Reproduction prohibited
ISO 27001:2013
ENTREPRENEUR | CISO ADVISOR | CYBERFEMINIST | PEERLYST BRAND AMBASSADOR |
TOP 50 CYBER INFLUENCER | @RESPONSIBLE CYBER
MAGDA LILIA CHELLY
1
Reproduction prohibited
OVERVIEW
1. ISO Project Description
2. ISO Project Execution
1. Stage 1: Assessment and Prioritization
2. Stage 2: Development
3. Stage 3: Communication
4. Stage 4: Review
3. Conclusion
2
Reproduction prohibited
3
ISO PROJECT DESCRIPTION
Reproduction prohibited
ISO PROJECT DESCRIPTION
Building policies is crucial for an
organization.
However, building policies by themselves will
not be enough to maintain or build cyber
resilience.
It needs to be followed by process,
technology, and awareness.
4
Policy
People
TechnologyProcess
Reproduction prohibited
ISO PROJECT DESCRIPTION
5
Targeted attacks cost $92,000 for
small/medium businesses and $2.4
million for large businesses.
Serious security incidents cost
$50,000 for small/medium
businesses and $649,000 for large
businesses.
2013: 91% of the companies had
at least one external IT security
incident and 85% had internal
incidents.
Security policies
enable security through
process and people
following the right
actions, in alignment
with the according
technology in place.
Source 2013
Reproduction prohibited
ISO PROJECT DESCRIPTION
6
Communication, enforcement, and maintenance of the policies are the real
challenges.
▪ Do you know what policies has your company ?
▪ Did you read them all ?
▪ How to make sure that they are update ?
Reproduction prohibited
ISO PROJECT DESCRIPTION
7
The answer is:
Reproduction prohibited
ISO PROJECT DESCRIPTION
8
Only 40% of non-IT employees are aware of these
policies.
46% of companies reported insufficient time and
resources to update or implement policies.
77% of IT professionals believe their policies need
improvement and updating.
But…
86% of companies have security policies
Kaspersky, Global Corporate IT Security Risks, 2013
Reproduction prohibited
ISO PROJECT DESCRIPTION
9
What is a policy ?
‘’A policy is a deliberate system of principles to guide decisions and achieve rational
outcomes. A policy is a statement of intent, and is implemented as a procedure or
protocol.’’
What is a standard ?
‘’Technical standard, an established norm or requirement about technical systems
International standard, standards suitable for worldwide use
Open standard, a standard that is publicly available
Reproduction prohibited
ISO PROJECT DESCRIPTION
10
‘’Standards organization, an entity primarily concerned with maintaining standards
Standardization, the process of establishing technical standards
Standard operating procedure, a step-by-step instruction to achieve a desired result’’
What is a guideline ?
‘’A guideline is a statement by which to determine a course of action. A guideline aims to
streamline particular processes according to a set routine or sound practice. By definition,
following a guideline is never mandatory.’’
Source: Wikipedia
Reproduction prohibited
ISO PROJECT DESCRIPTION
11
‘’A policy is a guiding principle used to
set direction in an organization.
A procedure is a series of steps to be
followed as a consistent and repetitive
approach to accomplish an end result.’’
Reproduction prohibited
ISO PROJECT DESCRIPTION
12
What is ISO 27001:2013 ?
ISO 27001, the international standard for information security management
‘’ "ISO 27001" (or ISO/IEC 27001:2013, "Information Security Management Systems") is a standard that
provides a good practical framework for establishing, implementing, operating, monitoring, reviewing,
maintaining and improving an ISMS. The key purpose of the ISMS is to bring information risk and
security under management control.’’
Why do you need ISO 27001:2013 ?
At a high level, the ISMS will help minimize the costs of security incidents and enhance the company’s
reputation and general security posture.
Reproduction prohibited
ISO PROJECT DESCRIPTION
