REQUEST FOR EXPRESSIONS OF INTEREST

Size: px
Start display at page:

Download "REQUEST FOR EXPRESSIONS OF INTEREST"

Transcription

1 REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTING SERVICES FIRMS SELECTION) Country : INDIA Project : FINANCING PUBLIC PRIVATE PARTNERSHIP THROUGH SUPPORT TO THE INDIA INFRASTRUCTURE FINANCE COMPANY LIMITED Sector : Finance and Private Sector Development Grant No. : TF Reference No. : C 3 Assignment Title: Implementation of ISO based Information Security Management System 1. The India Infrastructure Finance Company Limited (IIFCL) has received a Grant from the World Bank-towards the cost of Building Capacity and Strengthening Monitoring and Implementation Capability of India Infrastructure Company Finance Limited, and intends to apply part of the proceeds to payment for goods and consulting services to be procured under this Grant. 2. The consultants will implement an Information Security Management System (ISMS) based on the latest version of International Information Security Standard ISO /IEC at all IIFCL offices located in New Delhi. The broad steps to be carried out and the major deliverables at various milestones are given in Annex Skill Requirements / Eligibility Criteria for Vendors or Consultants or IT Consultants Vendor to state the extent of compliance to the following qualification criteria: Robust Methodology: Vendor shall employ proven & robust framework for ISMS Implementation to ensure successful completion of project leading to certification under ISO ISMS implementation experience: Vendor shall provide references of at least three organizations in BFSI Sector where they have executed projects related to ISO (ISMS) implementation. Completion certificates of the assignments from these organizations would need to be furnished.

2 Vendor s Security Expertise: Vendor shall have at least two ISO Lead Auditors and / or Implementers and one CISSP/ CISA or SANS Certified Security Professionals employed with them. Team to be deployed for the project: Project Team must include an ISO Certified Security Consultant as Project Manager and a CISSP / CISA or SANS certified security professional in the team. Each member should have at least 3 years of experience and should have successfully implemented at least 3 ISMS projects each in BFSI space. Track Record in Information Security Services: Vendor should have an experience of at least 3 Years in offering Information Security Services (including Security Assessment, Security Policies & Procedures Design and Security Consulting assignments) to leading organizations including minimum of three BFSI organizations. Vendors must list all such security services assignments undertaken by them in the last three years outlining the client name, brief project description, location, project duration, project value & date of completion. Vendor should have executed at least three IS Audit, Security Project of minimum value of Rs 20 lakhs in BFSI Sector in the last 3 years. 4. The IIFCL now invites eligible consulting firms to indicate their interest in providing the above services. Interested Consultants must provide information (brochures, description of similar assignments, experience in similar conditions, and availability of appropriate skills among staff) indicating that they are qualified to perform the services. The information regarding the consultant s organization and experience to be provided in the relevant attached forms: a. Consultant s Organization : ref Form - I b. Consultant s Experience : ref Form - II 5. The attention of interested Consultants is drawn to paragraph 1.9 of the World Bank s Guidelines: Selection and Employment of Consultants by World Bank Borrowers May 2004 Revised October 1, ( Consultant Guidelines ), setting forth the World Bank s policy on conflict of interest. Consultants may associate with other firms in the form of a joint venture or a sub consultancy to enhance their qualifications.

3 6. A consultant will be selected in accordance with the procedures set out in the World Bank s Guidelines: Selection and Employment of Consultants by World Bank Borrowers May 2004 Revised October 1, Further information can be obtained at the address below during office hours (1030 hours to 1700 hours) India Infrastructure Finance Company Limited CGM-IT 8 th Floor, Hindustan Times House, 18&20, Kasturba Gandhi Marg, New Delhi Tel: , Fax: technology@iifcl.org Web site: The Expressions of Interest must be delivered to the address below by 22nd October 2014 by 17:00 hrs.

