UGANDA NATIONAL BUREAU OF STANDARDS LIST OF DRAFT UGANDA STANDARDS ON PUBLIC REVIEW

Size: px
Start display at page:

Download "UGANDA NATIONAL BUREAU OF STANDARDS LIST OF DRAFT UGANDA STANDARDS ON PUBLIC REVIEW"

Transcription

1 UGANDA NATIONAL BUREAU OF STANDARDS LIST OF DRAFT UGANDA STANDARDS ON PUBLIC REVIEW S/No. STANDARDS CODE TITLE(DESCRIPTION) SCOPE 1. DUS ISO/IEC 29151:2017 technology -- Security techniques -- Code of practice for personally identifiable information protection ISO/IEC 29151:2017 establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII). In particular, this Recommendation International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the requirements for processing PII that may be applicable within the context of an organization's information security risk environment(s). ISO/IEC 29151:2017 is applicable to all types and sizes of organizations acting as PII controllers (as defined in ISO/IEC 29100), including public and private companies, government entities and not-for-profit organizations that process PII. 2. DUS ISO/IEC 19752:2017 technology Office equipment Method for the determination of toner cartridge yield for monochromatic electrophotographic printers and multifunction devices that contain printer components 3. DUS ISO/IEC 24734:2014 technology Office This document is limited to the evaluation of toner cartridge page yield for toner containing cartridges (i.e. all-in-one toner cartridges and toner cartridges without a photoconductor) for monochrome electrophotographic print systems. This document could also be applied to the printer component of any multifunctional device that has a digital input-printing path (i.e. multi-function devices that contain printer components). This document is only intended for the measurement of toner cartridge yield. No other claims can be made from this testing regarding quality, reliability, etc. This International Standard specifies a method for measuring the productivity of digital printing devices with various office applications and

2 equipment Method for measuring digital printing productivity 4. DUS ISO/ :2007 Ergonomics of human-- system interaction -- Part 400: Principles and requirements for physical input devices 5. DUS ISO :2008 Ergonomics of humansystem interaction Part 171: Guidance on software accessibility print job characteristics. This International Standard is applicable to digital printing devices, including single-function and multi-function devices, regardless of print technology (e.g. inkjet, laser). Devices can be equipped with a range of paper feed and finishing options either directly connected to the computer system or via a network. It is intended to be used for black and white (B&W) as well as colour digital printing devices. It allows for the comparison of the productivity of machines operating in various available modes (simplex, duplex, size of substrates, etc.) and office applications when the test system environment, operating modes, and job mix for each machine are held identical. This International Standard includes test files, test setup procedure, test runtime procedure, and the reporting requirements for the digital printing productivity measurements. SO :2006 gives guidelines for physical input devices for interactive systems. It provides guidance based on ergonomic factors for the following input devices: keyboards, mice, pucks, joysticks, trackballs, trackpads, tablets and overlays, touch sensitive screens, styli, light pens, voice controlled devices, and gesture controlled devices. It defines and formulates ergonomic principles valid for the design and use of input devices. These principles are to be used to generate recommendations for the design of products and for their use. It also defines relevant terms for the entire 400 series of ISO ISO :2006 also determines properties of input devices relevant for usability including functional, electrical, mechanical, maintainability and safety related properties. Additionally included are aspects of interdependency with the use environment and software. This part of ISO 9241 provides ergonomics guidance and specifications for the design of accessible software for use at work, in the home, in education and in public places. It covers issues associated with designing accessible software for people with the widest range of physical, sensory and cognitive abilities, including those who are temporarily disabled, and the elderly. It addresses software considerations for accessibility that complement general design for usability as addressed by ISO , ISO to ISO , ISO and ISO

3 6. DUS ISO/IEC 23912:2005 technology mm (1,46 Gbytes per side) and 120 mm (4,70 Gbytes per side) DVD Recordable Disk (DVD- R) This part of ISO 9241 is applicable to the accessibility of interactive systems. It addresses a wide range of software (e.g. office, Web, learning support and library systems). It promotes the increased usability of systems for a wider range of users. While it does not cover the behaviour of, or requirements for, assistive technologies (including assistive software), it does address the use of assistive technologies as an integrated component of interactive systems. It is intended for use by those responsible for the specification, design, development, evaluation and procurement of software platforms and software applications. ISO/IEC 23912:2005 specifies the mechanical, physical and optical characteristics of an 80 mm and a 120 mm DVD Recordable disk to enable the interchange of such disks. It specifies the quality of the pre-recorded, unrecorded and the recorded signals, the format of the data, the format of the information zone, the format of the unrecorded zone, and the recording method, thereby allowing for information interchange by means of such disks. This disk is identified as a DVD Recordable (DVD-R) disk. ISO/IEC 23912:2005 specifies: - 80 mm and 120 mm nominal diameter disks that may be either single or double sided; - the conditions for conformance; - the environments in which the disk is to be operated and stored; - the mechanical and physical characteristics of the disk, so as to provide mechanical interchange between data processing systems; - the format of the pre-recorded information on an unrecorded disk, including the physical disposition of the tracks and sectors, the error correcting codes and the coding method used;

