SlideShare a Scribd company logo
1 of 1
Download to read offline
Official Business Paper:

* ISO 27001:20
13 	 	
moves beyond
PDCA
* 10 major cha
nges
from ISO 2700
1:2005

ISMS PRACTITIONER
“Re-positioning to ISO 27001:2013”
Program Overview

More than 90% businesses of all sizes suffer from information security threats – with impacts ranging
from minor data loss to complete shutdown. As technology becomes more powerful and processes
becomes more complex busniness risks have increased exponentially - the need to ensure security
has never been greater. Popular surveys indicate that corporates are spending time and money on
new technologies. In reality, information security is more of a people and process issue than it is a
technology issue.
With increased threats, ISO has just launched an updated version of most followed global standard on
information security - ISO 27001 from 2005 to 2013, with some significant changes and several minor
changes. All in line with the need of the hour. This 2-day course is designed to provide information
security professionals with the knowledge and skills required to implement ISMS in an organization.
This course will cover issues highlighting the importance of information security; structure of ISO
27001:2013 and its detailed contents towards an effective ISMS implementation in preparation for
internal and external audits.

Learning Objectives
At the end of the program, participants are expected to:
●● Map the difference between ISO 27001:2005 and ISO 27001:2013
●● Upgrade your existing ISMS to be fully compliants with ISO 27001:2013
●● Be equipped for 2nd and 3rd party information security audits
●● Acquire and implement flexibility of choice for Risk Assessment where ‘asset owners’ are now
‘risk owners’
●● Implement an effective &efficient information security management system
●● Learn how to map your stakeholders and interested parties
●● Strategically link ISO 31000, ISO 22301 to your Risk Register

Benefits

●● Gain clear understanding & hands-on experience for an effective organizational ISMS
●● Act on the systemic problems and operational issues that companies face during ISMS 	
●●
●●
●●
●●
●●

	
implementation (using ISO 27001:2013 as a benchmark)
Gain access to world-class resources / assets that ISMS implementation practically EASIER!
Perform an effective / holistic Risk Management addressing all business needs
Achieve substantial gains in experience through case studies and workshops
Create an effective organizational ISMS complying to ISO 27001:2013 & ensuring your 	
	
business requirements
Create a knowledge / mind share by interacting with other Information Security professionals

Key Clients

www.eccinternational.com

Schedule:

●● Jan. 29 - 30, 2014

Venue:

●● Makati City

Duration:

●● 2 Days

Target Audience:

●● 	IT Managers /
Consultants
●● 	Information Security
Professionals
●● 	Internal Auditors /
Audit Team Members
●● 	Risk Managers /
Management Team
●● 	Information Security
Consultants
●● 	All Personnel
responsible for ISMS
Implementation in the
Organization

More Related Content

More from APEXMarCom

Training ROI - Return of Investment
Training ROI - Return of InvestmentTraining ROI - Return of Investment
Training ROI - Return of InvestmentAPEXMarCom
 
An IMPERATIVE for EVERY ORGANIZATION: Crisis Communication Planner
An IMPERATIVE for EVERY ORGANIZATION: Crisis Communication PlannerAn IMPERATIVE for EVERY ORGANIZATION: Crisis Communication Planner
An IMPERATIVE for EVERY ORGANIZATION: Crisis Communication PlannerAPEXMarCom
 
CERTIFIED Data Center Professional - CDCP
CERTIFIED Data Center Professional - CDCPCERTIFIED Data Center Professional - CDCP
CERTIFIED Data Center Professional - CDCPAPEXMarCom
 
Blended ITIL® Foundation
Blended ITIL® FoundationBlended ITIL® Foundation
Blended ITIL® FoundationAPEXMarCom
 
Managing Structured Aircraft Modification Projects
Managing Structured Aircraft Modification ProjectsManaging Structured Aircraft Modification Projects
Managing Structured Aircraft Modification ProjectsAPEXMarCom
 
