ISO 27001 Webinars
ISO/IEC 27001 certification demonstrates to existing and potential customers that an organization has defined and put in place best-practice information security processes. ISO 27001 is the only auditable international standard that defines the requirements of an information security management system (ISMS).
An ISMS is a set of policies, procedures, processes, and systems that manage information risks, such as cyber attacks, hacks, data leaks, or theft. By implementing an ISMS certified to ISO 27001, your organisation can benefit greatly: avoiding the losses and financial penalties associated with data breaches, winning new business, and strengthening relationships with existing clientele.
On demand ISO 27001 webinars
ISO 27701: the new privacy extension for ISO 27001
ISO 27701, introduced earlier in the year, is an extension to ISO 27001, the international standard that describes best practise for an ISMS (information security management system).
ISO 27701’s approach recognises that by expanding on ISO 27001’s clauses and Annex A controls that relate specifically to data privacy, as well as providing two additional sets of controls specific to data controllers and data processors, your organisation will be able to demonstrate that it has taken the steps to comply with international privacy laws and regulations.
Read more >>
The webinar covers:
- A brief overview of ISO 27701;
- The benefits of ISO 27701;
- How to extend your ISMS (information security management system) to incorporate ISO 27701;
- Considerations when extending your ISMS; and
- Certification to ISO 27701.
|
ISO 27001, cybersecurity and the importance of people
Many if not most breaches have a human factor – someone either accidentally or maliciously does something they should not do which leads to or expedites a breach. The importance of people in the protection of confidential and personal data is often underestimated.
Read more >>
In this webinar you will get an overview of the internal audit process under ISO 27001. Leading the webinar is Sharon O’Reilly, an established consultant and trainer with IT Governance Europe.
Join Sharon O’Reilly, an established consultant and trainer with IT Governance Europe, to learn:
- How do people cause security breaches?
- Why is training and awareness so important
- What is a security culture?
- How do you create a security culture?
- How do you measure how strong your security culture actually is?
|
Assessing compliance: the ISO 27001 ISMS internal audit
Testing and assessing your information security measures is essential to ascertain whether the controls you have implemented are working effectively.
Compliance with the international information security standard ISO 27001 requires continual monitoring and regular reviews of the ISMS. An internal audit is an effective measure to assess whether your ISMS is functioning as it should, and one of the requirements for ISO 27001 certification.
Read more >>
In this webinar you will get an overview of the internal audit process under ISO 27001. Leading the webinar is Sharon O’Reilly, an established consultant and trainer with IT Governance Europe.
This webinar will cover:
- The requirements for an internal audit and an internal audit program
- The role of the internal auditor and ISMS audits
- Mandatory documents for reviewing an ISO 27001-compliant ISMS
- An evidence-based approach to reporting, identifying, and compiling nonconformities
- Addressing common audit mistakes and challenges
|
How to overcome your data security compliance challenges
Data security laws throughout Europe are becoming increasingly stringent as the cyber threat landscape constantly evolves. This evolution calls for stronger, smarter and more robust security solutions within organisations.
In this webinar, Sharon O’Reilly, data protection consultant at IT Governance Europe, explains how an ISMS (information security management system) can help mitigate breaches and meet a host of regulations that require information security measures to protect data.
Read more >>
This webinar covers:
- The cyber risk landscape and the latest cybersecurity and data protection laws
- How to achieve compliance and reduce your liability in the event of a data breach
- The link between information security and cybersecurity
- The top risks that result in data breaches
- How an ISMS works
- How ISO 27001 compliance can help you improve your information security posture
|
How to implement an information security management system
Implementing an ISMS based on the best-practice guidance set out by ISO 27001 and ISO 27002 delivers numerous benefits, including reducing your risk of a data breach.
Read more >>
This webinar, Sharon O’Reilly, data protection consultant at IT Governance Europe, will introduce you to the steps that should be taken to implement a comprehensive ISMS, including the following:
- How to adopt a comprehensive, risk-based approach to information security
- Securing organization-wide commitment
- The importance of people, processes, and technology in information security
- The nine-step approach to implementing an ISMS
- Using ISO 27001 as the global best-practice information security standard
- Risk assessments and controls
- Testing your ISMS and developing documentation
- The benefits of obtaining independent assurance
|
Conducting a cybersecurity risk assessment
ISO 27001 is the international standard that sets out the specification of an ISMS, a best-practice approach to addressing information security that encompasses people, processes, and technology.
Read more >>
The assessment and management of information security risks is at the core of ISO 27001, which ensures that the ISMS continually adapts to changes in the organization and the risk environment.
Sharon O’Reilly will cover the following topics:
- The five-step approach to conducting a risk assessment
- Information security versus cybersecurity
- Choosing appropriate risk treatment options
- Unpacking the key controls necessary for effective cybersecurity
- Reviewing and monitoring and reporting on the risk assessment
- ISO 27001 and effective information security risk management
|
Speak to an expert
Our qualified ISO 27001 lead implementers are ready to offer you practical advice about the best approach to take for implementing an ISO 27001 project and discuss different options to suit your budget and business needs.