Maintenance errors,
       User errors,
     Lack of staff, ...)                                         Visual
                                                                                                  Intelectual
                                                              Information
                                                                (Vídeo, fotos,                   Information
                                                               environment, ...)                   (Knowledge)

 Social Problens
          (Strikes,
    Terrorism Attack,
   politics, legislation...)
''           #        2 < #*

                       A5 Security policy
                A6 Organization of Information Security
                       A7 Asset management
A8 HR      A9 Physical and    A10 Communications     A12 Information
security    Environmental       and operations          Systems
               security           management           Acquisition,
                                                      development
                A11 Access control                  and maintenance
 A13 Incident Management        A14 Business continuity management
                             A15 Compliance
##                                       =

                                              ! "#    $
                                              %   &


                                                  $
                      +   ', -
' (   $                   .       /
                                  %       )
                                  %
          %       )
                              *       *
          %
              "                                       "*
> =                             #
                $
&                 #
                  $    2 4 )
                        3   %      9-
                                   ?
                 Communicate and Consult
                             Assess Risks



                Identify    Analyse       Evaluate   Control
    Establish                 the
                  the                       the        the
     Context     Risks       Risks         Risks      Risks




                     Monitor and Review
> =                               #1
                                          Risk Assessment
 Asset Identification
 and Valuation        Identification of
                       Vulnerabilities
                                       Identification of
                 Evaluation of Impacts     Threats
     Business Risk
                   Rating/ranking of Risks
                                          Risk Management
 Review of Existing
 Security Controls     Identification of
                         new Security
                           Controls           Policy and
                      Implementation and      Procedures
 Risk Acceptance
                         Risk Reduction
  (Residual Risk)
1;
$
@% # A
& B$ #            #   % !%
   %     %            !    * #
  ! %#       !%   %      C$ A
                          ,
$
& %#
   %         #
 .>    #   * 1 * #
                     %0   12   3   4 5
$
&       =       #
    .
    ."%     #
    . $ $
    . %#
$
&       =   8#                % #
    .   %       # *                  #   %
    .       %                 %              < #
                                             %




                %0   12   3    4 5
$
&       %       # % #!D
                  > =
    .       #
            $   %         0   % #
                               #
    .       #
            $   %              % **
    .       =       $ $       #       #
        =       #%
                 ## 67
#



                *   *    6
    7*                             -
            *              "           *
*       #                68        #   *
    *               *9         :
                         :;
$
&            #    > =          #
            $

&       %    #=                    #

    *       # %
            $ #   #   #   %#
$
&                       #*       $        !           $

&           #       #        #
                             $       $#       2
    .           A            $   A B$ A E         A


&       #                    #       #
    .;          #       #    #
                             %   0 %#
                                    %
$
&                       %       F" #         #   G
    .       2 "
             H                  IA


& ;         *       F       #    # G
    .   2 ( '$              I


&                   D                    $       # #
                                                 % !

&       =       %           %        #   %       ##
9 '            #   #




<<<;=   ;   *
$


&)       ## #   *#

     +
"   #J
"           #
&           *       #           J
    .           #           #
        &   #   3K D    #
        &


&>2
"     #
&"%       # %#
             !                 #
 .        I
 .    #
      $ F     $   !  # %#IG
                        !
 .    #
      $ F"  %      # %#!1 G
        !" # %$   & ' '
                   # '

                      <<<; #   ;   "
"          #
&2 D                       # %
                           $"
       #        #    JJJ



& # #                #
    #          # %
               $           L%    #
"              #
& 1                 *          #

& B                        #        "%          #

&         *        #       *       %     L #
                                          % !

&   %#
     %         $        3 $                 #
    . >            #
                   !JJJJ


&         D%            # #
                        % !        * #
"       #


& F,    G   #    # $ $
                 $       #
       =#   #

&           #
            $F      #& (     #
@% # A
&   !%  #   %           #
    # # # % ** #
               $   8#       #
                            A
You are free:                                          Creative Commons Attribution-
•to copy, distribute, display, and perform this work
                                                                      NoDerivs 2.0
•to make commercial use of this work
Under the following conditions:


                Attribution. You must give the original author credit.



                 No Derivative Works. You may not alter, transform, or build upon this work.



For any reuse or distribution, you must make clear to others the license terms of this work.

Any of these conditions can be waived if you get permission from the author.

Your fair use and other rights are in no way affected by the above.

