ISMS Manual
1.1 Purpose and Scope
The ISMS is designed to ensure the confidentiality, integrity, and availability of Disruptive Edge’s information assets in support of our mission to help ambitious companies thrive in the face of disruption. It establishes the policies, processes, and controls necessary to manage information security risks and maintain trust with our clients.
1.2 Organizational Context
Disruptive Edge is the innovation consultancy built for tomorrow. We help ambitious companies thrive in the face of disruption, making growth inevitable. Our services leverage proven innovation methods and AI-native tools, enabling leaders to stay ahead of change. We operate globally from Toronto, New York, and Dubai.
1.3 Leadership and Commitment
All information security responsibilities rest with Venkat Pothamsetty, Chief Information Security Officer (CISO). The CISO defines and maintains the information security policy, assigns resources, and reports on ISMS performance to executive management.
1.4 Planning
Risk assessment and treatment follow ISO/IEC 27001 Clause 6.1.3. Venkat Pothamsetty (CISO) oversees identification, analysis, evaluation, and selection of controls mapped to Annex A. Information security objectives are defined by the CISO and aligned with corporate goals.
1.5 Support
All ISMS documentation is maintained in G Suite (Google Drive, and Freshdesk). Security tickets and incidents are tracked and managed using Freshdesk.
The CISO ensures allocation of resources—personnel, budget, and technology—for effective ISMS operation. All employees report security incidents and maintain awareness per CISO-led training programs. Documented information is controlled under the CISO’s authority.
1.6 Operation
Venkat Pothamsetty (CISO) conducts risk assessments, approves treatment plans, monitors implementation of controls from Annex A of ISO/IEC 27001, and logs and tracks security incidents in Freshdesk.
1.7 Performance Evaluation
The CISO monitors key performance metrics—incident rates, audit findings, and corrective actions. Internal audits are coordinated by the CISO, and findings are reviewed in management review meetings.
1.8 Improvement
Nonconformities are managed through corrective actions initiated and approved by the CISO. Continual improvement is driven by audit results and evolving threat landscapes.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article