www.slideshare.net
Open in
urlscan Pro
151.101.2.152
Public Scan
URL:
https://www.slideshare.net/AndreyProzorov/iso-270052022-overview-221028pdf
Submission: On October 04 via manual from US — Scanned from US
Submission: On October 04 via manual from US — Scanned from US
Form analysis
1 forms found in the DOMGET /search
<form class="SearchForm_form__KLQKV" method="get" action="/search" data-testid="search-form">
<div class="input-box"><input type="hidden" name="searchfrom" value="header"><input type="text" id="nav-search-query" aria-label="Search SlideShare" placeholder="Search" name="q" autocomplete="off" value=""><button type="submit"
class="SearchForm_submit__YjszT" id="search-submit"><svg class="" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24" height="24" fill="#868dab66">
<path d="M21.71,20.29,18,16.61A9,9,0,1,0,16.61,18l3.68,3.68a1,1,0,0,0,1.42,0A1,1,0,0,0,21.71,20.29ZM11,18a7,7,0,1,1,7-7A7,7,0,0,1,11,18Z"></path>
</svg><span class="VisuallyHidden_root__hD4yb">Submit Search</span></button></div>
</form>
Text Content
SlideShare a Scribd company logo Submit Search UploadLoginSignup ISO 27005:2022 OVERVIEW 221028.PDF Report Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001Follow Cybersecurity and Privacy Expert at RAOS Project Oy Oct. 29, 2022•4 likes•7,352 views Ad Go ad-free on SlideShare 1 of 33 2 ISO 27005:2022 OVERVIEW 221028.PDF Oct. 29, 2022•4 likes•7,352 views Download NowDownload to read offline Report Technology ISO 27005:2022 Overview Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001Follow Cybersecurity and Privacy Expert at RAOS Project Oy RECOMMENDED ISO 27001:2022 IntroductionAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 270014.7K views•40 slides ISO 27001_2022 What has changed 2.0 for ISACA.pdfAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 270011.3K views•58 slides ISO 27001 Awareness/TRansition.pptxDr Madhu Aman Sharma903 views•44 slides ISO 27001_2022 Standard_Presentation.pdfSerkanRafetHalil197 views•67 slides ISO 27001:2022 What has changed.pdfAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 2700112.7K views•26 slides ISO/IEC 27001:2022 – What are the changes?PECB 4.9K views•66 slides MORE RELATED CONTENT WHAT'S HOT Basic introduction to iso27001Imran Ahmed10.5K views•8 slides ISO 27001n|u - The Open Security Community29.7K views•17 slides ISO 27001 2013 isms final overviewNaresh Rao1.9K views•34 slides 27001 awareness TrainingDr Madhu Aman Sharma337 views•28 slides Information Security Management System with ISO/IEC 27000:2018Goutama Bachtiar2.4K views•90 slides ISO 27001 Certification - The Benefits and ChallengesCertification Europe5.7K views•11 slides WHAT'S HOT(20) Basic introduction to iso27001 Imran Ahmed•10.5K views ISO 27001 n|u - The Open Security Community•29.7K views ISO 27001 2013 isms final overview Naresh Rao•1.9K views 27001 awareness Training Dr Madhu Aman Sharma•337 views Information Security Management System with ISO/IEC 27000:2018 Goutama Bachtiar•2.4K views ISO 27001 Certification - The Benefits and Challenges Certification Europe•5.7K views Best Practices in Auditing ISO/IEC 27001 PECB •3.6K views ISO 27001 2002 Update Webinar.pdf ControlCase•1.5K views ISO 27001 How to accelerate the implementation.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•113 views Iso 27001 isms presentation Midhun Nirmal•17K views ISO 27001 - Information Security Management System Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master•11.5K views ISO 27001:2013 Mandatory documents and records Manoj Vakekattil•3K views Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra... PECB •2.6K views ISO 27001 - IMPLEMENTATION CONSULTING Arul Nambi•873 views ISO 27001 - Information security user awareness training presentation - part 3 Tanmay Shinde•24.8K views Project plan for ISO 27001 technakama•4.4K views ISO 27001:2013 Implementation procedure Uppala Anand•20K views 2022 Webinar - ISO 27001 Certification.pdf ControlCase•1.1K views Supply management 1.1.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•3.7K views ISO Survey 2021: ISO 27001.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•2.9K views SIMILAR TO ISO 27005:2022 OVERVIEW 221028.PDF ISO 27005 - Digital Trust FrameworkMaganathin Veeraragaloo255 views•62 slides CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowPECB 2.2K views•14 slides 20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy127 views•57 slides PECB Webinar: Risk-management in IT intensive SMEsPECB 1.1K views•23 slides Iso 27001 awarenessÃsħâr Ãâlâm1.3K views•20 slides 2023 ITM Short Course - Week 1.pdfDorcusSitali7 views•29 slides SIMILAR TO ISO 27005:2022 OVERVIEW 221028.PDF(20) ISO 27005 - Digital Trust Framework Maganathin Veeraragaloo•255 views CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know PECB •2.2K views 20CS024 Ethics in Information Technology Kathirvel Ayyaswamy•127 views PECB Webinar: Risk-management in IT intensive SMEs PECB •1.1K views Iso 27001 awareness Ãsħâr Ãâlâm•1.3K views 2023 ITM Short Course - Week 1.pdf DorcusSitali•7 views ISO/IEC 27001:2013 An Overview Ahmed Riad .