SlideShare a Scribd company logo
1 of 23
Download to read offline
Michael Brophy
ISO 27001 Trends and   CEO
       Developments    Certification Europe




                                              1
2
1000
                        2000
                               3000
                                       4000
                                              5000
                                                     6000
                                                            7000
                                                                   8000




                                                                                                                  Global take-up of ISO 27001
             0
    Apr-99
    Jan-02
    Jan-04




                                                                          Total No. of ISO 27001 Certifications
    Dec-04
    Nov-05
    Jan-06
    Oct-06
    Jan-07
    Feb-07
    Mar-07
    Apr-07
    Aug-07
    Oct-07
    Dec-07
    Aug-08
    Dec-08
    Sep-09
    Nov-09
    Dec-09
    Dec-11
                               Total
3
Top Ten Countries with ISO 27001
                  Certificates
4500
4000
3500
3000
2500
2000
1500
1000
500
  0




                                   4
Which sectors are prominent?
                IT & IT Services (Security)

                    Financial Services

           Government & Semi-State (extensive)

                        Telecoms

                         Printing

                        Software

                       Consultancy

                       Healthcare

               Online Gambling & Betting *

                     Infrastructure *

                                                 5
Why are organisations getting
certified?


   • First mover advantage still a factor, but not in the
     ten major categories
   • Tendering requirements
   • Supply chain pressure
   • In some sectors it is virtually a market requirement
     (E.g. hosting and datacentres)




                                                            6
Why are organisations getting
certified?
  What Standards or Guidelines have your customers required
  you to comply with?


                                                                                  41%
       A recognised standard like ISO 27001
                                                                              31%
                                                                                        Large Organisations
                                                                            37%         Small Organisations
            Government related requirements
                                                                      26%


                                                                             30%
                   PCI (payment Card Industry)
                                                                    16%


                                                               6%
                                                 Other
                                                               6%


                                                                              32%
              Not aware of any such demands
                                                                                  38%




Source: PWC Information Security Breaches Survey 2010 fig 15                                                  7
8
Recent Trends (1)


  • High Profile Data Breaches




                                 9
Recent Trends (1)


  • High Profile Data Breaches




                                 10
Recent Trends (2)

     • Supply Chain Pressure



Security Policy Guidelines (Telefónica O2 UK only)
O2 attaches particular importance to the security of its own, its
employees’ and its customers’ data.
The reference standard for O2’s security policies is ISO27001 and the
suppliers shall comply with the principles of that standard at all times.




                                                                            11
Recent Trends (3)

  • Major incidents




                      12
Recent Trends (3)

  • Major incidents




                      13
Recent Trends (3)

   • Major incidents


Office of the Australian Information Commissioner:
“noted that the company had a wide range of security
safeguards in place for the protection of personal
information including physical, network,
communications security and maintained security
standards… ISO 27001”


                                                   14
15
What is coming down the line (1)


     • Expect to see ISO 27001 (& BS 25999)
       featuring in many more tendering
       requirements
     • Particularly when IT services are
       outsourced




                                              16
What is coming down the line (2)



     • ISO 27001 used as a basis to address
       the risks associated with Cloud
       Computing




                                              17
What is coming down the line (3)



     • Increasing reliance being placed upon
       ISO 27001 by regulatory bodies




                                               18
What is coming down the line (3)




         • APACS & Standard 55




                                   19
What is coming down the line (3)
       • "Outsourcing requires not only a
         written contract but also active
         measures to ensure data is secure in
         the “cloud”. If a cloud provider has
         taken the trouble to certify to
         recognised security standards such as
         ISO 27001… this provides significant
         reassurance about data security."


Irish Data Protection Commissioner Annual Report 2010



                                                        20
What is coming down the line (3)


     • Financial Services Authority (UK)
     • "FSA Handbook" in SYSC 3A.7.8 that
       "firms should have regard to
       established security standards such as
       ISO17799 (Information Security
       Management)."




                                                21
What is coming down the line (3)




     • In essence evolving to become a key
       tool in overall risk management as
       opposed to an isolated activity




                                             22
Thank you



      mbrophy@certificationeurope.com



   www.certificationeurope.com



                                        23

More Related Content

What's hot

University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012
Hakem Filiz
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
AHM Pervej Kabir
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information Security
Ana Meskovska
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
pgpmikey
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
Prajwal Panchmahalkar
 
Mr. ahmed obaid the ceo guide to implement iso 27001
Mr. ahmed obaid   the ceo guide to implement iso 27001Mr. ahmed obaid   the ceo guide to implement iso 27001
Mr. ahmed obaid the ceo guide to implement iso 27001
qualitysummit
 

What's hot (20)

ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and Challenges
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
4 System For Information Security
4 System For Information Security4 System For Information Security
4 System For Information Security
 
Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002Implementing a Security Framework based on ISO/IEC 27002
Implementing a Security Framework based on ISO/IEC 27002
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
Mr. ahmed obaid the ceo guide to implement iso 27001
Mr. ahmed obaid   the ceo guide to implement iso 27001Mr. ahmed obaid   the ceo guide to implement iso 27001
Mr. ahmed obaid the ceo guide to implement iso 27001
 

Similar to ISO 27001 Information Security Management Systems Trends and Developments

Ai Investor Presentation July 2007
Ai Investor Presentation July 2007Ai Investor Presentation July 2007
Ai Investor Presentation July 2007
Teguh Prasetya
 
201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks
Francisco Calzado
 
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
Matthieu DEMOOR
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
PECB
 
