IS CERTIFICATION PROGRAMS
Information Security Management System – ISO/IEC 27001: 2022
5 DAYS WORKHOP ON INFORMATION SECURITY – CERTIFIED LEAD IMPLEMENTER
Information security, often referred to as “InfoSec,” plays a crucial role in safeguarding an organization’s valuable data. Here’s why it’s so important:
Cyber Threats: In our increasingly digital world, cybercriminals recognize the value of data. They launch attacks to steal sensitive information or hold it hostage for money.
Business Impact: A data breach has far-reaching consequences. It leads to unexpected downtime, lost business, customer attrition, and damage to reputation.
The need for protecting organizational digital assets is the responsibility of every employee in an organization. Hence the need for employees to understand how to secure digital assets is gaining high importance.
Lead Implementer Course
- INFORMATION SECURITY – ISO/IEC 27001:2022
- TOTAL DURATION: 5 days
- Location: Classroom
- Course Timing: 9AM to 5 PM IST
Lead Implementer Course
INFORMATION SECURITY – ISO/IEC 27001:2022
Lead Implementer Certificates
CERTIFICATION FROM ISAAA
International Standards Organization has defined multiple standards for protection of digital assets & risk management, and this training is intended to give an in-depth knowledge & understanding on implementing such standards across any organization.
JBASTIN PVT LTD. brings to you a focused and professional certification in Information Security, a career oriented certification under the trademark ISAAA, targeted budding professionals in all disciplines.
Master Information Security Risk Management
The workshop focuses on Information Security Risk Management, based on ISO 27001:2022 standards, providing the participants with the opportunity to develop the expertise needed to support an organization and provide leadership in implementing and managing Information Security Risks.
Workshop Description:
The workshop focusses on the hands-on practical side of Information Security implementation. It would impart the necessary hands-on experience in implementing Information Security by every participant. During this training period, the participants would get exposure to actual implementation records and will themselves acquire the skills to develop the tools and documentation required for an organization.
Pre-requisites:-
- It is expected that participants have completed university level of education.
- Process Management experience will be an added advantage.
- A good technical experience can also be considered for the Consultant Profession.
Who should attend:
- Persons who will or wish to play a key role in managing programs for implementing and maintaining ISO Standards in an organization.
- Auditors and Lead Auditors who are responsible to conduct internal/external Quality/ IT service management / ISMS / Business Continuity audits.
- Persons like Risk Manager , IT- Manager , IT- Auditor , Security Manager, Compliance Manager can also be part of course
- Engineering Students (All streams)
- MBA Students (All Streams)
- BCA/MCA Students wanting a career in Information Security, Privacy, Compliance
- Technology Students preparing for campus recruitments.
- Any Working Professional in any field, with a keenness and enthusiasm to enter Information Security Consulting or Officer role.
Course Outline
- Introduction to Management Systems and the Continually Improving Approach.
- Detailed Presentation of ISO Standards.
- Preliminary analysis and determining the level of maturity of the existing Information Security Management System.
- Defining the scope of security projects.
- Drafting Policies & Procedures.
- Identifying Information Assets and Classifying Assets.
- Asset management and Asset valuation.
- Impact Assessment & Risk Analysis based on ISO 31000.
- Treatment of risk based controls from ISO27002:2022
- Organization Controls
- Physical Controls
- Human Resource Controls
- Technology Controls
- Conducting Internal Audits & Management review meetings
- External Certification Process.
Learning Objectives:
- Mastering the concepts, approaches, standards, methods and techniques of managing Information Security within organizations.
- Implementing Information Security Management Systems based on ISO 27001 Standards.
- Adapting Risk Management based on ISO 31000.
- Drafting policies, procedures, and procedures and implementing those across the organization.
- Performing Risk Assessments.
- Be a champion in managing a full life cycle of implementation of Information Security based on International Standards.
- Assessing any Organisation against International best practices and checking for compliance in an authoritative manner.
- Performing Internal Audits
Key Takeaways
ISAAA Certified “Information Security Lead Implementer” Certificate Delegate Manual | Sample Policies & Procedures Risk Assessment Work Sheets Internal Audit Templates |