SlideShare una empresa de Scribd logo
1 de 10
July 2014
Summer Internship Presentation
“Know-how of ISO 27001:2013,
Internal Auditing and Business
Continuity Management”
Company – Ltd.
Submitted By – Shantanu Rai
PRN – 13030241177
Division - D
MBA–ITBM, 2013 – 2015 batch
Agenda
Introduction to the Project
Analysis of Work Done
Project 1 - Roadmap for Transition to ISO 27001:2013
Project 2 – Process Map for Internal Auditing
Project 3 – Specific Scenario Business Continuity
Management Preparedness
Learning and Experience on Business and
Technology
Conclusion
July 2014
Introduction
• Ltd. is a part of Mahindra group conglomerate, is an Indian multinational firm which provides Information
technology, network technology solutions and business support service to the telecom industries. The firm works across fifty one
countries and provides service to six hundred thirty customers
• The vision of the firm is “We will Rise” and be among the top three leaders in each of the chosen market and segment while fostering
innovation and inclusion’
• They are into various services like communication, consulting, enterprise
architecture, infrastructure, networks, product life cycle management, testing
and Information security. They have an internal information security group to
implement well-articulated and meticulous information security
• During my internship I worked with Information security group of the
organization which is a support function on three projects.
• The first one was Road map for transition to ISO 27001:2013, the second one
was to understand the Process map of Internal Auditing and the third one was
a specific Case scenario on Business continuity management preparedness.
Slide No. 1 July 2014
Project 1 - Roadmap for Transition to ISO 27001:2013
Analysis of Work Done
Slide No. 2 July 2014
• Currently the organization is ISO 27001:2005 compliant and aims to go for the upgraded version of ISO 27001:2013
• This is done by doing the gap analysis and checking the status of the controls. Adding applicable new controls, removing the redundant
controls
• It is a part of harmonization change effort from ISO and it is better aligned with business
• The reason for shifting to ISO 27001:2013 is Market Assurance and Governance
Slide No.3 July 2014
• The roadmap for transition includes preparation of list of documents which are shown in the excel sheet:
• There are sheets for mapping of Controls and Requirements along with deleted and added Controls and Requirements
• The Statement of Applicability which tells status of controls and the reason the control is selected (Legal, Business, Contractual or Risk
Related)
• The Gap Assessment sheet gives the idea about the gaps existing in Controls implemented in the organization and to which level are they
optimized and what needs to be fulfilled
Scheduling
of Audit
Preparing
of Audit
Conducting
Audit
Preparing
Audit
Report
Follow Up
Action
Information Security Monitoring and Compliance
Project 2 – Process Map for Internal Auditing
• Auditing is done in house
with help of a tool which
schedules the audit
automatically
• Frequency of the audit
depends upon client’s
requirement and project
criticality
• Thus the audit cycle and
audit plan is fixed
between auditor and
project manager
• Audit includes the
making the checklist for
the audit
• The auditor prepares a
questionnaire including
all the relevant points
and the areas which are
to be covered while
conducting the audit
• The audit is conducted
by primary and the
secondary auditor who
put up the questions
to the Project manager
or the SPOC
responsible for the
project
• The questions are
asked keeping the
current information
security policy as a
benchmark
• After the audit is
conducted the evidence
are collected based on
which an audit report is
prepared
• The audit report
includes strengths
observed, non-
conformities along with
corrective and
preventive actions
which must be taken to
avoid any deviation
from the normal
standard
• The follow up actions
are taken by the auditor
in order to make sure
that the non-conformity
is cleared by the project
manager in the given
span of time
• The report is escalated
to higher management
in case of repeated non-
conformities and
appropriate action is
taken accordingly
Slide No. 4 July 2014
Project 3 – Specific Scenario Business Continuity Management Preparedness
• Business Continuity describes the processes and procedures an organization puts in place to ensure that essential functions can continue
during and after a business interruption such as a disaster or system downtime
• BCM seeks to prevent interruption of mission-critical services during a business interruption up to the point where full services and