•40K views Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001 PECB •2.8K views ISO/IEC 27001 as a Starting Point for GRC PECB •2.4K views Master thesis defence Shu Pei Oei MIPLM•384 views INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx bagotjesusa•4 views INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx MargenePurnell14•8 views CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t... Cohesive Networks•1.2K views Whitepaper iso 27001_isms | All about ISO 27001 Chandan Singh Ghodela•97 views Iso iec 27001 foundation training course by interprom Mart Rovers•383 views 12 Best Privacy Frameworks Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•22 views Planning for-and implementing ISO 27001 Yerlin Sturdivant•952 views 20220911-ISO27000-SecurityStandards.pptx Suman Garai•18 views Iso 27001 certification ramya119•180 views Visió holística de la gestio de riscos de les TIC CSUC - Consorci de Serveis Universitaris de Catalunya•1K views SLIDESHOWS FOR YOU Personal Branding Presentationchrisgambino59.5K views•27 slides RACI MatrixAnand Subramaniam46.6K views•10 slides 24 Time Management Hacks to Develop for Increased ProductivityIulian Olariu1.9M views•26 slides Problem SolvingAtiqul Haq Mazumder3.5K views•74 slides PROBLEM SOLVING POWERPOINT Andrew Schwartz282.3K views•13 slides Critical thinking skills pptTauqeer Abbas18.3K views•18 slides SLIDESHOWS FOR YOU(20) Personal Branding Presentation chrisgambino•59.5K views RACI Matrix Anand Subramaniam•46.6K views 24 Time Management Hacks to Develop for Increased Productivity Iulian Olariu•1.9M views Problem Solving Atiqul Haq Mazumder•3.5K views PROBLEM SOLVING POWERPOINT Andrew Schwartz•282.3K views Critical thinking skills ppt Tauqeer Abbas•18.3K views Customer Research & Persona Development William Evans•11.6K views Inspired Storytelling: Engaging People & Moving Them To Action Kelsey Ruger•70.9K views An example of a successful proof of concept ETLSolutions•145.2K views The Future Series by Academy Xi Charbel Zeaiter•375.4K views 5 Tips for Presenting to Executives speakingppt•196.7K views GO BRAND YOURSELF. How to land a job with personal branding in 5 steps Lorenzo Galbiati•196.2K views The Future Of Work & The Work Of The Future Arturo Pelayo•442.5K views Kt Intro Master V7 TedLemmers•4.1K views Voice of Customer Planning Guide Kampyle•6.4K views Happier Teams Through Tools Laura Frank Tacho•55.5K views The Build Trap Melissa Perri•565.3K views 20 Presentation Secrets You Won't Find Elsewhere NFN Labs•98.7K views Data Design: Where Math and Art Collide Trina Chiasson•90K views Build vs Buy Strategy Chris Halton•24.2K views MORE FROM ANDREY PROZOROV, CISM, CIPP/E, CDPSE. LA 27001 ISO Survey 2022: ISO 27001 certificates (ISMS)Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001146 views•10 slides Cybersecurity Frameworks for DMZCON23 230905.pdfAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001283 views•22 slides My 15 Years of Experience in Using Mind Maps for Business and Personal PurposesAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001335 views•22 slides From NIST CSF 1.1 to 2.0.pdfAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001320 views•22 slides ISO 27001 How to use the ISMS Implementation Toolkit.pdfAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001101 views•60 slides How to use ChatGPT for an ISMS implementation.pdfAndrey Prozorov, CISM, CIPP/E, CDPSE. LA 270011.1K views•32 slides MORE FROM ANDREY PROZOROV, CISM, CIPP/E, CDPSE. LA 27001(20) ISO Survey 2022: ISO 27001 certificates (ISMS) Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•146 views Cybersecurity Frameworks for DMZCON23 230905.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•283 views My 15 Years of Experience in Using Mind Maps for Business and Personal Purposes Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•335 views From NIST CSF 1.1 to 2.0.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•320 views ISO 27001 How to use the ISMS Implementation Toolkit.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•101 views How to use ChatGPT for an ISMS implementation.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•1.1K views pr Privacy Principles 230405 small.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•14 views All about a DPIA by Andrey Prozorov 2.0, 220518.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•498 views Employee Monitoring and Privacy.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•278 views GDPR RACI.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•756 views GDPR and Personal Data Transfers 1.1.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•178 views GDPR and Security.