The webinar covers:
• Principles of auditing
• Attributes of effective auditors
• Audit aftermath-communicating audit results, ensuring effective closure of non-conformities
Presenter:
This webinar was presented by Cyrus Karanja, Systems Co-ordinator at Tetra Pak and a well-practiced professional with over 9 years of experience in the areas of Quality, Health, Safety & Environmental Management.
Link of the recorded session published on YouTube: https://youtu.be/aUcvt2-x8PM
PECB Webinar: The Impact ISO 9001 Revisions Will Have on Your Business and Qu...PECB
The webinar covers:
• The major Revisions of the ISO 9001 standard
• Preventive vs. Risk Management & Stakeholders vs. Suppliers
• Main business processes and their interaction
• Understanding process approach & interaction of process
Presenter:
This webinar was presented by Sheryl Anderson, Managing Director for Quality Systems Solutions & Initiatives (QSSI) and certified trainer for HACCP ISO 9001 & ISO 22000.
Link of the recorded session published on YouTube: https://www.youtube.com/watch?v=BLoubNgXKsM
PECB Webinar: Corrective Action or Preventative Action - The new risk based m...PECB
The webinar covers:
• How the concepts of corrective and preventive action change in the new version of the standard
• Understanding risk-based thinking approach
• Understanding the new risk based methodology for ISO 9001:2015
Presenter:
This webinar was presented by Jason Teliszczak, PECB Certified Trainer and CEO/Founder of JT Environmental Consulting, Inc.
Link of the recorded session published on YouTube: https://www.youtube.com/watch?v=NSNIgSYNgSI
Firstly, it will be clarify some of the misunderstandings of some of the fundamental audit concepts and principals that are implemented during the audit or planning of the audit program, focusing on audit guidelines, auditor principles, audit process principles and types of audits. Furthermore, gaining understanding of the management and preparation of an ISO 9001 audit through audit program pillars, good audit practices and prepared work documents and checklists. Outline how to conduct and close an ISO 9001 audit in a professional manner with the precise audit review.
Main points covered:
• Fundamental audit concepts and principles
• Managing an ISO 9001 audit program
• Preparation of an ISO 9001 audit
• Conduct of an ISO 9001 audit & Closing the audit
Presenter:
This webinar was presented by Kefah El-Ghobbas, PECB Certified Trainer and Organizational Development expert and operations manager at TURBO CARBO.
Link of the recorded session published on YouTube:https://youtu.be/kK8pAc3QM5E
The webinar covers:
• Important changes in QMS
• Context of the organization
• Planning - Risk Assessment & Identification of Objectives
Presenter:
This live session was presented by Tariq Khan, PECB Partner and Trainer, who is also the country manager for IMS Reliance.
Link of the recorded session published on YouTube: https://youtu.be/MhDWbDPHMeA
PECB Webinar: The Impact ISO 9001 Revisions Will Have on Your Business and Qu...PECB
The webinar covers:
• The major Revisions of the ISO 9001 standard
• Preventive vs. Risk Management & Stakeholders vs. Suppliers
• Main business processes and their interaction
• Understanding process approach & interaction of process
Presenter:
This webinar was presented by Sheryl Anderson, Managing Director for Quality Systems Solutions & Initiatives (QSSI) and certified trainer for HACCP ISO 9001 & ISO 22000.
Link of the recorded session published on YouTube: https://www.youtube.com/watch?v=BLoubNgXKsM
PECB Webinar: Corrective Action or Preventative Action - The new risk based m...PECB
The webinar covers:
• How the concepts of corrective and preventive action change in the new version of the standard
• Understanding risk-based thinking approach
• Understanding the new risk based methodology for ISO 9001:2015
Presenter:
This webinar was presented by Jason Teliszczak, PECB Certified Trainer and CEO/Founder of JT Environmental Consulting, Inc.
Link of the recorded session published on YouTube: https://www.youtube.com/watch?v=NSNIgSYNgSI
Firstly, it will be clarify some of the misunderstandings of some of the fundamental audit concepts and principals that are implemented during the audit or planning of the audit program, focusing on audit guidelines, auditor principles, audit process principles and types of audits. Furthermore, gaining understanding of the management and preparation of an ISO 9001 audit through audit program pillars, good audit practices and prepared work documents and checklists. Outline how to conduct and close an ISO 9001 audit in a professional manner with the precise audit review.
Main points covered:
• Fundamental audit concepts and principles
• Managing an ISO 9001 audit program
• Preparation of an ISO 9001 audit
• Conduct of an ISO 9001 audit & Closing the audit
Presenter:
This webinar was presented by Kefah El-Ghobbas, PECB Certified Trainer and Organizational Development expert and operations manager at TURBO CARBO.
Link of the recorded session published on YouTube:https://youtu.be/kK8pAc3QM5E
The webinar covers:
• Important changes in QMS
• Context of the organization
• Planning - Risk Assessment & Identification of Objectives
Presenter:
This live session was presented by Tariq Khan, PECB Partner and Trainer, who is also the country manager for IMS Reliance.
Link of the recorded session published on YouTube: https://youtu.be/MhDWbDPHMeA
An audit is a systematic, independent and documented process for obtaining audit evidence and evaluating it objectively to determine the extent to which audit criteria are fulfilled.
This presentation illustrates:
- The Audit definition
- Possible reasons for auditing
- Audit Types
- How to conduct an audit
0- Audit preparation
0 Audit performance
0- Audit reporting
0- Audit follow up and closure
- Auditor key skills
* For business possibilities, feel free to contact me.
SO 9001:2015 requires to address the risks and opportunities in each process of the QMS.
The principal questions of risk management are:
- Key Risks Wording and
- Risk Treatment Areas
Examples for 'Management Review', 'Technical
Maintenance', and 'Control of Personnel' processes.
Use in ISO 9001:2015 Internal auditors and personnel training.
What is requirement of Risk based Thinking in ISO 9001:2015 & ISO 14001:2015 ?
What is Risk? How to identify? How to assess and control?
How to incorporate Risk based thinking in to QMS & EMS?
The webinar covers:
• Analysis of the 6 step approach to process auditing
• How to define processes through Generic Processes Model
• Overview of the process affecters 8 M’s, business processes and processes types.
Presenter:
This webinar was hosted by David Smart, PECB Certified Trainer and Managing Director of Smart ISO Systems / Smart Mentoring.
Link of the recorded session published on YouTube: https://youtu.be/X5rUniMYV_U
A key change in the 2015 revision is to establish a systematic approach to risk, rather than treating it as a single component of a quality management system.
ISO 9001 - It sets out the criteria for a quality management system and is th...Tushar Sadhye
ISO 9001 - It sets out the criteria for a quality management system and is the only standard in the family that can be certified to (although this is not a requirement).
