SlideShare a Scribd company logo
How	
  Does	
  the	
  new	
  ISO	
  27001	
  Impact	
  
Your	
  IT	
  Risk	
  Management	
  Processes?	
  
Presented	
  by	
  Lars	
  Neupart	
  	
  
Founder,	
  CEO	
  of	
  
Neupart	
  –	
  The	
  ERP	
  of	
  Security	
  
LN@neupart.com	
  
twiBer	
  @neupart	
  	
  
The	
  ISO	
  2700x	
  standards	
  
ISO	
  27000	
  
• Overview	
  and	
  
vocabulary	
  
ISO27001	
  
• InformaKon	
  Security	
  
Management	
  Systems	
  –	
  
Requirements	
  
ISO27002	
  
• Code	
  of	
  pracKce	
  for	
  
informaKon	
  security	
  
management	
  
ISO	
  27003	
  	
  
• ISMS	
  ImplementaKon	
  
Guidelines	
  
ISO	
  27004	
  
• InformaKon	
  Security	
  
Management	
  -­‐	
  
Measurement.	
  	
  
ISO27005	
  
• InformaKon	
  Security	
  
Risk	
  Management	
  
ISO27006	
  
• Requirements	
  for	
  
bodies	
  providing	
  audit	
  
and	
  cerKficaKon	
  	
  
+	
  +	
  +	
  +	
  	
  
New	
  drafts	
  available	
  
ISO	
  27000	
  
• Overview	
  and	
  
vocabulary	
  
ISO27001	
  
• InformaKon	
  Security	
  
Management	
  Systems	
  –	
  
Requirements	
  
ISO27002	
  
• Code	
  of	
  pracKce	
  for	
  
informaKon	
  security	
  
management	
  
ISO	
  27003	
  	
  
• ISMS	
  ImplementaKon	
  
Guidelines	
  
ISO	
  27004	
  
• InformaKon	
  Security	
  
Management	
  -­‐	
  
Measurement	
  	
  
ISO27005	
  
• InformaKon	
  Security	
  
Risk	
  Management	
  
ISO27006	
  
• Requirements	
  for	
  
bodies	
  providing	
  audit	
  
and	
  cerKficaKon	
  	
  
+	
  +	
  +	
  +	
  	
  
Information	
  Security	
  
Management	
  Systems	
  –	
  
Requirements	
  
ISO	
  27001	
  –	
  the	
  2013	
  edition	
  ISO/IEC	
  DIS	
  27001	
  =	
  draft.	
  	
  
I.e.	
  changes	
  are	
  likely	
  to	
  happen	
  
	
  
Aim	
  of	
  todays	
  webinar	
  is	
  to	
  give	
  you	
  a	
  head	
  start	
  preparing	
  for	
  
the	
  new	
  standard	
  so	
  you	
  can	
  have	
  a	
  smoother	
  transition.	
  
What’s	
  new?	
  
•  A	
  lot!	
  
•  New	
  content	
  
•  New	
  requirements	
  
numbering	
  
•  Still	
  short:	
  9	
  pages	
  of	
  
requirements	
  to	
  an	
  ISMS	
  
•  Controls	
  are	
  still	
  listed	
  in	
  
Annex	
  A,	
  and	
  referring	
  
to	
  ISO	
  27002	
  (the	
  new)	
  
•  Maintaining	
  a	
  fair	
  
portion	
  of	
  backwards	
  
compatibility	
  
Poll:	
  How	
  do	
  you	
  use	
  ISO	
  27001	
  
today?	
  
•  We	
  are	
  certified	
  
•  We	
  plan	
  to	
  certify	
  
•  We	
  plan	
  to	
  comply;	
  no	
  
certification	
  
•  Best	
  practice	
  
inspiration	
  
•  Don't	
  know	
  
Still	
  risk	
  oriented:	
  
•  The	
  first	
  requirement	
  
in	
  the	
  new	
  ISO	
  27001	
  
refers	
  to	
  an	
  Enterprise	
  
Risk	
  Management	
  
Standard:	
  ISO	
  31000	
  
ISO	
  31000	
  Enterprise	
  Risk	
  Management	
  
Plan	
  
Do	
  
Check	
  
Act	
  
Enterprise	
  Risk	
  
Management	
  (ISO	
  
31000)	
  
InformaKon	
  
Security	
  Risk	
  
Management	
  (ISO	
  
27005)	
  
ISMS	
  
Requirements	
  
(ISO	
  27001)	
  	
