RUAG Cyber Security Information Security Management System … · you stay in control of the...

4
RUAG Cyber Security Information Security Management System

Transcript of RUAG Cyber Security Information Security Management System … · you stay in control of the...

Page 1: RUAG Cyber Security Information Security Management System … · you stay in control of the complete ISMS imple-mentation. If you need more advice or support, our experts are always

RUAG Cyber Security

Information SecurityManagement System

Page 2: RUAG Cyber Security Information Security Management System … · you stay in control of the complete ISMS imple-mentation. If you need more advice or support, our experts are always

ISMS can be so simple!ISO/IEC 27001: Stay in control while implementing your ISMS

PROVEN PROCEDURE READY-MADE CONTENTS

You do not have to reinvent the wheel. Our experts guide you safely through the implementa-tion process as mentors. On the phone, online or with you onsite. So that you can ensure a success-ful implementation. All the way to certification.

You can create all documents for the ISMS im-plementation yourself and meet all requirements with our standards-compliant content building blocks and document templates.

You determine the pace, the cost and stay in control during the complete process from A to Z. Professional, quick, based on facts, with as little consulting as possible and as much support as needed.

Simply economicalOur risk-based approach meets all ISO/IEC 27001 require-ments. You define the risks you want to minimize, based on business criteria.

Simply plannableAfter the first assessment, you know all the measures required and can reliably plan time, costs and resources.

Simply certifiableYou can customize all building blocks and templates with just a few mouse clicks. All documents and contents are ISO/IEC 27001-compliant and form the solid foundation for your certification-ready management system.

Simply understandableThe documents are structured and written so that they are easy to understand. The software maintains all content and ensures consistency across all documents.

1. ASSESSYou are looking for a solution to implement your ISMS easily and self-determined. Together, we find out where you are now, where you need to go and how much ISMS you need.

2. PLANYou plan the entire process and all measures required based on the software-supported first assess-ment and gap analysis.

3. IMPLEMENTYou implement measure by meas-ure according to our proven pro-cedure. With ready-made content, smart software and experienced mentors.

4. CHECK AND IMPROVEYou have introduced your ISMS (and had it certified) and are improv-ing it with our solution. If you need more support, we’ve got you covered.

Page 3: RUAG Cyber Security Information Security Management System … · you stay in control of the complete ISMS imple-mentation. If you need more advice or support, our experts are always

SMART SOFTWARE

You build up the required know-how and reliably implement your ISMS step by step with our software INDITOR® ISO. The software supports you in the main-tenance and further development of the management system after the implementation.

Simply self-pacedThe software with built-in consulting logic and intelligence clearly explains what you need to know and do step by step. Wizards and rules guide you through the entire process and verify all inputs.

Simply comprehensiveYou control the entire security management from risk analysis to

asset management to the documentation of deviations.

Simply efficientThe solution supports the continual improvement of the security management process and helps you efficiently solve tasks such as document reviews or incident management.

With smart software, our proven procedure, ready-made content and customizable templates, you stay in control of the complete ISMS imple-mentation. If you need more advice or support, our experts are always there for you.

YOUR ADVANTAGE:

Two strong partners.The RUAG Information Security Management System (ISMS) is so efficient because the software comprehensively maps every single step as well as the whole process.

RUAG Cyber Security specializes in information security, management systems and ISO/IEC 27001. CONTECHNET is the leading software supplier of software-based emer-gency planning and IT security.

Together, we have developed INDITOR® ISO. The intu-itive software combines the knowledge, expertise and experience of our ISMS experts with the proven, flexible and performant functions of the CONTECHNET software products.

We integrate INDITOR® ISO into every RUAG Cyber Security ISMS solution because we are fully convinced of it. Because it is just indispensable.

„ Everything should be made as simple as possible, but no simpler.“

Albert Einstein

Page 4: RUAG Cyber Security Information Security Management System … · you stay in control of the complete ISMS imple-mentation. If you need more advice or support, our experts are always

03 / 2017

PROFESSIONAL, EFFICIENT AND ALWAYS UNDER YOUR CONTROL

RUAG Cyber Security. Understand Cyber. Protect Values.At RUAG, we do everything we can to ensure your success. As an effective and independent partner, we focus persistently on addressing

your future security challenges. Working in partnership, we offer you tailored solutions for cyber prevention, detection and response. We also

increase the effectiveness of your teams through training and simulations to enable your company to get back to full performance. Thanks

to many years of experience, we know what’s important – in every situation.

RUAG Schweiz AG | RUAG Cyber SecurityStauffacherstrasse 65 | 3000 Bern 22 | [email protected] | isac.digital/isms

Plan reliablyYou plan costs, resources and time, steer each step and intervene only if necessary.

Stay in controlYou are in control and determine the schedule and pace for a more efficient use of your time.

Reduce costs You save money for (unnecessary) consulting because you pay only for what you really need.

Stay independentYou build up ISMS know-how and are independent of external consultants.

Celebrate achievementsSuccessful implementations are noticed and respected internally and externally.