ISO/IEC 27005 Lead Risk Manager Training Course
The ISO/IEC 27005 Lead Risk Manager training equips you with the essential expertise to support an organization in managing risks associated with all assets relevant to Information Security. This training uses the ISO/IEC 27005 standard as a reference framework, providing a comprehensive understanding of how to design and develop an Information Security Risk Management program. Throughout the course, you will gain a thorough knowledge of best practices for risk assessment methods, including OCTAVE, EBIOS, MEHARI, and harmonized TRA. This training also supports the implementation process of the ISMS framework outlined in the ISO/IEC 27001 standard.
Upon mastering all the necessary concepts of Information Security Risk Management based on ISO/IEC 27005, you can take the exam to apply for the “PECB Certified ISO/IEC 27005 Lead Risk Manager” credential. Holding a PECB Lead Risk Manager Certificate will demonstrate your practical knowledge and professional capabilities in supporting and leading a team in managing Information Security Risks.
Who should attend?
- Information Security risk managers
- Information Security team members
- Individuals responsible for Information Security, compliance, and risk within an organization
- Those implementing ISO/IEC 27001 or seeking to comply with it, as well as those involved in a risk management program
- IT consultants
- IT professionals
- Information Security officers
- Privacy officers
Examination - Duration: 3 hours
The “PECB Certified ISO/IEC 27005 Lead Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Programme (ECP). The exam covers the following competency domains:
- Domain 1: Fundamental principles and concepts of Information Security Risk Management
- Domain 2: Implementation of an Information Security Risk Management program
- Domain 3: Information security risk assessment
- Domain 4: Information security risk treatment
- Domain 5: Information security risk communication, monitoring, and improvement
- Domain 6: Information security risk assessment methodologies
General Information
- Certification fees are included in the exam price
- A training material set containing over 350 pages of information and practical examples will be provided
- A participation certificate with 21 CPD (Continuing Professional Development) credits will be issued
- In the event of exam failure, you can retake the exam within 12 months at no additional cost
Course Outline
Day 1 Introduction to ISO 27005, concepts and implementation of a risk management program
- Section 01: Course objectives and structure
- Section 02: Standard and regulatory framework
- Section 03: Concepts and definitions of risk
- Section 04: Implementing a risk management programme
- Section 05: Context establishment
Day 2 Risk identification, evaluation, and treatment as specified in ISO 27005
- Section 06: Risk Identification
- Section 07: Risk Analysis
- Section 08: Risk Evaluation
- Section 09: Risk Assessment with a quantitative method
- Section 10: Risk Treatment
Day 3 Information Security Risk Acceptance, Communication, Consultation, Monitoring and Review
- Section 11: Information security risk acceptance
- Section 12: Information security risk communication and consultation
- Section 13: Information security risk monitoring and review
Day 4 Risk Assessment Methodologies
- Section 14: OCTAVE Method
- Section 15: MEHARI Method
- Section 16: EBIOS Method
- Section 17: Harmonized Threat and Risk Assessment (TRA) Method
- Section 18: Applying for certification and closing the training
Day 5 Certification Exam
Requirements
A fundamental understanding of ISO/IEC 27005 and comprehensive knowledge of Risk Assessment and Information Security.
Open Training Courses require 5+ participants.
ISO/IEC 27005 Lead Risk Manager Training Course - Booking
ISO/IEC 27005 Lead Risk Manager Training Course - Enquiry
ISO/IEC 27005 Lead Risk Manager - Consultancy Enquiry
Testimonials (3)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
I genuinely enjoyed the real examples of the trainer.
Joana Gomes
Course - Compliance and the Management of Compliance Risk
Upcoming Courses
Related Courses
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III is a global regulatory framework for bank capital adequacy, stress testing, and market liquidity risk. Initially agreed upon by the Basel Committee on Banking Supervision between 2010 and 2011, subsequent changes to The Accord have extended its implementation to 31st March 2019. Basel III enhances bank capital requirements by boosting bank liquidity and reducing leverage.
Basel III differs from Basel I and II in that it requires varying levels of reserves for different forms of deposits and other borrowings, complementing rather than replacing the earlier accords.
Navigating this complex and ever-evolving landscape can be challenging. Our course and training will assist you in managing potential changes and their impact on your institution. As an accredited partner of the Basel Certification Institute, we guarantee that our training and materials are up-to-date and effective.
Objectives:
- Preparation for the Certified Basel Professional Examination.
- Development of practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within a banking organization.
Target Audience:
- Board members with risk management responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Risk Management team members
- Compliance, legal, and IT support staff
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- An introduction to Basel norms and amendments to the Basel Accord (III)
- Regulations for market, credit, counterparty, and liquidity risk
- Stress testing methodologies, including how to design and conduct stress tests
- The anticipated impact of Basel III on the international banking sector, with practical demonstrations of its application
- The rationale behind the new Basel norms
- An overview of the Basel III norms
- Objectives of the Basel III norms
- A timeline for Basel III implementation
Certified Fraud Examiner (CFE) Preparation
70 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at advanced-level professionals who wish to gain a comprehensive understanding of fraud examination concepts and prepare for the Certified Fraud Examiner (CFE) exam.