4 - the format of the data and the recorded information on the disk, including the physical disposition of the tracks and sectors, the error correcting codes and the coding method used; - the characteristics of the signals from pre-recorded and unrecorded areas on the disk, enabling data processing systems to read the prerecorded information and to write to the disks; and - the characteristics of the signals recorded on the disk, enabling data processing systems to read the data from the disk. ISO/IEC 23912:2005 provides for interchange of disks between disk drives. Together with a standard for volume and file structure, it provides for full data interchange between data processing systems.

5 7. DUS ISO 19109:2015 Geographic information -- Rules for application schema ISO 19109:2015 defines rules for creating and documenting application schemas, including principles for the definition of features. The scope of this International Standard includes the following: - conceptual modelling of features and their properties from a universe of discourse; - definition of application schemas; - use of the conceptual schema language for application schemas; - transition from the concepts in the conceptual model to the data types in the application schema; - Integration of standardized schemas from other ISO geographic information standards with the application schema. The following are outside the scope: - choice of one particular conceptual schema language for application schemas; - definition of any particular application schema; - representation of feature types and their properties in a feature catalogue; - representation of metadata; - rules for mapping one application schema to another; - implementation of the application schema in a computer environment;

6 - computer system and application software design; - programming.

7 8. DUS ISO IEC 38500:2015 Corporate governance of information technology This International Standard provides guiding principles for members of governing bodies of organizations (which can comprise owners, directors, partners, executive managers, or similar) on the effective, efficient, and acceptable use of information technology (IT) within their organizations. It also provides guidance to those advising, informing, or assisting governing bodies. They include the following: executive managers; members of groups monitoring the resources within the organization; external business or technical specialists, such as legal or accounting specialists, retail or industrial associations, or professional bodies; internal and external service providers (including consultants); Auditors. This International Standard applies to the governance of the organization's current and future use of IT including management processes and decisions related to the current and future use of IT. These processes can be controlled by IT specialists within the organization, external service providers, or business units within the organization. This International Standard defines the governance of IT as a subset or domain of organizational governance, or in the case of a corporation, corporate governance. This International Standard is applicable to all organizations, including public and private companies, government entities, and not-for-profit

8 organizations. This International Standard is applicable to organizations of all sizes from the smallest to the largest, regardless of the extent of their use of IT. The purpose of this International Standard is to promote effective, efficient, and acceptable use of IT in all organizations by assuring stakeholders that, if the principles and practices proposed by the standard are followed, they can have confidence in the organization's governance of IT, informing and guiding governing bodies in governing the use of IT in their organization, and establishing a vocabulary for the governance of IT.

9 9. DUS ISO/IEC 18598:2016 technology Automated infrastructure management (AIM) systems Requirements, data exchange and applications This International Standard specifies the requirements and recommendations for the attributes of automated infrastructure management (AIM) systems. This International Standard explains how AIM systems can contribute to operational efficiency and deliver benefits to a) cabling infrastructure and connected device administration, b) facilities and IT management processes and systems, c) other networked management processes and systems (e.g. intelligent building systems), d) business information systems covering asset tracking and asset management together with event notifications and alerts that assist with physical network security.

10 10. DUS ISO/IEC :2015 technology Security techniques Network security Part 1: Overview and concepts This part of ISO/IEC provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services, and end-users, in addition to security of the information being transferred across the communication links.) It is relevant to anyone involved in owning, operating or using a network. This includes senior managers and other non-technical managers or users, in addition to managers and administrators who have specific responsibilities for information security and/or network security, network operation, or who are responsible for an organization s overall security program and security policy development. It is also relevant to anyone involved in the planning, design and implementation of the architectural aspects of network security. This part of ISO/IEC also includes the following: provides guidance on how to identify and analyse network security risks and the definition of network security requirements based on that analysis, provides an overview of the controls that support network technical security architectures and related technical controls, as well as those nontechnical controls and technical controls that are applicable not just to networks, introduces how to achieve good quality network technical security architectures, and the risk, design and control aspects associated with typical network scenarios and network technology areas (which are dealt with in detail in subsequent parts of ISO/IEC 27033), and briefly

11 addresses the issues associated with implementing and operating network security controls, and the on-going monitoring and reviewing of their implementation.