ISO over one million companies and organizations in over 170 countries implement 9001:2008.
Detailed insight of Strategy Deployment in an Organization encompassing: Vision, Mission & Quality Policy, Goals and Objectives & its importance, SMART Objectives, Target & Requirement of Objectives in ISO 9001:2015 Standard
This webinar was about ISO 9001:2015 changes and enterprise risk management. It mentioned how risk management actually contributes to the organization’s value and QMS. It also described the benefits of implementing enterprise risk management.
Main points covered:
• Where to start?
• What is in and what is out?
• How to win top management support?
Presenter:
This webinar was presented by Eddie de Vries, a PECB ISO 31000 Certified Risk Manager and Trainer with 20 years’ experience in Quality Management and more than 12 years’ experience in Enterprise Risk Management.
Link of the recorded webinar published on YouTube: https://youtu.be/PLHx57ZPo30
SSCG ISO 9001 Quality Management Systems (QMS)SSCG Consulting
ISO 9001 is the internationally recognised standard for quality management and as reputable performance benchmark. Applies to processes, procedures and systems that create and control the products and services a company supplies, and prescribes systematic control of activities to ensure that the needs and expectations of customers are met.
ISO 9001 de Auditoría Interna como herramienta para la mejora continuaPECB
The webinar covers:
• IMPORTANCIA DE LA ADUDITORÍA INTERNA, EN LA MEDIDA, SEGUIMIENTO Y EVALUACIÓN DEL SISTEMA DE GESTIÓN DE LA CALIDAD ISO 9001:2015
• PLANIFICACIÓN, ESTRUCTURA Y REALIZACIÓN DE LA AUDITORÍA INTERNA
• RESULTADOS DE LA AUDITORÍA INTERNA. NO CONFORMIDADES COMO OPORTUNIDADES DE MEJORA
Presenter:
Este seminario será presentado por Antonio Sole Cabanes , PECB Certified Trainer y Director en Consultor y Formador Textil.
Link of the recorded session published on YouTube: https://youtu.be/J8rD3pzStg4
An audit is a systematic, independent and documented process for obtaining audit evidence and evaluating it objectively to determine the extent to which audit criteria are fulfilled.
This presentation illustrates:
- The Audit definition
- Possible reasons for auditing
- Audit Types
- How to conduct an audit
0- Audit preparation
0 Audit performance
0- Audit reporting
0- Audit follow up and closure
- Auditor key skills
* For business possibilities, feel free to contact me.
SO 9001:2015 requires to address the risks and opportunities in each process of the QMS.
The principal questions of risk management are:
- Key Risks Wording and
- Risk Treatment Areas
Examples for 'Management Review', 'Technical
Maintenance', and 'Control of Personnel' processes.
Use in ISO 9001:2015 Internal auditors and personnel training.
What is requirement of Risk based Thinking in ISO 9001:2015 & ISO 14001:2015 ?
What is Risk? How to identify? How to assess and control?
How to incorporate Risk based thinking in to QMS & EMS?
The webinar covers:
• Analysis of the 6 step approach to process auditing
• How to define processes through Generic Processes Model
• Overview of the process affecters 8 M’s, business processes and processes types.
Presenter:
This webinar was hosted by David Smart, PECB Certified Trainer and Managing Director of Smart ISO Systems / Smart Mentoring.
Link of the recorded session published on YouTube: https://youtu.be/X5rUniMYV_U
A key change in the 2015 revision is to establish a systematic approach to risk, rather than treating it as a single component of a quality management system.
ISO 9001 - It sets out the criteria for a quality management system and is th...Tushar Sadhye
ISO 9001 - It sets out the criteria for a quality management system and is the only standard in the family that can be certified to (although this is not a requirement).
ISO over one million companies and organizations in over 170 countries implement 9001:2008.
Detailed insight of Strategy Deployment in an Organization encompassing: Vision, Mission & Quality Policy, Goals and Objectives & its importance, SMART Objectives, Target & Requirement of Objectives in ISO 9001:2015 Standard
This webinar was about ISO 9001:2015 changes and enterprise risk management. It mentioned how risk management actually contributes to the organization’s value and QMS. It also described the benefits of implementing enterprise risk management.
Main points covered:
• Where to start?
• What is in and what is out?
• How to win top management support?
Presenter:
This webinar was presented by Eddie de Vries, a PECB ISO 31000 Certified Risk Manager and Trainer with 20 years’ experience in Quality Management and more than 12 years’ experience in Enterprise Risk Management.
Link of the recorded webinar published on YouTube: https://youtu.be/PLHx57ZPo30
SSCG ISO 9001 Quality Management Systems (QMS)SSCG Consulting
ISO 9001 is the internationally recognised standard for quality management and as reputable performance benchmark. Applies to processes, procedures and systems that create and control the products and services a company supplies, and prescribes systematic control of activities to ensure that the needs and expectations of customers are met.
ISO 9001 de Auditoría Interna como herramienta para la mejora continuaPECB
The webinar covers:
• IMPORTANCIA DE LA ADUDITORÍA INTERNA, EN LA MEDIDA, SEGUIMIENTO Y EVALUACIÓN DEL SISTEMA DE GESTIÓN DE LA CALIDAD ISO 9001:2015
• PLANIFICACIÓN, ESTRUCTURA Y REALIZACIÓN DE LA AUDITORÍA INTERNA
• RESULTADOS DE LA AUDITORÍA INTERNA. NO CONFORMIDADES COMO OPORTUNIDADES DE MEJORA
Presenter:
Este seminario será presentado por Antonio Sole Cabanes , PECB Certified Trainer y Director en Consultor y Formador Textil.
Link of the recorded session published on YouTube: https://youtu.be/J8rD3pzStg4
The lead auditor training course is a course in which the candidate is taught about ISO 9001 quality management systems audits from different standpoints and also how to build an effective quality management system.
How to Perform a Successful Internal Quality AuditGreenlight Guru
You already know internal quality audits are required by both FDA 21 CFR Part 820 and ISO 13485.
You also probably already know they are a big hassle to conduct.
What you might not know is that they are one of the most powerful weapons at your disposal for preventing 483's and observations.
Why?
Because they are one of the most effective and efficient ways to make sure you and your team are always prepared if FDA or NB decided to show up unexpectedly.
So how do you “establish” the right procedures? How do you ensure your auditor is competent and properly qualified? And what do you do if you find non-conformances?
View this presentation by our guest Kyle Rose, President at Rook Quality Systems, where you will find the answers to all those questions and more.
