際際滷shows by User: ShankarSubramaniyan / http://www.slideshare.net/images/logo.gif 際際滷shows by User: ShankarSubramaniyan / Fri, 18 Aug 2017 14:47:54 GMT 際際滷Share feed for 際際滷shows by User: ShankarSubramaniyan Cloud Security Governance /slideshow/cloud-security-governance-78957257/78957257 cloudsecurtygovernanceaug17-isaca-170818144754
Cloud Security Governance]]>

Cloud Security Governance]]>
Fri, 18 Aug 2017 14:47:54 GMT /slideshow/cloud-security-governance-78957257/78957257 ShankarSubramaniyan@slideshare.net(ShankarSubramaniyan) Cloud Security Governance ShankarSubramaniyan Cloud Security Governance <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudsecurtygovernanceaug17-isaca-170818144754-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cloud Security Governance
Cloud Security Governance from Shankar Subramaniyan
]]>
4659 5 https://cdn.slidesharecdn.com/ss_thumbnails/cloudsecurtygovernanceaug17-isaca-170818144754-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IT Perspectives in Implementing Privacy Framework /slideshow/it-perspectives-in-implementing-privacy-framework/78957145 privacyframeworkaug17-final-isaca-170818144400
IT Perspectives in Implementing Privacy Framework]]>

IT Perspectives in Implementing Privacy Framework]]>
Fri, 18 Aug 2017 14:44:00 GMT /slideshow/it-perspectives-in-implementing-privacy-framework/78957145 ShankarSubramaniyan@slideshare.net(ShankarSubramaniyan) IT Perspectives in Implementing Privacy Framework ShankarSubramaniyan IT Perspectives in Implementing Privacy Framework <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/privacyframeworkaug17-final-isaca-170818144400-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> IT Perspectives in Implementing Privacy Framework
IT Perspectives in Implementing Privacy Framework from Shankar Subramaniyan
]]>
566 2 https://cdn.slidesharecdn.com/ss_thumbnails/privacyframeworkaug17-final-isaca-170818144400-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ISO27001: Implementation & Certification Process Overview /slideshow/iso27001-2014-isacamay150final/38750014 iso270012014isacamay150-final-140905112039-phpapp02
ISO27001 standard was revised and a new version was published in 2013. ISO27001 is also becoming more common Information Security standard among service providers. This presentation focuses on the recent changes in 2013 version and also the process for implementing and getting certified for ISO27001. Following are the key objectives of this presentation: Provide an introduction to ISO27001 and changes in 2013 version Discuss the implementation approach for an Information Security Management System (ISMS) framework Familiarize the audience with some common challenges in implementation ]]>

ISO27001 standard was revised and a new version was published in 2013. ISO27001 is also becoming more common Information Security standard among service providers. This presentation focuses on the recent changes in 2013 version and also the process for implementing and getting certified for ISO27001. Following are the key objectives of this presentation: Provide an introduction to ISO27001 and changes in 2013 version Discuss the implementation approach for an Information Security Management System (ISMS) framework Familiarize the audience with some common challenges in implementation ]]>
Fri, 05 Sep 2014 11:20:39 GMT /slideshow/iso27001-2014-isacamay150final/38750014 ShankarSubramaniyan@slideshare.net(ShankarSubramaniyan) ISO27001: Implementation & Certification Process Overview ShankarSubramaniyan ISO27001 standard was revised and a new version was published in 2013. ISO27001 is also becoming more common Information Security standard among service providers. This presentation focuses on the recent changes in 2013 version and also the process for implementing and getting certified for ISO27001. Following are the key objectives of this presentation: Provide an introduction to ISO27001 and changes in 2013 version Discuss the implementation approach for an Information Security Management System (ISMS) framework Familiarize the audience with some common challenges in implementation <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iso270012014isacamay150-final-140905112039-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ISO27001 standard was revised and a new version was published in 2013. ISO27001 is also becoming more common Information Security standard among service providers. This presentation focuses on the recent changes in 2013 version and also the process for implementing and getting certified for ISO27001. Following are the key objectives of this presentation: Provide an introduction to ISO27001 and changes in 2013 version Discuss the implementation approach for an Information Security Management System (ISMS) framework Familiarize the audience with some common challenges in implementation
ISO27001: Implementation & Certification Process Overview from Shankar Subramaniyan
]]>
15065 8 https://cdn.slidesharecdn.com/ss_thumbnails/iso270012014isacamay150-final-140905112039-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Best Practices & Considerations in IT Suppliers Audit /slideshow/auditing-it-supplier-aug15/28935904 auditingitsupplieraug15-131205132140-phpapp02
In the current business environment, IT Suppliers have become integral part of the Customer organization and the IT environment and processes of IT Suppliers have a direct impact on the Customer Organization. Even though Operational responsibility might have got transferred to Supplier, but legal and regulatory responsibility will still be with Customer. Hence it is Customers responsibility to verify that appropriate controls are in effect to ensure that the organization fulfills its contractual obligations. This topic focuses on some of the key components and the best practices in auditing IT Suppliers for Compliance. It is aligned with one of the ISACA Research paper (Outsourced IT Environments Audit/Assurance Program) with additional information. ]]>