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•506 views GDPR EU Institutions and bodies.pdf Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•257 views Data protection RU vs EU Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•17.7K views IS Awareness in practice, isaca moscow 2019 10 Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•5K views Про работу на Западе (Прозоров) Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•6.2K views About TM for CISO (rus) Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•5.4K views IAPP certification programs overview Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•10.2K views The security rules for protecting EU classified information Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•12.4K views GDPR and information security (ru) Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001•1.1K views RECENTLY UPLOADED GDSC INFO SESSION 2023.pdfMustabshira14 views•24 slides RemeOs science and clinical data 20230926_PViv2 (4).pptxPetrusViitanen186 views•14 slides CamundaCon NYC 2023 Keynote - Shifting into overdrive with process orchestrationBernd Ruecker76 views•63 slides THRIVING IN THE GEN AI ERA: NAVIGATING CHANGE IN TECHSteve Poole10 views•44 slides Omada Pitch Decksjcobrien41 views•9 slides roomos_webinar_280923_v2.pptxThousandEyes42 views•29 slides RECENTLY UPLOADED(20) GDSC INFO SESSION 2023.pdf Mustabshira•14 views RemeOs science and clinical data 20230926_PViv2 (4).pptx PetrusViitanen1•86 views CamundaCon NYC 2023 Keynote - Shifting into overdrive with process orchestration Bernd Ruecker•76 views THRIVING IN THE GEN AI ERA: NAVIGATING CHANGE IN TECH Steve Poole•10 views Omada Pitch Deck sjcobrien•41 views roomos_webinar_280923_v2.pptx ThousandEyes•42 views Webinar : L&H Insurance in the 21st Century: Navigating Antimicrobial Resista... The Digital Insurer•25 views Product Research Presentation DeahJadeArellano•42 views Brisbane MuleSoft Meetup 13 MuleSoft Maven and Managing Dependencies Part 1.pptx BrianFraser29•26 views GDSC ZHCET Google Study Jams 23.pdf AbhishekSingh313342•32 views Empowering City Clerks OnBoard•120 views From Project to Product - The Need for Speed Cprime•14 views Project Euler in Python Tetsuo Koyama•31 views Salesforce Miami User Group Event - 3rd Quarter SkyPlanner•45 views Connecting the Dots: Early Insights from Customer Journey Mapping with Graphs... Neo4j•9 views Cloud Native Application Development Guide – 2023 Lucy Zeniffer•10 views Dennis Wendland_The i4Trust Collaboration Programme.pptx FIWARE•19 views Edge Computing - A Future Fuel of 21st Century.pptx NidhiShingade•10 views MEANING & SCOPE of Crop science.ppt JenniferCelades•20 views Enhancing academic work using AI-Powered resources.pptx frank yeboah•20 views RELATED BOOKS Free with a 30 day trial from ScribdView All EbookISO/IEC 27001:2022: An introduction to information security and the ISMS standardSteve Watkins 5 / 5 EbookISO 27001 Controls – A guide to implementing and auditingBridget Kenyon 5 / 5 EbookISO 31000: 2018 Enterprise Risk ManagementGreg Hutchins 5 / 5 EbookGuide to effective risk management 3.0Alex Sidorenko 0 / 5 EbookISO27001/ISO27002:2013: A Pocket GuideAlan Calder 4 / 5 EbookInformation Security Risk Management for ISO27001/ISO27002Steve Watkins 4.5 / 5 EbookInformation Security Risk Management for ISO 27001/ISO 27002, third editionAlan Calder 4 / 5 EbookInformation security - Edition 2022: Risk management. Management systems. The ISO/IEC 27001:2022 standard. The ISO/IEC 27002:2022 controls.Cesare Gallotti 0 / 5 EbookISO/IEC 27701:2019: An introduction to privacy information managementAlan Shipman 4.5 / 5 EbookSecure & Simple – A Small-Business Guide to Implementing ISO 27001 On Your Own: The Plain English, Step-by-Step Handbook for Information Security PractitionersDejan Kosutic 0 / 5 EbookRisk Based Auditing: Using ISO 19011: 2018Greg Hutchins 5 / 5 EbookCompTIA CASP+ CAS-004 Exam Guide: A-Z of Advanced Cybersecurity Concepts, Mock Exams, Real-world Scenarios with Expert Tips (English Edition)Dr. Akashdeep Bhardwaj 0 / 5 EbookIntroduction to Enterprise Risk Management: A Guide to Risk Analysis and Control for Small and Medium EnterprisesN. Krishnamurthy 0 / 5 EbookSafety Risk Management for Medical DevicesBijan Elahi 5 / 5 EbookGuidelines for Risk Based Process SafetyCCPS (Center for Chemical Process Safety) 0 / 5 EbookApplication security in the ISO27001:2013 EnvironmentVinod Vasudevan 4 / 5 EbookGuidelines for Hazard Evaluation ProceduresCCPS (Center for Chemical Process Safety) 5 / 5 EbookRisk Assessment for Asset OwnersAlan Calder 4.5 / 5 EbookRisk Management and ISO 31000: A pocket guideAlan Field 0 / 5 EbookISO27001 in a Windows Environment: The best practice implementation handbook for a Microsoft Windows environmentBrian Honan 0 / 5 EbookRisk Management Applications in Pharmaceutical and Biopharmaceutical Manufacturing- 0 / 5 EbookIoannis Tsiouras - The risk management according to the standard ISO 31000Ioannis Tsiouras 3 / 5 EbookConcise Guide to CompTIA Security +alasdair gilchrist 3 / 5 EbookData Governance: Governing data for sustainable businessBenoit Aubert 0 / 5 EbookOperational Risk Management in Financial ServicesAnthony Tarantino 0 / 5 EbookThe EU Data Protection Code of Conduct for Cloud Service Providers: A guide to complianceAlan Calder 0 / 5 EbookProcess Safety and Big DataSagit Valeev 0 / 5 EbookBusiness Practical SecurityJ. Brantley Briegel CISSP CISM CHSP 0 / 5 EbookApplication Security in the ISO27001 