Specifically, you will learn:
- How to conduct an effective internal quality audit based on process identification, sampling and questioning
- How to plan a internal quality audit and develop an audit schedule
- How to find and use competent and qualified auditors
- Why certain auditors shouldn’t audit certain areas
- How to properly report the findings of your internal quality audit
- How to concisely document non-conformances
- How to determine what needs corrective actions and how to follow up on them
This presentation takes one through the basic mistakes often made while performing the internal audit function and calls for introspection of the internal audit function on a timely basis. It also defines the manner in which an internal audit function is to be approached.
ISO 9001 2015 | Training Now Available In Johannesburg & PretoriaAndre Barnarde
The NEW ISO Quality Management Standard was ratified in September 2015.
MOVE-TO-THE-TOP-OF-THE-CLASS and get the latest training. Now available in Johannesburg and Pretoria.
Iso 9001 lead auditor course training irca approvedIntertek Moody
Growing scrutiny toward industry's Quality Management has made conformance with ISO 9001:2008- a voluntary, internationally recognized Quality Management Systems (QMS) standard - more important than ever.
Regardless of whether you are conducting internal audits, second-party or third-party audits, the auditor training programs must meet the highest standards of professionalism. Upon completion of this program, participants will be capable of conducting internal audits, sub-contractor audits, and supplier audits. This five-day, forty-hour course is approved by IRCA, and meets all training requirements for lead auditor certification.
Al terminar el curso, el participante conocerá los lineamientos para la realización de una auditoría del sistema de gestión de calidad, así como su utilidad en el desarrollo de la organización
CHAPTER-1 Information Gathering and Administration.pdfDr. Dinesh Mehta
During the audit, information relevant to the objectives, scope and criteria, including information on interfaces between functions, activities and processes, should be collected by appropriate sampling and should be verified.
Quality Audit in pharmaceutical industryHari Haran
It deals with the understanding and process for auditing
pharmaceutical industries. This covers the methodology involved in auditing process of different in pharmaceutical industries.
CIA part 1 essentials of internal auditingariundalai1
The Institute of Internal Auditors (The IIA) uses the International Professional Practices Framework (IPPF) to organize its authoritative guidance in a manner that is readily accessible. The IPPF, sometimes called the “Red Book,” is intended to help practitioners and stakeholders throughout the world respond to the expanding market for high-quality internal auditing.
BOOK REPORT: 2. Guía para la implantación de un sistema de gestión de calidad en i.e.s. que imparten formación profesional en Aragón basado en la norma iso 9001-2000.
Similar to PECB Webinar: Conducting Effective Quality System Audits (20)
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
The global implications of DORA and NIS 2 Directive are significant, extending beyond the European Union.
Amongst others, the webinar covers:
• DORA and its Implications
• Nis 2 Directive and its Implications
• How to leverage directive and regulation as a marketing tool and competitive advantage
• How to use new compliance framework to request additional budget
Presenters:
Christophe Mazzola - Senior Cyber Governance Consultant
Armed with endless Excel files, a meme catalog worthy of the best X'os (formerly twittos), and a risk register to make your favorite risk manager jealous, I swapped my computer scientist cape a few years ago for that of a (cyber) threat hunter with the honorary title of CISO.
Ah, and I am also a quadruple senior certified ISO27001/2/5, Pas mal non ? C'est francais.
Malcolm Xavier
Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc.
His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management.
Date: April 25, 2024
Tags: Information Security, Digital Operational Resilience Act (DORA)
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: Digital Operational Resilience Act (DORA) - EN | PECB
NIS 2 Directive - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
In an era where digital transformation is inevitable, the landscape of cybersecurity is constantly evolving.
Amongst others, the webinar covers:
• DORA and its Implications
• ISO/IEC 27005: Risk Management in Information Security
• Leveraging Artificial Intelligence for Enhanced Cybersecurity
Presenters:
Geoffrey L. Taylor - Director of Cybersecurity
Geoffrey Taylor brings a wealth of experience from multiple roles within various industries throughout his career. As a Certified ISO 27001 Implementer and Auditor, as well as certified ISO 27005, CISM and CRISC, he brings a unique perspective on cybersecurity strategy, risk management and the implementation of an Information Security Management System, having helped multiple organizations in aligning their strategy based on their threat landscape.
Martin Tully - Senior Cyber Governance Consultant
Martin is a Senior Consultant at CRMG with over twenty years of experience, and has previously been employed at two of the ‘Big Four’ professional services firms. Martin has worked across most industry sectors in the development of the best practice guidance and risk analysis methodologies. Martin is also accomplished at: leading the implementation of an ISMS; delivering a number of information risk assessments; reviewing information security policies; assessing security requirements across the supply chain; and updating a complete framework of supporting standards. Prior to the ISF, Martin’s roles have included delivering operational risk reporting, running research projects and benchmarking information security investments for major clients. Martin holds a Bachelors degree from Royal Holloway University of London.
Date: March 27, 2024
Tags: ISO, ISO/IEC 27005, ISO/IEC 42001, Artificial Intelligence, Information Security, Digital Operational Resilience Act (DORA)
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27005 Information Security Risk Management - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/ffX-Xbw7XUk
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
In today’s rapidly evolving world, where Artificial Intelligence (AI) not only drives innovation but also presents unique challenges and opportunities, staying ahead means being informed.
Amongst others, the webinar covers:
• ISO/IEC 27001 and ISO/IEC 42001 and their key components
• Latest trends in AI Governance
• Ethical AI practices
• Benefits of Certification
Presenters:
Jeffrey Bankard - Cybersecurity & AI Leader, AI Management Systems: ISO/IEC 42001
Jeffrey provides executive leadership for AI product creation through the product incubation unit (PIU). Ensures the timely delivery of AI consulting engagements through cross-functional teams comprised of senior information and network security leaders to establish strategic goals for improving the security architecture and risk posture for clients. Consults with business leaders to define key performance indicators and service levels. Fosters employee development through mentoring and coaching. Decides how to achieve results within the organization’s strategic plans, policies, and guidelines. Develops new products and secures those products through current AI security guidelines (ISO 42001).
Adrian Resag - Experienced in Risk and Control - ISO/IEC 27001 and ISO/IEC 42001
Adrian believes a stimulating career can span many disciplines and that leading organizations value versatile professionals. He has enjoyed managing teams spanning the globe by working in world-leading organizations as Chief Audit Executive, Head of Risk Management, Information Systems Auditor, Head of Internal Control, as a consultant, a statutory auditor and an accountant. To allow such a diverse career, his approach has been to pursue certifications in many fields (making him one of the most qualified and certified in some of them). He has written books and created professional certifications in audit & assurance and compliance & ethics, and teaches in subjects from information security to risk management. With a passion for education, Adrian founded an educational institution and has taught tens of thousands of students and professionals online, in companies, universities and in governmental organizations.