4 Annexure I Information Security Management System (ISMS) IIFCL requires establishment and implementation of an Information Security management system (ISMS) based on the latest version of International Information Security Standard ISO /IEC at all IIFCL offices located in New Delhi. Broad steps required to be done by the vendor as an integral part of the exercise shall include, but not be limited, to the following: Gap Analysis -Assessment of Organization s security environment to assess the current security posture and level of preparedness of the Organization against the requirements of ISO standards. 1. Identification of various controls already implemented in the Organization including technical controls, administrative controls etc. Major Deliverable - Gap Analysis Report. 2. Development of Scope and Management Sign-off Major Deliverable Signed-off Scope statement 3. Setup of ISO (Information Security Organization) in the Organization preferably nominating a dedicated CISO and dedicated Information Security team. 4. Developing Risk Assessment Methodology and Management Sign-off Major Deliverable Signed-off Risk Assessment Methodology. 5. Identification of all Assets under scope of ISO together with all possible threats and vulnerabilities to these assets. Major Deliverable Asset Register 6. Vulnerability Assessment and Penetration Testing (VAPT) of all assets identified and system hardening to address all identified vulnerabilities. Major Deliverable VAPT report 7. Risk Assessment of all assets under scope of the project and development of Risk treatment plan esp. for all medium and high category risks identified. Major Deliverable Risk Assessment and Risk Treatment Reports.

5 8. Development and Implementation of appropriate Policies, Procedures, Standards and Guidelines. Major Deliverable Policies, Procedures, Standards and Guidelines. 9. List of all controls required and development of a SoA (Statement of Applicability) and procurement of all new controls to be implemented. Major Deliverable SoA (approved). 10. Establishing Control of Records and Control of Documents. 11. Implementation of all controls agreed to be implemented under SoA. 12. Training and awareness to all IIFCL staff & any third-party staff working at IIFCL office should be provided to create necessary awareness regarding Information Security and to foster a strong security culture within the organization. 13. Internal Audit to verify all risks identified have been successfully treated and all residual risks have been accepted by the management. Major Deliverable Internal Audit Report 14. Review of Internal Audit by Management. Major Deliverable Management commitment record 15. Prepare the Organization for Third Party/Certification Audit

6 FORM - I: Consultant s Organization and Experience A - Consultant s Organization [Provide here a brief (two pages) description of the background and organization of your firm/entity and each associate for this assignment.]

7 FORM - II B - Consultant s Experience [Using the format below, provide information on each assignment for which your firm, and each associate for this assignment, was legally contracted either individually as a corporate entity or as one of the major companies within an association, for carrying out consulting services similar to the ones requested under this assignment] Assignment name: Approx. value of the contract (in current US$ or Euro): Country: Location within country: Duration of assignment (months): Name of Client: Total No. of staff-months of the assignment: Address: Start date (month/year): Completion date (month/year): Name of associated Consultants, if any: Approx. value of the services provided by your firm under the contract (in current US$ or Euro): No. of professional staff-months provided by associated Consultants: Name of senior professional staff of your firm involved and functions performed (indicate most significant profiles such as Project Director/Coordinator, Team Leader): Narrative description of Project: Description of actual services provided by your staff within the assignment. State whether project since implemented

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27006 Second edition 2011-12-01 Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

More information

Request for Proposal (RFP)

Request for Proposal (RFP) Request for Proposal (RFP) BOK PENETRATION TESTING Date of Issue Closing Date Place Enquiries Table of Contents 1. Project Introduction... 3 1.1 About The Bank of Khyber... 3 1.2 Critical Success Factors...

More information

Predstavenie štandardu ISO/IEC 27005

Predstavenie štandardu ISO/IEC 27005 PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST TERMS OF REFERENCE February 2017 1 TERMS OF REFERENCE FOR

More information

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05

APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION. PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 APPROVAL SHEET PROCEDURE INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION PT. TÜV NORD Indonesia PS - TNI 001 Rev.05 Created : 20-06-2016 Checked: 20-06-2016 Approved : 20-06-2016 Indah Lestari Karlina

More information

FIJIAN ELECTIONS OFFICE SYSTEM CONSULTANCY AUDIT. Expression of Interest (EOI) (04/2017)

FIJIAN ELECTIONS OFFICE SYSTEM CONSULTANCY AUDIT. Expression of Interest (EOI) (04/2017) FIJIAN ELECTIONS OFFICE SYSTEM CONSULTANCY AUDIT Expression of Interest (EOI) (04/2017) Closing Date: 4pm Friday 4 August 2017 EXPRESSION OF INTEREST [EOI] SYSTEM CONSULTANCY AUDIT OF FEO s ELECTION MANAGEMENT

