CourseDescription:

This five-day intensive course enables the participants to develop the expertise to support an organization in implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013. Participants will also master the best practices for implementing information security controls from the eleven areas of ISO/IEC 27002:2005.

This training is consistent with the good practices of project management established by the Project Management Institute (PMI) and ISO 10006:2003 (Quality Management Systems – Guidelines for Quality Management in Projects). This training is fully compatible with ISO/IEC 27003:2009 (Guidelines for the Implementation of an ISMS), ISO/IEC 27004:2009 (Measurement of Information Security) and ISO/IEC 27005:2008 (Risk Management in Information Security).

Audience:

Project manager or consultant wanting to prepare for and support an organization in the implementation of an Information Security Management System (ISMS)

  • ISO27001 Auditor who wants to master the Information Security Management System implementation process
  • Person responsible for the information security or conformity in an organization
  • Member of the information security team
  • Expert advisor in information technology
  • Technical expert wanting to prepare for an information security function or for an ISMS project management function

LearningObjectives:

At the end of this course, the participant will gain competencies in:

  • Understanding the application of an Information Security Management System in the ISO/IEC 27001:2013 context
  • Mastering the concepts, approaches, standards, methods and techniques allowing effective management of an Information Security Management System
  • Understanding the relationship between an Information Security Management System, including risk management and controls and compliance with the requirements of different stakeholders of the organization
  • Acquiring expertise to support an organization in implementing, managing and maintaining an ISMS as specified in ISO/IEC 27001:2013
  • Acquiring the expertise necessary to manage a team in implementing the ISO/IEC 27001:2013 standard
  • Developing personal skills and knowledge required to advise organizations on best practices in management of information security
  • Improving the capacity for analysis and decision making in a context of information security management

Prerequisites:

  • ISO 27001 Foundation Certification or a basic knowledge of ISO 27001 is recommended
  • Participants are required to purchase a copy of the ISO/IEC 27001:2013 Standard from iso.org
  • Upon passing the Lead Implementer Exam, the candidate can get registered with PECB to become:
    • A Provisional Implementer – Required: No experience required
    • An Implementer – Required: 2 years of professional experience, 1 year of information security experience, ISMS project activities totalling 200 hours
    • A Lead Implementer – Required: 5 years of professional experience, 2 years of information security experience, ISMS project activities totalling 300 hours

For more information about these requirements, please visit either www.pecb.org or https://www.pecb.org/en/certifications/iso-27001-and-information-security-certifications/iso-27001-lead-implementer

Agenda:

Day 1: Introduction to Information Security Management System (ISMS) concepts as required by ISO 27001; Initiating an ISMS

  • Introduction to management systems and the process approach
  • Presentation of the standards ISO 27001, ISO 27002 and ISO 27003 and regulatory framework
  • Fundamental principles of Information Security
  • Preliminary analysis and establishment of the level of the maturity level of an existing information security management system based on ISO 21827
  • Writing a business case and a project plan for the implementation of an ISMS

Day 2: Planning the implementation of an ISMS based on ISO 27001

  • Defining the scope of an ISMS
  • Development of an ISMS and information security policies
  • Selection of the approach and methodology for risk assessment
  • Risk management: identification, analysis and treatment of risk (drawing on guidance from
    ISO 27005)
  • Drafting the Statement of Applicability

Day 3: Implementing an ISMS based on ISO 27001

  • Implementation of a document management framework
  • Design of controls and writing procedures
  • Implementation of controls
  • Development of a training & awareness program and communicating about the information security
  • Incident management (based on guidance from ISO 27035)
  • Operations management of an ISMS

Day 4: Controlling, monitoring, measuring and improving an ISMS; certification audit of the ISMS

  • Controlling and Monitoring the ISMS
  • Development of metrics, performance indicators and dashboards in accordance with ISO 27004
  • ISO 27001 internal Audit
  • Management review of an ISMS
  • Implementation of a continual improvement program
  • Preparing for an ISO 27001 certification audit

Day 5: Certification Exam

Ciudad:

Medellín – Colombia

Infórmate con Nosotros! 

Karen Pacheco Valderrama

Celular: 3113644660 Email: karen.pacheco@celeritum.com