Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Iso 27001:2022 Audit And Implementation
#1
[Image: c1ed41ca67b9ce054b744ba27ad1bf02.jpg]
Iso 27001:2022 Audit And Implementation
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 793.86 MB | Duration: 3h 29m

Certify Your Organization With The Most Updated Cyber Security ISO Standard

[b]What you'll learn[/b]

The structure and requirements of the ISO/IEC 27001:2022 standard.

The importance of risk assessment and risk treatment in the implementation process.

How to identify and evaluate risks to an organization's information security.

The role of internal audits in monitoring and improving an ISMS.

The importance of continuous improvement in maintaining an effective ISMS.

How to apply the Plan-Do-Check-Act (PDCA) cycle to an ISMS.

The certification process for ISO/IEC 27001:2022 compliance.

Controls for information security, cybersecurity, and privacy protection within the framework of an ISO/IEC 27001: 2022 ISMS.

Practical skills in implementing an ISMS, including hands-on exercises and case studies.

The updates to ISO 27001:2022 and ISO 27002:2022 and how they affect businesses that have achieved or want to achieve ISO 27001: 2022 certification.

How to align ISO 27001:2022 with NIST CSF

[b]Requirements[/b]

None

[b]Description[/b]

The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) have jointly released ISO/IEC 27001:2022, a standard for information security management systems (ISMS). This standard provides a framework for organizations to manage their sensitive information using a risk management process. Along with ISO 27001, ISO 27002 is closely related as it offers advice for implementing an ISO 27001 ISMS in practice.In October 2022, a revised version of ISO 27001 was released after the release of the updated set of controls of ISO 27002 in February of the same year. These updates reflect the changing landscape of information security and provide organizations with the most up-to-date guidance for protecting their sensitive information.In this course, you will learn why the ISO 27001 standard is one of the most widely used models for creating successful cybersecurity programs. You will discover what it takes to adhere to the standard and obtain certification of compliance. The course will cover the structure of the standard, the certification process, and provide a simple, step-by-step guide for creating an ISO 27001-compliant cybersecurity program as described in clauses four through ten.You will also learn about the updates to ISO 27001 and ISO 27002 and how they affect businesses that have achieved or want to achieve ISO 27001 certification. The course will cover controls for information security, cybersecurity, and privacy protection within the framework of an ISO/IEC 27001 ISMS.By the end of this course, you will have a thorough understanding of the ISO/IEC 27001:2022 standard and how to implement it within your organization to protect your sensitive information. You will learn about the importance of risk assessment and risk treatment in the implementation process and how to identify and evaluate risks to your organization's information security.The course will also cover the importance of continuous improvement in maintaining an effective ISMS. You will learn about the Plan-Do-Check-Act (PDCA) cycle and how it can be applied to your ISMS to ensure that it remains effective over time. The course will also cover the role of internal audits in monitoring and improving your ISMS.In addition to learning about the requirements of the standard, you will also gain practical skills in implementing an ISMS. The course will include hands-on exercises and case studies to help you apply what you have learned to real-world scenarios.This course provides a comprehensive introduction to the ISO/IEC 27001:2022 standard and its implementation. Whether you are new to information security or an experienced professional looking to update your knowledge, this course will provide you with valuable insights and practical skills that you can apply in your organization

Overview

Section 1: Why ISO/IEC 27000 series

Lecture 1 Introduction

Lecture 2 Introduction to ISO/IEC 27001:2022

Lecture 3 The ISO 27000 family of standards

Lecture 4 Why organizations need an ISMS

Lecture 5 Setting up an ISMS

Section 2: What is ISO/IEC 27001:2022

Lecture 6 Structure of ISO 27001:2022

Lecture 7 Context of the Organization

Lecture 8 Leadership

Lecture 9 Planning

Lecture 10 Support and Operation

Lecture 11 Performance Evaluation

Lecture 12 Improvement

Lecture 13 Main Changes in ISO 27001:2022

Lecture 14 What has been added and removed from the standard

Section 3: What is ISO/IEC 27005:2022

Lecture 15 How can ISO 27005:2022 support your ISMS certification

Section 4: ISO/IEC 27001 Annex A controls

Lecture 16 What is Annex A

Lecture 17 New requirements

Lecture 18 Changes in Annex A

Lecture 19 ISO 27001:2022 Organizational controls

Lecture 20 ISO 27001:2022 People controls

Lecture 21 ISO 27001:2022 Physical controls

Lecture 22 ISO 27001:2022 Technological controls

Lecture 23 Statement of Applicability (SoA)

Section 5: What is ISO/IEC 27002

Lecture 24 How can ISO 27002:2022 support ISMS certification

Lecture 25 Five attributes

Lecture 26 ISO 27002:2022 Control Examples

Section 6: New controls in ISO/IEC 27002:2022

Lecture 27 Threat intelligence control

Lecture 28 Information security for use of cloud services control

Lecture 29 ICT readiness for business continuity control

Lecture 30 Physical security monitoring control

Lecture 31 Configuration management control

Lecture 32 Information deletion control

Lecture 33 Data masking control

Lecture 34 Data leakage prevention control

Lecture 35 Monitoring activities control

Lecture 36 Web filtering control

Lecture 37 Secure coding control

Section 7: Mapping ISO 27001:2013, ISO 27001:2022 and NIST CSF

Lecture 38 Mapping ISO 27001:2013 and ISO 27001:2022 ANNEX A controls

Lecture 39 ISO 27001:2022 and NIST CSF controls

Lecture 40 Mapping ISO 27001:2022 controls to NIST CSF subcategories

Section 8: ISO/IEC 27001:2022 Transition and Implementation Guide

Lecture 41 Transition from ISO 27001:2013 to ISO 27001:2022 controls

Lecture 42 ISMS policy example

Lecture 43 Transition timelines and Q&A

CISOs, Information security managers, and personnel,ISMS auditors and consultants,Cybersecurity professionals

[Image: nACDMAh1_o.jpg]

[To see links please register or login]


[To see links please register or login]


[To see links please register or login]

[Image: signature.png]
Reply


Download Now



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now   Download Now