ISO has just launched an updated version of most followed Global Standard on Information Security - ISO 27001 from 2005 to 2013, with some significant changes and several minor changes. All in line with the need of the hour. This 2-day course is designed to provide information security professionals with the knowledge and skills required to implement ISMS in an organization.This course will cover issues highlighting the importance of information security; structure of ISO 27001:2013 and its detailed contents towards an effective ISMS implementation in preparation for internal and external audits.
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ISMS 27001 Practitioner
1. Official Business Paper:
* ISO 27001:20
13
moves beyond
PDCA
* 10 major cha
nges
from ISO 2700
1:2005
ISMS PRACTITIONER
“Re-positioning to ISO 27001:2013”
Program Overview
More than 90% businesses of all sizes suffer from information security threats – with impacts ranging
from minor data loss to complete shutdown. As technology becomes more powerful and processes
becomes more complex busniness risks have increased exponentially - the need to ensure security
has never been greater. Popular surveys indicate that corporates are spending time and money on
new technologies. In reality, information security is more of a people and process issue than it is a
technology issue.
With increased threats, ISO has just launched an updated version of most followed global standard on
information security - ISO 27001 from 2005 to 2013, with some significant changes and several minor
changes. All in line with the need of the hour. This 2-day course is designed to provide information
security professionals with the knowledge and skills required to implement ISMS in an organization.
This course will cover issues highlighting the importance of information security; structure of ISO
27001:2013 and its detailed contents towards an effective ISMS implementation in preparation for
internal and external audits.
Learning Objectives
At the end of the program, participants are expected to:
●● Map the difference between ISO 27001:2005 and ISO 27001:2013
●● Upgrade your existing ISMS to be fully compliants with ISO 27001:2013
●● Be equipped for 2nd and 3rd party information security audits
●● Acquire and implement flexibility of choice for Risk Assessment where ‘asset owners’ are now
‘risk owners’
●● Implement an effective &efficient information security management system
●● Learn how to map your stakeholders and interested parties
●● Strategically link ISO 31000, ISO 22301 to your Risk Register
Benefits
●● Gain clear understanding & hands-on experience for an effective organizational ISMS
●● Act on the systemic problems and operational issues that companies face during ISMS
●●
●●
●●
●●
●●
implementation (using ISO 27001:2013 as a benchmark)
Gain access to world-class resources / assets that ISMS implementation practically EASIER!
Perform an effective / holistic Risk Management addressing all business needs
Achieve substantial gains in experience through case studies and workshops
Create an effective organizational ISMS complying to ISO 27001:2013 & ensuring your
business requirements
Create a knowledge / mind share by interacting with other Information Security professionals
Key Clients
www.eccinternational.com
Schedule:
●● Jan. 29 - 30, 2014
Venue:
●● Makati City
Duration:
●● 2 Days
Target Audience:
●● IT Managers /
Consultants
●● Information Security
Professionals
●● Internal Auditors /
Audit Team Members
●● Risk Managers /
Management Team
●● Information Security
Consultants
●● All Personnel
responsible for ISMS
Implementation in the
Organization