  
ISO	
  27005	
  recap	
  
IT	
  Risk	
  Management	
  -­‐	
  Explained	
  
Risk
Incident
Likelihood
Incident
Consequence
Threat
Frequency
Threat
Effect
Threats
Preventive
Measures
Corrective
Measures
Reduce
LikelihoodProactive
Security
IT Security Policy
Compliance & Awareness
Change Management
Operating Procedures
Access Control
Monitoring
System Redundancy
Firewall
Antivirus
Reactive
Security
Reduce
Consequence
IT Service Continuity Teams
IT Service Continuity Strategy
IT Service Continuity Plans
Disaster Recovery Procedures
Emergency Operations
Flexibility
Standby Equipment
Virtualization
Backup
IT	
  Risk	
  Management	
  -­‐	
  Explained	
  
Risk
Prioritization
Incident
Likelihood
Incident
Consequence
Threat
Frequency
Threat
Effect
Threats
Preventive
Measures
Corrective
Measures
Vulnerability	
  &	
  control	
  environment	
  assessment	
  
AdministraKve	
  
Measures	
  
Physical	
  /	
  Technical	
  
Measures	
  
PrevenKve	
  
Measures	
  
CorrecKve	
  
Measures	
  
Firewall	
   AnKvirus	
  
Server	
  
Cluster	
  
RAID	
   Backup	
  
Standby	
  
Equipment	
  
VirtualizaKon	
  
Security	
  
Policy	
  
System	
  
DocumentaKon	
  
Awareness	
  
Compliance	
  
Checks	
  
Alarm	
  
System	
  
Fire	
  
Suppression	
  
Logging	
  
Change	
  
Management	
  
IT	
  Service	
  
ConKnuity	
  Plan	
  
Disaster	
  Recovery	
  
Procedures	
  
Business	
  
ConKnuity	
  
Strategy	
  
Redundancy	
  
Access	
  Control	
  
System	
  
Standby	
  Site	
  
Server	
  snapshots	
  
Assessments	
  based	
  on	
  
Capability	
  Maturity	
  
Model	
  
Monitoring	
  
Assets:	
  Dependency	
  Hierarchy	
  
Business	
  Impact	
  values	
  
are	
  inherited	
  downwards	
  
Vulnerability	
  values	
  
are	
  inherited	
  upwards	
  
Server	
  01	
  
Virtual	
  Server	
  
SAN	
  01	
  
Data	
  Staorage	
  
HP	
  DL380	
  
Hardware	
  	
  unit	
  
Data	
  Center	
  Oslo	
  
Datacenter	
  
Finance	
  DB	
  
Database	
  
ERP	
  
IT	
  Service	
  
Dynamics	
  AOS	
  
Business	
  system	
  
HP	
  DL380	
  
Hardware	
  unit	
  
Server	
  02	
  
Virtual	
  Server	
  
Finance	
  
Business	
  Process	
  
Comparing	
  ISO	
  27005,	
  NIST	
  SP800-­‐30	
  
ISO	
  27005	
   NIST	
  SP800-­‐30	
  
Context	
  establishment	
   	
  	
  
	
  	
   	
  	
  
Identification	
  of	
  assets	
   System	
  Characterization	
  
Identification	
  of	
  threats	
   Threat	
  Identification	
  
Identification	
  of	
  existing	
  controls	
   Vulnerability	
  Identification	
  
Identification	
  of	
  vulnerabilities	
   Control	
  Analysis	
  
Identification	
  of	
  consequences	
   	
  	
  
	
  	
   	
  	
  
Assessment	
  of	
  consequences	
   Likelihood	
  Determination	
  
Assessment	
  of	
  incident	
  likelihood	
   Impact	
  Analysis	
  
Risk	
  estimation	
   Risk	
  Determination	
  
	
  	
   	
  	
  
Risk	
  evaluation	
   	
  	
  
	
  	
   	
  	
  
Risk	
  treatment	
   Control	
  Recommendations	
  
Risk	
  acceptance	
   	
  	
  
Risk	
  communication	
   Results	
  Documentation	
  
Examples	
  of	
  how	
  the	
  27001	
  update	
  
will	
  impact	
  your	
  risk	
  management	
  
processes	
  
27001:	
  Not	
  only	
  downside	
  risks	
  
•  6.1	
  Actions	
  to	
  address	
  risks	
  
and	
  opportunities	
  	
  
•  Quote	
  ISO	
  31000:	
  
“Organizations	
  of	
  all	
  types	
  
and	
  sizes	
  face	
  internal	
  and	
  
external	
  factors	
  and	
  
influences	
  that	
  make	
  it	
  
uncertain	
  whether	
  and	
  
when	
  they	
  will	
  achieve	
  
their	
  objectives.	
  The	
  effect	
  
this	
  uncertainty	
  has	
  on	
  an	
  
organization's	
  objectives	
  is	
  
“risk”.	
  