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27006 First edition 2007-03-01 Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

More information

_isms_27001_fnd_en_sample_set01_v2, Group A

_isms_27001_fnd_en_sample_set01_v2, Group A 1) What is correct with respect to the PDCA cycle? a) PDCA describes the characteristics of information to be maintained in the context of information security. (0%) b) The structure of the ISO/IEC 27001

More information

Spillemyndigheden s requirements for accredited testing organisations. Version of 1 July 2012

Spillemyndigheden s requirements for accredited testing organisations. Version of 1 July 2012 Version 1.3.0 of 1 July 2012 Contents 1 Introduction... 3 1.1 Authority... 3 1.2 Objective... 3 1.3 Target audience... 3 1.4 Version... 3 1.5 Enquiries... 3 2 Certification... 4 2.1 Framework for certification...

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security risk management

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security risk management INTERNATIONAL STANDARD ISO/IEC 27005 Second edition 2011-06-01 Information technology Security techniques Information security risk management Technologies de l'information Techniques de sécurité Gestion

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT Buy: http://www.globalmanagergroup.com/iso27001training.htm Chapter-1.0 CONTENTS OF ISO 27001-2005

More information

Zero Defect Zero Effect (ZED) Certification Scheme Rating Process

Zero Defect Zero Effect (ZED) Certification Scheme Rating Process QUALITY COUNCIL OF INDIA (QCI) 2 nd Floor, Institution of Engineers Building, Bahadur Shah Zafar Marg, New Delhi 110002 Phone: +91-11-2337 8056 / 57; Fax: +91-11-2337 8678; Web: www.qcin.org Zero Defect

More information

Application for Certification

Application for Certification Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the

More information

falanx Cyber ISO 27001: How and why your organisation should get certified

falanx Cyber ISO 27001: How and why your organisation should get certified falanx Cyber ISO 27001: How and why your organisation should get certified Contents What is ISO 27001? 3 What does it cover? 3 Why should your organisation get certified? 4 Cost-effective security management

More information

INFORMATION TECHNOLOGY AUDIT &

INFORMATION TECHNOLOGY AUDIT & One day training on INFORMATION TECHNOLOGY AUDIT & 10 th May 2018 - Mövenpick Hotel, Karachi 14 th May 2018 - Sunfort Hotel, Lahore (10:00 AM to 5:00 PM) TRAINING OVERVIEW Every time people get to hear

More information

INFORMATION SECURITY MANAGEMENT

INFORMATION SECURITY MANAGEMENT ISMS (ISO/IEC 27001:2005 to ISO/IEC 27001:2013) Transition Training Course (A17700) Two (2) Days It is recommended for ISMS registered Provisional Auditors, Auditors, Lead Auditors, Principal Auditors

More information

QUESTIONNAIRE TO ASSIST PREPARATION FOR AN ISMS CERTIFICATION

QUESTIONNAIRE TO ASSIST PREPARATION FOR AN ISMS CERTIFICATION : 1 of 7 Questionnaire to prepare for a Certification Audit for Information Security Management Sytem (ISMS) 1 Purpose With the help of this questionnaire you can provide a detailed description of your

More information

ISO : Competence Requirements Clause 7

ISO : Competence Requirements Clause 7 ISO 17021 : 2011 Competence Requirements Clause 7 3 Terms and definitions 3.7 Competence Ability to apply knowledge and skills to achieve intended results 3 Terms and definitions 3.10 Technical area Area

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION. The National Quality Infrastructure Project for Nigeria (NQIP) Project ID

UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION. The National Quality Infrastructure Project for Nigeria (NQIP) Project ID UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION The National Quality Infrastructure Project for Nigeria (NQIP) Project ID 130220 Terms of Reference for the Lead Auditor/ Training of Trainers (ToT) Courses

More information

Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 27006 Third edition 2015-10-01 Information technology Security techniques Requirements for bodies providing audit and certification of information

More information

ISO 9000:2015 LEAD AUDITOR

ISO 9000:2015 LEAD AUDITOR FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 9000:2015 LEAD AUDITOR Training Program This course is based on the ISO quality management system (QMS) standard ISO 9001:2015 Lead Auditor, the guideline