EnvironmentVinod Vasudevan 0 / 5 EbookStatistical Monitoring of Complex Multivatiate Processes: With Applications in Industrial Process ControlUwe Kruger 0 / 5 EbookComparative Risk Assessment: Concepts, Problems and ApplicationsHolger Schütz 0 / 5 EbookInformation Security Governance: A Practical Development and Implementation ApproachKrag Brotby 0 / 5 EbookUnderstanding Cybersecurity Management in FinTech: Challenges, Strategies, and TrendsGurdip Kaur 0 / 5 EbookA Practical Field Guide for ISO 14001:2015Erik V. Myhrberg 0 / 5 EbookFinancial Analysis and Risk Management: Data Governance, Analytics and Life Cycle Management- 0 / 5 EbookOperational Risk Management: A Practical Approach to Intelligent Data Analysis- 0 / 5 EbookRisk Management: Lever for SME Development and Stakeholder Value Creation- 0 / 5 EbookSystem Safety for the 21st Century: The Updated and Revised Edition of System Safety 2000Richard A. Stephans 0 / 5 EbookSafe and Reliable Plant Operations: Operations Management for Hazardous FacilitiesDietrich Roeben 0 / 5 EbookRisk Modeling for Appraising Named Peril Index Insurance Products: A Guide for PractitionersShadreck Mapfumo 0 / 5 RELATED AUDIOBOOKS Free with a 30 day trial from ScribdView All AudiobookThe Risk of Trading: Mastering the Most Important Element in Financial SpeculationMichael Toma 4.5 / 5 Audiobook(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th EditionMike Chapple 4 / 5 AudiobookISO 9001:2015: A Pocket GuideSteve Watkins 4.5 / 5 AudiobookProject Management for Small Projects, Third EditionSandra F. Rowe 5 / 5 AudiobookBig Data: A Complete Guide to the Basic Concepts in Data Science, Cyber Security, Analytics and MetricsHans Weber 4 / 5 AudiobookPRINCE2 in Action: Project management in real termsSusan Tuttle 4.5 / 5 AudiobookThe Essentials of Risk Management: Second EditionMichel Crouhy 2.5 / 5 AudiobookCISSP All-in-One Exam Guide, Ninth EditionFernando Maymi 0 / 5 AudiobookNine Steps to Success: An ISO27001:2013 Implementation OverviewAlan Calder 5 / 5 AudiobookISO 14001 Step by Step: A practical guide - Second editionNaeem Sadiq 0 / 5 AudiobookISO27001/ISO27002:2013: A Pocket GuideAlan Calder 4.5 / 5 AudiobookPractical Project Risk Management, Third Edition: The ATOM MethodologyDavid Hillson 5 / 5 AudiobookKey Performance Indicators (KPI): Developing, Implementing, and Using Winning KPIsDavid Parmenter 3.5 / 5 AudiobookThe CISO Evolution: Business Knowledge for Cybersecurity ExecutivesMatthew K. Sharp 5 / 5 AudiobookWhat's Your Digital Business Model?: Six Questions to Help You Build the Next-Generation EnterprisePeter Weill 4.5 / 5 AudiobookAlice and Bob Learn Application Security- 5 / 5 AudiobookAn Introduction to Information Security and ISO27001:2013: A Pocket GuideSteve Watkins 5 / 5 AudiobookTransformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure BehaviorsPerry Carpenter 5 / 5 AudiobookCyber Essentials: A Pocket GuideAlan Calder 5 / 5 AudiobookISO 22301: 2019 - An introduction to a business continuity management system (BCMS)Alan Calder 0 / 5 AudiobookISO/IEC 27701:2019: An introduction to privacy information managementAlan Shipman 0 / 5 AudiobookThe Psychology of Information Security: Resolving conflicts between security compliance and human behaviourLeron Zinatullin 4.5 / 5 AudiobookIntroduction to Risk AnalysisIntrobooks Team 4 / 5 AudiobookChanging the Game: The Playbook for Leading Business TransformationGraham Christie 5 / 5 AudiobookManaging Your Nonprofit for Resilience: Use Lean Risk Management To Improve Performance and Increase Employee EngagementTed Bilich 0 / 5 AudiobookCyber Security: Essential principles to secure your organisationAlan Calder 0 / 5 AudiobookHow to Measure Anything in Cybersecurity Risk, 2nd EditionDouglas W. Hubbard 0 / 5 AudiobookISO22301: A Pocket GuideTony Drewitt 4.5 / 5 AudiobookIT-Driven Business Models: Global Case Studies in TransformationJohn M. Jordan 0 / 5 AudiobookZero Harm: How to Achieve Patient and Workforce Safety in HealthcareCraig Clapper 5 / 5 AudiobookISO/IEC 38500: A pocket guide, second editionAlan Calder 5 / 5 AudiobookHow Cyber Security Can Protect Your Business - A guide for all stakeholdersChristopher Wright 0 / 5 AudiobookISO 50001: A strategic guide to establishing an energy management systemAlan Field 0 / 5 AudiobookStart-Up Secure: Baking Cybersecurity into Your Company from Founding to ExitChris Castaldo 0 / 5 AudiobookSIAM/MSI: An Introduction to Service Integration and Management/ Multi-Sourcing Integration for IT Service ManagementDavid Clifford 5 / 5 AudiobookThe New Normal in IT: How the Global Pandemic Changed Information Technology ForeverGregory S. Smith 0 / 5 AudiobookProject Decisions, 2nd Edition: The Art and ScienceLev Virine 0 / 5 AudiobookGlobal Business Ethics: Responsible Decision Making in an International ContextRonald D. Francis 0 / 5 AudiobookThe Cybersecurity Maturity Model Certification (CMMC) – A pocket guideWilliam Gamble 0 / 5 ISO 27005:2022 OVERVIEW 221028.PDF * 1. ISO 27005:2022 Overview by Andrey Prozorov, CISM, CIPP/E, CDPSE, LA 27001 www.patreon.com/AndreyProzorov 1.0, 28.10.2022 * 2. Agenda 2 1. Purchasing 2. Life cycle 3. New Name 4. Main changes 5. Abstract 6. Number of pages 7. Contents 8. Introduction 9. 