Please use the links above to find what you were looking for.
You may not have been able to visit your page because of:
1. An out-of-date bookmark/favourite
2. A search engine that has an out-of-date listing
3. A mistyped address
4. You have no access to this page
5. The requested resource was not found.
6. An error has occurred while processing your request.
This fully accredited, practitioner-led course equips you to lead an ISO/IEC 27001 ISMS implementation project. Win new business by securing your organisation’s information assets and reducing data security risks with real-world expertise and practical insights.
IT Governance is the global expert on ISO 27001 and has trained more than 7,000 professionals around the world on ISMS implementations and audits.
Delegates take the online ISO27001 Certified ISMS Lead Implementer (CIS LI) examination at the end of the course—a 90-minute multiple-choice, ISO 17024-certificated exam set by IBITGQ. There is no extra charge for taking the exam at the end of the course.
ISO27001 Certified ISMS Lead Implementer (CIS LI) is acknowledged by the PCI Security Standards Council (PCI SCC) as an approved qualification meeting the requirements of application for an individual to become a PCI DSS Qualified Security Assessor (QSA).
This course is part of our unique ISO 27001 Learning Pathway, which also includes the ISO27001 Certified Foundation and Lead Auditor Online courses. It also qualifies for 21 CPD/CPE credits and fits well with the CISSP and SSCP Continued Professional Education Program.
Anyone in the Asia-Pacific region who is involved in information security management, writing information security policies, or implementing ISO 27001, either as a Lead Implementer or as part of an implementation team.
There are no formal entry requirements. However, it is assumed that you will have a basic knowledge of ISO 27001 gained through either practical experience, reading the ISO 27001:2013 standard, or by attending the ISO27001 Certified ISMS Foundation Online course.
The course includes:
Please note that this course is delivered as a WebEx Live Online session at fixed times (ACST) and on fixed dates throughout the year.
Delegates booked on this course are expected to have a reliable Internet connection at their home or office. We will check and confirm that you have the WebEx application installed and that you can correctly log onto our WebEx training centre before the course.
To sit the online exam you will need:
Written by an acknowledged expert on the new ISO27001 Standard, An Introduction to Information Security and ISO27001:2013 is the ideal resource for anyone wanting a clear, concise, and easy-to-read primer on information security. It will ensure the systems you put in place are effective, reliable, and auditable.
This pocket guide will help you to:
Contact us if you are looking for the ISO27001:2005 edition.
The BS 10012:2017 +A1 2018 specification provides a framework to manage the risks to the privacy of personal data and implement the necessary policies, procedures and controls to help ensure compliance with the GDPR. It is designed to follow the plan-do-check-act cycle (PDCA) to ensure continual improvement.
Many books explain how to reduce the risk of information security breaches. Nevertheless, breaches do occur, even to organizations that have taken all reasonable precautions. Information Security Breaches – Avoidance and treatment based on ISO 27001:2013 helps you to manage this threat by detailing what to do as soon as you discover a breach.
When your organization’s security is compromised, you cannot afford to waste time deciding how to resolve the issue. You must be ready to take prompt and decisive action. Updated to cover ISO 27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimize damage and return to business as usual.
Michael Krausz is an IT expert and experienced professional investigator. He has investigated over a hundred cases of information security breaches. Many of these cases have concerned forms of white-collar crime. He studied physics, computer science, and law at the University of Technology in Vienna, and at Vienna and Webster Universities. He has delivered over 5000 hours of professional and academic training and has provided services in eleven countries to date.