operations are fully re-established
• A BCM enables critical services or products to be continually delivered in the event of a business interruption
BCP lays out a process to ensure that critical operations
continue to be available during the interruption.
There are five main ways to invoke BCM. There are drills
conducted at regular interval in order to test the
resumption of operations at time of disaster. Also to make
sure that the BCM plan is reviewed and updated to reflect
current operating environment. There were five types of
drills conducted as :
1. Call Tree Drill
2. Table Top Drill
3. Project Rehearsal
4. Environment Rebuilt Drill
5. Data Restoration Drill
Slide No. 5 July 2014
Business Continuity Plan for a given scenario
Step 1 - Resource
Distribution
Step 2 - Critical
Process Priority
Step 3 -
Calculations of
BCM variables
Step 4 - Stetting of
Infrastructure
Step 5 - Incidence
Response Activities
Step 6 - Business
Resumption Plan/
Post Disaster
Activities
• It is for back up of
different location
or different
resources
• If site A the main
location is down
then one can shift
to site B which
would be in
different city and if
site B is down one
can shift to site C
which might be in
different nation
thus continuing the
business without
any interruption
• It is done to
identify most
critical process of
the project or the
organization and
utmost priority is
given to it for
respond time and
resolution time
• Respond and
resolution time is
set as per the SLA
• There must be an
incident response
team in order to
report the incident
happened
• Incidents are
classified on the
basis of the severity
• It defines key
responsibilities of
the people involved
at the time of
incident. It also tells
whom and how to
communicate the
incident
• Plan to bring the
business back to
normal
• Establish a damage
assessment team
• Calculation of
impact of the
disaster
• Submission of the
disaster report in
the documented
form
• Establish team to
work on restoration
of all the loss
• The calculation of
the variables like
RTO, MAO and
MBCO will give
an estimate of
how much time it
will take to
respond and
resolve a ticket
• It tells all the
hardware and
software must be
uniquely
identified
• All the critical
infrastructure
items must have a
back and
redundant item in
case of
breakdown
Slide No. 6 July 2014
Learnings and Experience on Business and Technology
Road Map for transition to ISO 27001:2013 Process Map for Internal Auditing
Specific scenario BCM
preparedness
• Understanding the key difference
between the two policies
• By doing the gap assessment analysis
one could trace the gaps in the existing
policy
• By preparing the statement of
applicability one can see the status of all
controls and at which level they are
optimized in the organization
• They can add the controls which are not
documented and managed in the
organization and remove the one which
is not needed in the organization
• It encompasses all the activities going in
the organization
• One gets the idea of preparation of audit
checklist, methodology of conducting the
audit, putting up the questionnaires,
collecting evidences and observation and
report writing. It also tells about corrective
and preventive action given by the auditor
to the auditee
• It gives clear idea of risks which could
breach the security if the audits are not
conducted in the respective manner
• The case scenario related to business
continuity management gave an idea
about the resilience of the firm
• The calculation of RTO, MBCO, MAO and
other BCM variables gives idea how to
lay the BCM plan according to the SLA
and other agreement which has been set
by the supplier
• By framing the business continuity plan
one can get the idea how the resources
are distributed as a part of back up at
different locations, setting infrastructure,
incident reporting, how to resume the
business after the disaster has happened,
estimation of the losses and other post
disaster activities which must be taken
Slide No. 7 July 2014
• Preparation of mapping sheets, gap assessment sheet, control monitoring matrix and statement of applicability gave an idea how to go for
upgraded ISO/IEC 27001:2013 version
• By conducting IT Internal Auditing we learnt the process to scrutinize the live projects in the organization, write audit report and give
corrective and preventive action to the auditee
• The case scenario related to Business Continuity Management gave an idea about the resilience of the firm. It gave an idea of the various
ways through which one can conduct the business continuity drills and invoke continuity plan in case of any disaster
Conclusion
Slide No. 8 July 2014
THANK YOU

