Jumat, 18 Juni 2010

[benchmarksixsigma] RE: Suggestions Invited



Thanks Sathya. The process is in place from past several years, so was just trying to find out the best practices and process across different companies in IT domain. I think ISMS will be helpful. Will gain more insights on this.

I guess Mr. Khatri will have more to add on J

 

Regards,

Gautam

 

From: Venkatesh, Sathyanarayan [mailto:sathyanarayan.venkatesh@hp.com]
Sent: Thursday, June 17, 2010 11:45 PM
To: Gautam Kumar (gautkuma)
Cc: Vishwadeep Khatri; benchmarksixsigma@yahoogroups.com
Subject: Suggestions Invited
Importance: High

 

Gautam,

 

This could be useful to you.

 

Sathya

 


From: Venkatesh, Sathyanarayan
Sent: Friday, June 18, 2010 10:05 AM
To: 'gautkuma@cisco.com'
Cc: 'Vishwadeep Khatri'; 'benchmarksixsigma@yahoogroups.com'
Subject: RE: Suggestions Invited
Importance: High

Hi Gautam,

 

Before getting into the project, perform CE analysis to substantiate the ROI.  Because there are many ways to improve the current processes very effectively without ballooning the other interrelated processes.

 

If a new processes is initiated, never do a improvement project because, the processes has to get stabilized to explore opportunities for improvement.

 

ITs very important to know your project charter before any one can provide you knowledge support.

 

Just wanted to know if you are Certified ISMS, if not,  ISMS knowledge could help you understand on the Audit and Investigation.

 

I would advise you to know a little more on Cyber Foresenic, ISMS, TRIZ, PFMEA , Cyber Kaizens etc.....

 

Have a great Day,

 

Sathya

TSD : Quality Program Manager

INDIA - Client Experience Lead

MBB; E1- LSS ; Certified LA - ISO/ISMS

HP INDIA SALES

24, Salarpuria Arena, Audugodi Road,

Bangalore - 30

 

PS :  Dear Khatri,  Salutations, I always remember your thought provoking advises during our MBB - 1st batch trg.

__________________________________________________________________________________________________________________________

 

What is Cyber Crime Investigation?

 


Cyber Crime Investigation is the collecting, analyzing and investigation of digital evidence and cyber trails.

This digital evidence and cyber trail may be found in computer hard disks, cell phones, CDs, DVDs, floppies, computer networks, the Internet etc.

Digital evidence and cyber trails can be hidden in pictures (steganography), encrypted files, password protected files, deleted files, formatted hard disks, deleted emails, chat transcripts etc.

Digital evidence and cyber trails can relate to online banking frauds, online share trading fraud, source code theft, credit card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks, email hijacking, denial of service, hacking, divorce cases, murder cases, organized crime, terrorist operations, defamation, pornography, extortion, smuggling etc.

Basics of Cyber Security

  • Basics of Computer Hardware, Networks and Internet
  • Information Security Planning & Management
  • Electronic Authentication
  • Cryptography

 
Advanced Cyber Security Concepts

  • Server Security
  • Electronic Mail Security
  • Intrusion Detection and Prevention Systems
  • Selecting Information Technology Security Products

 
Cyber Crime Investigation & Forensics

  • Understanding how Cyber Criminals and Hackers work
  • Best Practices for Cyber Crime Investigation
  • Handling Real World Investigations
  • Legal Issues
  • Cyber Forensics

 
Incident Response

  • Computer Security Incident Handling
  • Malware Incident Prevention and Handling
  • Media Sanitization
  • Computer Security Incident Response Teams

__________________________________________________________________________________________________________________________________________________________________________

 

 

 

 

 


 

 

Hello everyone,

Just a quick introduction of myself: I am a Black Belt, working for Cisco in Audit and Investigations team.

Just wanted to know if anyone of us in the group has done/have a case study  for BB project in auditing, Cyber crime and investigations domain – with the objective of continuous service improvement/ process/performance improvement/other . I am planning to incorporate some of the best practices to improve the existing process at Cisco in this domain. Any pointers will be of great help.

Regards,

Gautam



__._,_.___


www.benchmarksixsigma.com



Your email settings: Individual Email|Traditional
Change settings via the Web (Yahoo! ID required)
Change settings via email: Switch delivery to Daily Digest | Switch to Fully Featured
Visit Your Group | Yahoo! Groups Terms of Use | Unsubscribe

__,_._,___

0 Comments:

 

Get Visa Card Info | Domain Guide |