Risk	
  Owner	
  
•  Risk	
  Owner	
  approves	
  risk	
  treatment	
  plan	
  and	
  accepts	
  residual	
  risks	
  
•  Note:	
  Asset	
  ownership	
  is	
  formally	
  no	
  longer	
  a	
  ISO	
  27001	
  requirement,	
  but	
  it’s	
  still	
  in	
  the	
  annex	
  A	
  Control	
  
List.	
  Practically	
  same	
  requirement,	
  as	
  you	
  can’t	
  expect	
  it	
  to	
  not	
  be	
  in	
  your	
  Statement	
  of	
  Applicability	
  
Increased	
  flexibility	
  in	
  your	
  choice	
  	
  
of	
  risk	
  method	
  
The	
  organization	
  shall	
  define	
  an	
  information	
  
security	
  risk	
  assessment	
  process	
  that:	
  	
  
1.  establishes	
  and	
  maintains	
  information	
  security	
  
risk	
  criteria,	
  including	
  the	
  risk	
  acceptance	
  
criteria;	
  	
  
2.  determines	
  the	
  criteria	
  for	
  performing	
  
information	
  security	
  risk	
  assessments;	
  and	
  	
  
3.  ensures	
  that	
  repeated	
  information	
  security	
  risk	
  
assessments	
  produce	
  consistent,	
  valid	
  and	
  
comparable	
  results.	
  	
  
(section	
  6.1	
  )	
  
	
  
Time	
  to	
  vote	
  
•  What	
  IT	
  risk	
  assessment	
  
method	
  or	
  framework	
  
do	
  you	
  use	
  today?	
  
–  ISO	
  27005	
  
–  NIST	
  SP	
  800	
  series	
  
–  IRAM	
  	
  
–  OCTAVE	
  
–  Some	
  other	
  threat	
  based	
  
approach	
  
–  Some	
  other	
  control	
  based	
  
approach	
  
–  Don’t	
  know	
  
The	
  organization	
  shall	
  apply	
  an	
  
information	
  security	
  risk	
  treatment	
  
process	
  
	
  
Treating	
  Risks	
  
Accept	
   Reduce	
  
Share	
   Avoid	
  
Treatment	
  opKons	
  according	
  to	
  ISO	
  27001:2005	
  and	
  ISO	
  27005.	
  
ISO	
  27001:2013,	
  do	
  not	
  require	
  these	
  specific	
  treatment	
  opKons;	
  but	
  
you	
  are	
  free	
  to	
  	
  choose	
  these.	
  
SoA	
  linked	
  even	
  closer	
  to	
  Risk	
  Treatment	
  
Risk	
  treatment	
  
SoA	
  =	
  
Statement	
  of	
  
Applicability	
  
•  Select	
  treatment	
  options	
  
•  Determine	
  controls	
  
•  Check	
  controls	
  with	
  Annex	
  A,	
  	
  
verify	
  no	
  necessary	
  controls	
  are	
  
omitted	
  
•  Make	
  SoA	
  and	
  justify	
  exclusions	
  
AND	
  inclusions	
  (new)	
  
•  Clearly	
  worded	
  that	
  you	
  must	
  
determine	
  all	
  necessary	
  controls	
  
Review	
  of	
  Neuparts	
  well	
  known	
  4	
  
responsible	
  short-­‐cuts	
  –	
  do	
  they	
  still	
  apply?	
  
Assess	
  your	
  most	
  
important	
  assets	
  first	
  	
  
(you	
  can	
  add	
  more	
  
later)	
  
1:	
  Not	
  all	
  assets	
  
Do	
  not	
  use	
  complete	
  
threat	
  catalogue	
  on	
  
each	
  of	
  your	
  assets	
  
(relevant	
  threats	
  
depends	
  on	
  asset	
  type)	
  
2:	
  Not	
  all	
  threats	
  
• Inheritance:	
  Business	
  
impact	
  values	
  inherits	
  
downwards	
  
• Vulnerability	
  scores	
  
inherits	
  upwards	
  
• Asset	
  dependencies	
  /	
  
Hierarchy	
  
3:	
  Inheritance	
  
• Make	
  overall	
  
assessment	
  first	
  –	
  
refine	
  later	
  
• Example:	
  Assess	
  
threats	
  combined	
  first	
  
–	
  individually	
  later	
  
4:	
  Fewer	
  assessments	
  
Oh,	
  what	
  happened	
  to	
  PDCA?	
  
