Creativity

Innovation

Originality

Imagination

 

About us

ITSM CENTER d.o.o. is a company from Slovenia, focusing on IT Service Management (ITSM), Project Management, Information Security Management and Digital transformation to ensure our clients reach their strategic goals in effective and efficient manner.

Company Brochure

Information security based on ISO/IEC 27001

Being secure in a digital world is a critical success factor.

Information Security is not only about securing information from unauthorized access. Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. Information can be physical or electronic one. Information can be anything like Your details or we can say your profile on social media, your data in mobile phone, your biometrics etc. Thus Information Security spans so many research areas like Cryptography, Mobile Computing, Cyber Forensics, Online Social Media etc.

During First World War, Multi-tier Classification System was developed keeping in mind sensitivity of information. With the beginning of Second World War formal alignment of Classification System was done. Alan Turing was the one who successfully decrypted Enigma Machine which was used by Germans to encrypt warfare data.

Information Security programs are build around 3 objectives, commonly known as CIA – Confidentiality, Integrity, Availability.

What is Information Security?
Information security consultancy

ITSM CENTER will help you to get ready for, and address your potential issues and deficiencies prior undergoing certification, hence minimizing your costs of the certification process by taking possible corrective actions prior the beginning of the certification process.The certification process itself can then be embarked upon via a suitable accredited third party.

The process starts when the organization makes the decision to embark upon the exercise. Clearly, at this point, it is also important to ensure management commitment and then assign responsibilities for the project itself.

An organizational top level policy can then be developed and published. This can, and will normally, be supported by subordinate policies. The next stage is particularly critical: scoping. This will define which part(s) of the organization will be covered by the ISMS. Typically, it will define the location, assets and technology to be included.

At this stage a risk assessment will be undertaken, to determine the organization's risk exposure/profile, and identify the best route to address this. The document produced will be the basis for the next stage, which will be the management of those risks. A part of this process will be selection of appropriate controls with respect to those outlined in the standard (and ISO27002), with the justification for each decision recorded in a Statement of Applicability (SOA). The controls themselves should then be implemented as appropriate.

Few companies can afford the depth and breadth of IT and security specialists required to address the increasing number of IT related risks. IT Internal Audit Services provide clients a cost-effective alternative for the development and execution of an internal audit plan aimed at addressing IT related business risks. Services range from single discreet projects focused on a specific risk, to partial or full IT internal audit outsourcing.

Internal Audit of Information Security Management System (ISMS) is a mandatory step before getting accreditation but it also gives organisations a quick overview of the current compliance with ISO/IEC 27001.

Information Security Audit

Privacy policy

ITSM CENTER d.o.o. is committed to ensuring that your privacy is protected. Should we ask you to provide certain information by which you can be identified when using this website, then you can be assured that it will only be used in accordance with GDPR and all internal privay policies.

Intelectual property rights

ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. PRINCE2® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. The Swirl Logo is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

Keep in touch

ITSM CENTER d.o.o.
Ljubljanska cesta 12F, 1236 Trzin, Slovenia

Email: info@itsm-center.si, Phone: +386 1 2425 866

Working hours: 8:00 - 17:00 CET

We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not.