How to handle multilayered IT security today
-
Upload
marc-vael -
Category
Technology
-
view
331 -
download
3
description
Transcript of How to handle multilayered IT security today
![Page 1: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/1.jpg)
An effective strategy to handle
multi-layered IT security today
![Page 2: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/2.jpg)
Membership Guidance &
Practices
Professional recognition
ISACA (www.isaca.org)
• Founded in 1969
• Non-profit, global
membership association for
IT & information systems
professionals
• +95,000 members
• 190 chapters in 75 countries
• globally accepted research,
certifications and community
collaboration
• trust in, and value from,
information systems.
• ISACA provides its
members with education,
resource sharing, advocacy,
professional networking and
a host of other benefits on a
local level.
ISACA (Official)
@ISACANews
![Page 3: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/3.jpg)
![Page 4: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/4.jpg)
![Page 5: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/5.jpg)
2 views on controls
![Page 6: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/6.jpg)
Information security
has become
a critical business function!
![Page 7: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/7.jpg)
© 2011 ISACA
These materials are exclusive for HOGENT.
![Page 8: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/8.jpg)
![Page 9: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/9.jpg)
![Page 10: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/10.jpg)
![Page 11: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/11.jpg)
![Page 12: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/12.jpg)
![Page 13: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/13.jpg)
IT risk always exists! (whether or not it is
detected / recognised by the organisation).
![Page 14: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/14.jpg)
ISO 27005
![Page 15: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/15.jpg)
![Page 16: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/16.jpg)
![Page 17: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/17.jpg)
systemic approach
Linear versus Circular thinking:
![Page 18: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/18.jpg)
Your solution
is as strong …
… as its weakest link
![Page 19: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/19.jpg)
“I don’t care how many millions of
dollars you spend on security
technology. If you don’t have
people trained properly, I’m going
to get in if I want to get in.”
Susie Thunder, Cyberpunk
![Page 20: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/20.jpg)
20
![Page 21: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/21.jpg)
1. Information Security Governance
2. Information Risk Management
3. Information Security Program Development
4. Information Security Program Management
5. Incident Management & Response
![Page 22: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/22.jpg)
![Page 23: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/23.jpg)
![Page 24: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/24.jpg)
Nov
emb
er
201
1
24 ISACA
![Page 25: How to handle multilayered IT security today](https://reader034.fdocuments.net/reader034/viewer/2022052410/554f54b4b4c905423f8b545f/html5/thumbnails/25.jpg)
Career Summary Expertise Summary Education/ Certification
Marc Vael
• Chief Audit Executive (Smals)
• Managing Director (Valuendo)
• Director / CISO (KPMG Belgium)
• Sr Mgr (Arthur Andersen)
• Quality Control (IBM)
• IT Audit & Assurance
• Information Security
Management
• Business Continuity /
Disaster Recovery
• Privacy & Data
Protection
• Risk Management
• IT Governance
• Master in Applied Economics (UA)
• Master in Information Mgt
(Uhasselt)
• Master in IT (KUL)
• CISA (ISACA)
• CISM (ISACA)
• CISSP (ISC2)
• CGEIT (ISACA)
• ITIL Service Mgr (BCS)
• Prince2 (BCS)
• Board Effectiveness (GUBERNA)
Involvement
• Member Flemish Privacy Commission
• Director at ISACA International
• Vice President ISACA Belgium
• Chairman Cloud Computing Task Force ISACA International
• Visiting lecturer at Antwerp Mgt School, Solvay Business School and other universities
http://www.linkedin.com/in/marcvael
@marcvael