More information

REPUBLIC OF KENYA THE NATIONAL TREASURY P. O. BOX NAIROBI

REPUBLIC OF KENYA THE NATIONAL TREASURY P. O. BOX NAIROBI REPUBLIC OF KENYA THE NATIONAL TREASURY P. O. BOX 30007 00100 NAIROBI EXPRESION OF INTEREST FOR PROCUREMENT OF IFMIS ENTERPRISE SECURITY AND NETWORK SUPPORT TNT/EOI/02/2017-2018 CLOSING DATE: THURSDAY

More information

Conformity assessment Requirements for bodies providing audit and certification of management systems. Part 6:

Conformity assessment Requirements for bodies providing audit and certification of management systems. Part 6: TECHNICAL SPECIFICATION ISO/IEC TS 17021-6 First edition 2014-12-01 Conformity assessment Requirements for bodies providing audit and certification of management systems Part 6: Competence requirements

More information

Chapter 4. EDGE Approval Protocol for Auditors

Chapter 4. EDGE Approval Protocol for Auditors Chapter 4 EDGE Approval Protocol for Auditors Version 2.01 June 2016 Copyright 2015 International Finance Corporation. All rights reserved. The material in this publication is copyrighted by International

More information

RESERVE BANK OF INDIA

RESERVE BANK OF INDIA भ रत य रज़वर ब क स चन गक वभ ग Corporate Communications Division RESERVE BANK OF INDIA Department of Information Technology Annexure-A RFP for RFP for providing certification services under ISO 27001:2013

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001)

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) BELAC 2-405-ISMS R0 2017 SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) The only valid versions of the documents

More information

VOLUNTARY CERTIFICATION SCHEME FOR MEDICINAL PLANT PRODUCE REQUIREMENTS FOR CERTIFICATION BODIES

VOLUNTARY CERTIFICATION SCHEME FOR MEDICINAL PLANT PRODUCE REQUIREMENTS FOR CERTIFICATION BODIES VOLUNTARY CERTIFICATION SCHEME FOR MEDICINAL PLANT PRODUCE 1. Scope REQUIREMENTS FOR CERTIFICATION BODIES 1.1 This document describes the requirements the Certification Bodies (CBs) are expected to meet

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

Certification Body Audit Resources

Certification Body Audit Resources Certification Body Audit Resources Policy 13 v4.01 Original Issue 20 May 2012 Revision Date Effective Date Policy Applicable To All CertiSource Staff and Certification Body Staff Policy Managed By Approved

More information

Request for Expressions of Interest: The EU mhealth Hub

Request for Expressions of Interest: The EU mhealth Hub Request for Expressions of Interest: The EU mhealth Hub A project within the framework of the WHO-ITU joint initiative Be He@lthy, Be Mobile The project is supported by the European Commission Horizon2020

More information

What is ISO/IEC 27001?

What is ISO/IEC 27001? An Introduction to the International Information Security Management Standard By President INTERPROM July 2017 Copyright 2017 by InterProm USA. All Rights Reserved www.interpromusa.com Contents INTRODUCTION...

More information

ISO 27001:2013 certification

ISO 27001:2013 certification www.pwc.ch/cybersecurity ISO 27001:2013 certification Building confidence in your digital future Our approach to certification PwC offers a four-phase approach to help with your ISO 27001 project, using

More information

Description of the certification procedure MS - ISO 9001, MS - ISO 14001, MS - ISO/TS and MS BS OHSAS 18001, MS - ISO 45001, MS - ISO 50001

Description of the certification procedure MS - ISO 9001, MS - ISO 14001, MS - ISO/TS and MS BS OHSAS 18001, MS - ISO 45001, MS - ISO 50001 The certification of a management system based on standard ISO 9001, ISO 14001, ISO/TS 29001, BS OHSAS 18001, ISO 45001 or ISO 50001, consists of the offer and contract phase, the audit preparation, performance

More information

Sýnishorn ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security risk management

Sýnishorn ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security risk management INTERNATIONAL STANDARD ISO/IEC 27005 Second edition 2011-06-01 Information technology Security techniques Information security risk management Technologies de l'information Techniques de sécurité Gestion