Plan	
  -­‐	
  Do	
  –	
  Check	
  -­‐	
  Act	
  is	
  still	
  there,	
  now	
  called	
  continual	
  
improvement	
  
Risk	
  Management	
  
•  Risk	
  Owner	
  
•  (Assets)	
  
•  Threats	
  
•  Business	
  Impact	
  
Assessment	
  
•  Vulnerability	
  Assessment	
  
•  Reporting	
  &	
  evaluating	
  
•  Treating	
  (Accept,	
  Reduce,	
  Share,	
  
Avoid)	
  
Time	
  to	
  vote	
  
•  Will	
  the	
  new	
  ISO	
  improve	
  
your	
  risk	
  management	
  
processes?	
  
–  Yes	
  –	
  the	
  update	
  is	
  easy	
  to	
  
understand	
  and	
  makes	
  
sense	
  
–  Not	
  much	
  –	
  nothing	
  really	
  
new	
  here	
  
–  I’m	
  concerned	
  of	
  the	
  
introduced	
  flexibility	
  
–  Don’t	
  know	
  
About	
  Neupart	
  
•  ISO	
  27001	
  certified	
  company	
  
•  Provides	
  SecureAware®,	
  	
  an	
  all-­‐in-­‐one,	
  
efficient	
  IT	
  GRC	
  solution	
  allowing	
  
organizations	
  to	
  automate	
  IT	
  governance,	
  
risk	
  and	
  compliance	
  management	
  	
  
•  “The	
  ERP	
  of	
  Security”	
  
•  HQ	
  in	
  Denmark,	
  subsidiary	
  in	
  Germany	
  and	
  
a	
  200+	
  customer	
  portfolio	
  covering	
  a	
  wide	
  
range	
  of	
  private	
  enterprises	
  and	
  
governmental	
  agencies	
  	
  
IT	
  GRC	
  =	
  
IT	
  Governance,	
  	
  
Risk	
  &	
  Compliance	
  
Management	
  
SecureAware	
  Risk	
  TNG	
  Benefits	
  
•  Less	
  specialist	
  knowledge	
  
needed	
  to	
  conduct	
  professional	
  
risk	
  management	
  
•  Know	
  your	
  IT	
  related	
  business	
  
risks	
  
•  Fast	
  results	
  
•  Saves	
  time	
  for	
  you	
  and	
  your	
  
organization	
  
•  ISO	
  27005	
  based	
  methodology	
  –
and	
  fully	
  compatible	
  with	
  NIST	
  
SP800-­‐30	
  	
  
•  Cloud	
  or	
  on-­‐premise	
  software	
  
Try	
  ISO	
  27001	
  compliant	
  IT	
  GRC	
  soluKon	
  at	
  www.neupart.com	
  
Presented	
  by	
  Lars	
  Neupart	
  	
  
Founder,	
  CEO	
  of	
  
Neupart	
  –	
  The	
  ERP	
  of	
  Security	
  
LN@neupart.com	
  
twiBer	
  @neupart	
  	
  

More Related Content

PDF
ISO 27001 How to accelerate the implementation.pdf
PDF
NQA ISO 27001 Implementation Guide
PDF
What is ISO 27001 ISMS
PPTX
Control interno-informatico
PPTX
27001 awareness Training
PDF
Infosec Audit Lecture_4
DOCX
Iso 27001 2013 Standard Requirements
PPTX
Iso 27001 isms presentation
ISO 27001 How to accelerate the implementation.pdf
NQA ISO 27001 Implementation Guide
What is ISO 27001 ISMS
Control interno-informatico
27001 awareness Training
Infosec Audit Lecture_4
Iso 27001 2013 Standard Requirements
Iso 27001 isms presentation

What's hot (20)