12 11. DUS ISO/IEC : DUS ISO/IEC :2010 technology Security techniques Part 2: Guidelines for the design and implementation of network security technology Security techniques Part 3: Reference networking scenarios Threats, design techniques and control issues ISO/IEC :2012 gives guidelines for organizations to plan, design, implement and document network security. This part of ISO/IEC describes the threats, design techniques and control issues associated with reference network scenarios. For each scenario, it provides detailed guidance on the security threats and the security design techniques and controls required to mitigate the associated risks. Where relevant, it includes references to ISO/IEC to ISO/IEC to avoid duplicating the content of those documents. The information in this part of ISO/IEC is for use when reviewing technical security architecture/design options and when selecting and documenting the preferred technical security architecture/design and related security controls, in accordance with ISO/IEC The particular information selected (together with information selected from ISO/IEC to ISO/IEC ) will depend on the characteristics of the network environment under review, i.e. the particular network scenario(s) and technology topic(s) concerned. Overall, this part of ISO/IEC will aid considerably the comprehensive definition and implementation of security for any organization's network environment.

13 13. DUS ISO /IEC :2014 technology -- Security techniques -- Network security -- Part 4: Securing communications between networks using security gateways This part of ISO/IEC gives guidance for securing communications between networks using security gateways (firewall, application firewall, Intrusion Protection System, etc.) in accordance with a documented information security policy of the security gateways, including: a) identifying and analysing network security threats associated with security gateways; b) defining network security requirements for security gateways based on threat analysis; c) using techniques for design and implementation to address the threats and control aspects associated with typical network scenarios; and 14. DUS ISO IEC :2013 technology -- Security techniques -- Network security -- Part 5: Securing communications across networks using Virtual Private Networks (VPNs) d) addressing issues associated with implementing, operating, monitoring and reviewing network security gateway controls. Provides detailed guidance on the security aspects of the management, operation and use of IT networks, and their inter-connections. It defines techniques for securing inter-network connections that are established using virtual private networks (VPNs). It is relevant to all personnel who are involved in the detailed planning, design and implementation of VPN security (for example IT network managers, administrators, engineers, and IT network security officers).

14 15. DUS ISO/IEC :2016 Security Network security Part 6: Securing wireless IP network access ISO/IEC :2016 describes the threats, security requirements, security control and design techniques associated with wireless networks. It provides guidelines for the selection, implementation and monitoring of the technical controls necessary to provide secure communications using wireless networks. The information in this part of ISO/IEC is intended to be used when reviewing or selecting technical security architecture/design options that involve the use of wireless network in accordance with ISO/IEC Overall, ISO/IEC will aid considerably the comprehensive definition and implementation of security for any organization's wireless network environment. It is aimed at users and implementers who are responsible for the implementation and maintenance of the technical controls necessary to provide secure wireless networks. 16. DUS ISO/IEC 27039:2015 technology -- Security techniques -- Selection, deployment and operations of intrusion detection and prevention systems (IDPS) This International Standard provides guidelines to assist organizations in preparing to deploy intrusion detection and prevention systems (IDPS). In particular, it addresses the selection, deployment, and operations of IDPS. It also provides background information from which these guidelines are derived.

15 17. DUS ISO/IEC :2016 technology -- Security techniques -- security incident management - - Part 2: Guidelines to plan and prepare for incident response This part of ISO/IEC provides the guidelines to plan and prepare for incident response. The guidelines are based on the Plan and Prepare phase and the Lessons Learned phase of the security incident management phases model presented in ISO/IEC The major points within the Plan and Prepare phase include the following: information security incident management policy and commitment of top management; information security policies, including those relating to risk management, updated at both corporate level and system, service and network levels; information security incident management plan; incident response team (IRT) establishment; establish relationships and connections with internal and external organizations; technical and other support (including organizational and operational support); information security incident management awareness briefings and training; information security incident management plan testing. The principles given in this part of ISO/IEC are generic and intended to be applicable to all organizations, regardless of type, size or nature.

16 Organizations can adjust the guidance given in this part of ISO/IEC according to their type, size and nature of business in relation to the information security risk situation. This part of ISO/IEC is also applicable to external organizations providing information security incident management services.

17 18. DUS ISO/IEC 27006: DUS ISO/IEC 27004:2016 technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems technology Security techniques security management Monitoring, measurement, analysis and evaluation This International Standard specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC and ISO/IEC It is primarily intended to support the accreditation of certification bodies providing ISMS certification. The requirements contained in this International Standard need to be demonstrated in terms of competence and reliability by any body providing ISMS certification, and the guidance contained in this International Standard provides additional interpretation of these requirements for any body providing ISMS certification. NOTE This International Standard can be used as a criteria document for accreditation, peer assessment or other audit processes. This document provides guidelines intended to assist organizations in evaluating the information security performance and the effectiveness of an information security management system in order to fulfil the requirements of ISO/IEC 27001:2013, 9.1. It establishes: a) the monitoring and measurement of information security performance; b) the monitoring and measurement of the effectiveness of an information security management system (ISMS) including its processes and controls; c) the analysis and evaluation of the results of monitoring and measurement. This document is applicable to all types and sizes of organizations.

