Information Security Management

Information Security Management

iKala builds a robust information security management system to strengthen its protection framework

To enhance iKala's information security defense and management, we are implementing our information security policy in accordance with the international standard ISO/IEC 27001:2022. This policy aims to maintain the confidentiality, integrity, and availability of our core systems and information assets, ensuring uninterrupted business operations and protecting the interests of all stakeholders—including customers, employees, and partners.

This policy applies to all iKala departments, employees, contractors, and any third parties involved in our business operations. We will continuously review and improve our information security management system to stay aligned with the evolving threat landscape.

Information Security Risk Management Framework

Information security management is the cornerstone of our sustainable operations. Following the PDCA (Plan-Do-Check-Act) cycle, we have established a comprehensive security management framework. At its core is the Information Security Management Committee, which ensures our security strategies align with international standards and support the company's business objectives—creating a secure and resilient digital environment.

Information Security Strategy

Our information security strategy follows a three-phase approach—short-term, mid-term, and long-term—aimed at strengthening infrastructure, enhancing resilience, and building a comprehensive governance framework, while continuously fostering a strong security culture.

Short-Term Goals

  • Strengthen security awareness and education: Regular awareness campaigns

  • Ensure compliance and standardization: Maintain ISO 27001:2022 certification

  • Implement basic defense measures: System vulnerability management

Mid-Term Goals

  • Deploy advanced security technologies: EDR implementation, social engineering drills

  • Enhance operational resilience: Ongoing business continuity drills

Long-Term Goals

  • Establish comprehensive security governance

  • Integrate risk management: Form a security governance committee

  • Optimize defense strategies: Continuously upgrade technology and tools, leverage threat intelligence

  • Build a security culture and ensure compliance: Iterate and improve security policies