Cloud Essentials Course
Cloud Essentials CourseCloud Essentials Course
Cloud Essentials CourseAPEXMarCom
 
Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013APEXMarCom
 

More from APEXMarCom (7)

Training ROI - Return of Investment
Training ROI - Return of InvestmentTraining ROI - Return of Investment
Training ROI - Return of Investment
 
An IMPERATIVE for EVERY ORGANIZATION: Crisis Communication Planner
An IMPERATIVE for EVERY ORGANIZATION: Crisis Communication PlannerAn IMPERATIVE for EVERY ORGANIZATION: Crisis Communication Planner
An IMPERATIVE for EVERY ORGANIZATION: Crisis Communication Planner
 
CERTIFIED Data Center Professional - CDCP
CERTIFIED Data Center Professional - CDCPCERTIFIED Data Center Professional - CDCP
CERTIFIED Data Center Professional - CDCP
 
Blended ITIL® Foundation
Blended ITIL® FoundationBlended ITIL® Foundation
Blended ITIL® Foundation
 
Managing Structured Aircraft Modification Projects
Managing Structured Aircraft Modification ProjectsManaging Structured Aircraft Modification Projects
Managing Structured Aircraft Modification Projects
 
Cloud Essentials Course
Cloud Essentials CourseCloud Essentials Course
Cloud Essentials Course
 
Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

ISMS 27001 Practitioner

  • 1. Official Business Paper: * ISO 27001:20 13 moves beyond PDCA * 10 major cha nges from ISO 2700 1:2005 ISMS PRACTITIONER “Re-positioning to ISO 27001:2013” Program Overview More than 90% businesses of all sizes suffer from information security threats – with impacts ranging from minor data loss to complete shutdown. As technology becomes more powerful and processes becomes more complex busniness risks have increased exponentially - the need to ensure security has never been greater. Popular surveys indicate that corporates are spending time and money on new technologies. In reality, information security is more of a people and process issue than it is a technology issue. With increased threats, ISO has just launched an updated version of most followed global standard on information security - ISO 27001 from 2005 to 2013, with some significant changes and several minor changes. All in line with the need of the hour. This 2-day course is designed to provide information security professionals with the knowledge and skills required to implement ISMS in an organization. This course will cover issues highlighting the importance of information security; structure of ISO 27001:2013 and its detailed contents towards an effective ISMS implementation in preparation for internal and external audits. Learning Objectives At the end of the program, participants are expected to: ●● Map the difference between ISO 27001:2005 and ISO 27001:2013 ●● Upgrade your existing ISMS to be fully compliants with ISO 27001:2013 ●● Be equipped for 2nd and 3rd party information security audits ●● Acquire and implement flexibility of choice for Risk Assessment where ‘asset owners’ are now ‘risk owners’ ●● Implement an effective &efficient information security management system ●● Learn how to map your stakeholders and interested parties ●● Strategically link ISO 31000, ISO 22301 to your Risk Register Benefits ●● Gain clear understanding & hands-on experience for an effective organizational ISMS ●● Act on the systemic problems and operational issues that companies face during ISMS ●● ●● ●● ●● ●● implementation (using ISO 27001:2013 as a benchmark) Gain access to world-class resources / assets that ISMS implementation practically EASIER! Perform an effective / holistic Risk Management addressing all business needs Achieve substantial gains in experience through case studies and workshops Create an effective organizational ISMS complying to ISO 27001:2013 & ensuring your business requirements Create a knowledge / mind share by interacting with other Information Security professionals Key Clients www.eccinternational.com Schedule: ●● Jan. 29 - 30, 2014 Venue: ●● Makati City Duration: ●● 2 Days Target Audience: ●● IT Managers / Consultants ●● Information Security Professionals ●● Internal Auditors / Audit Team Members ●● Risk Managers / Management Team ●● Information Security Consultants ●● All Personnel responsible for ISMS Implementation in the Organization