Más contenido relacionado

La actualidad más candente

ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfControlCase
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Traininghimalya sharma
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013scttmcvy
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001technakama
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?PECB
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfSerkanRafetHalil1
 

La actualidad más candente (20)

What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
ISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdfISO 27001 2002 Update Webinar.pdf
ISO 27001 2002 Update Webinar.pdf
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
 
Implementing ISO27001 2013
Implementing ISO27001 2013Implementing ISO27001 2013
Implementing ISO27001 2013
 
ISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdfISO 27001:2022 What has changed.pdf
ISO 27001:2022 What has changed.pdf
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdf
 

Destacado

ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 
Iso27001 Audit Services
Iso27001 Audit ServicesIso27001 Audit Services
Iso27001 Audit Servicesmcloete
 
Presentation chapter 9
Presentation chapter 9Presentation chapter 9
Presentation chapter 9Emran Habeeb
 
ISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsCertification Europe
 
Presentation summer internship report shivam kumar_sec-h Letter of credit - m...
Presentation summer internship report shivam kumar_sec-h Letter of credit - m...Presentation summer internship report shivam kumar_sec-h Letter of credit - m...
Presentation summer internship report shivam kumar_sec-h Letter of credit - m...Shivam Kumar
 
Iso 27001 i̇ç denetçi eğitimi
Iso 27001 i̇ç denetçi eğitimiIso 27001 i̇ç denetçi eğitimi
Iso 27001 i̇ç denetçi eğitiminbeksi
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
Novità della norma ISO/IEC 27001:2013
Novità della norma ISO/IEC 27001:2013Novità della norma ISO/IEC 27001:2013
Novità della norma ISO/IEC 27001:2013Andrea Praitano
 
Action Plan for the Central Delaware: 2008-2018
Action Plan for the Central Delaware: 2008-2018Action Plan for the Central Delaware: 2008-2018
Action Plan for the Central Delaware: 2008-2018Wallace Roberts & Todd
 
Iso 27001 E Iso 27004
Iso 27001 E Iso 27004Iso 27001 E Iso 27004
Iso 27001 E Iso 27004dcordova923
 
Вопросы для интервью ISO 27001
Вопросы для интервью ISO 27001Вопросы для интервью ISO 27001
Вопросы для интервью ISO 27001Ivan Piskunov
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachPECB
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 

Destacado (20)

ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
SFC Plan of engagement
SFC Plan of engagementSFC Plan of engagement
SFC Plan of engagement
 
Iso27001 Audit Services
Iso27001 Audit ServicesIso27001 Audit Services
Iso27001 Audit Services
 
Presentation chapter 9
Presentation chapter 9Presentation chapter 9
Presentation chapter 9
 
ISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and Developments
 
Presentation summer internship report shivam kumar_sec-h Letter of credit - m...
Presentation summer internship report shivam kumar_sec-h Letter of credit - m...Presentation summer internship report shivam kumar_sec-h Letter of credit - m...
Presentation summer internship report shivam kumar_sec-h Letter of credit - m...
 
Seo presentation report
Seo presentation reportSeo presentation report
Seo presentation report
 
Internship Report
Internship ReportInternship Report
Internship Report
 
Iso 27001 i̇ç denetçi eğitimi
Iso 27001 i̇ç denetçi eğitimiIso 27001 i̇ç denetçi eğitimi
Iso 27001 i̇ç denetçi eğitimi
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
Novità della norma ISO/IEC 27001:2013
Novità della norma ISO/IEC 27001:2013Novità della norma ISO/IEC 27001:2013
Novità della norma ISO/IEC 27001:2013
 
Action Plan for the Central Delaware: 2008-2018
Action Plan for the Central Delaware: 2008-2018Action Plan for the Central Delaware: 2008-2018
Action Plan for the Central Delaware: 2008-2018
 
Iso 27001 E Iso 27004
Iso 27001 E Iso 27004Iso 27001 E Iso 27004
Iso 27001 E Iso 27004
 
Вопросы для интервью ISO 27001
Вопросы для интервью ISO 27001Вопросы для интервью ISO 27001
Вопросы для интервью ISO 27001
 
How to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approachHow to apply ISO 27001 using a top down, risk-based approach
How to apply ISO 27001 using a top down, risk-based approach
 
Internship report
Internship reportInternship report
Internship report
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 

Similar a Presentation on iso 27001-2013, Internal Auditing and BCM

AT-5908 CPA REVIEW SCHOOL OF THE PHILIPPINES
AT-5908 CPA REVIEW SCHOOL OF THE PHILIPPINESAT-5908 CPA REVIEW SCHOOL OF THE PHILIPPINES
AT-5908 CPA REVIEW SCHOOL OF THE PHILIPPINESRenee Lewis
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptxdotco
 