13
The ISO 27001:2013 will be used to:
• Thoroughly assess the organization's information risks with a methodical approach, and through a
clear framework
• Design and implement the adequate and efficient security controls, both technical and non-
technical, to address risks
• Comply with applicable laws, regulations and contacts, providing a subsequent commercial
advantage, when related to RFP responses
• Operate, manage and maintain security controls
• Monitor and continuously improve information security, and build a cyber resilient culture
Reproduction prohibited
14
ISO PROJECT EXECUTION
Reproduction prohibited
ISO PROJECT DESCRIPTION
15
Stage 1: Assessment and Prioritization
Does your company require an ISO standard and security policies ?
No matter what industry you are in, security policies are a MUST.
• Finance
• Insurance
• Health care
• Public administration
• Education services
• Professional services
• Scientific and technical services
Reproduction prohibited
ISO PROJECT DESCRIPTION
16
Stage 1: Assessment and Prioritization
1. Build and ensure your stakeholder support and help.
2. Identify the required security policies for YOUR business.
3. Align with the business requirements.
4. Interview the different actors and understand the current
landscape.
5. Proceed with a gap analysis.
6. Define the priorities.
Reproduction prohibited
ISO PROJECT DESCRIPTION
17
Stage 1: Assessment and Prioritization
▪ Kick-off and stakeholder support.
▪ Define and understand business requirements and run a gap analysis.
▪ Prioritize the controls vs policies.
Reproduction prohibited
ISO PROJECT DESCRIPTION
18
Stage 2: Development
1. Understand the important of the policies.
2. Develop the Security Charter.
3. Prepare all the security policies.
4. Make sure you take in consideration the feedback.
Reproduction prohibited
ISO PROJECT DESCRIPTION
19
Stage 2: Development
▪ Develop the Policy Charter.
▪ Develop the relevant security policies and gather feedback.
Reproduction prohibited
ISO PROJECT DESCRIPTION
20
Stage 3: Communication
1. A good communication program is a must for all project success.
2. Use and consider best practices.
3. Run awareness and training of new policies to employees.
4. Enforcement is a MUST.
5. Define the goals and the metrics.
Reproduction prohibited
ISO PROJECT DESCRIPTION
21
Stage 3: Communication
▪ Communicate awareness and
training of new policies.
▪ Metrics.
Reproduction prohibited
ISO PROJECT DESCRIPTION
22
Stage 4: Review
1. Policies need to be reviewed, at a minimum yearly.
2. The effectiveness of security policies needs to be monitored.
3. Build up the implementation process.
Reproduction prohibited
23
CONCLUSION
Reproduction prohibited
ISO PROJECT DESCRIPTION
24
Development Communication
Stage 2 Stage 3
Assessment
Stage 1
Review
Stage 4
Reproduction prohibited
ISO PROJECT DESCRIPTION
25
Security Policy Assessment Tool
Security Charter
Policy Awareness and Training Deck
Policies Subjects:
A.5 – Information security policies
A.6 – Organization of information security
A.7 – Human resource security
A.8 – Asset management
A.9 – Access control
A.10 – Cryptography
A.11 – Physical and environmental security
A.12 – Operations security
A.13 – Communications security
A.14 – System acquisition, development,
and maintenance
A.15 – Supplier relationships
A.16 – Information security incident
management
A.17 –Information security aspects of
BCP
A.18 – Compliance
Reproduction prohibited
ISO PROJECT DESCRIPTION
26
Don’t forget about:
▪ Awareness
▪ Understanding
▪ Compliance
▪ Business alignment
Reproduction prohibited
ISO PROJECT DESCRIPTION
27
The effectiveness of security policies can be assessed based on the
metrics of user awareness, understanding, compliance, and business
alignment.
Awareness Understanding Compliance Business Alignment
Reproduction prohibited
THANK YOU !
PLEASE FEEL FREE TO ASK QUESTIONS
OR SHARE YOUR TIPS
28

