Filter interviews by
I applied via Naukri.com and was interviewed in Jan 2024. There were 2 interview rounds.
Rate your
company
🤫 100% anonymous
How was your last interview experience?
Top trending discussions
I was interviewed in Jul 2017.
Yes, I am a fresher with no past working experience.
I am a recent graduate looking to gain experience in the field.
I have completed internships or projects during my studies.
I am eager to learn and grow in a professional environment.
I was responsible for conducting market research, creating social media content, and assisting with event planning.
Conducted market research to identify trends and opportunities
Created engaging social media content to increase brand awareness
Assisted in planning and executing events to promote company products/services
I am a recent graduate with a degree in Computer Science and a passion for coding and problem-solving.
Recent graduate with a degree in Computer Science
Passionate about coding and problem-solving
Strong communication and teamwork skills
Experience with programming languages such as Java, Python, and C++
I applied via Approached by Company and was interviewed in Jul 2017. There were 5 interview rounds.
I applied via Other and was interviewed in Jan 2018. There were 5 interview rounds.
I applied via Other and was interviewed in Jan 2018. There were 5 interview rounds.
I was interviewed before May 2016.
I was interviewed in Jul 2017.
I applied via Naukri.com and was interviewed in Oct 2019. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed before May 2021. There were 2 interview rounds.
The end to end implementation cycle of ISMS involves planning, implementation, monitoring, review, and improvement.
Planning involves identifying the scope, objectives, and risks of the ISMS.
Implementation involves designing and implementing controls to mitigate identified risks.
Monitoring involves regular checks to ensure the controls are effective.
Review involves assessing the effectiveness of the ISMS and identifying...
Risk assessment involves identifying, analyzing, and evaluating potential risks to determine the likelihood and impact of those risks.
Identify potential risks
Analyze the likelihood and impact of each risk
Evaluate the risks to determine their priority
Develop a plan to mitigate or manage the risks
Monitor and review the risks regularly
Annex A controls are the information security controls listed in ISO 27001 standard.
Annex A contains 114 controls categorized into 14 sections.
These controls are designed to ensure the confidentiality, integrity, and availability of information.
Examples of controls include access control, asset management, cryptography, incident management, and more.
Organizations must select and implement controls based on their risk a...
based on 3 interviews
Interview experience
Anonymously discuss salaries, work culture, and many more
Get Ambitionbox App
based on 23 reviews
Rating in categories
Group Head
30
salaries
| ₹0 L/yr - ₹0 L/yr |
Business Director
27
salaries
| ₹0 L/yr - ₹0 L/yr |
Business Manager
27
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Business Director
25
salaries
| ₹0 L/yr - ₹0 L/yr |
Development Engineer
15
salaries
| ₹0 L/yr - ₹0 L/yr |
Mindshare
Mediacom
Groupm Media
Dentsu Aegis Network