By the end of this training, participants will be able to:
- Gain comprehensive knowledge of fraud examination principles and the fraud examination process.
- Learn to identify, investigate, and prevent various types of financial fraud schemes.
- Understand the legal environment related to fraud, including the legal elements of fraud, relevant laws, and regulations.
- Acquire practical skills in conducting fraud investigations, including evidence collection, interviewing techniques, and data analysis.
- Learn to design and implement effective fraud prevention and deterrence programs within organizations.
- Gain confidence and knowledge to successfully pass the Certified Fraud Examiner (CFE) exam.
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This four-day event (CGEIT training) serves as the ultimate preparation to help you pass the challenging CGEIT exam on your first attempt.
The CGEIT qualification is an internationally recognized symbol of excellence in IT governance, awarded by ISACA. It is tailored for professionals responsible for managing IT governance or those with significant advisory or assurance responsibilities in this field.
Achieving CGEIT status will enhance your recognition in the market and increase your influence at the executive level.
Objectives:
This seminar has been designed to prepare participants for the CGEIT examination by building on their existing knowledge and understanding, ensuring they are better equipped to pass the exam as defined by ISACA.
Target Audience:
This training course is aimed at IT and business professionals with substantial experience in IT governance who are preparing to take the CGEIT exam.
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at payment services compliance professionals who wish to create, implement, and enforce a compliance program within an organization.
By the end of this training, participants will be able to:
- Understand the rules set forth by government regulators for payment service providers.
- Create the internal policies and procedures needed to satisfy government regulations.
- Implement a compliance program that adheres to relevant laws.
- Ensures that all corporate processes and procedures comply with the compliance program.
- Uphold the business's reputation while protecting it from lawsuits.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at intermediate-level cybersecurity professionals who wish to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations.
By the end of this training, participants will be able to:
- Understand the key components of cybersecurity governance, risk, and compliance.
- Conduct risk assessments and develop risk mitigation strategies.
- Implement compliance measures and manage regulatory requirements.
- Develop and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course provides an expert introduction to the newly enacted Accessibility Law and equips developers with the practical skills to design, develop, and maintain fully accessible applications. Starting with a contextual discussion on the law's importance and implications, the course quickly shifts to hands-on coding practices, tools, and testing techniques to ensure compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse Goal:
To ensure that participants gain a solid understanding of GRC processes and capabilities, as well as the skills needed to integrate governance, performance management, risk management, internal control, and compliance activities effectively.
Overview:
- Basic terms and definitions in GRC
- Principles guiding GRC
- Core components, practices, and activities within GRC
- The relationship between GRC and other disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
ISO 22301 Introduction
7 HoursThe ISO 22301 Introduction training course equips you with an understanding of the fundamental concepts of a Business Continuity Management System (BCMS).
By participating in the ISO 22301 Introduction course, you will gain insight into the significance of a Business Continuity Management System and the advantages it offers to businesses, society, and governments.
Who should attend?
- Individuals interested in Business Continuity Management
- Those looking to acquire knowledge about the core processes of a Business Continuity Management System (BCMS)
Learning objectives
- Gain an understanding of the concepts, approaches, methods, and techniques used to establish a Business Continuity Management System
- Familiarize yourself with the essential elements of a Business Continuity Management System
PECB ISO/IEC 27001 Lead Auditor
35 HoursISO/IEC 27001 Lead Auditor
The ISO/IEC 27001 Lead Auditor training equips you with the essential expertise to conduct an Information Security Management System (ISMS) audit, utilizing widely accepted audit principles, procedures, and techniques.
Why should you attend?
Throughout this training course, you will gain the knowledge and skills required to plan and execute internal and external audits in accordance with ISO 19011 and the ISO/IEC 17021-1 certification process.
Through practical exercises, you will become proficient in audit techniques and be able to manage an audit program, lead an audit team, communicate effectively with clients, and resolve conflicts.
After acquiring the necessary expertise to perform this audit, you can take the exam and apply for the “PECB Certified ISO/IEC 27001 Lead Auditor” credential. Holding a PECB Lead Auditor Certificate will demonstrate your capability and competence in auditing organizations based on best practices.
Who should attend?
- Auditors aiming to conduct and lead Information Security Management System (ISMS) certification audits
- Managers or consultants looking to master the ISMS audit process
- Individuals responsible for maintaining compliance with ISMS requirements
- Technical experts preparing for an ISMS audit
- Expert advisors in Information Security Management
Learning objectives
- Understand the operations of an Information Security Management System based on ISO/IEC 27001
- Recognize the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand an auditor’s role in planning, leading, and following up on a management system audit according to ISO 19011
- Learn how to lead an audit and an audit team
- Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
- Acquire the competencies of an auditor to plan, lead, draft reports, and follow up on audits in compliance with ISO 19011
Educational approach
- This training combines both theoretical knowledge and best practices used in ISMS audits
- Lecture sessions are supported by examples based on case studies
- Practical exercises include role-playing and discussions based on a case study
- Practice tests closely resemble the Certification Exam
ISO 27002 Lead Manager
35 HoursThe ISO/IEC 27002 Lead Manager training equips you with the essential expertise and knowledge to support an organization in implementing and managing Information Security controls as outlined in ISO/IEC 27002.