More Related Content

PPTX
What is iso 27001 isms
PDF
ISO 27001_2022 Standard_Presentation.pdf
PPTX
27001 awareness Training
PDF
ISO 27001 2002 Update Webinar.pdf
PDF
2022 Webinar - ISO 27001 Certification.pdf
PPTX
Iso 27001 awareness
PPTX
ISO 27001 - Information security user awareness training presentation - part 3
PPTX
Basic introduction to iso27001
What is iso 27001 isms
ISO 27001_2022 Standard_Presentation.pdf
27001 awareness Training
ISO 27001 2002 Update Webinar.pdf
2022 Webinar - ISO 27001 Certification.pdf
Iso 27001 awareness
ISO 27001 - Information security user awareness training presentation - part 3
Basic introduction to iso27001

What's hot (20)

PDF
Why ISO27001 For My Organisation
PDF
What is ISO 27001 ISMS
PPTX
All you wanted to know about iso 27000
PDF
Isms awareness presentation
PPT
ISO 27001 - Information Security Management System
PPTX
ISO 27001 Awareness/TRansition.pptx
DOCX
ISO 27001:2013 Implementation procedure
PPTX
ISO_ 27001:2022 Controls & Clauses.pptx
PDF
A to Z of Information Security Management
PPT
Overview of ISO 27001 ISMS
PDF
ISO/IEC 27001:2013 An Overview
PPT
isms-presentation.ppt
PDF
ISMS_of ISO 27001-2022-awareness training
PDF
Steps to iso 27001 implementation
PDF
ISO 27001:2022 What has changed.pdf
PDF
PPTX
ISOIEC 42001 AI Management System Slides
PDF
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
PPTX
RMF Roles and Responsibilities (Part 1)
Why ISO27001 For My Organisation
What is ISO 27001 ISMS
All you wanted to know about iso 27000
Isms awareness presentation
ISO 27001 - Information Security Management System
ISO 27001 Awareness/TRansition.pptx
ISO 27001:2013 Implementation procedure
ISO_ 27001:2022 Controls & Clauses.pptx
A to Z of Information Security Management
Overview of ISO 27001 ISMS
ISO/IEC 27001:2013 An Overview
isms-presentation.ppt
ISMS_of ISO 27001-2022-awareness training
Steps to iso 27001 implementation
ISO 27001:2022 What has changed.pdf
ISOIEC 42001 AI Management System Slides
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
RMF Roles and Responsibilities (Part 1)
Ad

Similar to Iso 27001 2013 (20)

PDF
Implementing ISO 27001: A Step-by-Step Guide
PDF
Implementing ISO 27001: A Guide to Securing Your Organization
PDF
Ants and Elephants in the CISO's Office by Paul Rain
PPTX
Unlocking the Benefits of ISO 27001 Certification for Information Security.pptx
PPTX
ISO in Healthcare Sector Presentation.pptx
PDF
Planning for-and implementing ISO 27001
PDF
Maximize Data Security with ISO 27001 Certification in Saudi Arabia.pdf
PPT
ISO 27001 Certification-The Gold Standard for Information Security-IAS-GULF-UAE
PPT
ISO 27001 Certification-The Gold Standard for Information Security
PPTX
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
PPTX
english_bok_ismp_202306.pptx
PDF
GDPR compliance and information security: Reducing data breach risks
PPTX
Security audits & compliance
ODP
Damco iso 27001
PPTX
iso 27001 certification
PDF
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
DOCX
A Comprehensive Guide to ISO 27001 Standard for Information Security
PDF
Information Security Management System with ISO/IEC 27000:2018
PDF
NQA Your Complete Guide to ISO 27001
PDF
NQA Your Complete Guide to ISO 27001
Implementing ISO 27001: A Step-by-Step Guide
Implementing ISO 27001: A Guide to Securing Your Organization
Ants and Elephants in the CISO's Office by Paul Rain
Unlocking the Benefits of ISO 27001 Certification for Information Security.pptx
ISO in Healthcare Sector Presentation.pptx
Planning for-and implementing ISO 27001
Maximize Data Security with ISO 27001 Certification in Saudi Arabia.pdf
ISO 27001 Certification-The Gold Standard for Information Security-IAS-GULF-UAE
ISO 27001 Certification-The Gold Standard for Information Security
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
english_bok_ismp_202306.pptx
GDPR compliance and information security: Reducing data breach risks
Security audits & compliance
Damco iso 27001
iso 27001 certification
A Comprehensive Guide To Information Security Excellence ISO 27001 Certificat...
A Comprehensive Guide to ISO 27001 Standard for Information Security
Information Security Management System with ISO/IEC 27000:2018
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
Ad

Recently uploaded (20)

PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
Configure Apache Mutual Authentication
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPT
Geologic Time for studying geology for geologist
PDF
Architecture types and enterprise applications.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Modernising the Digital Integration Hub
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
Microsoft Excel 365/2024 Beginner's training
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Configure Apache Mutual Authentication
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Credit Without Borders: AI and Financial Inclusion in Bangladesh
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Geologic Time for studying geology for geologist
Architecture types and enterprise applications.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
OpenACC and Open Hackathons Monthly Highlights July 2025
Build Your First AI Agent with UiPath.pptx
A review of recent deep learning applications in wood surface defect identifi...
Consumable AI The What, Why & How for Small Teams.pdf
Flame analysis and combustion estimation using large language and vision assi...
Developing a website for English-speaking practice to English as a foreign la...
NewMind AI Weekly Chronicles – August ’25 Week III
Modernising the Digital Integration Hub
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A proposed approach for plagiarism detection in Myanmar Unicode text
Microsoft Excel 365/2024 Beginner's training

Iso 27001 2013

  • 1. Reproduction prohibited ISO 27001:2013 ENTREPRENEUR | CISO ADVISOR | CYBERFEMINIST | PEERLYST BRAND AMBASSADOR | TOP 50 CYBER INFLUENCER | @RESPONSIBLE CYBER MAGDA LILIA CHELLY 1
  • 2. Reproduction prohibited OVERVIEW 1. ISO Project Description 2. ISO Project Execution 1. Stage 1: Assessment and Prioritization 2. Stage 2: Development 3. Stage 3: Communication 4. Stage 4: Review 3. Conclusion 2
  • 4. Reproduction prohibited ISO PROJECT DESCRIPTION Building policies is crucial for an organization. However, building policies by themselves will not be enough to maintain or build cyber resilience. It needs to be followed by process, technology, and awareness. 4 Policy People TechnologyProcess
  • 5. Reproduction prohibited ISO PROJECT DESCRIPTION 5 Targeted attacks cost $92,000 for small/medium businesses and $2.4 million for large businesses. Serious security incidents cost $50,000 for small/medium businesses and $649,000 for large businesses. 2013: 91% of the companies had at least one external IT security incident and 85% had internal incidents. Security policies enable security through process and people following the right actions, in alignment with the according technology in place. Source 2013
  • 6. Reproduction prohibited ISO PROJECT DESCRIPTION 6 Communication, enforcement, and maintenance of the policies are the real challenges. ▪ Do you know what policies has your company ? ▪ Did you read them all ? ▪ How to make sure that they are update ?
  • 7. Reproduction prohibited ISO PROJECT DESCRIPTION 7 The answer is:
  • 8. Reproduction prohibited ISO PROJECT DESCRIPTION 8 Only 40% of non-IT employees are aware of these policies. 46% of companies reported insufficient time and resources to update or implement policies. 77% of IT professionals believe their policies need improvement and updating. But… 86% of companies have security policies Kaspersky, Global Corporate IT Security Risks, 2013
  • 9. Reproduction prohibited ISO PROJECT DESCRIPTION 9 What is a policy ? ‘’A policy is a deliberate system of principles to guide decisions and achieve rational outcomes. A policy is a statement of intent, and is implemented as a procedure or protocol.’’ What is a standard ? ‘’Technical standard, an established norm or requirement about technical systems International standard, standards suitable for worldwide use Open standard, a standard that is publicly available
  • 10. Reproduction prohibited ISO PROJECT DESCRIPTION 10 ‘’Standards organization, an entity primarily concerned with maintaining standards Standardization, the process of establishing technical standards Standard operating procedure, a step-by-step instruction to achieve a desired result’’ What is a guideline ? ‘’A guideline is a statement by which to determine a course of action. A guideline aims to streamline particular processes according to a set routine or sound practice. By definition, following a guideline is never mandatory.’’ Source: Wikipedia
  • 11. Reproduction prohibited ISO PROJECT DESCRIPTION 11 ‘’A policy is a guiding principle used to set direction in an organization. A procedure is a series of steps to be followed as a consistent and repetitive approach to accomplish an end result.’’