Date: February 28, 2024
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/DujXaxBhhRk
The importance of a robust cybersecurity strategy cannot be overstated. Learning on the effective measures to be taken and tools needed to navigate the evolving cybersecurity landscape successfully is essential.
Amongst others, the webinar covers:
• ISO/IEC 27002 and ISO/IEC 27032 and their key components
• Key Components of a Resilient Cybersecurity Strategy
• CMMC Frameworks
Presenters:
Dr. Oz Erdem
Governance, Risk and Compliance (GRC) consultant, trainer, auditor, and speaker
Dr. Erdem has over 25 years of experience in information security, trade compliance, data privacy, and risk management. He took leadership roles in governance and compliance at various Fortune 100-500 companies and SMBs, including Siemens Corporation, Siemens Industry, Linqs, Texas Instruments, Rtrust, ICEsoft Technologies, NATO C3A, and BILGEM. In addition, successfully managed software development (i.e., embedded, cloud, and SaaS) and digital product projects involving information security, mobile networks, and IoT networks. Further, Dr. Erdem led several non-profit organizations, such as National Association of District Export Councils (NADEC), Government Contractors Council (GovConCouncil), and Central-North Florida District Export Council as the Chairman of the Board.
Peter Geelen
Peter Geelen is the director and managing consultant at CyberMinute and Owner of Quest for Security, Belgium. Over more than 20 years, Peter has built strong experience in enterprise security & architecture, Identity & Access management, but also privacy, information & data protection, cyber- and cloud security. Last few years, the focus is on ISO/IEC 27001 and other ISO certification mechanisms. Peter is accredited Lead Auditor for ISO/IEC 27001, ISO 9001, PECB Trainer and Fellow in Privacy. Committed to continuous learning, Peter holds renowned security certificates as certified ISO/IEC 27701 lead implementer and lead auditor, ISO/IEC 27001 Master, Sr. Lead Cybersecurity Manager, ISO/IEC 27002 lead manager, ISO/IEC 27701 Lead Implementer, cDPO, Risk management, Lead Incident Mgr., Disaster Recovery, and many more.
George Usi - CEO of Omnistruct
An internet pioneer and award-winning leader in internet governance with over 25 years of experience, George Usi knows that getting hacked is not a matter of ‘if’ but, ‘when’ and the fiscal and reputational effects that has on a business, the executives, and the board. George is the Co-Founder of Omnistruct, a cyber risk company. Omnistruct protects and expands revenue creation, reputation, and customer retention through cyber risk transference, governance, and compliance. We ensure that security and privacy programs work.
Date: January 24, 2024
YouTube Video: https://youtu.be/9i5p5WFExT4
Website: https://bit.ly/3SjovIP
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
As we approach the new year, the importance of a robust cybersecurity strategy cannot be overstated. Learning on the effective measures to be taken and tools needed to navigate the evolving cybersecurity landscape successfully is essential.
Amongst others, the webinar covers:
• ISO/IEC 27001 and ISO/IEC 27035 and their key components
• Key Components of a Resilient Cybersecurity Strategy
• Best practices for building a resilient cybersecurity strategy in 2024
Presenters:
Rinske Geerlings
Rinske is an internationally known consultant, speaker and certified Business Continuity, Information Security & Risk Management trainer.
She was awarded Alumnus of the Year 2012 of Delft University, Australian Business Woman of the Year 2010-13 by BPW, Risk Consultant of the Year 2017 (RMIA/Australasia) and Outstanding Security Consultant 2019 Finalist (OSPAs)
Rinske has consulted to the Department of Prime Minister & Cabinet, 15 Central Banks, APEC, BBC, Shell, Fuji Xerox, NIB Health Funds, ASIC, Departments of Defense, Immigration, Health, Industry, Education, Foreign Affairs and 100s of other public and private organizations across 5 continents.
She has been changing the way organizations ‘plan for the unexpected’. Her facilitation skills enable organizations to achieve their own results and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCM, Security, and Risk.
Her 'alter ego' includes being a lead singer in SophieG Music and contributing to the global charity playing for Change, which provides music education to children in disadvantaged regions.
Loris Mansiamina
A Senior GRC Professional consultant for Small, Medium and large companies. Over 10 years, Loris has been assisting clients in both public and private sectors about various matters relating to Gouvernance, Risk Management and Compliance (GRC), Digital transformation, cyber security program management, ISO 27k & ISO 20k implementation, COBIT & ITIL implementation, etc.
Date: December 19, 2023
Tags: ISO, ISO/IEC 27001, ISO/IEC 27035, Cybersecurity, Information Security
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
ISO/IEC 27035 Information Security Incident Management - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/yT8gxRZD_4c
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
In today's rapidly evolving digital landscape, the integration of artificial intelligence (AI) in business processes is becoming increasingly essential. Hence, it is crucial to stay informed and prepared.
Amongst others, the webinar covers:
• ISO/IEC 27005 and ISO/IEC 27001 and their key components
• The standard’s alignment
• Identifying AI risks and vulnerabilities
• Implementing effective risk management strategies
Presenters:
Sabrina Feddal
With more than 16 years of background in operational security, telco as engineer and project manager for major international companies. I have founded Probe I.T in 2016 to provide my customers (both national and international) with GRC services. Winner of the 2020 award, the CEFCYS – Main French Women in cybersecurity association - jury's favorite, she remains committed on a daily basis to maintaining diversity and gender diversity in her teams.
Passionate about Law, History & Cybersecurity. She has several professional certifications acquired over the course of her career: Prince2, CISSP, Lead Implementer ISO27001, Risk Manager, University degree in Cybercrime and Digital Investigation.
Her values: excellence, discretion, professionalism.
Mike Boutwell
Mike Boutwell is a Senior Information Security Specialist with over 15 years of experience in security and 10 years of risk management experience, primarily focused on financial services. He excels in collaborating with CISOs and other executive leadership to build and implement security frameworks aligned with business objectives and developing enterprise-wide security requirements. Mike has a strong track record of securing assets worth over $1 quadrillion and delivering $100M+ projects.
Mike is a certified CISSP, CISA, CGEIT, ISO 27001 Senior Lead Implementer, ISO 27001 Senior Lead Auditor, ISO 38500 Senior Lead IT Governance Manager, ISO 27032 Senior Lead Cyber Security Manager, and Certified Non-Executive Director.
Date: November 22, 2023
Tags: ISO, ISO/IEC 27001, ISO/IEC 27005, Cybersecurity, Information Security
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
ISO/IEC 27005 Information Security Risk Management - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/TtnY1vzHzns
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
In today's digital age, cybersecurity is more critical than ever. Hence, it is crucial to stay informed and prepared.
