Difference between revisions of "Session:How companies manage their security: Introduction into Information Security Management Systems"

From 34C3_Wiki
Jump to: navigation, search
Line 16: Line 16:
 
'''Contact:''' [https://twitter.com/tuikc @tuikc]
 
'''Contact:''' [https://twitter.com/tuikc @tuikc]
  
'''Update:''' Lecture slides will be uploaded by day 4
+
'''Lecutre Slides:''' http://docdro.id/qRIyH1v
  
 
This talk is for:
 
This talk is for:

Revision as of 09:33, 28 December 2017

Description This talk is an introduction into Information Security Management Systems (ISMS) as based on ISO27001. ISMS are the way companies or organisations organize their IT security in a top-down approach. It is a beginner level talk for people who want to learn more about this topic or want to work with ISMS.
Website(s)
Type Talk
Kids session No
Keyword(s) security
Tags ISMS, ISO27001, information security
Person organizing
Language en - English
en - English
Other sessions...

refresh

Starts at 2017/12/27 18:30
Ends at 2017/12/27 19:30
Duration 60 minutes
Location Room:Seminar room 14-15

Contact: @tuikc

Lecutre Slides: http://docdro.id/qRIyH1v

This talk is for:

  • Those interested in learning how companies manage their IT-security
  • System administrators, software developers, IT professionals or those who would like to work as such
  • People who want to become Information Security Officers (CISO) or Data Privacy Officers
  • Those who want to implement an Information Security Management System in their organisation/company

What is the talk about:

  • What an Information Security Management System (ISMS) is, what it can and cannot do and why it may be important for your organisation
  • Basics such as risk analysis, business impact analysis and setting information security goals
  • What the job of an Information Security Officer is and how it different from a system administrator, software developer, head of IT or pentester

What do you need to understand this talk:

  • Interest for IT security
  • Basic knowledge of IT threats that companies, organizations, individuals face
  • Curious to see what IT security looks like from a management perspective

This talk is maybe not interesting when:

  • You are looking for technical details of how to securely configure Apache2
  • You already are an experienced ISMS-professional (auditor, CISO)