1. Scope 10. 3. Terms and definitions 11. 4. Structure of this document 12. 5. IS risk management 13. 6 Context establishment 14. 7. Information security risk assessment process 15. Approaches to perform risk identification 16. 8. Information security risk treatment process 17. 9. Operations 18. 10. Leveraging related ISMS processes 19. Annexes 20. Annexes. Tables 21. New examples of typical threats 22. New risk sources 23. Qualitative approach (new matrix and scales) 24. Quantitative approach (examples), 2022 25. Annexes. New figures 26. Conclusion * 3. 3 www.iso.org/standard/80585.html ≈180 Euro * 4. Life cycle 4 * 5. New Name 5 ISO/IEC 27005:2018 ISO/IEC 27005:2022 Information technology — Security techniques — Information security risk management Information security, cybersecurity and privacy protection — Guidance on managing information security risks * 6. Main changes 1. All guidance text has been aligned with ISO/IEC 27001:2022, and ISO 31000:2018 2. The terminology has been aligned with the terminology in ISO 31000:2018 3. The structure of the clauses has been adjusted to the layout of ISO/IEC 27001:2022 4. Risk scenario concepts have been introduced 5. The event-based approach is contrasted with the asset-based approach to risk identification 6. The content of the annexes has been revised and restructured into a single annex. + More examples and models * 7. Abstract 7 ISO/IEC 27005:2018 ISO/IEC 27005:2022 This document provides guidelines for information security risk management. This document supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of this document. This document is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that can compromise the organization's information security. This document provides guidance to assist organizations to: • fulfil the requirements of ISO/IEC 27001 concerning actions to address information security risks; • perform information security risk management activities, specifically information security risk assessment and treatment. This document is applicable to all organizations, regardless of type, size or sector. * 8. Number of pages 8 ISO/IEC 27005:2018 ISO/IEC 27005:2022 56 62 * 9. Contents 9 ISO/IEC 27005:2018 ISO/IEC 27005:2022 Foreword Introduction 1. Scope 2. Normative references 3. Terms and definitions 4. Structure of this document 5. Background 6. Overview of the information security risk management process 7. Context establishment 8. Information security risk assessment 9. Information security risk treatment 10. Information security risk acceptance 11. Information security risk communication and consultation 12. Information security risk monitoring and review Annex A. Defining the scope and boundaries of the information security risk management process Annex B. Identification and valuation of assets and impact assessment Annex C. Examples of typical threats Annex D. Vulnerabilities and methods for vulnerability assessment Annex E. Information security risk assessment approaches Annex F. Constraints for risk modification Bibliography Foreword Introduction 1. Scope 2. Normative references 3. Terms and definitions 4. Structure of this document 5. Information security risk management 6. Context establishment 7. Information security risk assessment process 8. Information security risk treatment process 9. Operation 10. Leveraging related ISMS processes Annex A. (informative) Examples of techniques in support of the risk assessment process Bibliography * 10. Introduction This document provides guidance on: • implementation of the information security risk requirements specified in ISO/IEC 27001; • essential references within the standards developed by ISO/IEC JTC 1/SC 27 to support information security risk management activities; • actions that address risks related to information security (see ISO/IEC 27001:2022, 6.1 and Clause 8); • implementation of risk management guidance in ISO 31000 in the context of information security. This document contains detailed guidance on risk management and supplements the guidance in ISO/IEC 27003. This document is intended to be used by: • organizations that intend to establish and implement an information security management system (ISMS) in accordance with ISO/IEC 27001; • persons that perform or are involved in information security risk management (e.g. ISMS professionals, risk owners and other interested parties); • organizations that intend to improve their information security risk management process. 10 * 11. 1. Scope 11 ISO/IEC 27005:2018 ISO/IEC 27005:2022 This document supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/ IEC 27002 is important for a complete understanding of this document. This document is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that can compromise the organization’s information security. This document provides guidance to assist organizations to: • fulfil the requirements of ISO/IEC 27001 concerning actions to address information security risks; • perform information security risk management activities, specifically information security risk assessment and treatment. This document is applicable to all organizations, regardless of type, size or sector. * 12. 