More information

Information Technology Branch Organization of Cyber Security Technical Standard

Information Technology Branch Organization of Cyber Security Technical Standard Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:

More information

IDBI BANK LIMITED IDBI TOWER, WTC COMPLEX, CUFFE PARADE MUMBAI

IDBI BANK LIMITED IDBI TOWER, WTC COMPLEX, CUFFE PARADE MUMBAI IDBI BANK LIMITED IDBI TOWER, WTC COMPLEX, CUFFE PARADE MUMBAI 400 005 Invitation for EXPRESSION OF INTEREST (EOI) From Telecom Service Providers For MPLS Network Connectivity in India Address communication

More information

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification 2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification Presenters Jared Hamilton CISSP CCSK, CCSFP, MCSE:S Healthcare Cybersecurity Leader, Crowe Horwath Erika Del Giudice CISA, CRISC,

More information

CISA Course. Course Details: iathena.com, a Navitus Education Venture

CISA Course. Course Details: iathena.com, a Navitus Education Venture iathena.com, a Navitus Education Venture CISA Course Course Details: Modules: 5 Contents: Interactive Supplements: Overview, Tips n Tricks, 1 Exam Type: Self-Paced (30, 90 & 180 Days) Copyright: Navitus

More information

Level Access Information Security Policy

Level Access Information Security Policy Level Access Information Security Policy INFOSEC@LEVELACCESS.COM Table of Contents Version Control... 3 Policy... 3 Commitment... 3 Scope... 4 Information Security Objectives... 4 + 1.800.889.9659 INFOSEC@LEVELACCESS.COM

More information

Implementing an ISMS: Stories from the Trenches. Peter H. Gregory, CISA, CISSP, DRCE

Implementing an ISMS: Stories from the Trenches. Peter H. Gregory, CISA, CISSP, DRCE Implementing an ISMS: Stories from the Trenches Peter H. Gregory, CISA, CISSP, DRCE About the speaker Peter H. Gregory, CISA, CISSP, DRCE Security and risk manager Author of 19 books on security / tech

More information

ISO LEAD AUDITOR TRAINING

ISO LEAD AUDITOR TRAINING FINAL CERTIFICATION AWARDED BY PECB CANADA ISO 22301 LEAD AUDITOR TRAINING & CERTIFICATION (Business Continuity Management) Master the Audit of Business Continuity Management System (BCMS) based on ISO

More information

Chapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017

Chapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017 Chapter 4 EDGE Approval Protocol for Auditors Version 3.0 June 2017 Copyright 2017 International Finance Corporation. All rights reserved. The material in this publication is copyrighted by International

More information

Ingram Micro Cyber Security Portfolio

Ingram Micro Cyber Security Portfolio Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training

More information

Cyber Security is it a boardroom issue?

Cyber Security is it a boardroom issue? Brisbane, 23 September 2014 Alistair Blake Director Cyber Security & Risk Services Today s session will cover Cyber Security and the Boardroom Executive sponsorship Organisational culture Operational readiness

More information

UKAS Guidance for Bodies Offering Certification of Anti-Bribery Management Systems

UKAS Guidance for Bodies Offering Certification of Anti-Bribery Management Systems CIS 14 Edition 1 September 2018 UKAS Guidance for Bodies Offering Certification of Anti-Bribery Management Systems CIS 14 Edition 1 Page 1 of 10 Contents 1. Introduction 3 2. UKAS Assessment Approach 3

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

SPECIFIC PROCUREMENT NOTICE IT SERVICES

SPECIFIC PROCUREMENT NOTICE IT SERVICES SPECIFIC PROCUREMENT NOTICE IT SERVICES Funding source: Sector: Asian Infrastructure Investment Bank (AIIB) Information Technology Project Name: On-site IT Security Service Project No. AIIB CP - 00043

More information

A80F300e Description of the SA8000:2014 certification procedure

A80F300e Description of the SA8000:2014 certification procedure The certification of a management system based on standard SA8000:2014 consists of the offer and contract phase, the audit preparation, performance of the Stage 1 audit with evaluation of the management

More information

Global Specification Protocol for Organisations Certifying to an ISO Standard related to Market, Opinion and Social Research.