Amongst others, the webinar covers:
• ISO/IEC 27032:2023 and ISO/IEC 27701 and their key components
• The standard’s alignment
• Emerging Cybersecurity Threats
• What is new to the ISO/IEC 27032:2023
Presenters:
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Jeffrey Crump
Mr. Jeffrey Crump is the Principal Consultant at Arizona-based Cyber Security Training and Consulting LLC and a graduate of the Certified NIS 2 Directive Lead Implementer course. He is a Certified CMMC Assessor, Certified CMMC Professional, and Instructor. Mr. Crump is also the author of Cyber Crisis Management Planning: How to reduce cyber risk and increase organizational resilience. His book has been expanded into a triad of certification courses on cyber crisis planning, exercises, and leadership.
Date: October 25, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/a21uasr8aLs
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
Cybersecurity is an ongoing journey. The regular update and improvement of security measures is essential to stay ahead of evolving threats.
Amongst others, the webinar covers:
• Benefits of Compliance
• Digital Transformation: Why
• ISO/IEC 27001 and ISO/IEC 27032
• ISO/IEC 27001: Information Security Management System (ISMS)
• ISO/IEC 27032: Cybersecurity Framework
Presenters:
Douglas Brush
Douglas Brush is a federally court-appointed Special Master, and Court Appointed Neutral expert in high-profile litigation matters involving privacy, security, and eDiscovery.
He is an information security executive with over 30 years of entrepreneurship and professional technology experience. He is a globally recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to serving as a CISO and leading enterprise security assessments, he has conducted hundreds of investigations involving hacking, data breaches, trade secret theft, employee malfeasance, and various other legal and compliance issues.
He is the founder and host of Cyber Security Interviews, a popular information security podcast.
Douglas is also committed to raising awareness about mental health, self-care, neurodiversity, diversity, equity, and inclusion, in the information security industry.
Malcolm Xavier
Malcolm Xavier has been working in the Digital Industry for over 18 Years now. He has worked with Global Clients in South Africa, United States and United Kingdom. He has achieved Many Professional Certifications Like CISSP, Google Cloud Practitioner, TOGAF, Azure Cloud, ITIL v3 etc.
His core competencies include IT strategy, cybersecurity, IT infrastructure management, data center migration and consolidation, data protection and compliance, risk management and governance, and IS program development and management.
Carole Njoya
Founder in 2018 of Alcees, a Paris-based management consulting fabric specialized in cybersecurity, data privacy governance and digital trust, Carole Njoya provides independent, tailored and expert advisory to companies doing business in European markets and serving both B2B and B2C customers. With more than 100 cybersecurity projects delivered, she assists entities in preparing, implementing and maintaining the right best practices under the ISO 27001 compliance framework and GDPR article 25 obligation (Privacy by design) for their vendors. Carole Njoya featured in the « Women Know Cybersecurity » 2019 Twitter list edited by Cybercrime Magazine. Carole Njoya is committed in science and engineering since pre-teen period.
Date: September 27, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
YouTube video: https://youtu.be/U7tyzUrh8aI
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
The management of AI systems is a shared responsibility. By implementing the ISO 31000 Framework and complying with emerging regulations like the EU ACT, we can jointly create a more reliable, secure, and trustworthy AI ecosystem.
Amongst others, the webinar covers:
• Understanding AI and the regulatory landscape
• AI and the threat landscape
• A risk driven approach to AI assurance - based on ISO 31000 principles
• Stress testing to evaluate risk exposure
Presenters:
Chris Jefferson
Chris is the Co-Founder and CTO at Advai. As the Co-Founder of Advai, Chris is working on the application of defensive techniques to help protect AI and Machine Learning applications from being exploited. This involves work in DevOps and MLOps to create robust and consistent products that support multiple platforms, such as cloud, local, and edge.
Nick Frost
Nick Frost is Co-founder and Lead Consultant at CRMG. Nick’s career in cyber security spanning nearly 20 years. Most recently Nick has held leadership roles at PwC as Group Head of Information Risk and at the Information Security Forum (ISF) as Principal Consultant. In particular Nick was Group Head of Information Risk for PwC designing and implementing best practice solutions that made good business sense that prioritized key risks to the organisation and helped minimize disruption to ongoing operations. Whilst at the ISF Nick led their information risk projects and delivered many of the consultancy engagements to help organisations implement leading thinking in information risk management.
Nicks combined experience as a cyber risk researcher and practitioner designing and implementing risk based solutions places him as a leading cyber risk expert. Prior to cyber security and after graduating from UCNW and Oxford Brookes Nick was a geophysicist in the Oil and Gas Industry.
Date: August 24, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-31000
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/MXnHC6AvjXc
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
Generative AI offers great opportunities for innovation in various industries. Hence, by adopting ISO/IEC 27032, you can enhance your cybersecurity resilience and efficiently address the risks associated with generative AI.
Amongst others, the webinar covers:
• AI & Privacy
• Generative AI, Models & Cybersecurity
• AI & ISO/IEC 27032
Presenters:
Christian Grafenauer
Anonymization expert, privacy engineer, data protection officer, LegalTech researcher (GDPR, Blockchain, AI) Christian Grafenauer is an accomplished privacy engineer, anonymization expert, and computer science specialist, currently serving as the project lead for anonymity assessments at techgdpr. With an extensive background as a senior architect in Blockchain for IBM and years of research in the field since 2013, Christian co-founded privacy by Blockchain design to explore the potential of Blockchain technology in revolutionizing privacy and internet infrastructure. As a dedicated advocate for integrating legal and computer science disciplines, Christian’s expertise in anonymization and GDPR compliance enables innovative AI applications, ensuring a seamless fusion of technology and governance, particularly in the realm of smart contracts. In his role at techgdpr, he supports technical compliance, Blockchain, and AI initiatives, along with anonymity assessments. Christian also represents consumer interests as a member of the national Blockchain and DTL standardization committee at din (German standardization institute) in ISO/TC 307.
Akin Johnson
Akin J. Johnson is a renowned Cybersecurity Expert, known for his expertise in protecting digital systems from potential threats. With over a decade of experience in the field, Akin has developed a deep understanding of the ever-evolving cyber landscape.
Akin is an advocate for cybersecurity awareness and frequently shares his knowledge through speaking engagements, workshops, and publications. He firmly believes in the importance of educating individuals and organizations on the best practices for safeguarding their digital assets.
Lucas Falivene
Lucas is a highly experienced cybersecurity professional with a solid base in business, information systems, information security, and cybersecurity policy-making. A former Fulbright scholar with a Master of Science degree in Information Security Policy and Management at Carnegie Mellon University (Highest distinction) and a Master's degree in Information Security at the University of Buenos Aires (Class rank 1st). Lucas has participated in several trainings conducted by the FBI, INTERPOL, OAS, and SEI/CERT as well as in the development of 4 cyber ISO national standards.