In the current business environment, IT Suppliers have become integral part of the Customer organization and the IT environment and processes of IT Suppliers have a direct impact on the Customer Organization. Even though Operational responsibility might have got transferred to Supplier, but legal and regulatory responsibility will still be with Customer. Hence it is Customers responsibility to verify that appropriate controls are in effect to ensure that the organization fulfills its contractual obligations. This topic focuses on some of the key components and the best practices in auditing IT Suppliers for Compliance. It is aligned with one of the ISACA Research paper (Outsourced IT Environments Audit/Assurance Program) with additional information. ]]>
Thu, 05 Dec 2013 13:21:40 GMT /slideshow/auditing-it-supplier-aug15/28935904 ShankarSubramaniyan@slideshare.net(ShankarSubramaniyan) Best Practices & Considerations in IT Suppliers Audit ShankarSubramaniyan In the current business environment, IT Suppliers have become integral part of the Customer organization and the IT environment and processes of IT Suppliers have a direct impact on the Customer Organization. Even though Operational responsibility might have got transferred to Supplier, but legal and regulatory responsibility will still be with Customer. Hence it is Customers responsibility to verify that appropriate controls are in effect to ensure that the organization fulfills its contractual obligations. This topic focuses on some of the key components and the best practices in auditing IT Suppliers for Compliance. It is aligned with one of the ISACA Research paper (Outsourced IT Environments Audit/Assurance Program) with additional information. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/auditingitsupplieraug15-131205132140-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In the current business environment, IT Suppliers have become integral part of the Customer organization and the IT environment and processes of IT Suppliers have a direct impact on the Customer Organization. Even though Operational responsibility might have got transferred to Supplier, but legal and regulatory responsibility will still be with Customer. Hence it is Customers responsibility to verify that appropriate controls are in effect to ensure that the organization fulfills its contractual obligations. This topic focuses on some of the key components and the best practices in auditing IT Suppliers for Compliance. It is aligned with one of the ISACA Research paper (Outsourced IT Environments Audit/Assurance Program) with additional information.
Best Practices & Considerations in IT Suppliers Audit from Shankar Subramaniyan
]]>
1160 4 https://cdn.slidesharecdn.com/ss_thumbnails/auditingitsupplieraug15-131205132140-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/cloudsecurtygovernanceaug17-isaca-170818144754-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cloud-security-governance-78957257/78957257 Cloud Security Governance https://cdn.slidesharecdn.com/ss_thumbnails/privacyframeworkaug17-final-isaca-170818144400-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/it-perspectives-in-implementing-privacy-framework/78957145 IT Perspectives in Imp... https://cdn.slidesharecdn.com/ss_thumbnails/iso270012014isacamay150-final-140905112039-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/iso27001-2014-isacamay150final/38750014 ISO27001: Implementati...