Global Specification Protocol for Organisations Certifying to an ISO Standard related to Market, Opinion and Social Research. CONTENTS i. INTRODUCTION 3 ii. OVERVIEW SPECIFICATION PROTOCOL DOCUMENT DEVELOPMENT PROCESS 4 1. SCOPE 5 2. DEFINITIONS 5 3. REFERENCES 6 4. MANAGEMENT STANDARDS FOR APPROVED CERTIFICATION BODIES 6 4.1

More information

ISO/IEC Information technology Security techniques Code of practice for information security controls

ISO/IEC Information technology Security techniques Code of practice for information security controls INTERNATIONAL STANDARD ISO/IEC 27002 Second edition 2013-10-01 Information technology Security techniques Code of practice for information security controls Technologies de l information Techniques de

More information

Federal Acquisition Service Authorized Federal Supply Schedule Price List

Federal Acquisition Service Authorized Federal Supply Schedule Price List Federal Acquisition Service Authorized Federal Supply Schedule Price List On-line access to contract ordering information, terms and conditions, up-to-date pricing, and the option to create an electronic

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

AUDITOR / LEAD AUDITOR PHARMACEUTICAL AND MEDICAL DEVICE INDUSTRY

AUDITOR / LEAD AUDITOR PHARMACEUTICAL AND MEDICAL DEVICE INDUSTRY Requirement specification Certification of individuals: AUDITOR / LEAD AUDITOR PHARMACEUTICAL AND MEDICAL DEVICE INDUSTRY Requirement specification Auditor Lead Auditor rev 5.docx Page 1 1 Introduction

More information

COURSE BROCHURE CISA TRAINING

COURSE BROCHURE CISA TRAINING COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within

More information

Job Specification & Recruiting Profile of Vacancy

Job Specification & Recruiting Profile of Vacancy Job Specification & Recruiting Profile of Vacancy 26 March 2019 The following vacancy exists at NSFAS in Cape Town. Position Information Security Analyst Type & Grade Permanent, Grade 11 Vacancy No 76

More information

Cymsoft Information Technologies

Cymsoft Information Technologies 1 Cymsoft Information Technologies Dr. Cemal Gemci CEO 2 CYMSOFT? Established in 2006 in Ankara/Turkey. Main Activity: Provides Information Security solutions in each area of ICT. Focused on consultancy

More information

PROCUREMENT OF GOODS UNDER NATIONAL SHOPPING PROCEDURES

PROCUREMENT OF GOODS UNDER NATIONAL SHOPPING PROCEDURES PROCUREMENT OF GOODS UNDER NATIONAL SHOPPING PROCEDURES INVITATION FOR QUOTATIONS FOR SUPPLY OF GOODS UNDER NATIONAL SHOPPING PROCEDURES 7 th September 2012 IIFCL invites sealed bids from eligible bidders

More information

IPC Certification Scheme IPC QMS/EMS Auditors

IPC Certification Scheme IPC QMS/EMS Auditors Page 1 of 16 International Personnel Certification Association I P C CERTIFICATION SCHEME IPC QUALITY/ENVIRONMENTAL MANAGEMENT SYSTEM AUDITORS ISSUE 1 Page 2 of 16 International Personnel Certification

More information

VOLUNTARY CERTIFICATION SCHEME FOR MEDICINAL PLANT PRODUCE

VOLUNTARY CERTIFICATION SCHEME FOR MEDICINAL PLANT PRODUCE VOLUNTARY CERTIFICATION SCHEME FOR MEDICINAL PLANT PRODUCE - REQUIREMENTS FOR CERTIFICATION BODIES 1. INTRODUCTION 1.1 The Certification Bodies (CBs) are expected to meet the process for their approval

More information

BCM Program Development

BCM Program Development BCM Program Development Course Description: The BCM Program Development course provides you with knowledge to develop an auditable and actionable business continuity program for your organization. This

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Audit & Inspection Department - Head Office: Manipal. Empanelment of CISA qualified individuals on Contract Basis for conducting IS Audits

Audit & Inspection Department - Head Office: Manipal. Empanelment of CISA qualified individuals on Contract Basis for conducting IS Audits Audit & Inspection Department - Head Office: Manipal Empanelment of CISA qualified individuals on Contract Basis for conducting IS Audits Applications are invited from eligible CISA qualified Information