18 20. DUS ISO/IEC 27002:2013/Cor 2:2015 technology -- Security techniques -- Code of practice for information security controls This Standard gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization s information security risk environment(s). This International Standard is designed to be used by organizations that intend to: 21. DUS ISO/IEC 27003: DUS ISO/IEC27001:2013/Cor.2:2015 technology -- Security techniques -- security management systems - - Guidance technology Security techniques security management systems Requirements a) select controls within the process of implementing an Security Management System based on ISO/IEC 27001;[10] b) implement commonly accepted information security controls; c) develop their own information security management guidelines. This document provides explanation and guidance on ISO/IEC 27001:2013. This Standard specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This International Standard also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in this International Standard are generic and are intended to be applicable to all organizations, regardless of type, size or nature. Excluding any of the requirements specified in Clauses 4 to 10 is not acceptable when an organization claims conformity to this International Standard.

19 23. DUS ISO/IEC :2011 technology Interoperability with assistive technology (AT) Part 1: Requirements and recommendations for interoperability This part of ISO/IEC defines the responsibilities of different information technology (IT) and assistive technology (AT) functional units in supporting interoperability. It recognizes that AT can be provided both as functional units that are installed or otherwise connected to a system or can be utilized by being provided as a service which is accessed via communications connections. It bases these responsibilities on fundamental IT definitions of major types of functional units. It focuses on the utilization of standard, public interfaces for functional units and on the provision of accessible documentation of their capabilities. This part of ISO/IEC13066 recognizes that IT is implemented both in conventional computer systems and as a major component of other systems within the wider scope of information and communications technology (ICT). This part of ISO/IEC recognizes the fundamental role of operating systems and application programming interfaces (APIs), in managing interoperability, and in providing guidance to developers of other functional units. It also recognizes that different operating systems will have their own standardized methods of supporting interoperability. This part of ISO/IEC does not define or require specific technology, commands, APIs, or hardware interfaces. It defers to other existing standards and supports the development of new standards in these areas. It identifies a variety of common accessibility APIs that are further described in other parts of ISO/IEC

20 24. DUS ISO/IEC :2016 technology Data centres Key performance indicators Part 1: Overview and general requirements This part of ISO/IEC specifies the following for the other parts of ISO/IEC 30134: a) a common structure; b) definitions, terminology and boundary conditions for KPIs of data centre resource usage effectiveness and efficiency; c) common requirements for KPIs of data centre resource usage effectiveness and efficiency; d) common objectives for KPIs of the data centre resource effectiveness and efficiency; e) general information regarding the use of KPIs of data centre resource usage effectiveness and efficiency.

SC27 WG4 Mission. Security controls and services

SC27 WG4 Mission. Security controls and services copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial

More information

_isms_27001_fnd_en_sample_set01_v2, Group A

_isms_27001_fnd_en_sample_set01_v2, Group A 1) What is correct with respect to the PDCA cycle? a) PDCA describes the characteristics of information to be maintained in the context of information security. (0%) b) The structure of the ISO/IEC 27001

More information

Measuring the effectiveness of your ISMS implementations based on ISO/IEC 27001

Measuring the effectiveness of your ISMS implementations based on ISO/IEC 27001 Measuring the effectiveness of your ISMS implementations based on ISO/IEC 27001 Information Security Management Systems Guidance series The Information Security Management Systems (ISMS) series of books

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27006 Second edition 2011-12-01 Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

More information

ITIL 2011 Foundation Course

ITIL 2011 Foundation Course IT SERVICE MANAGEMENT ITIL 2011 Foundation Course CERTIFICATE: DURATION: COURSE DELIVERY: LANGUAGE: ITIL 2011 Foundation 2 or 3 Days Classroom, Live Virtual Classroom English Course Description: This course

More information

An Overview of ISO/IEC family of Information Security Management System Standards

An Overview of ISO/IEC family of Information Security Management System Standards What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager The objective of the PECB Certified ISO/IEC 38500 Lead IT Corporate Governance Manager examination is to ensure

More information

IAF Mandatory Document KNOWLEDGE REQUIREMENTS FOR ACCREDITATION BODY PERSONNEL FOR INFORMATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001)

