Mastering risk assessment and optimal risk management in information security based on ISO 27005
Summary
In this three-day intensive course participants develop the competence to master the basic risk management elements related to all assets of relevance for information security using the ISO/IEC 27005:2011 standard as a reference framework. Based on practical exercises and case studies, participants acquire the necessary knowledge and skills to perform an optimal information security risk assessment and manage risks in time by being familiar with their life cycle. During this training, we will also present other risk assessment methods such as OCTAVE, EBIOS, MEHARI and Harmonized TRA. This training fits perfectly with the implementation process of the ISMS framework in ISO/IEC 27001:2013 standard.
Who should attend?
- Risk managers
- Member of the information security team
- Persons responsible for information security or conformity within an organization
- Staff implementing or seeking to comply with ISO 27001 or involved in a risk management program
- IT consultants
Learning objectives
- To understand the concepts, approaches, methods and techniques allowing an effective risk management according to ISO 27005
- To interpret the requirements of ISO 27001 on information security risk management
- To understand the relationship between the information security risk management, the security controls and the compliance with the requirements of different stakeholders of an organization
- To acquire the competence to implement, maintain and manage an ongoing information security risk management program according to ISO 27005
- To acquire the competence to effectively advise organizations on the best practices in information security risk management
Course Agenda
Day 1: Introduction, risk management program according to ISO 27005
- Concepts and definitions related to risk management
- Risk management standards, frameworks and methodologies
- Implementation of an information security risk management program
- Understanding an organization and its context
Day 2: Risk identification and assessment, risk evaluation, treatment, acceptance, communication and surveillance according to ISO 27005
- Risk identification
- Risk analysis and risk evaluation
- Risk assessment with a quantitative method
- Risk treatment
- Risk acceptance and residual risk management
- Information Security Risk Communication and Consultation
- Risk monitoring and review
Day 3: Overview of other information security risk assessment methods and Exam
- Presentation of OCTAVE method
- Presentation of MEHARI method
- Presentation of EBIOS method
- Presentation of Harmonized TRA method
- Certified ISO/IEC 27005 Risk Manager Exam (2 hours)
Prerequisites
None
Educational approach
- This training is based on both theory and practice:
– Sessions of lectures illustrated with examples based on real cases
– Practical exercises based on a full case study including role playing and oral presentations
– Review exercises to assist the exam preparation
– Practice test similar to the certification exam - To benefit from the practical exercises, the number of training participants is limited
Examination
- The “Certified ISO/IEC 27005 Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Program (ECP). The exam covers the following competence domains:
– Domain 1: Fundamental concepts, approaches, methods and techniques of Information Security Risk Management
– Domain 2: Implementation of an Information Security Risk Management program
– Domain 3: Information Security Risk Assessment based on ISO 27005 - The “Certified ISO/IEC 27005 Risk Manager” exam is available in different languages, including English, French, Spanish and Portuguese
- Duration: 2 hours
Certification
- After successfully completing the “ISO/IEC 27005 Risk Manager” exam, participants can apply for the credentials of Certified Provisional ISO/IEC 27005 Provisional Risk Manager or Certified ISO/IEC 27005 Risk Manager depending on their level of experience.
- A certificate will be issued to participants who successfully pass the exam and comply with all the other requirements related to the selected credential.