Information Risk Management according to ISO 27005
An intensive two-day training focused on the practical aspects of risk management within an Information Security Management System. The activities are aligned with the requirements of the ISO/IEC 27005 standard.
About the training
An effective training for individuals looking to expand their knowledge in risk management within information security.
This two-day training is conducted in the form of lectures and workshops, ensuring that participants effectively translate the new knowledge and skills into practical actions. We emphasize not only providing theoretical knowledge but also offering effective, practical advice, methods, techniques, as well as valuable experiences and best practices. Upon completing the training, all participants will receive a course completion certificate.
Training objective
- Master the concepts related to information security risk management.
- Analyze the vulnerabilities of information systems in the context of risk identification.
- Discuss risk analysis, assessment, and evaluation.
- Gain knowledge on risk treatment plans.
- Understand the essence of risk management within an organization.
- Learn about the factors that contribute to success in risk management.
- Become familiar with practical methods for risk assessment and management strategies.
Target audience for the training
The training on risk management in compliance with ISO 27001 is addressed to board members, management staff, risk department employees, internal auditors, and anyone interested in risk analysis within the context of information security in an organization.
The language of the training
The training is conducted in Polish.
There is also the possibility of organizing the training in English.
Training methodology
Training Methodology
Achieving the right training outcomes is possible by selecting the appropriate topic and the methods of delivering the training tailored to the specific needs of the participants and the issues at hand. Below are the methods and techniques we use:
LECTURE
We provide knowledge to participants using dedicated teaching aids such as multimedia presentations. This forms the foundational content of the training, where we introduce the topic, discuss key concepts, describe roles, processes, procedures, etc.
PRACTICAL EXAMPLES
As practitioners, we base our training programs on real-life events presented for a specific problem. We help participants independently reach conclusions or solutions. Our training is strongly focused on practice and skill development.
DISCUSSION
Participants express their opinions and share experiences. A well-formed discussion topic, when at least two perspectives clash, usually evokes significant emotional engagement. The discussion allows for the development of a common solution or prepares arguments regarding a particular topic.
BRAINSTORMING
In a short amount of time, we generate many ideas and solutions for specific problems and situations. We engage participants and stimulate thinking and creativity development.
EXERCISES
Practical tasks related to the subject of the training, such as creating a process, conducting a case study analysis, etc. These exercises effectively complement lectures and practical examples.
TESTS
We verify the participant’s knowledge and skills. We identify competency gaps and appropriately plan the education process to improve the participant’s abilities. Depending on the training’s nature, this may involve various tools, such as knowledge tests or practical exercises.
SIMULATIONS
These provide an excellent trial of reality where participants act and experience the consequences of their actions.
SUMMARY
After completing each topic, we summarize the material discussed. This process is carried out by the trainer and allows for the review of the key points related to the subject matter, while giving participants the opportunity to verify how well they have understood it.
Trainer
Emanuel Krzysztoń
A graduate of three renowned universities: the University of Lisbon, the University of Aveiro, and Kazimierz Wielki University in Bydgoszcz. An outstanding student with an impressive academic record, a ten-time recipient of scientific scholarships, and the title of the best student of the Faculty of Mathematics, Physics, and Engineering at UKW.
He holds a Master of Science degree in Engineering with specializations in mechatronics, automation/cybersecurity, and safety engineering with a technical specialization. Professionally, he is passionate about information security, cybersecurity for IT and OT systems, and ensuring business continuity within organizations.
He has extensive operational and research experience in these fields, gained, among other things, while creating a startup.
Training program
Day 1
9:00 - 16:00
- Introduction to Information Security Risk Management
- Definitions of information security risk and its significance
- Benefits of implementing risk management
- ISO 27005 standard and its role in risk management
- Risk Management Process:
- Stages of the risk management process according to ISO 27005
- Identification of information assets and threats
- Risk assessment and its impact on the organization
Day 2
9:00 - 16:00
- Risk Assessment Methods
- Qualitative and quantitative risk assessment methods
- Estimating the probability and impact of events
- Risk Management in Practice:
- Case studies of risk management implementation
- Workshops on identifying and assessing risk within an organization
Training price
Price per participant: 3,950 PLN (net)
Conditions of participation
Price
The price of the training refers to the service, which is the right for one participant to attend the two-day training. It includes training materials, a certificate, coffee breaks, and lunch during the training. The price does not include accommodation.
Payment will be made based on the correctly issued VAT invoice within 14 days from the invoice receipt date to the bank account of the organizer indicated on the invoice.
Terms
The acceptance of the application is confirmed to the email address provided in the registration form.
The organizer reserves the right to cancel the course. In the event of cancellation by the organizer, participants will receive a full refund of the course fee. A written withdrawal of the participant’s application made no later than 10 business days before the training start date will incur a fee of 30% of the training price. A written resignation submitted less than 10 business days before the training start date will incur a 100% fee of the training price.