3. Terms and definitions 12 ISO/IEC 27005:2018 ISO/IEC 27005:2022 N/A, just a reference to ISO 27000 and databases: • ISO Online browsing platform: www.iso.org/obp • IEC Electropedia: www.electropedia.org 3.1 Terms related to information security risk (17): external context, internal context, risk, risk scenario, risk owner, risk source, risk criteria, risk appetite, threat, vulnerability, event, information security incident, likelihood, consequence, level of risk, control, residual risk 3.2 Terms related to information security risk management (10): risk management process, risk communication and consultation, risk assessment, risk identification, risk analysis, risk evaluation, risk treatment, risk acceptance, risk sharing, risk retention ”Risk scenario - sequence or combination of events leading from the initial cause to the unwanted consequence.” * 13. 4. Structure of this document This document is structured as follows: • Clause 5: Information security risk management; • Clause 6: Context establishment; • Clause 7: Information security risk assessment process; • Clause 8: Information security risk treatment process; • Clause 9: Operation; • Clause 10: Leveraging related ISMS processes. Except for the descriptions given in general subclauses, all risk management activities as presented from Clause 7 to Clause 10 are structured as follows: • Input: Identifies any required information to perform the activity. Action: Describes the activity. • Trigger: Provides guidance on when to start the activity, for example because of a change within the organization or according to a plan or a change in the external context of the organization. • Output: Identifies any information derived after performing the activity, as well as any criteria that such output should satisfy. • Guidance: Provides guidance on performing the activity, keyword and key concept. 13 * 14. 5. IS risk management Risk management process - systematic application of management policies, procedures and practices to the activities of communicating, consulting, establishing the context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. • Classic scheme (2018) + Documented Information (2022) • Risk treatment cyclical process (2018) -> Risk treatment iterative process (2022): — formulating and selecting risk treatment options; — planning and implementing risk treatment; — assessing the effectiveness of that treatment; — deciding whether the remaining risk is acceptable; — taking further treatment if not acceptable. • Added IS risk management cycles: strategic (overall context) and operational (scenarios) • Many changes in the activity descriptions, additional recommendations. See further… 14 * 15. 6 Context establishment 15 ISO/IEC 27005:2018, pages 5-8 ISO/IEC 27005:2022, pages 9-16 7.1 General considerations 7.2 Basic criteria • 7.2.1 Risk management approach • 7.2.2 Risk evaluation criteria • 7.2.3 Impact criteria • 7.2.4 Risk acceptance criteria 7.3 Scope and boundaries 7.4 Organization for information security risk management 6.1 Organizational considerations 6.2 Identifying basic requirements of interested parties 6.3 Applying risk assessment 6.4 Establishing and maintaining information security risk criteria • 6.4.1 General • 6.4.2 Risk acceptance criteria • 6.4.3 Criteria for performing information security risk assessments • 6.4.3.1 General • 6.4.3.2 Consequence criteria • 6.4.3.3 Likelihood criteria • 6.4.3.4 Criteria for determining the level of risk 6.5 Choosing an appropriate method * 16. 7. Information security risk assessment process 16 ISO/IEC 27005:2018, pages 8-16 ISO/IEC 27005:2022, pages 16-23 8.1 General description of information security risk assessment • 8.2 Risk identification 8.2.1 Introduction to risk identification • 8.2.2 Identification of assets • 8.2.3 Identification of threats • 8.2.4 Identification of existing controls • 8.2.5 Identification of vulnerabilities • 8.2.6 Identification of consequences 8.3 Risk analysis • 8.3.1 Risk analysis methodologies • 8.3.2 Assessment of consequences • 8.3.3 Assessment of incident likelihood • 8.3.4 Level of risk determination 8.4 Risk evaluation 7.1 General 7.2 Identifying information security risks • 7.2.1 Identifying and describing information security risks • 7.2.2 Identifying risk owners 7.3 Analysing information security risks • 7.3.1 General • 7.3.2 Assessing potential consequences • 7.3.3 Assessing likelihood • 7.3.4 Determining the levels of risk 7.4 Evaluating the information security risks • 7.4.1 Comparing the results of risk analysis with the risk criteria • 7.4.2 Prioritizing the analysed risks for risk treatment * 17. 