A practical approach to implementing an ISMS according to ISO 27001

A professionally prepared training course on implementing the Information Security Management System (ISMS) covers the skills, knowledge, and procedures necessary to effectively meet the requirements of ISO 27001, taking into account the changes in the PN-EN ISO/IEC 27001:2022 standard.

About the training

Effective training for individuals looking to expand their knowledge in the field of information security.

The training is conducted in the form of a lecture and workshops, ensuring an effective translation of the new knowledge and skills into practical actions for participants. We focus not only on delivering theoretical knowledge but, above all, on providing effective, practical methods and techniques, along with valuable experiences and best practices.

The training is one-day, and upon completion, participants will receive a certificate of participation.

Training program

Day 1
9:00 - 16:00

 

  • Welcome of participants
  • Introduction to information security management.
  • What is information security management?
  • Basic terms and definitions.
  • Structure of the ISO 27001 standard.
  • ISO 27001 requirements.
  • Context of the organization.
  • Stakeholder analysis.
  • Leadership.
  • PDCA approach in the context of information security management.
  • Areas of information security (physical security, IT, personal, and organizational-legal).
  • Break
  • Practical approach to identifying the context of the organization.
  • Estimating the resources necessary for a successful ISMS implementation.
  • Practical approach to ISMS topics:
  • Practical approach to identifying and inventorying information assets.
  • Practical approach to classifying information groups.
  • Risk analysis within the ISMS.
  • Risk assessment for identified assets and development of a risk treatment plan.
  • Verification of the effectiveness of applied controls.
  • Development of the statement of applicability of controls.
  • Break
  • Prevention and management of information security incidents.
  • Evaluation of the effectiveness and continuous improvement of the ISMS.
  • Risk assessment for identified assets.
  • Development of a risk treatment plan.
  • Verification of the effectiveness of applied controls.
  • Continuous improvement of the information security management system.
  • The functioning of the system within the organization.
  • Possible works related to the system’s development.
  • Summary – Questions and discussion

Training price

The price per participant: 2,250 PLN (net).

Registration for the in-person training

Fill out this form if you wish to participate in the Open In-Person Training. If you are interested in online participation, please register here: Online Training Registration Form.

It is also possible to organize a closed training tailored to your specific request: send an inquiry and receive a quote.

Submitting the registration form means acceptance of the terms and conditions of participation.

Training program

Day 1
9:00 - 16:00

  • Welcome of participants
  • Introduction to information security management.
  • What is information security management?
  • Basic terms and definitions.
  • Structure of ISO 27001 standard.
  • Requirements of the ISO 27001 standard.
  • Context of the organization.
  • Stakeholder analysis.
  • Leadership.
  • PDCA approach in the context of information security management.
  • Information security areas (physical, IT, personal, and organizational-legal).
  • Break
  • Practical approach to identifying the context of the organization.
  • Estimating resources necessary for successful implementation of ISMS (Information Security Management System).
  • Practical approach to ISMS issues:
  • Practical approach to identifying and inventorying information assets.
  • Practical approach to information classification.
  • Risk analysis within ISMS.
  • Risk assessment for identified assets and preparation of a risk treatment plan.
  • Verification of the effectiveness of applied security measures.
  • Preparation of the statement on security controls implementation.
  • Break
  • Preventing and managing information security incidents.
  • Assessing the effectiveness and continuous improvement of ISMS.
  • Risk assessment for identified assets.
  • Developing a risk treatment plan.
  • Verification of the effectiveness of security measures.
  • Continuous improvement of information security management system.
  • System operation within the organization.
  • Possible work related to development.
  • Summary – Questions and Discussion

 

Training price

Price per participant: 1,150 PLN (net)

Registration for online training

Fill out this form if you wish to participate in the online training. If you are interested in attending the in-person training, please register here: Offline Training Registration Form.

It is also possible to organize a closed training tailored to your specific needs: send an inquiry and receive a quote.

Submitting the registration form means acceptance of the terms and conditions of participation.

Dedicated exclusively to your organization – this approach ensures comfort and flexibility to thoroughly discuss specific issues and situations within your organization. We understand that every company is different, so to effectively translate the acquired knowledge into your organization, we tailor the examples presented to suit your unique needs and business situation.

Training program

Day 1
9:00 - 16:00

Welcome participants
Introduction to Information Security Management
What is Information Security Management
Basic terms and definitions
Structure of the ISO 27001 standard
Requirements of the ISO 27001 standard
Context of the organization
Stakeholder analysis
Leadership
PDCA approach in the context of Information Security Management
Areas of Information Security (physical, IT, personal, and organizational-legal security)

Break

Practical approach to identifying the context of the organization

Break

Estimating the resources necessary for the successful implementation of ISMS

Break

Practical approach to ISMS issues
Practical approach to identifying and inventorying information assets
Practical approach to classifying information groups

Day 2
9:00 - 16:00

Risk analysis within the ISMS
Risk assessment for identified assets and development of a risk treatment plan

Break

Risk analysis within the ISMS – continuation
Verification of the effectiveness of implemented security controls
Development of the statement of applicability

Break

Prevention and management of information security incidents
Effectiveness assessment and improvement of the ISMS
Risk assessment for identified assets
Development of a risk treatment plan
Verification of the effectiveness of implemented security controls

Break

Improvement of the Information Security Management System
Operation of the system within the organization
Potential development-related tasks

Summary – questions and discussion

How does it work?

Step 1

APPLICATION

In the first step, please fill out the registration form to express your interest in organizing a dedicated training session for your company.

Step 2

DATE

We will set the date and location of the training – we will accommodate your availability and individual expectations.

Step 3

PRICE

We will present the commercial terms for organizing the training based on the agreed parameters and number of participants.

Step 4

TRAINING

We will deliver the tailored training in accordance with the agreed terms.

Would you like to inquire about the pricing for a internal training session?