IAF Mandatory Document KNOWLEDGE REQUIREMENTS FOR ACCREDITATION BODY PERSONNEL FOR INFORMATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) IAF Mandatory Document KNOWLEDGE REQUIREMENTS FOR ACCREDITATION BODY PERSONNEL FOR INFORMATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) (IAF MD 13:2015) Issue 1 IAF MD - Knowledge Requirements for Accreditation

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 27006 Third edition 2015-10-01 Information technology Security techniques Requirements for bodies providing audit and certification of information

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001)

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) BELAC 2-405-ISMS R0 2017 SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) The only valid versions of the documents

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Information technology Office equipment Method for measuring digital printing productivity

Information technology Office equipment Method for measuring digital printing productivity INTERNATIONAL STANDARD ISO/IEC 24734 Second edition 2014-07-01 Information technology Office equipment Method for measuring digital printing productivity Technologies de l information Équipements de bureau

More information

Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Telecommunication Standardization Bureau (TSB) Consultant

Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Telecommunication Standardization Bureau (TSB) Consultant Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Standardization Bureau (TSB) Consultant Moscow, 9-11 november 2011 Contents The benefits of conformity assessment Conformity

More information

John Snare Chair Standards Australia Committee IT/12/4

John Snare Chair Standards Australia Committee IT/12/4 John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC

More information

Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001

Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 Information Security Management Systems Guidance series The Information Security Management Systems (ISMS) series of books

More information

Part 1: Overview and concepts

Part 1: Overview and concepts Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 19086-1 First edition 2016-09-15 Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts

More information

Section Qualifications of Audit teams Qualifications of Auditors Maintenance and Improvement of Competence...

Section Qualifications of Audit teams Qualifications of Auditors Maintenance and Improvement of Competence... Section 9. SFI 2010-2014 Audit Procedures and Auditor Qualifications and Accreditation Updated January 2011 Section 9 Introduction... 3 1. Scope... 3 2. Normative Reference... 3 3. Terms and Definitions...

More information

Introduction to ISO/IEC 27001:2005

Introduction to ISO/IEC 27001:2005 Introduction to ISO/IEC 27001:2005 For ISACA Melbourne Chapter Technical Session 18 th of July 2006 AD Prepared by Endre P. Bihari JP of Performance Resources What is ISO/IEC 17799? 2/20 Aim: Creating

More information

ISO Gap Analysis Excerpt from sample report

ISO Gap Analysis Excerpt from sample report ISO 27001 Gap Analysis Excerpt from sample report Protect Comply Thrive (The below excerpts do not represent the entire report, and only provide a small sample of the information provided in the full report).

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27013 First edition 2012-10-15 Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 Technologies de l'information

More information

ISO INTERNATIONAL STANDARD. Ergonomics of human-system interaction Part 400: Principles and requirements for physical input devices

ISO INTERNATIONAL STANDARD. Ergonomics of human-system interaction Part 400: Principles and requirements for physical input devices INTERNATIONAL STANDARD ISO 9241-400 First edition 2007-02-01 Ergonomics of human-system interaction Part 400: Principles and requirements for physical input devices Ergonomie de l'interaction homme-système

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

Defining IT Security Requirements for Federal Systems and Networks

Defining IT Security Requirements for Federal Systems and Networks Defining IT Security Requirements for Federal Systems and Networks Employing Common Criteria Profiles in Key Technology Areas Dr. Ron Ross 1 The Fundamentals Building more secure systems depends on the

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

ISO/IEC Information technology Security techniques Code of practice for information security controls

ISO/IEC Information technology Security techniques Code of practice for information security controls INTERNATIONAL STANDARD ISO/IEC 27002 Second edition 2013-10-01 Information technology Security techniques Code of practice for information security controls Technologies de l information Techniques de

More information

Information Security Management System (ISMS) ISO/IEC 27001:2013

Information Security Management System (ISMS) ISO/IEC 27001:2013 Information Security Management System (ISMS) ISO/IEC 27001:2013 Course No. 110B Attendees will learn how to help your organization manage the security of assets such as financial information, intellectual

More information

ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR

ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR JPCANN ASSOCIATES LTD #58 NSAWAM ROAD, AVENOR JUNCTION, KOKOMLEMLE-ACCRA Office lines: +233 302 242 573 / +233 302 974 302 Mobile: +233 501 335 818 20 www.corptrainghana.com

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the

More information

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements UK Permanent Salary Index ember 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation

More information

Digital Health Cyber Security Centre

Digital Health Cyber Security Centre Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting

More information

Manchester Metropolitan University Information Security Strategy

Manchester Metropolitan University Information Security Strategy Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History

More information

Session 609 Tuesday, October 22, 2:45 PM - 3:45 PM Track: IT Governance and Security