250250902-141-ISACA-NACACS-Auditing-IT-Projects-Audit-Program.pdf
250250902-141-ISACA-NACACS-Auditing-IT-Projects-Audit-Program.pdf250250902-141-ISACA-NACACS-Auditing-IT-Projects-Audit-Program.pdf
250250902-141-ISACA-NACACS-Auditing-IT-Projects-Audit-Program.pdfAddisu15
 
2016.04.06.Business Continuity Planning
2016.04.06.Business Continuity Planning2016.04.06.Business Continuity Planning
2016.04.06.Business Continuity PlanningNDeLaurentis
 
Project Management Ch 14.ppt
Project Management Ch 14.pptProject Management Ch 14.ppt
Project Management Ch 14.pptUjalaBatool7
 
Heartbeats & Bloodstreams.pptx
Heartbeats & Bloodstreams.pptxHeartbeats & Bloodstreams.pptx
Heartbeats & Bloodstreams.pptxmalikshanii458
 
Project Management for IT-related Projects (Logitrain)
Project Management for IT-related Projects (Logitrain)Project Management for IT-related Projects (Logitrain)
Project Management for IT-related Projects (Logitrain)Logitrain: New Zealand
 
auditing Fram . from the start to Reporting .pdf
auditing Fram . from the start to Reporting .pdfauditing Fram . from the start to Reporting .pdf
auditing Fram . from the start to Reporting .pdfnguyenanvuong2007
 
3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department 3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department Sandeep S Jaryal
 
Regulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsRegulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsPaul Kuiken
 
How to integrate BCMS with Organization's culture?
How to integrate BCMS with Organization's culture?How to integrate BCMS with Organization's culture?
How to integrate BCMS with Organization's culture?Abdul Naseer
 
Corrective and Preventive Actions
Corrective and Preventive Actions Corrective and Preventive Actions
Corrective and Preventive Actions Willie Carter
 
Ch 7 controlling
Ch 7 controllingCh 7 controlling
Ch 7 controllingwaqole
 
Sample audit plan
Sample audit planSample audit plan
Sample audit planMaher Manan
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Hendri Eka Saputra
 
crisc_wk_6.pptx
crisc_wk_6.pptxcrisc_wk_6.pptx
crisc_wk_6.pptxdotco
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditingMarc Vael
 
DOES14 - Pat Reed - Project Labor Cost Accounting for Agile Projects
DOES14 - Pat Reed - Project Labor Cost Accounting for Agile ProjectsDOES14 - Pat Reed - Project Labor Cost Accounting for Agile Projects
DOES14 - Pat Reed - Project Labor Cost Accounting for Agile ProjectsGene Kim
 

Similar a Presentation on iso 27001-2013, Internal Auditing and BCM (20)

AT-5908 CPA REVIEW SCHOOL OF THE PHILIPPINES
AT-5908 CPA REVIEW SCHOOL OF THE PHILIPPINESAT-5908 CPA REVIEW SCHOOL OF THE PHILIPPINES
AT-5908 CPA REVIEW SCHOOL OF THE PHILIPPINES
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
250250902-141-ISACA-NACACS-Auditing-IT-Projects-Audit-Program.pdf
250250902-141-ISACA-NACACS-Auditing-IT-Projects-Audit-Program.pdf250250902-141-ISACA-NACACS-Auditing-IT-Projects-Audit-Program.pdf
250250902-141-ISACA-NACACS-Auditing-IT-Projects-Audit-Program.pdf
 
2016.04.06.Business Continuity Planning
2016.04.06.Business Continuity Planning2016.04.06.Business Continuity Planning
2016.04.06.Business Continuity Planning
 
Project Management Ch 14.ppt
Project Management Ch 14.pptProject Management Ch 14.ppt
Project Management Ch 14.ppt
 
Heartbeats & Bloodstreams.pptx
Heartbeats & Bloodstreams.pptxHeartbeats & Bloodstreams.pptx
Heartbeats & Bloodstreams.pptx
 
Project Management for IT-related Projects (Logitrain)
Project Management for IT-related Projects (Logitrain)Project Management for IT-related Projects (Logitrain)
Project Management for IT-related Projects (Logitrain)
 
Bcp drp
Bcp drpBcp drp
Bcp drp
 
auditing Fram . from the start to Reporting .pdf
auditing Fram . from the start to Reporting .pdfauditing Fram . from the start to Reporting .pdf
auditing Fram . from the start to Reporting .pdf
 
3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department 3 focus areas for any organisation's IT & Security department
3 focus areas for any organisation's IT & Security department
 
Regulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and ModelsRegulatory Affairs Outsourcing Considerations and Models
Regulatory Affairs Outsourcing Considerations and Models
 
How to integrate BCMS with Organization's culture?
How to integrate BCMS with Organization's culture?How to integrate BCMS with Organization's culture?
How to integrate BCMS with Organization's culture?
 