Date: July 26, 2023
YouTube Link: https://youtu.be/QPDcROniUcc
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
By embracing the importance of GDPR and leveraging ISO/IEC 27701, you can enhance your data protection practices, achieve compliance, and minimize the risk of penalties.
Amongst others, the webinar covers:
Importance of Data Protection
Understanding Data Collection and Challenges
Introduction to GDPR
Key Principles of GDPR
Who does GDPR Apply to and Its Global Implications
Introduction to ISO/IEC 27701
Implementing ISO/IEC 27701
Privacy by Design
Dealing with IT on a Daily Basis
Building Awareness and Training
Audit, Data Discovery, and Risk Assessments
Presenters:
Mike Boutwell
Mike Boutwell is a Senior Information Security Specialist with over 15 years of experience in security and 10 years of risk management experience, primarily focused on financial services. He excels in collaborating with CISOs and other executive leadership to build and implement security frameworks aligned with business objectives and developing enterprise-wide security requirements. Mike has a strong track record of securing assets worth over $1 quadrillion and delivering $100M+ projects.
Mike is a certified CISSP, CISA, CGEIT, ISO 27001 Senior Lead Implementer, ISO 27001 Senior Lead Auditor, ISO 38500 Senior Lead IT Governance Manager, ISO 27032 Senior Lead Cyber Security Manager, and Certified Non-Executive Director.
Lisa Goldsmith
Lisa Goldsmith is the founder of LJ Digital and Data Consultancy. Lisa has over 23 years’ experience of supporting leadership teams in membership, charity, and wider not-for-profit organisations to simplify their IT and digital strategy that allows them to sleep soundly at night, knowing their systems and processes are fit for purpose, GDPR compliant, secure and that they deliver value to staff, members, and stakeholders.
Prior to starting her own consultancy, Lisa gained extensive experience working for membership organisations and has knowledge and expertise at all levels of operations from working within careers and qualifications teams, as Membership Manager, as Head of Digital & IT for delivering large-scale digital, IT and GDPR compliance projects and serving on several Senior Leadership Teams. Lisa is also currently a Trustee of the BCLA and Groundwork East.
Date: June 27, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/lfJrSLaGDtc
Website: https://bit.ly/437GOnG
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
The EU has implemented a range of regulations aimed at strengthening its cybersecurity posture. In this context, the ISO/IEC 27001 standard offers a comprehensive framework for managing and safeguarding sensitive information, such as personal data.
Amongst others, the webinar covers:
• Quick recap on the ISO/IEC 27001:2013 & 2022
• ISO/IEC 27001 vs legislation
• The EU Cyber Legislation landscape
• Some considerations and consequences
• How to stay on top of the ever changing context
Presenters:
Peter Geelen
Peter Geelen is the director and managing consultant at CyberMinute and Owner of Quest for Security, Belgium. Over more than 20 years, Peter has built strong experience in enterprise security & architecture, Identity & Access management, but also privacy, information & data protection, cyber- and cloud security. Last few years, the focus is on ISO/IEC 27001 and other ISO certification mechanisms. Peter is accredited Lead Auditor for ISO/IEC 27001, ISO 9001, PECB Trainer and Fellow in Privacy. Committed to continuous learning, Peter holds renowned security certificates as certified ISO/IEC 27701 lead implementer and lead auditor, ISO/IEC 27001 Master, Sr. Lead Cybersecurity Manager, ISO/IEC 27002 lead manager, ISO/IEC 27701 Lead Implementer, cDPO, Risk management, Lead Incident Mgr., Disaster Recovery, and many more.
Jean-Luc Peters
Jean-Luc Peters brings 25 years of IT technology, information and cybersecurity expertise to boards, executives, and employees. Since the younger age he has held management positions in the private and government sector. He is currently the Head of the Cyber Emergency Response team for the National Cybersecurity Authority in Belgium. In addition to this, he is also a trainer, coach and trusted advisor focusing on enhancing cyber resilience.
Jean-Luc has helped in the technical implementation of the NIS 1 (Network and Information Security) Directive transposition in Belgium, defining the Baseline Security Guidelines governmental ISMS framework and many other projects. He holds several certifications, including ISO/IEC 27001 Lead Implementer, ISO/IEC 27005 Auditor, CISSP, GISP, Prince 2 Practitioner, ITIL etc.
Date: May 31, 2023
Tags: ISO, ISO/IEC 27001, Information Security, Cybersecurity
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/rsjwwF5zlK8
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
To protect your organization from cyber attacks, you need to implement a robust information security management system (ISMS) and business continuity management system (BCMS) based on international standards, such as ISO/IEC 27001 and ISO 22301.
Amongst others, the webinar covers:
• Why we need a cyber response plan to protect business operations
• Introduction to ISO/IEC 27001 and ISO 22301
• What do we need for a cyber security response plan?
• How do we develop a cyber security response plan?
Presenters:
Nick Frost
Nick Frost is Co-founder and Lead Consultant at CRMG.
Nick’s career in cyber security spanning nearly 20 years. Most recently Nick has held leadership roles at PwC as Group Head of Information Risk and at the Information Security Forum (ISF) as Principal Consultant.
In particular Nick was Group Head of Information Risk for PwC designing and implementing best practice solutions that made good business sense, that prioritise key risks to the organisation and helped minimise disruption to ongoing operations. Whilst at the ISF Nick led their information risk projects and delivered many of the consultancy engagements to help organisations implement leading thinking in information risk management.
Nicks combined experience as a cyber risk researcher and practitioner designing and implementing risk based solutions places him as a leading cyber risk expert. Prior to cyber security and after graduating from UCNW and Oxford Brookes Nick was a geophysicst in the Oil and Gas Industry.
Simon Lacey
Simon is a resourceful, creative Information & Cyber Security professional with a proven track record of instigating change, disrupting the status quo, influencing stakeholders and developing ‘big picture’ vision across business populations. Multiple industry experience; excels in building stakeholder engagement & consensus; and suporting organisations to make sustainable change.
Simon also has considerable experience of risk management, education and awareness, strategy development and consulting to senior management and is a confident and engaging public speaker.
Simon has previously worked within the NHS, Bank of England and BUPA, before setting out as an independent consultan forming Oliver Lacey Limited, supporting clients in multiple business sectors.
When not working, Simon loves to run – currently training for the Berlin Marathon, a Director of Aylesbury United Football Club, records vlogs and is an experienced standup comic.