Session 609 Tuesday, October 22, 2:45 PM - 3:45 PM Track: IT Governance and Security Session 609 Tuesday, October 22, 2:45 PM - 3:45 PM Track: IT Governance and Security An Overview of Recent Changes to ISO 20000 Ron Lester Enterprise Service Management Consultant, Information Technology

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Information technology Security techniques Guidance on the integrated implementation of ISO/IEC and ISO/IEC

Information technology Security techniques Guidance on the integrated implementation of ISO/IEC and ISO/IEC Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 27013 Second edition 2015-12-01 Information technology Security techniques Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 14001 Lead Implementer www.pecb.com The objective of the PECB Certified ISO 14001 Lead Implementer examination is to ensure that the candidate

More information

Information technology Security techniques Code of practice for personally identifiable information protection

Information technology Security techniques Code of practice for personally identifiable information protection INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27006 First edition 2007-03-01 Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Information Systems Security Management: A Review and a Classification of the ISO Standards

Information Systems Security Management: A Review and a Classification of the ISO Standards Information Systems Security Management: A Review and a Classification of the ISO Standards Aggeliki Tsohou, Spyros Kokolakis, Costas Lambrinoudakis, Stefanos Gritzalis Dept. of Information and Communication

More information

ISO 9001 Auditing Practices Group Guidance on:

ISO 9001 Auditing Practices Group Guidance on: International Organization for Standardization International Accreditation Forum Date: 13 January 2016 ISO 9001 Auditing Practices Group Guidance on: Expected Outcomes The expected outcomes documents (given

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

An Introduction to the ISO Security Standards

An Introduction to the ISO Security Standards An Introduction to the ISO Security Standards Agenda Security vs Privacy Who or What is the ISO? ISO 27001:2013 ISO 27001/27002 domains Building Blocks of Security AVAILABILITY INTEGRITY CONFIDENTIALITY

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27039 First edition 2015-02-15 Corrected version 2016-05-01 Information technology Security techniques Selection, deployment and operations of intrusion detection and prevention

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Information Technology Branch Organization of Cyber Security Technical Standard

Information Technology Branch Organization of Cyber Security Technical Standard Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

ITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F

ITSM20F_Umang.   Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22301 Lead Implementer www.pecb.com The objective of the Certified ISO 22301 Lead Implementer examination is to ensure that the candidate

More information

ITIL Foundation. Processexam.com. Exam Summary Syllabus Questions

ITIL Foundation. Processexam.com. Exam Summary Syllabus Questions ITIL Foundation Processexam.com Exam Syllabus Questions Table of s Key to success in ITIL Foundation Exam... 2 ITIL Foundation Certification Details:... 2 ITIL Foundation Exam Syllabus:... 2 ITIL Foundation

More information

Professional Qualifications for ITIL PRACTICES FOR SERVICE MANAGEMENT. The ITIL Foundation Certificate in IT Service Management SYLLABUS

Professional Qualifications for ITIL PRACTICES FOR SERVICE MANAGEMENT. The ITIL Foundation Certificate in IT Service Management SYLLABUS Professional Qualifications for ITIL PRACTICES FOR SERVICE MANAGEMENT The ITIL Foundation Certificate in IT Service Management SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a registered

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

Information technology Office equipment Method for measuring digital printing productivity

Information technology Office equipment Method for measuring digital printing productivity Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 24734 Second edition 2014-07-01 Information technology Office equipment Method for measuring digital printing productivity Technologies de

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security management system implementation guidance

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security management system implementation guidance INTERNATIONAL STANDARD ISO/IEC 27003 First edition 2010-02-01 Information technology Security techniques Information security management system implementation guidance Technologies de l'information Techniques

More information

Massimo Nardone, TKK, S Security of Communication Protocols

Massimo Nardone, TKK, S Security of Communication Protocols Network Logging/Auditing of network devices Firewall (types, management, procedures) Remote Access Passive intrusion detection Services/Applications Account authorization Account termination Accounts Lockout

More information

INFORMATION SECURITY MANAGEMENT SYSTEMS CERTIFICATION RESEARCH IN THE ROMANIAN ORGANIZATIONS

INFORMATION SECURITY MANAGEMENT SYSTEMS CERTIFICATION RESEARCH IN THE ROMANIAN ORGANIZATIONS U.P.B. Sci. Bull., Series D, Vol. 77, Iss. 4, 2015 ISSN 1454-2358 INFORMATION SECURITY MANAGEMENT SYSTEMS CERTIFICATION RESEARCH IN THE ROMANIAN ORGANIZATIONS Bogdan ŢIGĂNOAIA 1, Anca-Alexandra PURCĂREA

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27005 Risk Manager The objective of the Certified ISO/IEC 27005 Risk Manager examination is to ensure that the candidate has the knowledge and the skills to