Corrective and Preventive Actions
Corrective and Preventive Actions Corrective and Preventive Actions
Corrective and Preventive Actions
 
Ch 7 controlling
Ch 7 controllingCh 7 controlling
Ch 7 controlling
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
crisc_wk_6.pptx
crisc_wk_6.pptxcrisc_wk_6.pptx
crisc_wk_6.pptx
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
DOES14 - Pat Reed - Project Labor Cost Accounting for Agile Projects
DOES14 - Pat Reed - Project Labor Cost Accounting for Agile ProjectsDOES14 - Pat Reed - Project Labor Cost Accounting for Agile Projects
DOES14 - Pat Reed - Project Labor Cost Accounting for Agile Projects
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 

Último

Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 

Último (20)

Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 

Presentation on iso 27001-2013, Internal Auditing and BCM

  • 1. July 2014 Summer Internship Presentation “Know-how of ISO 27001:2013, Internal Auditing and Business Continuity Management” Company – Ltd. Submitted By – Shantanu Rai PRN – 13030241177 Division - D MBA–ITBM, 2013 – 2015 batch
  • 2. Agenda Introduction to the Project Analysis of Work Done Project 1 - Roadmap for Transition to ISO 27001:2013 Project 2 – Process Map for Internal Auditing Project 3 – Specific Scenario Business Continuity Management Preparedness Learning and Experience on Business and Technology Conclusion July 2014
  • 3. Introduction • Ltd. is a part of Mahindra group conglomerate, is an Indian multinational firm which provides Information technology, network technology solutions and business support service to the telecom industries. The firm works across fifty one countries and provides service to six hundred thirty customers • The vision of the firm is “We will Rise” and be among the top three leaders in each of the chosen market and segment while fostering innovation and inclusion’ • They are into various services like communication, consulting, enterprise architecture, infrastructure, networks, product life cycle management, testing and Information security. They have an internal information security group to implement well-articulated and meticulous information security • During my internship I worked with Information security group of the organization which is a support function on three projects. • The first one was Road map for transition to ISO 27001:2013, the second one was to understand the Process map of Internal Auditing and the third one was a specific Case scenario on Business continuity management preparedness. Slide No. 1 July 2014
  • 4. Project 1 - Roadmap for Transition to ISO 27001:2013 Analysis of Work Done Slide No. 2 July 2014 • Currently the organization is ISO 27001:2005 compliant and aims to go for the upgraded version of ISO 27001:2013 • This is done by doing the gap analysis and checking the status of the controls. Adding applicable new controls, removing the redundant controls • It is a part of harmonization change effort from ISO and it is better aligned with business • The reason for shifting to ISO 27001:2013 is Market Assurance and Governance
  • 5. Slide No.3 July 2014 • The roadmap for transition includes preparation of list of documents which are shown in the excel sheet: • There are sheets for mapping of Controls and Requirements along with deleted and added Controls and Requirements • The Statement of Applicability which tells status of controls and the reason the control is selected (Legal, Business, Contractual or Risk Related) • The Gap Assessment sheet gives the idea about the gaps existing in Controls implemented in the organization and to which level are they optimized and what needs to be fulfilled
  • 6. Scheduling of Audit Preparing of Audit Conducting Audit Preparing Audit Report Follow Up Action Information Security Monitoring and Compliance Project 2 – Process Map for Internal Auditing • Auditing is done in house with help of a tool which schedules the audit automatically • Frequency of the audit depends upon client’s requirement and project criticality • Thus the audit cycle and audit plan is fixed between auditor and project manager • Audit includes the making the checklist for the audit • The auditor prepares a questionnaire including all the relevant points and the areas which are to be covered while conducting the audit • The audit is conducted by primary and the secondary auditor who put up the questions to the Project manager or the SPOC responsible for the project • The questions are asked keeping the current information security policy as a benchmark • After the audit is conducted the evidence are collected based on which an audit report is prepared • The audit report includes strengths observed, non- conformities along with corrective and preventive actions which must be taken to avoid any deviation from the normal standard • The follow up actions are taken by the auditor in order to make sure that the non-conformity is cleared by the project manager in the given span of time • The report is escalated to higher management in case of repeated non- conformities and appropriate action is taken accordingly Slide No. 4 July 2014
