Professional Documents
Culture Documents
Contractual Requirements
Defining Security Policies for different security components. Identifying vulnerabilities and the risks Alerts and counter measure for potential threats. Log & Event Analysis. Pattern Monitoring and Intrusion trend Analysis Implementation of patches & upgrades Update of latest signatures for IDS and Anti-virus Incident Management Periodic audits Review organizations security policy Prepare activity list as per the organization security policy Monitor and review the implementation of policies. Incident Management Suggesting corrective and preventive measures Presentation to the steering committee Identify improvements in the ISMS and implement recommendations
Thank You !!