Thanks Sathya. The process is in place from past several years, so was just trying to find out the best practices and process across different companies in IT domain. I think ISMS will be helpful. Will gain more insights on this.
I guess Mr. Khatri will have more to add on J
Regards,
Gautam
From: Venkatesh, Sathyanarayan [mailto:sathyanarayan.venkatesh@hp.com]
Sent: Thursday, June 17, 2010 11:45 PM
To: Gautam Kumar (gautkuma)
Cc: Vishwadeep Khatri; benchmarksixsigma@yahoogroups.com
Subject: Suggestions Invited
Importance: High
Gautam,
This could be useful to you.
Sathya
From: Venkatesh, Sathyanarayan
Sent: Friday, June 18, 2010 10:05 AM
To: 'gautkuma@cisco.com'
Cc: 'Vishwadeep Khatri'; 'benchmarksixsigma@yahoogroups.com'
Subject: RE: Suggestions Invited
Importance: High
Hi Gautam,
Before getting into the project, perform CE analysis to substantiate the ROI. Because there are many ways to improve the current processes very effectively without ballooning the other interrelated processes.
If a new processes is initiated, never do a improvement project because, the processes has to get stabilized to explore opportunities for improvement.
ITs very important to know your project charter before any one can provide you knowledge support.
Just wanted to know if you are Certified ISMS, if not, ISMS knowledge could help you understand on the Audit and Investigation.
I would advise you to know a little more on Cyber Foresenic, ISMS, TRIZ, PFMEA , Cyber Kaizens etc.....
Have a great Day,
Sathya
TSD : Quality Program Manager
INDIA - Client Experience Lead
MBB; E1- LSS ; Certified LA - ISO/ISMS
HP INDIA SALES
24, Salarpuria Arena, Audugodi Road,
Bangalore - 30
PS : Dear Khatri, Salutations, I always remember your thought provoking advises during our MBB - 1st batch trg.
__________________________________________________________________________________________________________________________
What is Cyber Crime Investigation? | |||||||||
|
This digital evidence and cyber trail may be found in computer hard disks, cell phones, CDs, DVDs, floppies, computer networks, the Internet etc. Digital evidence and cyber trails can be hidden in pictures (steganography), encrypted files, password protected files, deleted files, formatted hard disks, deleted emails, chat transcripts etc. Digital evidence and cyber trails can relate to online banking frauds, online share trading fraud, source code theft, credit card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks, email hijacking, denial of service, hacking, divorce cases, murder cases, organized crime, terrorist operations, defamation, pornography, extortion, smuggling etc.
|
__________________________________________________________________________________________________________________________________________________________________________
Hello everyone,
Just a quick introduction of myself: I am a Black Belt, working for Cisco in Audit and Investigations team.
Just wanted to know if anyone of us in the group has done/have a case study for BB project in auditing, Cyber crime and investigations domain – with the objective of continuous service improvement/ process/performance improvement/other . I am planning to incorporate some of the best practices to improve the existing process at Cisco in this domain. Any pointers will be of great help.
Regards,
Gautam
__._,_.___
www.benchmarksixsigma.com
Change settings via the Web (Yahoo! ID required)
Change settings via email: Switch delivery to Daily Digest | Switch to Fully Featured
Visit Your Group | Yahoo! Groups Terms of Use | Unsubscribe
__,_._,___
0 Comments:
Post a Comment