ISO/IEC 27005:2018 Information Security Risk Management
Cybersecurity
Organizations today recognize the importance of adopting a robust risk management programme. This course builds on what you already know about the framework specified in ISO/IEC 27001, which is now expanding to ISO/IEC 27005:2018.
This two-day training will equip you with practical guidance to manage information security risks. It will help you to review your existing risk management and ensure the measures are robust enough to reduce the identified risks. You will leave able to prioritize effectively and choose appropriate risk treatments within your organization.
Duration: 2 days / 16 hours
Delivery Method: Classroom-based, Virtual Instructor-Led Training
HOW WILL I BENEFIT?
· Identify benefits associated with using ISO/IEC 27005:2018, as part of an information security management system (ISMS)
· Understand the best practice risk management processes contained in ISO/IEC 27005:2018
· Develop processes for assessing and managing the risks related to your organization’s information assets
WHAT WILL I LEARN?
By the end of this course delegates will be able to:
· Explain concepts specific to information risk management, including terms and definitions
· Recognize typical information security risks faced by organizations
· Identify typical information security risk management concerns
· Communicate ISO/IEC 27005:2018 introduction, background, purpose, scope and structure
· Explain how ISO/IEC 27005:2018 integrates and interfaces with other standards, such as ISO/IEC 27001:2013
· Implement the topics covered in ISO/IEC 27005:2018 within your organization
· Determine the value of the information assets under your control
· Evaluate threats to information assets
· Identify, analyze and evaluate information security risks
· Prioritize and choose appropriate risk treatments
WHO SHOULD ATTEND?
Anyone who wants to learn about:
· Identifying and analyzing information security risks
· How risks can be evaluated
· What treatments, controls and measures can be implemented in order to mitigate risks
· Ongoing governance and risk monitoring processes
The course is applicable to individuals from any size or type of organization who are currently involved in (or will be in the future) planning, implementing, maintaining, supervising or assessing information security, as part of an ISO/IEC 27001 ISMS or a standalone system.
PREREQUISITES
You should have a basic knowledge of ISO/IEC 27001:2013 and ISO/IEC 27002:2013, as well as an understanding of the key principles of an ISMS.
We also recommend that you have an awareness of generic risk assessments and basic understanding of information security principles and terminology.
Some delegates on this course will have already attended our Information Security Management System (ISMS) Requirements of ISO 27001:2013 or Information Security Management System (ISMS) Implementing ISO/IEC 27001:2013 course.
We also recommend delegates have an understanding of the risk assessment approach currently employed in their organizations, should one exist.
LEARNING OBJECTIVES
Upon successful completion of this training course, participants will be able to:
· Explain the key concepts and principles of application security based on ISO/IEC 27034
· Interpret the ISO/IEC 27034 guidelines for an application security program from the perspective of an implementer
· Initiate and plan the implementation of an application security program based on ISO/IEC 27034 by utilizing best practices
· Support an organization in operating, maintaining, and continually improving an application security program based on ISO/IEC 27034
EDUCATIONAL APPROACH
· This training course contains various activities such as exercises, multiple-choice quizzes, real-life scenarios, and best practices used in the implementation of application security.
· Participants are encouraged to communicate with each other and engage in discussions when completing quizzes and exercises.
· The quizzes are structured to reflect the style and format of the certification exam.
PREREQUISITES
· The main requirement for participating in this training course is having a general knowledge of the application security concepts and ISO/IEC 27034.
REGISTER NOW