Citigroup 19th Annual Global Industrial Manufacturing Conference
Citigroup 19th Annual Global Industrial Manufacturing ConferenceCitigroup 19th Annual Global Industrial Manufacturing Conference
Citigroup 19th Annual Global Industrial Manufacturing Conference
finance10
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
Cyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdfCyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdf
toncik
 

Similar to ISO 27001 Information Security Management Systems Trends and Developments (20)

Ai Investor Presentation July 2007
Ai Investor Presentation July 2007Ai Investor Presentation July 2007
Ai Investor Presentation July 2007
 
201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks
 
2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf2022 Webinar - ISO 27001 Certification.pdf
2022 Webinar - ISO 27001 Certification.pdf
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to Many
 
Negotiating the Next Service Level Agreement
Negotiating the Next Service Level AgreementNegotiating the Next Service Level Agreement
Negotiating the Next Service Level Agreement
 
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
The Road to ISO 20K Certification - ITSMF Ottawa Conference March 2014
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
 
GRC2-KSA.ppt
GRC2-KSA.pptGRC2-KSA.ppt
GRC2-KSA.ppt
 
I Forum GSTI - David Bathiely
I Forum GSTI - David BathielyI Forum GSTI - David Bathiely
I Forum GSTI - David Bathiely
 
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27032: How do they map?
 
Cisco Case Analysis
Cisco Case AnalysisCisco Case Analysis
Cisco Case Analysis
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Citigroup 19th Annual Global Industrial Manufacturing Conference
Citigroup 19th Annual Global Industrial Manufacturing ConferenceCitigroup 19th Annual Global Industrial Manufacturing Conference
Citigroup 19th Annual Global Industrial Manufacturing Conference
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
 
SU Student Investment Fund - Fall 2010
SU Student Investment Fund - Fall 2010SU Student Investment Fund - Fall 2010
SU Student Investment Fund - Fall 2010
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Juniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press ConferenceJuniper "New Network" Launch Press Conference
Juniper "New Network" Launch Press Conference
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
Cyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdfCyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdf
 
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

ISO 27001 Information Security Management Systems Trends and Developments

  • 1. Michael Brophy ISO 27001 Trends and CEO Developments Certification Europe 1
  • 2. 2
  • 3. 1000 2000 3000 4000 5000 6000 7000 8000 Global take-up of ISO 27001 0 Apr-99 Jan-02 Jan-04 Total No. of ISO 27001 Certifications Dec-04 Nov-05 Jan-06 Oct-06 Jan-07 Feb-07 Mar-07 Apr-07 Aug-07 Oct-07 Dec-07 Aug-08 Dec-08 Sep-09 Nov-09 Dec-09 Dec-11 Total 3
  • 4. Top Ten Countries with ISO 27001 Certificates 4500 4000 3500 3000 2500 2000 1500 1000 500 0 4
  • 5. Which sectors are prominent? IT & IT Services (Security) Financial Services Government & Semi-State (extensive) Telecoms Printing Software Consultancy Healthcare Online Gambling & Betting * Infrastructure * 5
  • 6. Why are organisations getting certified? • First mover advantage still a factor, but not in the ten major categories • Tendering requirements • Supply chain pressure • In some sectors it is virtually a market requirement (E.g. hosting and datacentres) 6
  • 7. Why are organisations getting certified? What Standards or Guidelines have your customers required you to comply with? 41% A recognised standard like ISO 27001 31% Large Organisations 37% Small Organisations Government related requirements 26% 30% PCI (payment Card Industry) 16% 6% Other 6% 32% Not aware of any such demands 38% Source: PWC Information Security Breaches Survey 2010 fig 15 7
  • 8. 8
  • 9. Recent Trends (1) • High Profile Data Breaches 9
  • 10. Recent Trends (1) • High Profile Data Breaches 10
  • 11. Recent Trends (2) • Supply Chain Pressure Security Policy Guidelines (Telefónica O2 UK only) O2 attaches particular importance to the security of its own, its employees’ and its customers’ data. The reference standard for O2’s security policies is ISO27001 and the suppliers shall comply with the principles of that standard at all times. 11
  • 12. Recent Trends (3) • Major incidents 12
  • 13. Recent Trends (3) • Major incidents 13
  • 14. Recent Trends (3) • Major incidents Office of the Australian Information Commissioner: “noted that the company had a wide range of security safeguards in place for the protection of personal information including physical, network, communications security and maintained security standards… ISO 27001” 14
  • 15. 15
  • 16. What is coming down the line (1) • Expect to see ISO 27001 (& BS 25999) featuring in many more tendering requirements • Particularly when IT services are outsourced 16
  • 17. What is coming down the line (2) • ISO 27001 used as a basis to address the risks associated with Cloud Computing 17
  • 18. What is coming down the line (3) • Increasing reliance being placed upon ISO 27001 by regulatory bodies 18
  • 19. What is coming down the line (3) • APACS & Standard 55 19
  • 20. What is coming down the line (3) • "Outsourcing requires not only a written contract but also active measures to ensure data is secure in the “cloud”. If a cloud provider has taken the trouble to certify to recognised security standards such as ISO 27001… this provides significant reassurance about data security." Irish Data Protection Commissioner Annual Report 2010 20
  • 21. What is coming down the line (3) • Financial Services Authority (UK) • "FSA Handbook" in SYSC 3A.7.8 that "firms should have regard to established security standards such as ISO17799 (Information Security Management)." 21
  • 22. What is coming down the line (3) • In essence evolving to become a key tool in overall risk management as opposed to an isolated activity 22
  • 23. Thank you mbrophy@certificationeurope.com www.certificationeurope.com 23