Iso
Iso
Iso
Objectives
Laurent Deheyer
Approach GRC Consulting Director
CISM – ISACA Member
ISO 27001 Lead Implementer/Certified Trainer
Certified Data Protection Officer [GDPR]
Number of 120
ISO/IEC 100
27001 80
certifications
60
is exploding
40
20
in Belgium 0
2006 2017
Source: www.iso.org/the-iso-survey.html
ISO/IEC 27001-data per country and sector 2006 to 2017
4
Organisations processing
company confidential data
• IT
• Services
• B2B
ISO/IEC •
•
Boom: Startup
SaaS
27001
• Some uncommon requests
Organisations
processing personal
data 5
ISO/IEC introduction
• Worldwide federation of national standards bodies from 146 countries, one from eachcountry, e.g.,– NBN - Institut
Belge de Normalisation (Belgium)
• Mission: to promote the development of standardization and related activities in the world with a view to facilitating
the international exchange of goods and services, and to developing cooperation in the spheres of intellectual,
scientific, technological and economic activity.
• ISO's work results in international agreements which are published as International Standards (IS)
7
What do you want to protect?
CONFIDENTIALITY, INTEGRITY, AVAILABILITY of organisations ASSETS
You want to protect your ‘assets’. There are several definitions for the term ‘asset’, generally speaking an asset could be
defined as ‘an item of value’ for a company in order to run its business, including servers, laptops, smartphones people,
confidential/private information, Intellect Property, applications, customer’s data, ..
Employees
Intellectual
Property
Hardware
Applications Information
8
8
ISO/IEC 27K-series
47 published standards to date
ISMS implementation
cloud services
guidance
27003
27018
27017
27004
27002
27005
Informative
(implementation
guidance)
• ISO27701- provides guidance to implement & continually improve measures to ensure privacy of PII
• ISO27701- comprises clauses & Annexes that are sequentially aligned with ISO27001/2, the GDPR, ISO29100, etc
• ISO27001 plus ISO27701 certifications meet privacy & information security requirements of the GDPR (but it does not amount to GDPR
certification because there is still no official certification for the GDPR)
• Terminology- (a) ISO27701 privacy/PII = GDPR protection/data (b) ISO27701 PII principal (sometimes data subject) = GDPR data subject
(c) ISO27701 PII Controller (or Privacy Stakeholder) = GDPR data Controller (d) ISO27701 PII Processor = GDPR data Processor
Key
benefits
Sales Cyber
Efficiency Threats
11
What are the roadblocks?
Organisation priorities
Human factor
Initial investment
Lack of
understanding
12
What are the pitfalls?
Bad planning
The overall methodology used is based on the PDCA model ISO27000 Standard
(Plan, Do, Check, Act):
Gap analysis ‘As Is’ vs
requirements
Plan Phase I
Establish the ISMS Identifying risks
Check
Monitor & review Internal audit Phase II
ISMS
Corrective action
improvement
This model is not dedicated for security, it is widely used to implement
standards like ISO 9000 (Quality), ISO 14001 (Environment)…
internal use only – all right reserved 15
TOP most difficult parts during the projects
Survey from Approach’s consultants based upon their experiences
PLAN DO
• Can you define what should NOT be in scope, identify the boundaries and interfaces?
• Standards http://www.iso.org/iso/home/standards.htm
• News http://www.iso.org/iso/home/news_index.htm
SOC 3 distributed. 7.
8.
Quality
Monitoring and enforcement.
23
Why Approach ?
Global Approach to Cyber Security
We cover the entire cyber security value chain, from governance and strategy
through to resilient technical designs, architectures and implementations.
25
Our Portfolio of Solutions
How can we help you?
27
Some of our Customers
… and how we help them
CSIRT GDPR
Training
Architecture
Review
Software Factory
Secure Software
Factory, WAF
Software Factory
28
Thank you !
Let’s keep in touch
29
What our customers say about us
Testimonials
30