This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a copy of this
license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a letter to Creative Commons, 559
Nathan Abbott Way, Stanford, California 94305, USA.
E K M N
       2
->?- @ >   ; '   ?@ >   ; '

More Related Content

PDF
Social In(ex)clusion, Dis/ability and Technology
PPTX
Information security challenges in today’s banking environment
PDF
SOC 2 and You
PDF
Rothke secure360 building a security operations center (soc)
PPTX
SOC Architecture Workshop - Part 1
PPTX
Top 5 IT challenges for 2017
PPT
SOC presentation- Building a Security Operations Center
PDF
Cyber Security 2017 Challenges
Social In(ex)clusion, Dis/ability and Technology
Information security challenges in today’s banking environment
SOC 2 and You
Rothke secure360 building a security operations center (soc)
SOC Architecture Workshop - Part 1
Top 5 IT challenges for 2017
SOC presentation- Building a Security Operations Center
Cyber Security 2017 Challenges

Similar to Challenges and Benefits of Information Security Management (20)

PDF
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
PDF
Webinar - Getting a handle on wireless security for PCI DSS Compliance
PDF
New Age Marketer by Anees Merchant
PDF
About Level 8 Consulting LLC 2010
PDF
ICE Conference, June 2007,Sophia-Antipolis, France
PDF
PDF
Creating Realistic User Experiences with Interactive Prototypes
PDF
PDF
REAL Solutions_In School Branches_ILCUL
KEY
Managing massive datacenters
PDF
March 2012-Marketing Roundtable- Dee Davey
PDF
PDF
Community engagement
PDF
Dramatically increase revenue on verio template
PDF
Dramatically increase revenue on verio template
PDF
Sport and cultures in dialogue. sport citizens forum bled nov11
PDF
Bokers listings july 2011
PPT
workshop lca board 11.1.12
PDF
[HetRec2011@RecSys]Experience Discovery: Hybrid Recommendation of Student Act...
PDF
How do you fit millions of people into an event safely?, by Intergraph
Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
New Age Marketer by Anees Merchant
About Level 8 Consulting LLC 2010
ICE Conference, June 2007,Sophia-Antipolis, France
Creating Realistic User Experiences with Interactive Prototypes
REAL Solutions_In School Branches_ILCUL
Managing massive datacenters
March 2012-Marketing Roundtable- Dee Davey
Community engagement
Dramatically increase revenue on verio template
Dramatically increase revenue on verio template
Sport and cultures in dialogue. sport citizens forum bled nov11
Bokers listings july 2011
workshop lca board 11.1.12
[HetRec2011@RecSys]Experience Discovery: Hybrid Recommendation of Student Act...
How do you fit millions of people into an event safely?, by Intergraph
Ad

More from Conferencias FIST (20)

PDF
Seguridad en Open Solaris
PDF
Seguridad en Entornos Web Open Source
PDF
Spanish Honeynet Project
PDF
Seguridad en Windows Mobile
PDF
SAP Security
PDF
Que es Seguridad
PDF
Network Access Protection
PDF
Las Evidencias Digitales en la Informática Forense
PDF
Evolución y situación actual de la seguridad en redes WiFi
PDF
El Information Security Forum
PDF
Criptografia Cuántica
PDF
Inseguridad en Redes Wireless
PDF
Mas allá de la Concienciación
PDF
Security Metrics
PDF
PKI Interoperability
PDF
Wifislax 3.1
PDF
Network Forensics
PDF
Riesgo y Vulnerabilidades en el Desarrollo
PDF
Demostracion Hacking Honeypot y Análisis Forense
PDF
Security Maturity Model
Seguridad en Open Solaris
Seguridad en Entornos Web Open Source
Spanish Honeynet Project
Seguridad en Windows Mobile
SAP Security
Que es Seguridad
Network Access Protection
Las Evidencias Digitales en la Informática Forense
Evolución y situación actual de la seguridad en redes WiFi
El Information Security Forum
Criptografia Cuántica
Inseguridad en Redes Wireless
Mas allá de la Concienciación
Security Metrics
PKI Interoperability
Wifislax 3.1
Network Forensics
Riesgo y Vulnerabilidades en el Desarrollo
Demostracion Hacking Honeypot y Análisis Forense
Security Maturity Model
Ad

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Modernizing your data center with Dell and AMD
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Monthly Chronicles - July 2025
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Electronic commerce courselecture one. Pdf
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology

Challenges and Benefits of Information Security Management

  • 3. ! Information Security ! " "# " " ! $ %" " & &'
  • 4. " #$ # #% ## & % ' '" ( ) % % * * # +# & $ ) % * , %# - . # # # # !# % #/ . %# # # * / . # $ * # *# # # # # / . # !# # 0 . # # # # #
  • 5. # 01 # $ An 27001 Certified Lead Auditor Audit Aspectos essenciais BS ISO/IEC 17799 e 27001 Implantação BS ISO/IEC 27001 Auditorias Internas à BS ISO/IEC 27001 Auditor Coordenador BS ISO/IEC 27001 (IRCA) Trainning Consultancy
  • 6. # 01 # $ " #$ # #% ## & " 2 4 3 . ! . " !# & 1 5 6 " 5(7 (( . ! . " !# & 8 . ! . $% & & # ! # ' # (
  • 7. # # &,' # &9 %# . " + : 1 # % 0
  • 9. . # %# ! # !# & # !# " 2 4 3 9 ' &; #! # # $" 2 4 '9( 3 9( . " # #
  • 10. Natural Disasters Acoustic (Flood, Lightning, Earthquake, ...) Information (Telephone conversations, in public, in meetings, ...) Technical failures Logical Physical 17799 * 27001 17799 * 27001 (Communication, Lack of energy, Information Information Equipment break-down, ...) (Faxs, contracts, BS ISO/IEC BS ISO/IEC (electronic records) reports, manuals, ...) Business Human Failure (Maintenance errors, User errors, Lack of staff, ...) Visual Intelectual Information (Vídeo, fotos, Information environment, ...) (Knowledge) Social Problens (Strikes, Terrorism Attack, politics, legislation...)
  • 11. '' # 2 < #* A5 Security policy A6 Organization of Information Security A7 Asset management A8 HR A9 Physical and A10 Communications A12 Information security Environmental and operations Systems security management Acquisition, development A11 Access control and maintenance A13 Incident Management A14 Business continuity management A15 Compliance
  • 12. ## = ! "# $ % & $ + ', - ' ( $ . / % ) % % ) * * % " "*
  • 13. > = # $ & # $ 2 4 ) 3 % 9- ? Communicate and Consult Assess Risks Identify Analyse Evaluate Control Establish the the the the Context Risks Risks Risks Risks Monitor and Review
  • 14. > = #1 Risk Assessment Asset Identification and Valuation Identification of Vulnerabilities Identification of Evaluation of Impacts Threats Business Risk Rating/ranking of Risks Risk Management Review of Existing Security Controls Identification of new Security Controls Policy and Implementation and Procedures Risk Acceptance Risk Reduction (Residual Risk)
  • 15. 1;
  • 16. $
  • 17. @% # A & B$ # # % !% % % ! * # ! %# !% % C$ A ,
  • 18. $ & %# % # .> # * 1 * # %0 12 3 4 5
  • 19. $ & = # . ."% # . $ $ . %#
  • 20. $ & = 8# % # . % # * # % . % % < # % %0 12 3 4 5
  • 21. $ & % # % #!D > = . # $ % 0 % # # . # $ % % ** . = $ $ # # = #% ## 67
  • 22. # * * 6 7* - * " * * # 68 # * * *9 : :;
  • 23. $ & # > = # $ & % #= # * # % $ # # # %#
  • 24. $ & #* $ ! $ & # # # $ $# 2 . A $ A B$ A E A & # # # .; # # # % 0 %# %
  • 25. $ & % F" # # G . 2 " H IA & ; * F # # G . 2 ( '$ I & D $ # # % ! & = % % # % ##
  • 26. 9 ' # # <<<;= ; *
  • 27. $ &) ## # *# +
  • 28. " #J
  • 29. " # & * # J . # # & # 3K D # & &>2
  • 30. " # &"% # %# ! # . I . # $ F $ ! # %#IG ! . # $ F" % # %#!1 G !" # %$ & ' ' # ' <<<; # ; "
  • 31. " # &2 D # % $" # # JJJ & # # # # # % $ L% #
  • 32. " # & 1 * # & B # "% # & * # * % L # % ! & %# % $ 3 $ # . > # !JJJJ & D% # # % ! * #
  • 33. " # & F, G # # $ $ $ # =# # & # $F #& ( #
  • 34. @% # A & !% # % # # # # % ** # $ 8# # A
  • 35. You are free: Creative Commons Attribution- •to copy, distribute, display, and perform this work NoDerivs 2.0 •to make commercial use of this work Under the following conditions: Attribution. You must give the original author credit. No Derivative Works. You may not alter, transform, or build upon this work. For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the author. Your fair use and other rights are in no way affected by the above. This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.
  • 36. E K M N 2 ->?- @ > ; ' ?@ > ; '