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

Saving the Project Brief document under its own name

Saving the Project Brief document under its own name HOW TO USE THIS TEMPLATE: Introduction The template reflects the steps set out in the PRINCE2 Method and is designed to prompt the Project Manager and help in the creation of the. The information for the

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Security techniques Information security management guidelines for financial services

ISO/IEC TR TECHNICAL REPORT. Information technology Security techniques Information security management guidelines for financial services TECHNICAL REPORT ISO/IEC TR 27015 First edition 2012-12-01 Information technology Security techniques Information security management guidelines for financial services Technologies de l'information Techniques

More information

BHConsulting. Your trusted cybersecurity partner

BHConsulting. Your trusted cybersecurity partner Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised

More information

Certified Information Systems Auditor Training and Certification

Certified Information Systems Auditor Training and Certification Certified Information Systems Auditor Training and Certification Course Description Certified Information Systems Auditor (CISA) Training designation is a globally recognized certification for IS audit

More information

Inhalt. Description of Certification Procedure ISO 22000, HACCP and DIN 15593

Inhalt. Description of Certification Procedure ISO 22000, HACCP and DIN 15593 Inhalt 1. CERTIFICATION PROCEDURE... 2 1.1 Audit Preparation... 2 1.2 Audit Stage 1... 2 1.3 Audit Stage 2 Certification Audit... 3 1.4. Issue of Certificate... 3 2. SURVEILLANCE AUDIT... 3 3. RECERTIFICATION

More information

OIL & GAS DIVISION TRAINING CONSULTING ENGINEERING IMPLEMENTING AUDITING. Reva Phoenix Engineers & Consultants India Private Limited

OIL & GAS DIVISION TRAINING CONSULTING ENGINEERING IMPLEMENTING AUDITING. Reva Phoenix Engineers & Consultants India Private Limited www.revaphoenix.com Reva Phoenix Engineers & Consultants India Private Limited OIL & GAS DIVISION TRAINING CONSULTING ENGINEERING IMPLEMENTING AUDITING 01 INTRODUCTION We at Reva Phoenix Engineers & Consultants

More information

REPCO HOME FINANCE LIMITED

REPCO HOME FINANCE LIMITED REPCO HOME FINANCE LIMITED REQUEST FOR PROPOSAL FOR CONDUCTING VULNERABILITY ASSESSMENT AND PENETRATION TESTING EDP Department Corporate Office Repco Home Finance Ltd., Alexander Square Third Floor, New

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22301 Lead Implementer www.pecb.com The objective of the Certified ISO 22301 Lead Implementer examination is to ensure that the candidate

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

IT Audit Process Prof. Liang Yao Week Six IT Audit Planning

IT Audit Process Prof. Liang Yao Week Six IT Audit Planning Week Six IT Audit Planning IT Audit Planning Process Institute of Internal Audit Standards - Section 2010: Planning The chief audit executive must establish a risk-based plan to determine the priorities

More information

TERMS OF REFERENCE. ISO training and gap analysis of selected personnel certification bodies

TERMS OF REFERENCE. ISO training and gap analysis of selected personnel certification bodies SECTION II: ToR dated 3 rd April 2017 RFX 7000002275 UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION UNIDO PROJECT NUMBER: TFIRQ11004 STRENGTHENING THE NATIONAL QUALITY INFRASTRUCTURE TO FACILITATE

More information

"Energy and Ecological Transition for the Climate" Label Control and Monitoring Plan Guidelines

Energy and Ecological Transition for the Climate Label Control and Monitoring Plan Guidelines MINISTRY OF ENVIRONMENT, ENERGY AND THE SEA "Energy and Ecological Transition for the Climate" Label Control and Monitoring Plan Guidelines Contents FOREWORD... 3 INTRODUCTION... 4 I. INITIAL CERTIFICATION

More information

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System EVALUATION AND APPROVAL OF AUDITORS Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System 1 TABLE OF CONTENTS 1. Scope and field of Application 3 2. Normative

More information

Request for Quotations

Request for Quotations AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA P. O. Box 3243, Addis Ababa, ETHIOPIA Tel.: (251-11) 5517700 Fax: (251-11) 5517844 www.au.int Request for Quotations Consultancy for Provision of Training Service