PDF
Basics in IT Audit and Application Control Testing
PDF
Gobierno de TI - COBIT 5 y TOGAF
PDF
NQA - ISO 27001 Implementation Guide
PPTX
PCI PIN Security & Key Management Compliance
PDF
ISO 27001 Certification - The Benefits and Challenges
PDF
Introduction to NIST Cybersecurity Framework
PDF
PPTX
Implementing ISO27001 2013
PPT
ITSM Foundation Course Material
PPTX
CISA Training - Chapter 1 - 2016
PDF
ISO27001: Implementation & Certification Process Overview
PDF
ISO 27001 (v2013) Checklist
PDF
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
PDF
Anti bribery management system iso 37001 fauziah sulaiman lpktn 20022020 (1)
PPTX
What is iso 27001 isms
PDF
Auditoria de seguridad informatica
PPTX
Iso 27001 2013 clause 6 - planning - by Software development company in india
PDF
ITIL Incident Management Workflow - Process Guide
PPTX
Iso27001 Risk Assessment Approach
PDF
2022 Webinar - ISO 27001 Certification.pdf
Basics in IT Audit and Application Control Testing
Gobierno de TI - COBIT 5 y TOGAF
NQA - ISO 27001 Implementation Guide
PCI PIN Security & Key Management Compliance
ISO 27001 Certification - The Benefits and Challenges
Introduction to NIST Cybersecurity Framework
Implementing ISO27001 2013
ITSM Foundation Course Material
CISA Training - Chapter 1 - 2016
ISO27001: Implementation & Certification Process Overview
ISO 27001 (v2013) Checklist
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
Anti bribery management system iso 37001 fauziah sulaiman lpktn 20022020 (1)
What is iso 27001 isms
Auditoria de seguridad informatica
Iso 27001 2013 clause 6 - planning - by Software development company in india
ITIL Incident Management Workflow - Process Guide
Iso27001 Risk Assessment Approach
2022 Webinar - ISO 27001 Certification.pdf
Ad

Viewers also liked (17)

DOCX
ISO 27001:2013 Implementation procedure
PDF
ISO/IEC 27001:2013 An Overview
PDF
Neupart Bright Talk - How Does the New ISO 27001 Impact Your IT Risk Manageme...
 
PDF
Enterprise risk & risk management - I
PPT
The best way to use ISO 27001
PDF
How the the 2013 update of ISO 27001 Impacts your Risk Management
PPT
Enterprise Risk Management
PPTX
ISO Annex SL Clause 4: Context of the Organisation
PDF
ISO 27001 Implementation_Documentation_Mandatory_List
PPTX
ISO 27001 - information security user awareness training presentation -part 2
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
PDF
ISO 27005 Risk Assessment
PPTX
Iso 27001 transition to 2013 03202014
PPTX
ISO 27001 - Information security user awareness training presentation - part 3
PPTX
Information Security Management System ISO/IEC 27001:2005
PPT
Risk mangement
ISO 27001:2013 Implementation procedure
ISO/IEC 27001:2013 An Overview
Neupart Bright Talk - How Does the New ISO 27001 Impact Your IT Risk Manageme...
 
Enterprise risk & risk management - I
The best way to use ISO 27001
How the the 2013 update of ISO 27001 Impacts your Risk Management
Enterprise Risk Management
ISO Annex SL Clause 4: Context of the Organisation
ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27005 Risk Assessment
Iso 27001 transition to 2013 03202014
ISO 27001 - Information security user awareness training presentation - part 3
Information Security Management System ISO/IEC 27001:2005
Risk mangement
Ad

Similar to How Does the New ISO 27001 Impact Your IT Risk Management Processes? (20)

PDF
Auditing Information Security Management System Using ISO 27001 2013
PDF
Neupart webinar 1: Four shortcuts to better risk assessments
PDF
Implementing ISO 27001: A Step-by-Step Guide
PPT
University iso 27001 bgys intro and certification lami kaya may2012
PPTX
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
PDF
GDPR compliance and information security: Reducing data breach risks
PPT
Developing A Risk Based Information Security Program
PDF
NQA Your Complete Guide to ISO 27001
PDF
NQA Your Complete Guide to ISO 27001
PPTX
The Importance of ISO 27001 Certification in Today's Cybersecurity Landscape....
PDF
Planning for-and implementing ISO 27001
PDF
Risk Management for Medical Devices - ISO 14971 Overview
PPTX
the role of 27001 in cybersecurity pp.pptx
PPTX
Iso 27001 awareness
PPT
4 System For Information Security
DOC
ISO27001
PDF
ISO 27001 2002 Update Webinar.pdf
PPTX
english_bok_ismp_202306.pptx
PPT
Overview of ISO 27001 ISMS
PDF
G12: Implementation to Business Value
Auditing Information Security Management System Using ISO 27001 2013
Neupart webinar 1: Four shortcuts to better risk assessments
Implementing ISO 27001: A Step-by-Step Guide
University iso 27001 bgys intro and certification lami kaya may2012
ISO 27001 Compliance Checklist 9 Step Implementation Guide.pptx
GDPR compliance and information security: Reducing data breach risks
Developing A Risk Based Information Security Program
NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
The Importance of ISO 27001 Certification in Today's Cybersecurity Landscape....
Planning for-and implementing ISO 27001
Risk Management for Medical Devices - ISO 14971 Overview
the role of 27001 in cybersecurity pp.pptx
Iso 27001 awareness
4 System For Information Security
ISO27001
ISO 27001 2002 Update Webinar.pdf
english_bok_ismp_202306.pptx
Overview of ISO 27001 ISMS
G12: Implementation to Business Value

