Information Security Management
iKala builds a robust information security management system to strengthen its protection framework
To enhance iKala's information security defense and management, we are implementing our information security policy in accordance with the international standard ISO/IEC 27001:2022. This policy aims to maintain the confidentiality, integrity, and availability of our core systems and information assets, ensuring uninterrupted business operations and protecting the interests of all stakeholders—including customers, employees, and partners.
This policy applies to all iKala departments, employees, contractors, and any third parties involved in our business operations. We will continuously review and improve our information security management system to stay aligned with the evolving threat landscape.
Information Security Risk Management Framework
Information security management is the cornerstone of our sustainable operations. Following the PDCA (Plan-Do-Check-Act) cycle, we have established a comprehensive security management framework. At its core is the Information Security Management Committee, which ensures our security strategies align with international standards and support the company's business objectives—creating a secure and resilient digital environment.
Information Security Strategy
Our information security strategy follows a three-phase approach—short-term, mid-term, and long-term—aimed at strengthening infrastructure, enhancing resilience, and building a comprehensive governance framework, while continuously fostering a strong security culture.
Short-Term Goals
Strengthen security awareness and education: Regular awareness campaigns
Ensure compliance and standardization: Maintain ISO 27001:2022 certification
Implement basic defense measures: System vulnerability management
Mid-Term Goals
Deploy advanced security technologies: EDR implementation, social engineering drills
Enhance operational resilience: Ongoing business continuity drills
Long-Term Goals
Establish comprehensive security governance
Integrate risk management: Form a security governance committee
Optimize defense strategies: Continuously upgrade technology and tools, leverage threat intelligence
Build a security culture and ensure compliance: Iterate and improve security policies