A new step-by-step way to get ISO/IEC 27001 certification

A simple and easy-to-follow framework that will change the way you look at information security for ever

Ratings: 4.00 / 5.00




Description

This course will provide you with methods and techniques which have never been disclosed before, developed by one of the best information security experts – Paulius Petretis. Paulius spent years of his life helping various companies worldwide improving their security posture. After literally hundreds of projects and thousands of consulting hours, he came up with a secret easy-to-follow formula how to implement information security management system (ISMS) within a very limited timeframe and a modest budget.

In this course Paulius shares his SIMPLE ISMS implementation formula for a fraction of price you would typically spend on consulting with him to be able to find it out. This formula will enable you to:

· set ISMS scope correctly,

· identify information security related external, internal and business requirements with ease using CLUB method,

· create an amazing information security architecture with TOP-COPIED,

· draft needed documents with PaPeRS,

· add necessary integrity into your ACTIVE security communication,

· constantly IMProve and

· certify your ISO/IEC27001-based ISMS successful.

All with a use of a simple magical formula just in 60 days!

Supported with graphical illustrations you will find out how incident management, risk management and business continuity management processes are related, what is known- and unknown- uncertainty, which levels of risks should be acceptable, how training and education differ, how security management can be measured.

Understanding these principles will get you ready for really exciting more advanced formulas.

What You Will Learn!

  • How to implement sustainable information security management system ready for accredited certification in less than 60 days
  • How to define ISMS scope without errors
  • How to define useful and clear-vision-eye-opening security metrics
  • How to define required level of security
  • What to do with identified risks
  • How to adopt very easy-to-use tools for designing security architecture
  • Which documented information is required for successful certification
  • How to improve information security management system
  • How to pass accredited certification without any hassle
  • What to do after the certification

Who Should Attend!

  • Information security professionals implementing ISO/IEC 27001
  • Small business owners willing to implement ISMS them-selves
  • Information Security professionals willing to improve their knowledge on ISO/IEC 27001