LEAD IMPLEMENTER ISO 27001:2013
Why should you attend?
During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness.
After mastering all the necessary concepts of Information Security Management Systems, you can sit for the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO/IEC
27001 in an organization.
Who should attend?
- Managers or consultants involved in Information Security Management
- Expert advisors seeking to master the implementation of an Information Security
- Management System
- Individuals responsible for maintaining conformance with ISMS requirements
- ISMS team members
Learning objectives
- Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
- Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS
- Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization
- Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS
- Acquire the expertise to advise an organization in implementing Information Security
- Management System best practices
Educational approach
This training is based on both theory and best practices used in the implementation of an ISMS Lecture sessions are illustrated with examples based on case studies
Prerequisites
A fundamental understanding of ISO/IEC 27001 and comprehensive knowledge of implementation principles.
Course Agenda
Introduction to Information Security Management System (ISMS) concepts as required by ISO/IEC 27001; Initiating an ISMS
Introduction to management systems and the process approach
Presentation of the standards ISO/IEC 27001, ISO 27002 and ISO 27003 and regulatory framework
Fundamental principles of Information Security
Preliminary analysis and establishment of the level of the maturity level of an existing information security management system based on ISO 21827
Writing a business case and a project plan for the implementation of an ISMS
Planning the implementation of an ISMS based on ISO/IEC 27001
Defining the scope of an ISMS
Development of an ISMS and information security policies
Selection of the approach and methodology for risk assessment
Risk management: identification, analysis and treatment of risk (drawing on guidance from
ISO/IEC 27005
Drafting the Statement of Applicability
Implementing an ISMS based on ISO/IEC 27001
Implementation of a document management framework Design of controls and writing procedures Implementation of controls
Development of a training & awareness program and communicating about the information security
Incident management (based on guidance from ISO 27035) Operations management of an ISMS
Day 1
Rundown Pelatihan Lead Implementer ISO 27001:2013
13:00 – 13:30: Registrasi Ulang/Absensi
13.30 – 13:50: Pre-Test
13:50 – 15:00: In Class Training Part 1
15:00 – 15:15: Ice Breaking & Comfort Break
15:15 – 16:00: In Class Training Part 2
16:00 – 16:30: Workshop End of Day 1
Course :
- Introduction to management systems and the process approach
- Presentation of the standards ISO/IEC 27001, ISO 27002 and ISO 27003 and regulatory framework
- Fundamental principles of Information Security
- Preliminary analysis and establishment of the level of the maturity level of an existing information security management system based on ISO 21827
Day 2
13:00 – 13:30: Registrasi Ulang/Absensi
13.30 – 13:50: Pre-Test
13:50 – 15:00: In Class Training Part 1
15:00 – 15:15: Ice Breaking & Comfort Break
15:15 – 16:00: In Class Training Part 2
16:00 – 16:30: Workshop End of Day 2
Course:
- Writing a business case and a project plan for the implementation of an ISM
- Defining the scope of an ISMS
- Development of an ISMS and information security policies
- Selection of the approach and methodology for risk assessme
Day 3
13:00 – 13:30: Registrasi Ulang/Absensi
13.30 – 13:50: Pre-Test
13:50 – 15:00: In Class Training Part 1
15:00 – 15:15: Ice Breaking & Comfort Break
15:15 – 16:00: In Class Training Part 2
16:00 – 16:30: Workshop End of Day 3
Course :
- Risk management: identification, analysis and treatment of risk (drawing on guidance from ISO/IEC 27005
- Drafting the Statement of Applicability
- Implementation of a document management framework Design of controls and writing procedures
- Design of controls and writing procedures
Day 4
13:00 – 13:30: Registrasi Ulang/Absensi
13.30 – 13:50: Pre-Test
13:50 – 15:00: In Class Training Part 1
15:00 – 15:15: Ice Breaking & Comfort Break
15:15 – 16:00: In Class Training Part 2
16:00 – 16:30: Workshop End of Day 4
Course :
- Implementation of controls
- Development of a training & awareness program and communicating about the information security
- Incident management (based on guidance from ISO 27035)
- Operations management of an ISMS