ISO 27005 Risk Manager with an introduction to the methodologies of risk management
----- Guaranteed Date -----
In this five-day intensive course participants develop the competence to master the basic risk management elements related to all assets of relevance for information security using the ISO/IEC 27005:2011 standard as a reference framework. Based on practical exercises and case studies, participants acquire the necessary knowledge and skills needed to perform an optimal information security risk assessment and manage risks in time by being familiar with their life cycle. Participants will learn the different methods of risk assessment used on the market e.g.: NIST 800-30, Microsoft Security Risk Management Guide, OCTAVE, Harmonized TRA, EBIOS and MEHARI. This train…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
----- Guaranteed Date -----
In this five-day intensive course participants develop the competence to master the basic risk management elements related to all assets of relevance for information security using the ISO/IEC 27005:2011 standard as a reference framework. Based on practical exercises and case studies, participants acquire the necessary knowledge and skills needed to perform an optimal information security risk assessment and manage risks in time by being familiar with their life cycle. Participants will learn the different methods of risk assessment used on the market e.g.: NIST 800-30, Microsoft Security Risk Management Guide, OCTAVE, Harmonized TRA, EBIOS and MEHARI. This training fits perfectly in the framework of an ISO/IEC 27001:2005 standard implementation process.
TRAINING METHODOLOGY
This training is based on both theory and practice:
- Sessions of lectures illustrated with examples based on real cases;
- Practical exercises based on case studies;
- Review exercises to assist the exam preparation;
- Practice test similar to the certification exam;
To benefit from the practical exercises, the number of training participants is limited.
AUDIENCE
- Risk managers;
- Persons responsible for information security or conformity within an organization;
- Member of the information security team;
- IT consultants;
- Staff implementing or seeking to comply with ISO 27001 or involved in a risk management program.
INCLUDED:
- Training in English language.
- Course manual in English, containing over 300 pages of information and practical examples.
- Copy of the official documentation on NIST 800-30, Microsoft Security Risk Management Guide, OCTAVE, Harmonized TRA, EBIOS and, MEHARI.
- Behaviour Participation Certificate of 35 CPD/CPE credits.
- Certification exam.
- Certification Diploma after successful examination and formal process registration. This process has no associated cost.
- Coffee break in the morning and afternoon.
NOT INCLUDED:
- Lunch.
PROGRAM
Introduction, risk management program according to ISO 27005
- Concepts and definitions related to risk management
- Risk management standards, frameworks and methodologies
- Implementation of an information security risk management program
- Understanding an organization and its context
Risk identification and assessment, risk evaluation, treatment, acceptance, communication and surveillance according to ISO 27005
- Risk identification
- Risk analysis and risk evaluation
- Risk assessment with a quantitative method
- Risk treatment
- Risk acceptance and residual risk management
- Information Security Risk Communication and Consultation
- Risk monitoring and review
Certified ISO/IEC 27005 Risk Manager Exam (2 hours)
Introduction to risk assessment methodologies
- Presentation of NIST 800-30
- Microsoft Security Risk Management Guide
Introduction to OCTAVE and Harmonized TRA methods
- Presentation of OCTAVE
- Presentation of Harmonized TRA
Introduction to EBIOS and MEHARI methods
- Presentation of EBIOS
- Presentation of MEHARI
LEARNING OBJECTIVES
- understand the concepts, approaches, methods and techniques allowing an effective risk management according to ISO 27005
- interpret the requirements of ISO 27001 on information security risk management
- understand the relationship between the information security risk management, the security controls and the compliance with the requirements of different stakeholders of an organization
- learn the different methods of risk assessment used on the market e.g.: NIST 800-30, Microsoft Security Risk Management Guide, OCTAVE, Harmonized TRA, EBIOS and, MEHARI
- acquire the competence to implement, maintain and manage an ongoing information security risk management program according to ISO 27005
- acquire the competence to effectively advise organizations on the best practices in information security risk management
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