  • 12. Reproduction prohibited ISO PROJECT DESCRIPTION 12 What is ISO 27001:2013 ? ISO 27001, the international standard for information security management ‘’ "ISO 27001" (or ISO/IEC 27001:2013, "Information Security Management Systems") is a standard that provides a good practical framework for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an ISMS. The key purpose of the ISMS is to bring information risk and security under management control.’’ Why do you need ISO 27001:2013 ? At a high level, the ISMS will help minimize the costs of security incidents and enhance the company’s reputation and general security posture.
  • 13. Reproduction prohibited ISO PROJECT DESCRIPTION 13 The ISO 27001:2013 will be used to: • Thoroughly assess the organization's information risks with a methodical approach, and through a clear framework • Design and implement the adequate and efficient security controls, both technical and non- technical, to address risks • Comply with applicable laws, regulations and contacts, providing a subsequent commercial advantage, when related to RFP responses • Operate, manage and maintain security controls • Monitor and continuously improve information security, and build a cyber resilient culture
  • 15. Reproduction prohibited ISO PROJECT DESCRIPTION 15 Stage 1: Assessment and Prioritization Does your company require an ISO standard and security policies ? No matter what industry you are in, security policies are a MUST. • Finance • Insurance • Health care • Public administration • Education services • Professional services • Scientific and technical services
  • 16. Reproduction prohibited ISO PROJECT DESCRIPTION 16 Stage 1: Assessment and Prioritization 1. Build and ensure your stakeholder support and help. 2. Identify the required security policies for YOUR business. 3. Align with the business requirements. 4. Interview the different actors and understand the current landscape. 5. Proceed with a gap analysis. 6. Define the priorities.
  • 17. Reproduction prohibited ISO PROJECT DESCRIPTION 17 Stage 1: Assessment and Prioritization ▪ Kick-off and stakeholder support. ▪ Define and understand business requirements and run a gap analysis. ▪ Prioritize the controls vs policies.
  • 18. Reproduction prohibited ISO PROJECT DESCRIPTION 18 Stage 2: Development 1. Understand the important of the policies. 2. Develop the Security Charter. 3. Prepare all the security policies. 4. Make sure you take in consideration the feedback.
  • 19. Reproduction prohibited ISO PROJECT DESCRIPTION 19 Stage 2: Development ▪ Develop the Policy Charter. ▪ Develop the relevant security policies and gather feedback.
  • 20. Reproduction prohibited ISO PROJECT DESCRIPTION 20 Stage 3: Communication 1. A good communication program is a must for all project success. 2. Use and consider best practices. 3. Run awareness and training of new policies to employees. 4. Enforcement is a MUST. 5. Define the goals and the metrics.
  • 21. Reproduction prohibited ISO PROJECT DESCRIPTION 21 Stage 3: Communication ▪ Communicate awareness and training of new policies. ▪ Metrics.
  • 22. Reproduction prohibited ISO PROJECT DESCRIPTION 22 Stage 4: Review 1. Policies need to be reviewed, at a minimum yearly. 2. The effectiveness of security policies needs to be monitored. 3. Build up the implementation process.
  • 24. Reproduction prohibited ISO PROJECT DESCRIPTION 24 Development Communication Stage 2 Stage 3 Assessment Stage 1 Review Stage 4
  • 25. Reproduction prohibited ISO PROJECT DESCRIPTION 25 Security Policy Assessment Tool Security Charter Policy Awareness and Training Deck Policies Subjects: A.5 – Information security policies A.6 – Organization of information security A.7 – Human resource security A.8 – Asset management A.9 – Access control A.10 – Cryptography A.11 – Physical and environmental security A.12 – Operations security A.13 – Communications security A.14 – System acquisition, development, and maintenance A.15 – Supplier relationships A.16 – Information security incident management A.17 –Information security aspects of BCP A.18 – Compliance
  • 26. Reproduction prohibited ISO PROJECT DESCRIPTION 26 Don’t forget about: ▪ Awareness ▪ Understanding ▪ Compliance ▪ Business alignment
  • 27. Reproduction prohibited ISO PROJECT DESCRIPTION 27 The effectiveness of security policies can be assessed based on the metrics of user awareness, understanding, compliance, and business alignment. Awareness Understanding Compliance Business Alignment
  • 28. Reproduction prohibited THANK YOU ! PLEASE FEEL FREE TO ASK QUESTIONS OR SHARE YOUR TIPS 28