More from Lars Neupart (6)

PDF
Neupart indlæg om den ny iso 27001 hos dansk it i århus 2013 05-22
PPTX
Til ledelsen it-sikkerhed for forretningen
PPTX
Dansk It Neupart Cloud Sikkerhed Risikovurdering
PDF
Neupart Isaca April 2012
PPTX
Muligheder for sikker cloud computing
PPTX
Tror du stadig du kan sige nej tak til Web 2.0 og skyen?
Neupart indlæg om den ny iso 27001 hos dansk it i århus 2013 05-22
Til ledelsen it-sikkerhed for forretningen
Dansk It Neupart Cloud Sikkerhed Risikovurdering
Neupart Isaca April 2012
Muligheder for sikker cloud computing
Tror du stadig du kan sige nej tak til Web 2.0 og skyen?

Recently uploaded (20)

PDF
A Brief Introduction About - Stacey Soans
PDF
Leading with Vision_ How Mohit Bansal Is Shaping Chandigarh’s Real Estate Ren...
PDF
Minnesota’s New Lane-Sharing Law for Motorcycles.pdf
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PPT
How to Protect Your New York Business from the Unexpected
PDF
Mastering Social Media Marketing: Grow Your Brand Online
PPTX
Unlocking Creativity Top Adobe Tools for Content Creators Buy Adobe Software...
PDF
How to Value Virtual Machines and other IP Stuff.pdf
PDF
Lecture 3 - Risk Management and Compliance.pdf
PPTX
How to best Address your professional Training Program - August 2025.pptx
PDF
Why Is MCP Server Development Trending Now.pdf
PPTX
Communications Recruiter Melbourne.pptx
PDF
FOHO: The Rental Platform Transforming Housing for Asian Renters in the U.S.
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PPTX
GenAI at FinSage Financial Wellness Platform
PDF
Employnova Global Services : Outsourcing
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
Latest Blogs, Presentations, and other News - June 2025 to July 2025
PDF
KornFerry Presentation hbkjbkjbk bjkbkbk.pdf
PPTX
Is Your Brand Ready for Expansion? A Strategic Guide to Scaling Successfully
A Brief Introduction About - Stacey Soans
Leading with Vision_ How Mohit Bansal Is Shaping Chandigarh’s Real Estate Ren...
Minnesota’s New Lane-Sharing Law for Motorcycles.pdf
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
How to Protect Your New York Business from the Unexpected
Mastering Social Media Marketing: Grow Your Brand Online
Unlocking Creativity Top Adobe Tools for Content Creators Buy Adobe Software...
How to Value Virtual Machines and other IP Stuff.pdf
Lecture 3 - Risk Management and Compliance.pdf
How to best Address your professional Training Program - August 2025.pptx
Why Is MCP Server Development Trending Now.pdf
Communications Recruiter Melbourne.pptx
FOHO: The Rental Platform Transforming Housing for Asian Renters in the U.S.
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
GenAI at FinSage Financial Wellness Platform
Employnova Global Services : Outsourcing
WRN_Investor_Presentation_August 2025.pdf
Latest Blogs, Presentations, and other News - June 2025 to July 2025
KornFerry Presentation hbkjbkjbk bjkbkbk.pdf
Is Your Brand Ready for Expansion? A Strategic Guide to Scaling Successfully

How Does the New ISO 27001 Impact Your IT Risk Management Processes?

