ISMS Manual

Created by Venkat Pothamsetty, Modified on Sun, 6 Jul at 3:00 PM by Venkat Pothamsetty

ISMS Manual

1.1 Purpose and Scope

The ISMS is designed to ensure the confidentiality, integrity, and availability of Disruptive Edge’s information assets in support of our mission to help ambitious companies thrive in the face of disruption. It establishes the policies, processes, and controls necessary to manage information security risks and maintain trust with our clients.

1.2 Organizational Context

Disruptive Edge is the innovation consultancy built for tomorrow. We help ambitious companies thrive in the face of disruption, making growth inevitable. Our services leverage proven innovation methods and AI-native tools, enabling leaders to stay ahead of change. We operate globally from Toronto, New York, and Dubai.

1.3 Leadership and Commitment

All information security responsibilities rest with Venkat Pothamsetty, Chief Information Security Officer (CISO). The CISO defines and maintains the information security policy, assigns resources, and reports on ISMS performance to executive management.

1.4 Planning

Risk assessment and treatment follow ISO/IEC 27001 Clause 6.1.3. Venkat Pothamsetty (CISO) oversees identification, analysis, evaluation, and selection of controls mapped to Annex A. Information security objectives are defined by the CISO and aligned with corporate goals.

1.5 Support

All ISMS documentation is maintained in G Suite (Google Drive, and Freshdesk). Security tickets and incidents are tracked and managed using Freshdesk.

The CISO ensures allocation of resources—personnel, budget, and technology—for effective ISMS operation. All employees report security incidents and maintain awareness per CISO-led training programs. Documented information is controlled under the CISO’s authority.

1.6 Operation

Venkat Pothamsetty (CISO) conducts risk assessments, approves treatment plans, monitors implementation of controls from Annex A of ISO/IEC 27001, and logs and tracks security incidents in Freshdesk.

1.7 Performance Evaluation

The CISO monitors key performance metrics—incident rates, audit findings, and corrective actions. Internal audits are coordinated by the CISO, and findings are reviewed in management review meetings.

1.8 Improvement

Nonconformities are managed through corrective actions initiated and approved by the CISO. Continual improvement is driven by audit results and evolving threat landscapes.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article