16 Steps in the ISO 27001 Implementation

Поделиться
HTML-код
  • Опубликовано: 30 июл 2024
  • Webinar is designed for organizations that plan to implement ISO 27001, and have no previous experience in such projects. In this webinar, all the steps in ISO 27001 implementation are explained, and tips are provided on how to proceed with this complex task.
    Main points covered:
    • Family of ISO 27k standards - for what purpose should each standard be used
    • 16 steps towards ISO 27001 certification
    • Key benefits and how to present them to management
    • Tips for implementation - using tools, hiring a consultant, costs involved, how long does it take.
    Presenter:
    Dejan Kosutic is the main ISO 27001 expert Advisera. He has an extensive working experience both as tutor and as a consultant - he is an Approved Tutor for ISMS Lead Auditor courses, and delivers various ISO 27001 in-person courses throughout Europe as well as online courses via webinars. In his consulting career, he works with clients from the financial sector, government, and small and medium-sized business including IT companies.
    Date: June 1, 2016
    Organizer: Gezim Zeneli
    Slides of the webinar: bit.ly/1sS3G9u
    -------------------------------------------------------------------------------
    Find out more about Security standard:
    Trainings: www.pecb.com/iso-iec-27001-le...
    www.pecb.com/iso--iec27001-le...
    Webinars: www.pecb.com/webinars
    pecb.com/oldwebinar/16-steps-...
    Article: www.pecb.com/article/informat...
    Whitepaper: www.pecb.com/whitepaper/iso-2...
    Video: • Is training needed for...
    -------------------------------------------------------------------------------
    For more information about PECB:
    Website: pecb.com/
    LinkedIn: / pecb
    Twitter: / pecb
    Facebook: / pecbinternational
    Google +: plus.google.com/+PECBGroup
    Slideshare: www.slideshare.net/PECBCERTIFI...

Комментарии • 26

  • @ITSharing
    @ITSharing 7 лет назад +3

    Thanks for help sharing updated information "16 Steps in the ISO 27001 Implementation".

  • @kaizentrainingmanagementco8175
    @kaizentrainingmanagementco8175 3 года назад +1

    Great webinar; all key steps included.

  • @ramaboindala6393
    @ramaboindala6393 7 лет назад +1

    Thank you for the tool kit

  • @riccardomoraldi686
    @riccardomoraldi686 4 года назад +1

    Thank you by the way, everything is so much clear now :)

  • @richnik
    @richnik 7 лет назад +3

    Where is the link to your book?

  • @michaelmarquis7825
    @michaelmarquis7825 7 лет назад +1

    Great...
    Will like to be informed of any upcoming webinar. Thanks

    • @PECBGroup
      @PECBGroup  7 лет назад +1

      Hello Michael, here is the link of PECB upcoming webinars: pecb.com/webinars

  • @hanabliss9534
    @hanabliss9534 6 лет назад +2

    thats really amazing and helpfull

  • @gauravkaintura
    @gauravkaintura 4 года назад

    came across here, quite mesmerized by the speaker skill.

  • @bubsnicket
    @bubsnicket 7 лет назад +10

    Can you post the link to the mandatory documents?

    • @sd-yk9sq
      @sd-yk9sq 4 года назад +2

      scope (Clause 4.1) Understanding the organization and its context: The organization must determine its external and internal issues which should be relevant to its purpose and can affect its ability to achieve the intended outcome of its information security management system
      Scope (Clause 4.2) Understanding the needs and expectations of interested parties: The organization must determine the interested parties and their requirement that are relevant to the information security management system
      Scope (Clause 4.3) Determining the scope of the information security management system: The organization must determine the boundaries and applicability of the information security management system to establish its scope.
      Information security policy (Clause 5.2)
      Information security risk assessment process (Clause 6.1.2)
      Information security risk treatment process, including the Statement of Applicability (Clause 6.1.3d) and risk treatment plan (Clause 6.1.3e)
      Information security objectives (Clause 6.2)
      Evidence of competence (Clause 7.2)
      Documented information “determined by the organization as being necessary for the effectiveness of the [ISMS]” (Clause 7.5.1b)
      Information necessary to have confidence that the processes required for operational planning and control have been carried out as planned (Clause 8.1)
      Results of information security risk assessments (Clause 8.2)
      Results of information security risk treatment (Clause 8.3)
      Evidence of performance monitoring and measuring results (Clause 9.1)
      Internal audit program(s) and audit results (Clause 9.2g)
      Evidence of the results of management reviews (Clause 9.3)
      Evidence of the nature of the nonconformities and any subsequent actions taken, and the results of any corrective actions (Clause 10.1)

