Ultimate Security

Topics

Preparing

  • Challenge Treatment

Plan Phase

  • Recognition Stage
    1. Cognition
    2. Asset Inventory
    3. Process Definition
    4. Network Architecture
    5. Scope Definition
  • Assessment & Analysis Stage
    1. Asset Evaluation
    2. Risk Assessment
    3. Gap Analysis
  • Security Objectives & Strategy Development Stage
    1. Information Security Objectives & Strategy Development
    2. Information Security Policy Development
  • Solution Development Stage
    1. Security Organization
    2. Statement of Applicability
    3. Risk Treatment
    4. Technical Security Policies
    5. Information Security Procedures
    6. Training & Awareness Plan
    7. Business Continuity Plan

Do Phase

  • Implementation Stage
    1. Implementation Planning
    2. Implementation Management

Check Phase

  • Effectiveness Assessment Stage
    1. Effectiveness Assessment
    2. Internal Audit
  • Review Stage
    1. Management Review

Act Phase

  • Corrective Activities Stage
    1. Improvement

Hands-On

Preparing

  1. Readiness Assessment
  2. Challenge Treatment

Design

  1. Cognition
  2. Asset Inventory
  3. Process Definition
  4. Network Architecture
  5. Scope Definition
  6. Asset Evaluation
  7. Risk Assessment
  8. Gap Analysis
  9. Information Security Objectives & Strategy Development
  10. Information Security Policy Development
  11. Security Organization
  12. Statement of Applicability
  13. Risk Treatment
  14. Technical Security Policies
  15. Information Security Procedures
  16. Training & Awareness Plan
  17. Business Continuity Plan

Implement

  1. Implementation Planning
  2. Implementation Management

Audit

  1. Effectiveness Assessment
  2. Internal Audit
  3. Management Review

Improvement

  1. Improvement

Language

English

Keywords