  • 1. How  Does  the  new  ISO  27001  Impact   Your  IT  Risk  Management  Processes?   Presented  by  Lars  Neupart     Founder,  CEO  of   Neupart  –  The  ERP  of  Security   [email protected]   twiBer  @neupart    
  • 2. The  ISO  2700x  standards   ISO  27000   • Overview  and   vocabulary   ISO27001   • InformaKon  Security   Management  Systems  –   Requirements   ISO27002   • Code  of  pracKce  for   informaKon  security   management   ISO  27003     • ISMS  ImplementaKon   Guidelines   ISO  27004   • InformaKon  Security   Management  -­‐   Measurement.     ISO27005   • InformaKon  Security   Risk  Management   ISO27006   • Requirements  for   bodies  providing  audit   and  cerKficaKon     +  +  +  +    
  • 3. New  drafts  available   ISO  27000   • Overview  and   vocabulary   ISO27001   • InformaKon  Security   Management  Systems  –   Requirements   ISO27002   • Code  of  pracKce  for   informaKon  security   management   ISO  27003     • ISMS  ImplementaKon   Guidelines   ISO  27004   • InformaKon  Security   Management  -­‐   Measurement     ISO27005   • InformaKon  Security   Risk  Management   ISO27006   • Requirements  for   bodies  providing  audit   and  cerKficaKon     +  +  +  +    
  • 4. Information  Security   Management  Systems  –   Requirements   ISO  27001  –  the  2013  edition  ISO/IEC  DIS  27001  =  draft.     I.e.  changes  are  likely  to  happen     Aim  of  todays  webinar  is  to  give  you  a  head  start  preparing  for   the  new  standard  so  you  can  have  a  smoother  transition.  
  • 5. What’s  new?   •  A  lot!   •  New  content   •  New  requirements   numbering   •  Still  short:  9  pages  of   requirements  to  an  ISMS   •  Controls  are  still  listed  in   Annex  A,  and  referring   to  ISO  27002  (the  new)   •  Maintaining  a  fair   portion  of  backwards   compatibility  
  • 6. Poll:  How  do  you  use  ISO  27001   today?   •  We  are  certified   •  We  plan  to  certify   •  We  plan  to  comply;  no   certification   •  Best  practice   inspiration   •  Don't  know  
  • 7. Still  risk  oriented:   •  The  first  requirement   in  the  new  ISO  27001   refers  to  an  Enterprise   Risk  Management   Standard:  ISO  31000  
  • 8. ISO  31000  Enterprise  Risk  Management   Plan   Do   Check   Act  
  • 9. Enterprise  Risk   Management  (ISO   31000)   InformaKon   Security  Risk   Management  (ISO   27005)   ISMS   Requirements   (ISO  27001)    
  • 11. IT  Risk  Management  -­‐  Explained   Risk Incident Likelihood Incident Consequence Threat Frequency Threat Effect Threats Preventive Measures Corrective Measures
  • 12. Reduce LikelihoodProactive Security IT Security Policy Compliance & Awareness Change Management Operating Procedures Access Control Monitoring System Redundancy Firewall Antivirus Reactive Security Reduce Consequence IT Service Continuity Teams IT Service Continuity Strategy IT Service Continuity Plans Disaster Recovery Procedures Emergency Operations Flexibility Standby Equipment Virtualization Backup IT  Risk  Management  -­‐  Explained   Risk Prioritization Incident Likelihood Incident Consequence Threat Frequency Threat Effect Threats Preventive Measures Corrective Measures
  • 13. Vulnerability  &  control  environment  assessment   AdministraKve   Measures   Physical  /  Technical   Measures   PrevenKve   Measures   CorrecKve   Measures   Firewall   AnKvirus   Server   Cluster   RAID   Backup   Standby   Equipment   VirtualizaKon   Security   Policy   System   DocumentaKon   Awareness   Compliance   Checks   Alarm   System   Fire   Suppression   Logging   Change   Management   IT  Service   ConKnuity  Plan   Disaster  Recovery   Procedures   Business   ConKnuity   Strategy   Redundancy   Access  Control   System   Standby  Site   Server  snapshots   Assessments  based  on   Capability  Maturity   Model   Monitoring  
  • 14. Assets:  Dependency  Hierarchy   Business  Impact  values   are  inherited  downwards   Vulnerability  values   are  inherited  upwards   Server  01   Virtual  Server   SAN  01   Data  Staorage   HP  DL380   Hardware    unit   Data  Center  Oslo   Datacenter   Finance  DB   Database   ERP   IT  Service   Dynamics  AOS   Business  system   HP  DL380   Hardware  unit   Server  02   Virtual  Server   Finance   Business  Process  
  • 15. Comparing  ISO  27005,  NIST  SP800-­‐30   ISO  27005   NIST  SP800-­‐30   Context  establishment               Identification  of  assets   System  Characterization   Identification  of  threats   Threat  Identification   Identification  of  existing  controls   Vulnerability  Identification   Identification  of  vulnerabilities   Control  Analysis   Identification  of  consequences               Assessment  of  consequences   Likelihood  Determination   Assessment  of  incident  likelihood   Impact  Analysis   Risk  estimation   Risk  Determination           Risk  evaluation               Risk  treatment   Control  Recommendations   Risk  acceptance       Risk  communication   Results  Documentation  
