
The IFGICT and ITU (International Telecommunication Union) Cyber Security standard aims to ensure the security of all information technology systems, including communication networks, artificial intelligence (AI), emerging technologies, and information processing systems. The standard is intended to be implemented by governments, businesses, and other organizations worldwide. The ITU-T (SG17) coordinates security-related work across all ITU-T Study Groups, often working in cooperation with other standards development organizations (SDOs) and various ICT industry consortia. SG17 works on cybersecurity, security management, security architectures and frameworks and much more, visit www.itu.int for more info.

The cybersecurity standard by IFGICT is a merging of ITU SG17 Framework and awareness technical documentation and the IFGICT cyber security check list where both leads to audit compliance to achieve a quality delivery for a cyber security standard. ITU-T SG17 has created a document “Security Guidance for ITU-T Recommendations” to provide guidance to authors and reviewers of ITU-T Recommendations to consistently address security considerations within their Recommendations. This document responds to WTSA-04 Resolution 50 which recognizes that converged legacy networks and IP networks are potentially more vulnerable to intrusion if adequate care is not taken in the security design and management and requires the ITU-T to evaluate existing and evolving new Recommendations, especially signaling and communications protocol Recommendations, with respect to their security considerations. (Source ITU)
Definition of cybersecurity
https://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx
Awareness
https://www.itu.int/dms_pub/itu-t/oth/0B/04/T0B040000452C01PDFE.pdf
IFGICT CYBERSECURITY STANDARD AUDIT
There are quite a few companies that perform audits on the agreements but don’t take a look at the risks. It’s good to have a check and balance of the agreements but there is no way one can stop the hackers from stealing their data. If the security audits are performed on these risks as well, the company’s data will surely be safe and risk-free which will ultimately help the company grow faster.
IMPORTANCE OF IFGICT SECURITY AUDIT
Have you ever tried to track the cybersecurity news? If yes, you’ll surely understand how important these security audits to the companies. These audits on regular basis help in exposing any kind of insecurity or the undesired outcomes. The most important thing is that the law asks for these security audits as well in case if your own a medical or finance company.
THE BENEFITS A COMPANY CAN TAKE WITH THE HELP OF THESE AUDITS INCLUDE:
- Verification of the security strategy to ensure if it’s according to the situation.
- Reduction of Cost by getting rid of all such software and hardware that you ignore during the audit.
- Exposing any weakness of your company that can harm it.
- Showing whether the company is working according to the rules and regulations.

WHO SHOULD CONDUCT THE AUDIT?
Many companies have been helped by IFGICT’s ICT Standard in achieving better awareness about their client’s demands of guarantee. Any Medium or Large size companies from different sectors such as finance, banking, industry, aerospace, hospitals and healthcare and much more request to obtain IFGICT Cybersecurity Standard, this will assure that they are following the right instructions and guidance as per IFGICT compliance to achieve and secure their data centers and infrastructures.

HOW IT WORKS!
Your company or public sector will contact IFGICT customer service requesting registration for the audit and membership ID, our team will guide you with dedicated consultant(s) or local partner of IFGICT in your country to help your team with training and consulting during the audit. After the audit duration has been completed, the committee at IFGICT will review the final report submitted by the onsite consultant for reviewing and evaluation then proceed with certification award upon approval.

WHAT ARE THE PROCEDURES AND PROCESS OF THE AUDIT?
The process is quite comprehensive and dedicated to risk assessment, information system security policies, checklists and training, more information about the processes you may download our presentation in PDF.
I AM INTERESTING TO APPLY THE IFGICT SECURITY STANDARD AUDIT TO MY COMPANY, WHAT IS THE NEXT STEP?
You may need to contact our customer service department.