1. Mobility: It's time to think about application development with the mobile device as the primary client. The company's top executives and sales force would be using their mobiles as their primary way of staying in touch with the company. The customers are more likely to respond to offers made via mobile messages.
2. Social networks: This is something that is going to be the most talked about phenomenon. Communication with employees, customers and other stakeholders would be much prominent through social media.
3. Cloud and virtualization. Cloud computing and Virtualization is many a times confused with cost cutting. However, cloud computing also offers a way for companies to quickly provision technology infrastructure for startups within their own company.
4. Company's IT infrastructure. In most companies, the majority of their IT budget still goes into keeping the lights on and the servers running. Reducing those costs is where you free up capital. The new part is you have a wider range of hosted services to look at than even a year earlier
Tuesday, June 1, 2010
ISO 27001
ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for the original document, BS7799-2. It is intended to provide the foundation for third party audit, and is 'harmonized' with other management standards, such as ISO 9001 and ISO 14001.
Omnitech is in the process of acquiring this certificate.
ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following:
■use within organizations to formulate security requirements and objectives;
■use within organizations as a way to ensure that security risks are cost effectively managed;
■use within organizations to ensure compliance with laws and regulations;
■use within an organization as a process framework for the implementation and management of controls to ensure that the specific security objectives of an organization are met;
■definition of new information security management processes;
■identification and clarification of existing information security management processes;
■use by the management of organizations to determine the status of information security management activities;
■use by the internal and external auditors of organizations to determine the degree of compliance with the policies, directives and standards adopted by an organization;
■use by organizations to provide relevant information about information security policies, directives, standards and procedures to trading partners and other organizations with whom they interact for operational or commercial reasons;
■implementation of business-enabling information security;
■use by organizations to provide relevant information about information security to customers.
Omnitech is in the process of acquiring this certificate.
ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following:
■use within organizations to formulate security requirements and objectives;
■use within organizations as a way to ensure that security risks are cost effectively managed;
■use within organizations to ensure compliance with laws and regulations;
■use within an organization as a process framework for the implementation and management of controls to ensure that the specific security objectives of an organization are met;
■definition of new information security management processes;
■identification and clarification of existing information security management processes;
■use by the management of organizations to determine the status of information security management activities;
■use by the internal and external auditors of organizations to determine the degree of compliance with the policies, directives and standards adopted by an organization;
■use by organizations to provide relevant information about information security policies, directives, standards and procedures to trading partners and other organizations with whom they interact for operational or commercial reasons;
■implementation of business-enabling information security;
■use by organizations to provide relevant information about information security to customers.
Subscribe to:
Comments (Atom)