The training price listed in the training schedule is a net price, which should be increased by the current VAT rate.
The person/organization submitting the participation in the training authorizes, by expressing this consent, the processing of the provided personal data by PBSG SA based in Poznań at Szyperska 14 for the purposes of order fulfillment.
Certificates
Training participation certificates will be sent to the participants after meeting the conditions of at least 70% correct answers during the knowledge test and payment being settled.
To participate in the training, you must complete the registration form.
Submitting the application means acceptance of the terms of participation and consent for PBSG SA to process the personal data of the registered participants for the purpose of order fulfillment and for promotion and marketing of PBSG SA’s activities.
Organizational information
Training quality
The training is conducted in accordance with the Book of Standards for Training Service Quality.
Registration for the in-person training
Fill out this form if you want to participate in the Open In-Person Training. If you’re interested in attending online, sign up here: Contact Form – Online.
There is also an option to organize a closed training tailored to your specific needs: send an inquiry and receive a quote.
Submitting the registration form means acceptance of the terms and conditions of participation.
Training program
Day 1
9:00 - 16:00
- Introduction to Information Security Risk Management
- Definitions of information security risk and its significance
- Benefits of implementing risk management
- ISO 27005 standard and its role in risk management
- Risk management process:
- Stages of the risk management process according to ISO 27005
- Identification of information assets and threats
Day 2
9:00 - 16:00
- Risk assessment methods
- Qualitative and quantitative risk assessment methods
- Estimating the probability and impact of events
- Risk management in practice:
- Case studies of risk management implementation
- Workshops on risk identification and assessment in the organization
Training price
Price per participant: 2,450 PLN (net)
Terms of participation
Price
The price of the training refers to the service, which is the right to participate in a one-day training session for one participant.
The price includes training materials and a certificate.
Payment will be made based on a correctly issued VAT invoice within 14 days from the date of receiving the invoice, to the bank account indicated by the organizer on the invoice.
Conditions
The acceptance of the registration will be confirmed via email to the address provided in the registration form.
The organizer reserves the right to cancel the course. In the case of cancellation by the organizer, participants will receive a full refund of the course fee. Written withdrawal of registration at least 10 business days before the training date will result in a charge of 30% of the course fee. Written cancellation submitted less than 10 business days before the training date will incur a charge of 100% of the course fee.
The price of the training listed in the training schedule is net, and it should be increased by the applicable VAT rate.
The person/organization registering for the training hereby gives consent for PBSG SA, located in Poznań at Szyperska Street 14, to process the provided personal data for the purpose of order fulfillment.
Certificate
Certificates of participation will be sent to training participants after meeting the condition of at least 70% positive answers in the knowledge test and payment settlement.
To participate in the training, please complete the registration form.
Submitting the registration form implies acceptance of the participation terms and consent for PBSG SA to process the personal data of the registered participants for the purpose of fulfilling the order and for the promotion and marketing of PBSG SA activities.
Organizational information
Participants of the online training will receive access to the training platform. On the day of the training, you should log in to the platform. The training will begin at the designated time. During the training, the screen will be divided into three sections: presentation, trainer, and chat. Communication during the training will take place via chat.
Technical Requirements:
Hardware Requirements: A computer with internet access, a processor of at least 1.6 GHz, and at least 4 GB of RAM.
Browser: The latest version of Chrome, Mozilla Firefox, or Safari.
Training Quality:
The training will be conducted in accordance with the Quality Standards for Training Services Manual.
Registration for the online training
Fill out this form if you want to participate in the online training. If you’re interested in attending the in-person training, sign up here: Contact Form – Offline training.
Submitting the registration form means acceptance of the terms and conditions of participation.
Dedicated exclusively to your organization – this approach guarantees comfort and freedom to thoroughly discuss specific issues and situations within your organization. We understand that every company is different, so to effectively translate the acquired knowledge into your organization’s context, we tailor the presented examples to fit your specific needs and business situation.
Training program
Day 1
9:00 - 16:00
- Introduction to information security risk management
- Definitions of information security risk and its significance
- Benefits of implementing risk management
- ISO 27005 standard and its role in risk management
- Risk management process:
- Stages of the risk management process according to ISO 27005
- Identification of information assets and threats
Day 2
9:00 - 16:00
- Risk assessment methods
- Qualitative and quantitative risk assessment methods
- Estimating the probability and impact of events
- Risk management in practice:
- Case studies of risk management implementation
- Workshops on risk identification and assessment within the organization
How does it work?
Step 1
APPLICATION
In the first step, fill out the registration form to let us know your interest in organizing a dedicated training session for your company.
Step 2
DATE
We will set the date and location for the training – we will adapt to your availability and individual expectations.
Step 3
PRICE
We will present the commercial terms for organizing the training based on the agreed parameters and number of participants.
Step 4
TRAINING
We will deliver the customized training according to the agreed terms.