17 * 18. Approaches to perform risk identification 18 Event-based (scenarios) Asset-based Identify strategic scenarios through a consideration of risk sources, and how they use or impact interested parties to reach those risk’s desired objective. Identify operational scenarios, which are detailed in terms of assets, threats and vulnerabilities. The underlying concept is that risks can be identified and assessed through an evaluation of events and consequences. The underlying concept is that risks can be identified and assessed through an inspection of assets, threats and vulnerabilities. • An event-based approach can establish high level or strategic scenarios without spending a considerable amount of time in identification of assets on a detailed level. • This allows the organization to focus its risk treatment efforts on the critical risks. • Interviews with top management • Top-down • An asset is anything that has value to the organization and therefore requires protection. • If all valid combinations of assets, threats and vulnerabilities can be enumerated within the scope of the ISMS, then, in theory, all the risks would be identified. • The asset-based approach can identify asset- specific threats and vulnerabilities and allows the organization to determine specific risk treatment on a detailed level. • Bottom-up * 19. 8. Information security risk treatment process 19 ISO/IEC 27005:2018, pages 16-20 ISO/IEC 27005:2022, pages 23-30 9.1 General description of risk treatment 9.2 Risk modification 9.3 Risk retention 9.4 Risk avoidance 9.5 Risk sharing 10 Information security risk acceptance 8.1 General 8.2 Selecting appropriate information security risk treatment options 8.3 Determining all controls that are necessary to implement the information security risk treatment options 8.4 Comparing the controls determined with those in ISO/IEC 27001:2022, Annex A 8.5 Producing a Statement of Applicability 8.6 Information security risk treatment plan 8.6.1 Formulation of the risk treatment plan 8.6.2 Approval by risk owners 8.6.3 Acceptance of the residual information security risks * 20. 20 * 21. 9. Operations, page 31 21 9.1 Performing information security risk assessment process 9.2 Performing information security risk treatment process Input: Documents about the information security risk assessment process including risk assessment and risk acceptance criteria. Action: The risk assessment process should be performed in accordance with Clause 7. Trigger: The need of the organization to assess risks, at planned intervals or based on events. Output: Evaluated risks. Implementation guidance: … Input: Evaluated risk(s). Action: The risk treatment process should be performed in accordance with Clause 8. Trigger: The need of the organization to treat risks, at planned intervals or based on events. Output: Retained or accepted residual risks. Implementation guidance: … * 22. 10. Leveraging related ISMS processes, pages 32-40 22 ISMS Actions 10.1 Context of the organization All relevant data should be considered to identify and describe internal and external issues influencing information security risk management and requirements of interested parties. 10.2 Leadership and commitment Appropriate level of management should consider results related to information security risks, to decide on or endorse further actions. 10.3 Communication and consultation Information on risks, their causes, consequences, their likelihood and the controls being taken to treat them should be communicated to, or obtained from, the external and internal interested parties. 10.4 Documented information Information about the information security risk assessment and treatment processes and results should be documented and retained. 10.5 Monitoring and review Risks and their factors (i.e. value of assets, consequences, threats, vulnerabilities, likelihood of occurrence) should be monitored and reviewed to identify any changes in the context of the organization at an early stage, and to maintain an overview of the complete risk picture. 10.6 Management review The results of information security risk assessment and status of the information security risk treatment plan should be reviewed to confirm that residual risks meet risk acceptance criteria, and that the risk treatment plan addresses all relevant risks and their risk treatment options. 10.7 Corrective action Revise the risk treatment plan and implement it to modify the residual risk to an acceptable level. 10.8 Continual improvement The information security risk management process should be continually monitored, reviewed and improved as necessary. +Inputs/Outputs, Triggers, Implementation guidance * 23. Annexes 23 ISO/IEC 27005:2018, pages 24-52 ISO/IEC 27005:2022, pages 41-61 Annex A. Defining the scope and boundaries of the information security risk management process • A.1 Study of the organization • A.2 List of the constraints affecting the organization • A.3 List of the constraints affecting the scope Annex B. Identification and valuation of assets and impact assessment • B.1 Examples of asset identification (primary and supporting) • B.2 Asset valuation • B.3 Impact assessment Annex C. Examples of typical threats (+ Origin of threat) Annex D. Vulnerabilities and methods for vulnerability