GSSAIMCase Study APPROVED
GSSAIMCase Study APPROVED
GSSAIMCase Study APPROVED
Kurzynski says the message is simple, “use ISO 27001 to govern your Model for establishing,
security program.” Since 2005, organizations in the U.S. are able to implementing, operating,
register their Information Security Management Systems commonly
monitoring, reviewing,
referred to as the Security Program to the ISO standard. “We see
2008/2009 as the tipping point year. The year when a critical mass of maintaining, and improving
companies has completed registration and awareness begins to spread an Information Security
virally. Like many in manufacturing worked to obtain the ISO 9001 Management System
registration in the early 90s, so too will information-centric organizations
(ISMS); often referred to
strive to obtain ISO 27001 registration to demonstrate they have a
mature information security program,” says Kurzynski. as the Security Program
IT Security Controls
Recognized
Internationally
“Halock helped us identify threats and gaps to ISO
27001, and also helped us remediate our Formal Registration
vulnerabilities” Available
- Inna Berkovich, CIO, AIM
Harmonizes security
requirements from
regulation, legislation,
and the business
A great example of Halock’s services in action is its recent work with
American Imaging Management (AIM). AIM is a leading technology
Often identified as a
company in its segment and was in the process of redefining its
vendor requirement
information security program to meet its evolving business demands.
AIM was searching for the right partner to help it harmonize and
centralize the management of security controls. Enter Halock Security Demonstrates the
Labs. existence of a mature
security program
Solution Approach
AIM concluded that it needed to invest and expand its current corporate security posture to enhance
security for itself, its clients and the lives covered under its programs. Halock’s first task was to
perform a risk assessment on AIM’s current security program.
Part I
Halock performed an ISO 27001 gap assessment to quantify AIM's overall security posture, and
delivered a detailed recommended course of action to address and remediate areas both under and
over controlled
Halock provided guidance during various remediation efforts and an independent audit to ensure that
AIM’s scheduled client deployments were uninterrupted.
Subsequently, Halock provided a roadmap for building a Security Program that could be registered to
the ISO 27001 standard. Inna Berkovich, AIM’s CIO stated “Our applications are consistently evolving to
meet client needs. We need a security program that provides the flexibility to address new threats and
security requirements; ISO’s framework offers us that ability.”
Part II Plan-Do-Check-Act
Cycle
As a first step to implementing the new Security Program, Halock
championed ISO’s Plan-Do-Check-Act cycle to deploy a comprehensive Plan - Establish the
set of security controls and initiatives. Through the following months, Security Program
Halock worked as a member of AIM's Security Governance Committee
and the following efforts were completed: Do - Implement and
Operate the Security
Defined granular roles and responsibilities Program
Specifically indentified security requirements
(legislative, regulatory, and contractual) Check - Monitor and
Defined supporting policies, standards and procedures Review the Security
Defined and established security awareness program Program
Expanded vulnerability management program
Collaborated with BC/DR to integrate Security Program objectives Act - Maintain and
More clearly defined incident response program Improve the Security
Implemented internal security control audit program Program
Conformed Security Program to existing AIM Compliance, Privacy
and Standards initiatives
“As we continue to expand relationships with new and existing clients, our security
program offers an important and tangible area of differentiation that is
increasingly required by our customers.”
- Brandon Cady, President, AIM
As AIM prepares for its annual Corporate Security Assessment in late Q3 and as Halock continues to
refine and improve components of the operational Security Program, AIM is confident that it is fully
compliant with the expectations of the ISO 27001 Standard and is ready to begin preparations for
formal registration. AIM has set a target of Q1 2008 for completion of the registration process. Inna
Berkovich, the CIO of AIM stated “Halock helped us to get Senior Management buy in early in the
process, which was key to successful implementation of the new Security Program.”
“AIM’s partnership with Halock to implement the ISO 27001 standard only
serves to strengthen our HIPAA privacy and security programs to protect
the confidentiality and integrity of the information entrusted to us by our
clients.”
- Kristine Tomzik, VP and Chief Compliance Officer, AIM
About ISO 27000 (27001/27002): About Halock Governance & Strategy Services:
As security breaches intensify and regulations multiple, the need Governance & Strategy starts with identification and publication of
for a framework to manage vulnerabilities is eminent. ISO 27000 security requirements and the security organization. Halock’s
provides the guidance to initiate, build, and manage, and assess Governance specialists will assist in identifying the regulatory,
information security within any organization. Some of its features legislative, contractual and business mission related security
include: requirements and harmonize them. These requirements are
Security Policy – Documented management support for gathered from the business leadership, many of which will be a
information security. part of the security organization.
1834 Walden Office Square Suite 150 * Schaumburg, IL 60173 * 847.221.0200 * www.halock.com