Date: April 26, 2023
Find out more about ISO training and certification services
Training: https://bit.ly/3AyoyYF
https://bit.ly/3LbBVTx
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/i4qx5mjEqio
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
Integrating ISO/IEC 27001 and ISO 31000 can help organizations align their information security and risk management efforts with their overall business objectives, leading to more effective risk management and better decision-making.
Amongst others, the webinar covers:
• Aligning the ISMS process with ISO/IEC 27001
• Using ISO 31000 within the ISMS
• Aligning the RM process with ISO 31000
• How/where does ISO/IEC 27001 fit?
Presenters:
Nick Riemsdijk
As a highly experienced and multi-skilled leader in Information and Physical Security, Nick is known as a collaborative, focused, driven and highly analytical individual with a broad portfolio of successes in client engagements. His expertise spans devising, implementing, managing and delivering information security, physical security, organizational resilience and facilities management solutions for organizations. He is certified as a Certified Information Security Manager (CISM), Certified Protection Professional (CPP), in Project Management (Prince2), ISO 22301 (Business Continuity), ISO 27001 (Information Security), and ISO 31000 (Risk Management).
Rinske Geerlings
Rinske is an internationally known consultant, speaker and certified Business Continuity, Information Security & Risk Management trainer.
She was awarded Alumnus of the Year 2012 of Delft University, Australian Business Woman of the Year 2010-13 by BPW, Risk Consultant of the Year 2017 (RMIA/Australasia) and Outstanding Security Consultant 2019 Finalist (OSPAs)
Rinske has consulted to the Department of Prime Minister & Cabinet, 15 Central Banks, APEC, BBC, Shell, Fuji Xerox, NIB Health Funds, ASIC, Departments of Defense, Immigration, Health, Industry, Education, Foreign Affairs and 100s of other public and private organizations across 5 continents.
She has been changing the way organizations ‘plan for the unexpected’. Her facilitation skills enable organizations to achieve their own results and simplify their processes. She applies a fresh, energetic, fun, practical, easy-to-apply, innovative approach to BCM, Security, and Risk.
Her 'alter ego' includes being a lead singer in SophieG Music and contributing to the global charity playing for Change, which provides music education to children in disadvantaged regions.
Date: March 23, 2023
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-31000
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
YouTube video: https://youtu.be/Xj0U2mbpZUs
IT Governance and Information Security – How do they map?PECB
Effective IT Governance requires proper Information Security practices to ensure that the organization's data is secure. On the other hand, Information Security policies and procedures must be aligned with the organization's overall IT Governance framework to ensure that security measures do not negatively impact business operations.
Amongst others, the webinar covers:
▪ Bring Governance and InfoSec Together
▪ Answering WIIFM
▪ Business Terms
Presenters:
Dr. Edward Marchewka
Dr. Edward Marchewka is a seasoned executive that has come up through the ranks in the IT vertical, expanding into information security, quality management, and strategic planning.
Edward founded and serves as the Principal for 3LC Solutions, enabling YOU to Tell a Better Story in business, with our vCIO, vCISO, quality, and strategy consulting services, through metrics and relating risk to the business with our CHICAGO Metrics® SaaS solution.
He has also held several roles leading information technology, most recently with Gift of Hope Organ and Tissue Donor Network, leading the Information and Technology Services department as the Director of IT, Data, and Security Services. Prior to Gift of Hope, he ran information security for Chicago Public Schools.
Edward has earned a Doctorate of Business Administration from California Southern University and Masters’ degrees in Business Administration and Mathematics from Northern Illinois University. He earned Bachelors’ degrees in Liberal Studies and Nuclear Engineering Technologies from Thomas Edison State College, N.J. Edward maintains several active IT, security, and professional certifications from (ISC)2, ASQ, ITIL, PCI, PMI, ISACA, Microsoft, and CompTIA. He has held legacy IT certifications from Cisco and HP, and a designation from the National Security Agency.
Date: February 22, 2023
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-38500
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27001
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/2bSbAdL5Idg
Student Information Session University Digital Encode.pptxPECB
oin us as our Director for Business Mustafe Bislimi teams up with Dr. Obadare Peter Adewale, our academic partner Digital Encode Limited, to provide valuable information about our programs, admissions process and specialization and elective courses.
Discover the opportunities available to you as a student at PECB University and get a firsthand look at what makes us a top choice for education.
Whether you're a prospective student or simply curious about PECB University, don't miss this informative session! Subscribe to our channel and stay tuned for more videos.
For inquiries regarding admission process contact us: university.studentaffairs@pecb.com
-EMBA in Cybersecurity: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbHJQUUpjMmY2NmcyeURhTzE5VlRSNjg2Y1hwd3xBQ3Jtc0tuLTZqdmZyWkc2VVNQV21YRTlKZUQ2SEtUenNXbzYyb1ZianV5cldDYTViWjZ1eVhCNWtxWHI3VTNwRS1BOE4wTERkZ3BtcndwM0sxdVoydWZYSXBkV2hYd2lwU0NLSTk5WERWMlhtVk1Ud2tuWTRjTQ&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fcybersecurity&v=3YJbbr708pk
-EMBA in Business Continuity Management: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa3JQTGVhd1VfeG1weWNzUzRrMmg2bk0tc3kxUXxBQ3Jtc0tsOVF5VG82TkhRU3R5TVRWWmdhMzBrSTU2eW9wby1OYWN4VTg5bkJBY0lhTmNsOFhETzB5cVp0WU8zbTQwTlZkdk9Dby1fSXdhWmRpZFFPUmk3NS1QOGpMOVBlaDFhVVpwa2JZMkxKNGRnTnppMm93SQ&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fbusiness-continuity-management&v=3YJbbr708pk
-EMBA in Governance, Risk, and Compliance: https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbUplMGtjOFRWbzdGWERmdTR2QjdSbTBuQUxCd3xBQ3Jtc0tsNVdOU1p6UERWM3ZySE55V2FlWlJ1aFlzUU85VEt0aVRoR0hyTjNHbUNVYVMyb0lzTkZycUtJRzNxazlDWGRqTHZQMWJPZEYwbG1xWjVJN1JNOW1QUjJBZDY3NkU5LVl0b2xxOFpkZW1ZX2F3QmF5cw&q=https%3A%2F%2Fpecb.university%2Fprograms%2Fmba-programs%2Fgovernance-risk-compliance&v=3YJbbr708pk
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2. Introduction- 10 minutes
Principles of auditing- 15 minutes
The Ideal auditor: Attributes of effective
auditors -10 minutes
Audit aftermath- communicating audit
results, ensuring effective closure of
non conformities – 5minutes
Q&A: 10 minutes
3. What is Auditing
Auditing can best be described as gauging
process. It’s the process by which an entity
checks how well it’s processes are conforming to
laid down standards, procedures or guidelines. If
you were to liken the audit process to a traveler on
a journey, it would be the equivalent of that
traveler stopping periodically to query his
compass , maps and itinerary to ascertain if
he/she was still on course to attain the object of
his/her journey.