More information

falanx Cyber ISO 27001: How and why your organisation should get certified

falanx Cyber ISO 27001: How and why your organisation should get certified falanx Cyber ISO 27001: How and why your organisation should get certified Contents What is ISO 27001? 3 What does it cover? 3 Why should your organisation get certified? 4 Cost-effective security management

More information

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Michael John SmartSec 2016, Amsterdam www.encs.eu European Network for Cyber Security The European

More information

Building an Assurance Foundation for 21 st Century Information Systems and Networks

Building an Assurance Foundation for 21 st Century Information Systems and Networks Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership

More information

ISMS Essentials. Version 1.1

ISMS Essentials. Version 1.1 ISMS Essentials Version 1.1 This paper can serve as a guideline for the implementation of ISMS practices using BS7799 / ISO 27001 standards. To give an insight and help those who are implementing this

More information

What is ISO/IEC 27001?

What is ISO/IEC 27001? An Introduction to the International Information Security Management Standard By President INTERPROM July 2017 Copyright 2017 by InterProm USA. All Rights Reserved www.interpromusa.com Contents INTRODUCTION...

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

ISO/IEC INTERNATIONAL STANDARD. Conformity assessment Requirements for bodies certifying products, processes and services

ISO/IEC INTERNATIONAL STANDARD. Conformity assessment Requirements for bodies certifying products, processes and services INTERNATIONAL STANDARD ISO/IEC 17065 First edition 2012-09-15 Conformity assessment Requirements for bodies certifying products, processes and services Évaluation de la conformité Exigences pour les organismes

More information

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Adopted on 25 May 2018 Contents 1. Introduction... 2 1.1. Scope

More information

ISO/IEC ISO/IEC

ISO/IEC ISO/IEC ISO/IEC 27000 2010 6 3 1. ISO/IEC 27000 ISO/IEC 27000 ISMS ISO IEC ISO/IEC JTC1 SC 27 ISO/IEC 27001 ISO/IEC 27000 ISO/IEC 27001 ISMS requirements ISO/IEC 27000 ISMS overview and vocabulary ISO/IEC 27002

More information

Information technology Service management. Part 10: Concepts and vocabulary

Information technology Service management. Part 10: Concepts and vocabulary Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 20000-10 First edition 2018-09 Information technology Service management Part 10: Concepts and vocabulary Technologies de l'information Gestion

More information

Canadian Technology Accreditation Criteria (CTAC) COMPUTER SYSTEMS TECHNOLOGY - TECHNICIAN Technology Accreditation Canada (TAC)

Canadian Technology Accreditation Criteria (CTAC) COMPUTER SYSTEMS TECHNOLOGY - TECHNICIAN Technology Accreditation Canada (TAC) Canadian Technology Accreditation Criteria (CTAC) COMPUTER SYSTEMS TECHNOLOGY - TECHNICIAN Technology Accreditation Canada (TAC) Preamble These CTAC are applicable to programs having titles involving Computer

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO 15489-1 Second edition 2016-04-15 Information and documentation Records management Part 1: Concepts and principles Information et documentation Gestion des documents d activité

More information

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support

Workshop IT Star IT Security Professional Positioning and Monitoring: e-cfplus support Workshop IT Star 2016 IT Security Professional Positioning and Monitoring: e-cfplus support Roberto Bellini AICA-Milan October, 28 th 2016 agenda 1. e-cf standard and the enriched e-cfplus System 2. IT

More information

ISO : Competence Requirements Clause 7

ISO : Competence Requirements Clause 7 ISO 17021 : 2011 Competence Requirements Clause 7 3 Terms and definitions 3.7 Competence Ability to apply knowledge and skills to achieve intended results 3 Terms and definitions 3.10 Technical area Area

More information

COURSE BROCHURE. ITIL - Intermediate Service Transition. Training & Certification

COURSE BROCHURE. ITIL - Intermediate Service Transition. Training & Certification COURSE BROCHURE ITIL - Intermediate Service Transition. Training & Certification What is ITIL ST? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents.

More information

ISMS Implementation ISO IT Governance CEN 667

ISMS Implementation ISO IT Governance CEN 667 ISMS Implementation ISO 27003 IT Governance CEN 667 1 2 Standard Title: ISO/IEC 27003:2010 Information technology Security techniques Information security management system implementation guidance ISO/IEC

More information

SERVICE TRANSITION ITIL INTERMEDIATE TRAINING & CERTIFICATION

SERVICE TRANSITION ITIL INTERMEDIATE TRAINING & CERTIFICATION SERVICE TRANSITION ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL ST? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents. Successful implementation

More information

Report. Conceptual Framework for the DIAMONDS Project. SINTEF ICT Networked Systems and Services SINTEF A Unrestricted

Report. Conceptual Framework for the DIAMONDS Project. SINTEF ICT Networked Systems and Services SINTEF A Unrestricted SINTEF A22798- Unrestricted Report Conceptual Framework for the DIAMONDS Project Author(s) Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen SINTEF ICT Networked Systems and

More information

ISO/IEC Information technology Security techniques Code of practice for information security management

ISO/IEC Information technology Security techniques Code of practice for information security management This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 17799 Second edition 2005-06-15 Information technology Security techniques Code of practice for information security

More information

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS.