  • @babaispirit
    @babaispirit 6 лет назад

    Requesting u to arrange videos by 'topic-name - serial number' to enable viewers to get knowledge in correct/choronological manner.....Thanks LUV for your fine effort...

  • @zsgems
    @zsgems 6 лет назад

    Sir,
    Please provide the mandatory documents list.

    • @PECBGroup
      @PECBGroup  6 лет назад

      You can read the webinar slides here: www.slideshare.net/PECBCERTIFICATION/16-steps-in-the-iso-27001-implementation and contact Dejan if you need more information, please.

    • @sd-yk9sq
      @sd-yk9sq 4 года назад

      scope (Clause 4.1) Understanding the organization and its context: The organization must determine its external and internal issues which should be relevant to its purpose and can affect its ability to achieve the intended outcome of its information security management system
      Scope (Clause 4.2) Understanding the needs and expectations of interested parties: The organization must determine the interested parties and their requirement that are relevant to the information security management system
      Scope (Clause 4.3) Determining the scope of the information security management system: The organization must determine the boundaries and applicability of the information security management system to establish its scope.
      Information security policy (Clause 5.2)
      Information security risk assessment process (Clause 6.1.2)
      Information security risk treatment process, including the Statement of Applicability (Clause 6.1.3d) and risk treatment plan (Clause 6.1.3e)
      Information security objectives (Clause 6.2)
      Evidence of competence (Clause 7.2)
      Documented information “determined by the organization as being necessary for the effectiveness of the [ISMS]” (Clause 7.5.1b)
      Information necessary to have confidence that the processes required for operational planning and control have been carried out as planned (Clause 8.1)
      Results of information security risk assessments (Clause 8.2)
      Results of information security risk treatment (Clause 8.3)
      Evidence of performance monitoring and measuring results (Clause 9.1)
      Internal audit program(s) and audit results (Clause 9.2g)
      Evidence of the results of management reviews (Clause 9.3)
      Evidence of the nature of the nonconformities and any subsequent actions taken, and the results of any corrective actions (Clause 10.1)

  • @kaustubhponkshe6186
    @kaustubhponkshe6186 7 лет назад +1

    How can I get intimation about next webinars? I am interested to join it.

    • @PECBGroup
      @PECBGroup  6 лет назад

      Please subscribe here: pecb.com/en/subscription and you will receive information regarding new webinars!

  • @PECBGroup
    @PECBGroup  7 лет назад +1

    Thank you for your comments. Here is the link to join upcoming PECB Webinars: pecb.com/webinars

  • @hanabliss9534
    @hanabliss9534 6 лет назад

    what is PCB?

    • @PECBGroup
      @PECBGroup  6 лет назад

      Hello Maha,
      PECB is a certification body for persons, management systems, and products of international standards. It provides training, examination, audit and certification services.
      For more, please visit our website: pecb.com/

  • @shorty328
    @shorty328 6 лет назад

    Hi is it Possible to get a copy of these Slides?

    • @PECBGroup
      @PECBGroup  6 лет назад

      Hello! Slides are available at the following link only for reading purposes: bit.ly/1sS3G9u

  • @gulyaevAA
    @gulyaevAA 4 года назад

    ахах сразу слышно что русский

  • @riccardomoraldi686
    @riccardomoraldi686 4 года назад

    my god, you are good, but you seem exhausted!