• English
  • Mon - Fri 8.00 - 18.00
  • 5 rue Goell L-5326 Contern
  • + 352 26 20 39 64
Excellium University
  • Home
  • Сourses
    • Data Privacy
    • Hacking & Forensics
    • Security Management
    • Security Product
    • Application Security
    • Security Awareness
  • About Us
    • All instructors
  • Contact Us
  • Blog
  • Home
  • Сourses
    • Data Privacy
    • Hacking & Forensics
    • Security Management
    • Security Product
    • Application Security
    • Security Awareness
  • About Us
    • All instructors
  • Contact Us
  • Blog
HomeSECURITY MANAGEMENTISO27005 RISK MANAGER

ISO27005 RISK MANAGER

Teachers
Johann Alessandroni
Category:
SECURITY MANAGEMENT /
Free
mitre att&ck

Free

Duration: 3 days

DATE : 

On-demand

COURSE DESCRIPTION

This three day intensive course participants develop the competence to master the basic risk management elements related to all assets of relevance for information security using the ISO/IEC 27005:2011 standard as a reference framework. Based on practical exercises and case studies, participants acquire the necessary knowledge and skills to perform an optimal information security risk assessment and manage risks in time by being familiar with their life cycle. During this training, we will also present other risk assessment methods such as OCTAVE, EBIOS, MEHARI and Harmonized TRA. This training fits perfectly with the implementation process of the ISMS framework in ISO/IEC 27001:2013 standard.

Program

Introduction, risk management program according to ISO/IEC 27005

  • Concepts and definitions related to risk management
  • Risk management standards, frameworks and methodologies
  • Implementation of an information security risk management program
  • Understanding an organization and its context

Risk identification and assessment, risk evaluation, treatment, acceptance, communication and surveillance according to ISO/IEC 27005

  • Risk identification
  • Risk analysis and risk evaluation
  • Risk assessment with a quantitative method
  • Risk treatment
  • Risk acceptance and residual risk management
  • Information Security Risk Communication and Consultation
  • Risk monitoring and review

Overview of other information security risk assessment methods and Certification Exam

  • Presentation of OCTAVE method
  • Presentation of MEHARI method
  • Presentation of EBIOS method
  • Presentation of Harmonized TRA method

OBJECTIVES

To understand the concepts, approaches, methods and techniques allowing an effective risk management according to ISO/IEC 27005 To interpret the requirements of ISO/IEC 27001 on information security risk management To understand the relationship between the information security risk management, the security controls and the compliance with the requirements of different stakeholders of an organization To acquire the competence to implement, maintain and manage an ongoing information security risk management program according to ISO/IEC 27005 To acquire the competence to effectively advise organizations on the best practices in information security risk management.

REQUIREMENTS

Knowledge on Risk Management and Information Security is preferred.

WHAT IS THE TARGET AUDIENCE ?

  • Risk managers
  • Member of the information security team
  • Persons responsible for information security or conformity within an organization
  • Staff implementing or seeking to comply with ISO/IEC 27001 or involved in a risk management program
  • IT consultants
CONTACT

About Instructors

Johann Alessandroni

Free

Duration: 3 days

Contact

  • Excellium : 5 rue Goell L-5326 Contern or Oxiane 20, rue de l’Industrie – L – 8399 Windhof (Koerich)
  • +352 26 20 39 64 or Oxiane +352 27 39 35 1
  • training@excellium-services.com
Copyright © 2017 Excellium University
Mentions légales
Privacy Statement
  • Home
  • About Us
  • Courses
  • Contact Us
  • Blog
Search