  • 16. Examples  of  how  the  27001  update   will  impact  your  risk  management   processes  
  • 17. 27001:  Not  only  downside  risks   •  6.1  Actions  to  address  risks   and  opportunities     •  Quote  ISO  31000:   “Organizations  of  all  types   and  sizes  face  internal  and   external  factors  and   influences  that  make  it   uncertain  whether  and   when  they  will  achieve   their  objectives.  The  effect   this  uncertainty  has  on  an   organization's  objectives  is   “risk”.  
  • 18. Risk  Owner   •  Risk  Owner  approves  risk  treatment  plan  and  accepts  residual  risks   •  Note:  Asset  ownership  is  formally  no  longer  a  ISO  27001  requirement,  but  it’s  still  in  the  annex  A  Control   List.  Practically  same  requirement,  as  you  can’t  expect  it  to  not  be  in  your  Statement  of  Applicability  
  • 19. Increased  flexibility  in  your  choice     of  risk  method   The  organization  shall  define  an  information   security  risk  assessment  process  that:     1.  establishes  and  maintains  information  security   risk  criteria,  including  the  risk  acceptance   criteria;     2.  determines  the  criteria  for  performing   information  security  risk  assessments;  and     3.  ensures  that  repeated  information  security  risk   assessments  produce  consistent,  valid  and   comparable  results.     (section  6.1  )    
  • 20. Time  to  vote   •  What  IT  risk  assessment   method  or  framework   do  you  use  today?   –  ISO  27005   –  NIST  SP  800  series   –  IRAM     –  OCTAVE   –  Some  other  threat  based   approach   –  Some  other  control  based   approach   –  Don’t  know  
  • 21. The  organization  shall  apply  an   information  security  risk  treatment   process    
  • 22. Treating  Risks   Accept   Reduce   Share   Avoid   Treatment  opKons  according  to  ISO  27001:2005  and  ISO  27005.   ISO  27001:2013,  do  not  require  these  specific  treatment  opKons;  but   you  are  free  to    choose  these.  
  • 23. SoA  linked  even  closer  to  Risk  Treatment   Risk  treatment   SoA  =   Statement  of   Applicability   •  Select  treatment  options   •  Determine  controls   •  Check  controls  with  Annex  A,     verify  no  necessary  controls  are   omitted   •  Make  SoA  and  justify  exclusions   AND  inclusions  (new)   •  Clearly  worded  that  you  must   determine  all  necessary  controls  
  • 24. Review  of  Neuparts  well  known  4   responsible  short-­‐cuts  –  do  they  still  apply?   Assess  your  most   important  assets  first     (you  can  add  more   later)   1:  Not  all  assets   Do  not  use  complete   threat  catalogue  on   each  of  your  assets   (relevant  threats   depends  on  asset  type)   2:  Not  all  threats   • Inheritance:  Business   impact  values  inherits   downwards   • Vulnerability  scores   inherits  upwards   • Asset  dependencies  /   Hierarchy   3:  Inheritance   • Make  overall   assessment  first  –   refine  later   • Example:  Assess   threats  combined  first   –  individually  later   4:  Fewer  assessments  
  • 25. Oh,  what  happened  to  PDCA?   Plan  -­‐  Do  –  Check  -­‐  Act  is  still  there,  now  called  continual   improvement  
  • 26. Risk  Management   •  Risk  Owner   •  (Assets)   •  Threats   •  Business  Impact   Assessment   •  Vulnerability  Assessment   •  Reporting  &  evaluating   •  Treating  (Accept,  Reduce,  Share,   Avoid)  
  • 27. Time  to  vote   •  Will  the  new  ISO  improve   your  risk  management   processes?   –  Yes  –  the  update  is  easy  to   understand  and  makes   sense   –  Not  much  –  nothing  really   new  here   –  I’m  concerned  of  the   introduced  flexibility   –  Don’t  know  
  • 28. About  Neupart   •  ISO  27001  certified  company   •  Provides  SecureAware®,    an  all-­‐in-­‐one,   efficient  IT  GRC  solution  allowing   organizations  to  automate  IT  governance,   risk  and  compliance  management     •  “The  ERP  of  Security”   •  HQ  in  Denmark,  subsidiary  in  Germany  and   a  200+  customer  portfolio  covering  a  wide   range  of  private  enterprises  and   governmental  agencies     IT  GRC  =   IT  Governance,     Risk  &  Compliance   Management  
  • 29. SecureAware  Risk  TNG  Benefits   •  Less  specialist  knowledge   needed  to  conduct  professional   risk  management   •  Know  your  IT  related  business   risks   •  Fast  results   •  Saves  time  for  you  and  your   organization   •  ISO  27005  based  methodology  – and  fully  compatible  with  NIST   SP800-­‐30     •  Cloud  or  on-­‐premise  software  
  • 30. Try  ISO  27001  compliant  IT  GRC  soluKon  at  www.neupart.com   Presented  by  Lars  Neupart     Founder,  CEO  of   Neupart  –  The  ERP  of  Security   [email protected]   twiBer  @neupart