4. What is Auditing
According to the ISO 9000 standard, an audit is “A
systematic, independent, and documented process, for
obtaining audit evidence and evaluating it objectively to
determine the extent to which audit criteria are fulfilled.”
The definition above immediately sets out the key hall marks
of an acceptable or credible audit process namely:-
A) Systematic- it’s systematic meaning it is well planned,
has a clear objective(s) , follows laid down guidelines or
standards.
5. What is Auditing
B) Independent- A credible audit process must
be free from any bias or influence. Independence
ties in directly with the credibility of the audit
result.
C) Documented- an audit process must be
appropriately recorded in a clear, legible,
retrievable format. You can not have audit
evidence sitting in an auditor’s head for instance.
6. What is Auditing
C ) Documentation facilitates easy
communication of audit plans before the audit,
facilitates the audit exercise itself, reporting of the
audit results and the crafting of corrrective and
preventive actions.
7. Why Audit?
Audits are conducted for several reasons. An
audit can aim to:-
Check for compliance/ conformity or adherence to
set standards, legal requirements, guidelines etc.
Identify areas of improvement
Assess progress towards a set goal / objective.
Foster participation and involvement of people at
the work place.
8. Why Audit?
In short, we can only progress and improve if we
are able to assess at regular periods how we are
performing and in which direction.
A quote attributed to W.E .Deming really sums
up the reason for auditing. He said ‘What
cannot be measured , cannot be managed’
. We all therefore cannot claim to have a viable
management system if we cannot measure it or in
other words ‘audit it’
9. As earlier stated, auditing being systematic is
guided by certain principles and these are set out
below:
1) Planning
For effective outcomes, an audit process must be
well planned. Planning includes:-
Defining the audit objectives, scope and criteria.
Allocating resources for the audit (resources
include time, people to audit and finances if need
be and so on)
10. Planning
Selecting the audit team and communicating to
the auditee
The audit objective is the overall aim of the
audit, are you auditing to evaluate conformity to a
standard, look for areas of improvement, assess
progress against a set criteria. Audit objectives
answer the question ‘ why are we auditing’
11. Planning
Audit scope- refers to the boundaries of the
audit. It is important to very deliberately state the
boundaries or extent of the audit. Audit scope
answers the question ‘where are we auditing’
For instance an audit may focus on ‘customer
complaints handling’ within a large service
organization. Note that scope also includes the time
the audit will take.
12. Planning
Audit criteria- Refers to the standards,
guidelines ,laws ,policies etc, on which the audit is
based. Everyone participating in an audit must be
aware of the yardstick or standard against which
they are being audited or measured. Audit criteria
answers the question ; ‘what are we auditing
against’
13. 2) Independence
A credible audit must be independent and must be
seen to be so by all stakeholders. Audit independence
derives from several factors such as:-
Impartiality- an auditor cannot audit his or her own
process. The process must be entirely free of bias or
influence and is only guided by the audit objectives,
scope and criteria.
Objectivity – The audit findings must be based on
facts. Personal opinion should not colour audit findings.
14. 3) Communication
An effective audit process thrives on good
communication. The audit plan, dates, timelines,
objectives, scope and criteria must be communicated in
good time and agreed upon with the auditees.
During the audit proper, effective communication skills
must be applied in order to secure auditee cooperation and
participation. After the audit, the audit outcome must
be effectively communicated to ensure understanding and
ownership of the outcome. Only then will an audit add
value to the organization.
15. 4) Sampling
An audit process is of necessity based on
sampling. Given the constraints of time, scope and
limited resources, an audit cannot interrogate each
and every aspect of an organization. The sampling
principle is therefore applied in coming up with the
best possible choice of areas the auditor will focus
on in order to get as representative a view as
possible of the extent of conformity or performance
of the system against the criteria agreed upon.
16. The success or failure of an audit is to a very large
extent dependent on the auditor. The following are
attributes all auditors must strive to cultivate for
successful and effective auditing.
1) Positive attitude- this cannot be over
emphasized. The auditor must have an attitude and
frame of mind that communicates to the auditee
that :-
First of all he/she is not there to find fault but rather
to help improve the system/organization
17. That he/she and the auditee are really on the same
team. An audit is not a contest to see who comes
out tops but rather an exercise to seek out
opportunities for improvement.
2) Good communication skills – the auditor must
strive to cultivate excellent communication skills
including:-
- Being a good listener- you obviously cannot listen
while talking incessantly! Let the auditee talk.
18. 2) Good communication skills
The auditor must be able to create a good climate for
communication by eliminating anything that would
hinder it such as:-
Location of audit- the place must be conducive for
communication ( not too noisy, too hot/cold). It must
be a place where the auditee is comfortable.
Cultural considerations- eye contact, hand shake
etc.
19. 2) Good communication skills
Time keeping- auditor must keep the time agreed.
Consider customary timings( time for prayer, meals
etc)
Know how to use non-verbal communication- note
that 70 % of communication is non-verbal. Gestures,
facial expressions, Para-language ( grunts, snorts)
communicate a lot- intended and unintended. Use it
to ease communication.
20. 3) Cultural awareness
In a highly globalized world, inter-cultural scenarios
during audits are almost inevitable. The auditor must
be conscious of cultural norms and practices. Issues
to do with mode of dressing, gestures, head
covering e.t.c are hugely important in how people
perceive each other. Dress for the occasion!
21. 4) Good listener
An effective auditor is a good listener. He/she first of all
gives the auditee time to talk and does not judge. He/she
then picks out salient points in the conversation and seeks
clarification where need be.
5) Good interviewer
An effective auditor also knows how to get information by
applying the right interview technique, do not ask direct
questions ( yes/no type) or leading questions, again allow
the interviewee to talk.
22. 5) Good Observer
An effective auditor is also a keen observer.
Remember audit evidence is not gathered only by
interviewing but also through observation.
23. A key point to note is that an audit is only as good as it’s
outcome and by outcome here I mean the observations/
recommendations made, their applicability /practicality and
follow up.
The auditor must strive to give feedback on the audit
findings preferably in a closing meeting.
Give a summary of findings in the general closing meeting
but submit more detailed, actionable reports to the
auditees.
Agree on timelines for closure of any non-conformances
noted.
24. Do a follow-up after the agreed time has lapsed to
check whether the non- conformances have been
closed.
Assess whether actions on the non-conformances
truly address their root causes. Effective actions are
those that address the root cause.