More information

Rules for LNE Certification of Management Systems

Rules for LNE Certification of Management Systems Rules for LNE Certification of Management Systems Application date: March 10 th, 2017 Rev. 040716 RULES FOR LNE CERTIFICATION OF MANAGEMENT SYSTEMS CONTENTS 1. PURPOSE... 3 2. SCOPE... 3 3. DEFINITION

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

ISO Gap Analysis Excerpt from sample report

ISO Gap Analysis Excerpt from sample report ISO 27001 Gap Analysis Excerpt from sample report Protect Comply Thrive (The below excerpts do not represent the entire report, and only provide a small sample of the information provided in the full report).

More information

Areas of impact for client consideration taken from the Rules for achieving and maintaining IATF recognition 4 th Edition for ISO/TS 16949

Areas of impact for client consideration taken from the Rules for achieving and maintaining IATF recognition 4 th Edition for ISO/TS 16949 Areas of for client consideration taken from the Rules for achieving and maintaining IATF recognition 4 th Edition for ISO/TS 16949 1 st February 2014 1 Foreword Introduction The IATF recognizes certification

More information

John Snare Chair Standards Australia Committee IT/12/4

John Snare Chair Standards Australia Committee IT/12/4 John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC

More information

ISO 55001: 2014 Asset Management System 5-Day Training Course (IAM Certified)

ISO 55001: 2014 Asset Management System 5-Day Training Course (IAM Certified) ISO 55001: 2014 Asset Management System 5-Day Training Course (IAM Certified) TÜV SÜD Introduction ISO 55001: 2014 is a newly released best practice standard for asset management. This standard helps to

More information

PROVINCIAL DISASTER MANAGEMENT AUTHORITY SINDH REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTING SERVICES INDIVIDUAL CONSULTANT)

PROVINCIAL DISASTER MANAGEMENT AUTHORITY SINDH REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTING SERVICES INDIVIDUAL CONSULTANT) PROVINCIAL DISASTER MANAGEMENT AUTHORITY SINDH REQUEST FOR EXPRESSIONS OF INTEREST (CONSULTING SERVICES INDIVIDUAL CONSULTANT) Pakistan P155350: Sindh Resilience Project (PDMA Component) Credit No.: 5888-PK

More information

Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2

Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2 Making IT good for society Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2 Version 5.0 April 2018 This is a United Kingdom government regulated qualification which is administered

More information

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS.

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS. When Recognition Matters WHITEPAPER ISO 28000 SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS www.pecb.com CONTENT 3 4 4 4 4 5 6 6 7 7 7 8 9 10 11 12 Introduction An overview of ISO 28000:2007 Key clauses of

More information

Project Proposal for Revising GUID 5300 on Information Technology Audit October 16, 2017

Project Proposal for Revising GUID 5300 on Information Technology Audit October 16, 2017 This form is to be used to stand as a record of the proposal from the project team. PART A: PROJECT IDENTITY Description Information Project number and title as per SDP 2.8. Consolidating and aligning

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security risk management

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security risk management INTERNATIONAL STANDARD ISO/IEC 27005 First edition 2008-06-15 Information technology Security techniques Information security risk management Technologies de l'information Techniques de sécurité Gestion

More information

Odisha Urban Infrastructure Development Fund

Odisha Urban Infrastructure Development Fund Odisha Urban Infrastructure Development Fund EXPRESSION OF INTEREST FOR SELECTION OF TRANSACTION ADVISOR FOR IMPLEMENTATION OF ENERGY EFFICIENT STREET LIGHTING PROJECT IN GREEN FIELD AREAS IN 112 ULBS

More information

ISO27001:2013 The New Standard Revised Edition

ISO27001:2013 The New Standard Revised Edition ECSC UNRESTRICTED ISO27001:2013 The New Standard Revised Edition +44 (0) 1274 736223 consulting@ecsc.co.uk www.ecsc.co.uk A Blue Paper from Page 1 of 14 Version 1_00 Date: 27 January 2014 For more information

More information

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner Management and Information Technology Solutions Decker Consulting GmbH Training Catalog Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz Revision 9.1 05.12.2018 public Authorized Training Partner

More information