assessment • D.1 Examples of vulnerabilities • D.2 Methods for assessment of technical vulnerabilities Annex E. Information security risk assessment approaches • E.1 High-level information security risk assessment • E.2 Detailed information security risk assessment Annex F. Constraints for risk modification Annex A. (informative) Examples of techniques in support of the risk assessment process A.1 Information security risk criteria • A.1.1 Criteria related to risk assessment • A.1.2 Risk acceptance criteria A.2 Practical techniques • A.2.1 Information security risk components • A.2.2 Assets • A.2.3 Risk sources and desired end state • A.2.4 Event-based approach • A.2.5 Asset-based approach • A.2.6 Examples of scenarios applicable in both approaches • A.2.7 Monitoring risk-related events * 24. Annexes. Tables 24 ISO/IEC 27005:2018 ISO/IEC 27005:2022 Examples of typical threats Origin of threats Examples of typical vulnerabilities Table E.1 — The asset values, and the threat and vulnerability levels Table E.2 — Results from the consideration of the likelihood of an incident scenario, mapped against the estimated business impact Table E.3 — The factors of consequences (asset value) and likelihood of threat occurrence (taking account of vulnerability aspects) Table E.3 — Combination of the likelihood of the threat occurring and the ease of exploitation of the vulnerability Table E.4 — The intersection of asset value and likelihood value Table A.1 — Example of consequence scale Table A.2 — Example of likelihood scale Table A.3 — Example of qualitative approach to risk criteria Table A.4 — Example logarithmic likelihood scale Table A.5 — Example logarithmic consequence scale Table A.6 — Example of evaluation scale combined with three-colour risk matrix Table A.7 — Examples and usual methods of attack Table A.8 — Example classification of motivations to express the DES Table A.9 — Examples of target objectives Table A.10 — Examples of typical threats Table A.11 — Examples of typical vulnerabilities Table A.12 — Examples of risk scenarios in both approaches Table A.13 — Example of risk scenario and monitoring risk- related events relationship * 25. New examples of typical threats 25 ISO/IEC 27005:2018 ISO/IEC 27005:2022 1. Physical damage (6) 2. Natural events (5) 3. Loss of essential services (3) 4. Disturbance due to radiation (3) 5. Compromise of information (11) 6. Technical failures (5) 7. Unauthorized actions (5) 8. Compromise of functions (5) Total: 43 1. Physical threats (6) 2. Natural threats (6) 3. Infrastructure failures (8) 4. Technical failures (3) 5. Human actions (26) 6. Compromise of functions or services (4) 7. Organizational threats (4) Total: 56 * 26. New risk sources 26 ISO/IEC 27005:2018 ISO/IEC 27005:2022 Annex C, part of threat examples Human threat sources: 1. Hacker, cracker 2. Computer criminal 3. Terrorist 4. Industrial espionage (Intelligence, companies, foreign governments, other government interests) 5. Insiders (poorly trained, disgruntled, malicious, negligent, dishonest, or terminated employees) Table with Motivation and Possible consequences Table A.7 Examples and usual methods of attack Risk source: 1. State-related (States, Intelligence agencies) 2. Organized crime (Cybercriminal organizations (mafias, gangs, criminal outfits)) 3. Terrorist (Cyber-terrorists, cyber-militias) 4. Ideological activist (Cyber-hacktivists, interest groups, sects) 5. Specialized outfits (“Cyber-mercenary”) 6. Amateur 7. Avenger 8. Pathological attacker * 27. Qualitative approach (new matrix and scales) 27 ISO/IEC 27005:2018 ISO/IEC 27005:2022 * 28. Quantitative approach (examples), 2022 28 * 29. Annexes. New figures 29 * 30. 30 Instead of a conclusion: 1. General procedures (Assessment and Treatment) are OK, as usual. J J 2. Two approaches: asset-based and event-based (scenarios), finally J 3. «9.Operation» and «10.Leveraging related ISMS processes» are useful for the ISMS implementation. J J 4. Tables «A.10 Examples of typical threats», and «A.11 Examples of typical vulnerabilities», likelihood and consequence scales can be used for inspiration. J 5. «A.2 Practical techniques» are poorly designed and described. New figures and the examples of scenarios are useless. L L 6. ISO 27005:2022 is a very complicated standard and every new version makes it more difficult. L In my opinion, the ISACA IT Risk and IRAM2 are much more useful and practical. I recommend using them. * 31. Thanks! www.linkedin.com/in/andreyprozorov www.patreon.com/AndreyProzorov 31 * 32. Have you seen my previous presentation? 32 www.patreon.com/posts/my-presentation-73750394 * 33. My ISMS Implementation Toolkit (ISO 27001) 33 www.patreon.com/posts/47806655 AboutSupportTermsPrivacyCopyrightCookie PreferencesDo not sell or share my personal information English Current LanguageEnglish Español Portugues Français Deutsche -------------------------------------------------------------------------------- © 2023 SlideShare from Scribd × SlideShare a Scribd company logo Upload LoginSignup Favorite Share More Options Favorite Share More Options