  • 7. Project 3 – Specific Scenario Business Continuity Management Preparedness • Business Continuity describes the processes and procedures an organization puts in place to ensure that essential functions can continue during and after a business interruption such as a disaster or system downtime • BCM seeks to prevent interruption of mission-critical services during a business interruption up to the point where full services and operations are fully re-established • A BCM enables critical services or products to be continually delivered in the event of a business interruption BCP lays out a process to ensure that critical operations continue to be available during the interruption. There are five main ways to invoke BCM. There are drills conducted at regular interval in order to test the resumption of operations at time of disaster. Also to make sure that the BCM plan is reviewed and updated to reflect current operating environment. There were five types of drills conducted as : 1. Call Tree Drill 2. Table Top Drill 3. Project Rehearsal 4. Environment Rebuilt Drill 5. Data Restoration Drill Slide No. 5 July 2014
  • 8. Business Continuity Plan for a given scenario Step 1 - Resource Distribution Step 2 - Critical Process Priority Step 3 - Calculations of BCM variables Step 4 - Stetting of Infrastructure Step 5 - Incidence Response Activities Step 6 - Business Resumption Plan/ Post Disaster Activities • It is for back up of different location or different resources • If site A the main location is down then one can shift to site B which would be in different city and if site B is down one can shift to site C which might be in different nation thus continuing the business without any interruption • It is done to identify most critical process of the project or the organization and utmost priority is given to it for respond time and resolution time • Respond and resolution time is set as per the SLA • There must be an incident response team in order to report the incident happened • Incidents are classified on the basis of the severity • It defines key responsibilities of the people involved at the time of incident. It also tells whom and how to communicate the incident • Plan to bring the business back to normal • Establish a damage assessment team • Calculation of impact of the disaster • Submission of the disaster report in the documented form • Establish team to work on restoration of all the loss • The calculation of the variables like RTO, MAO and MBCO will give an estimate of how much time it will take to respond and resolve a ticket • It tells all the hardware and software must be uniquely identified • All the critical infrastructure items must have a back and redundant item in case of breakdown Slide No. 6 July 2014
  • 9. Learnings and Experience on Business and Technology Road Map for transition to ISO 27001:2013 Process Map for Internal Auditing Specific scenario BCM preparedness • Understanding the key difference between the two policies • By doing the gap assessment analysis one could trace the gaps in the existing policy • By preparing the statement of applicability one can see the status of all controls and at which level they are optimized in the organization • They can add the controls which are not documented and managed in the organization and remove the one which is not needed in the organization • It encompasses all the activities going in the organization • One gets the idea of preparation of audit checklist, methodology of conducting the audit, putting up the questionnaires, collecting evidences and observation and report writing. It also tells about corrective and preventive action given by the auditor to the auditee • It gives clear idea of risks which could breach the security if the audits are not conducted in the respective manner • The case scenario related to business continuity management gave an idea about the resilience of the firm • The calculation of RTO, MBCO, MAO and other BCM variables gives idea how to lay the BCM plan according to the SLA and other agreement which has been set by the supplier • By framing the business continuity plan one can get the idea how the resources are distributed as a part of back up at different locations, setting infrastructure, incident reporting, how to resume the business after the disaster has happened, estimation of the losses and other post disaster activities which must be taken Slide No. 7 July 2014
  • 10. • Preparation of mapping sheets, gap assessment sheet, control monitoring matrix and statement of applicability gave an idea how to go for upgraded ISO/IEC 27001:2013 version • By conducting IT Internal Auditing we learnt the process to scrutinize the live projects in the organization, write audit report and give corrective and preventive action to the auditee • The case scenario related to Business Continuity Management gave an idea about the resilience of the firm. It gave an idea of the various ways through which one can conduct the business continuity drills and invoke continuity plan in case of any disaster Conclusion Slide No. 8 July 2014 THANK YOU