When Recognition Matters WHITEPAPER ISO SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS. When Recognition Matters WHITEPAPER ISO 28000 SUPPLY CHAIN SECURITY MANAGEMENT SYSTEMS www.pecb.com CONTENT 3 4 4 4 4 5 6 6 7 7 7 8 9 10 11 12 Introduction An overview of ISO 28000:2007 Key clauses of

More information

Reproduced from the ANSI web site:

Reproduced from the ANSI web site: INCITS TC Chairmen As detailed in the following information provided by ANSI, the Identity Theft Prevention and Identity Management Standards Panel (IDSP) has issued the attached survey. Please review

More information

ISO INTERNATIONAL STANDARD. Ergonomics of human-system interaction Part 171: Guidance on software accessibility

ISO INTERNATIONAL STANDARD. Ergonomics of human-system interaction Part 171: Guidance on software accessibility INTERNATIONAL STANDARD ISO 9241-171 First edition 2008-07-15 Ergonomics of human-system interaction Part 171: Guidance on software accessibility Ergonomie de l'interaction homme-système Partie 171: Lignes

More information

Conformity assessment Requirements for bodies providing audit and certification of management systems. Part 6:

Conformity assessment Requirements for bodies providing audit and certification of management systems. Part 6: TECHNICAL SPECIFICATION ISO/IEC TS 17021-6 First edition 2014-12-01 Conformity assessment Requirements for bodies providing audit and certification of management systems Part 6: Competence requirements

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC/ IEEE 90003 First edition 2018-11 Software engineering Guidelines for the application of ISO 9001:2015 to computer software Ingénierie du logiciel Lignes directrices pour

More information

Software engineering Guidelines for the application of ISO 9001:2008 to computer software

Software engineering Guidelines for the application of ISO 9001:2008 to computer software INTERNATIONAL STANDARD ISO/IEC 90003 Second edition 2014-12-15 Software engineering Guidelines for the application of ISO 9001:2008 to computer software Ingénierie du logiciel Lignes directrices pour l

More information

Information Security Management System

Information Security Management System Information Security Management System Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA info@houmankaji.net

More information

Information technology Process assessment Concepts and terminology

Information technology Process assessment Concepts and terminology Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 33001 Second edition 2015-03-01 Information technology Process assessment Concepts and terminology Technologies de l information Évaluation

More information

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner

Training Catalog. Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz. Revision public. Authorized Training Partner Management and Information Technology Solutions Decker Consulting GmbH Training Catalog Decker Consulting GmbH Birkenstrasse 49 CH 6343 Rotkreuz Revision 9.1 05.12.2018 public Authorized Training Partner

More information

KENYA ACCREDITATION SERVICE

KENYA ACCREDITATION SERVICE KENAS-GUD-010 01 22/06/2013 22/07/2013 GUD 1 of 9 Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Document. Name Job Title / Role Signature

More information

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT

C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT C106: DEMO OF THE INFORMATION SECURITY MANAGEMENT SYSTEM - ISO: 27001:2005 AWARENESS TRAINING PRESENTATION KIT Buy: http://www.globalmanagergroup.com/iso27001training.htm Chapter-1.0 CONTENTS OF ISO 27001-2005

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability Session 2: Conformity Assessment Principles 12-16 October 2015 Beijing, China Keith Mainwaring ITU Expert Agenda 1. Context

More information

Networking Infrastructure

Networking Infrastructure Unit 43: Networking Infrastructure Unit code: A/601/1964 QCF Level 5: BTEC Higher National Credit Value 15 Aim To provide learners with an understanding of networking infrastructures, the directory based

More information

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community Information Security Management Systems Standards ISO/IEC 27001 Global Opportunity for the Business Community Prof. Edward (Ted) Humphreys IPA Global Symposium 2013 23 rd May 2013, Tokyo, Japan CyberSecurity

More information

Course # 55011A. The ITIL Foundation Certificate in IT Service Management

Course # 55011A. The ITIL Foundation Certificate in IT Service Management Course # 55011A The ITIL Foundation Certificate in IT Service Management Duration: 24 Hrs Overview About this Course This 3-day (19 contact hour) instructor-led course provides students with the knowledge

More information