Upon completing this course, you will be eligible to take the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential. A PECB Lead Manager Certification demonstrates that you have a deep understanding of the principles and techniques necessary for implementing and managing Information Security Controls based on ISO/IEC 27002.
Who should attend?
- Managers or consultants aiming to implement an Information Security Management System (ISMS) in line with ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants looking to master the ISMS implementation process
- Individuals responsible for information security, compliance, risk, and governance within an organization
- Members of information security teams
- Expert advisors in information technology
- Information Security officers
- Privacy officers
- IT professionals
- CTOs, CIOs, and CISOs
Learning objectives
- Master the implementation of Information Security controls by following the framework and principles of ISO/IEC 27002
- Gain a thorough understanding of the concepts, approaches, standards, methods, and techniques required for the effective implementation and management of Information Security controls
- Understand the relationship between various components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Recognize the importance of information security in organizational strategy
- Become proficient in implementing information security management processes
- Excel in formulating and implementing security requirements and objectives
Educational approach
- This training combines both theoretical and practical elements
- Lectures are complemented with real-life examples to illustrate key concepts
- Practical exercises based on case studies are included
- Review exercises to assist in exam preparation are provided
- A practice test similar to the certification exam is offered
General Information
- Certification fees are included in the exam price
- Participants will receive a comprehensive training material of over 500 pages, including practical examples
- A participation certificate with 31 CPD (Continuing Professional Development) credits will be issued to participants
- In the event of an exam failure, you have the option to retake the exam within 12 months at no additional cost
ISO 9001 and ISO 27001 – Interpretation and Internal Auditor
21 HoursISO 9001 and ISO 27001 are globally recognized standards for quality management systems and information security management systems, respectively.
This instructor-led, live training (available online or on-site) is designed for intermediate-level professionals who aim to interpret the ISO 9001 and ISO 27001 standards and conduct internal audits effectively.
By the end of this training, participants will be able to:
- Comprehend the principles and requirements outlined in ISO 9001 and ISO 27001.
- Apply the clauses and controls to real-world situations.
- Plan and execute internal audits that align with ISO standards.
- Identify nonconformities and propose corrective actions.
Format of the Course
- Interactive lectures and discussions.
- Practical auditing exercises and case studies.
- Hands-on analysis of quality and security scenarios.
Course Customization Options
- To request a tailored training program for this course, please contact us to arrange.
Compliance and the Management of Compliance Risk
21 HoursAudience
This course is designed for all employees who require a comprehensive understanding of Compliance and Risk Management.
Format of the Course
The course is structured as a blend of:
- Facilitated discussions
- Slide presentations
- Case studies
- Practical examples
Course Objectives
By the end of this course, participants will be able to:
- Grasp the key aspects of Compliance and the national and international initiatives aimed at managing associated risks.
- Outline the methods by which a company and its employees can establish a Compliance Risk Management Framework.
- Explain the roles of the Compliance Officer and Money Laundering Reporting Officer, and how these roles should be integrated into business operations.
- Understand other critical areas in Financial Crime, particularly as they pertain to International Business, Offshore Centres, and High-Net-Worth Clients.
Open Source Software (OSS) Management
14 HoursOpen Source Software (OSS) Management involves the oversight of open-source components' lifecycle within an organization, ensuring their use is secure, compliant, and efficient.
This instructor-led, live training (online or onsite) is designed for intermediate-level IT professionals who want to implement best practices for managing open-source software in enterprise and government settings.
By the end of this training, participants will be able to:
- Establish effective OSS policies and governance frameworks.
- Utilize SBOM and SCA tools to identify, track, and manage open-source dependencies.
- Mitigate risks related to licensing and security vulnerabilities.
- Streamline the adoption of OSS while maximizing innovation and cost savings.
Format of the Course
- Interactive lectures and discussions.
- Case studies and scenario-based exercises.
- Practical demonstrations with OSS management tools.
Course Customization Options
- This course can be customized to align with specific organizational OSS policies and toolchains. Please contact us for arrangements.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in Norway (online or onsite) provides an individual qualification for industry practitioners who wish to demonstrate their professional expertise and understanding of the PCI Data Security Standard (PCI DSS).
By the end of this training, participants will be able to:
- Understand the payment process and the PCI standards designed to protect it.
- Understand the roles and responsibilities for entities involved in the payment industry.
- Have deep insight into, and understanding of, the 12 PCI DSS requirements.
- Demonstrate knowledge of PCI DSS and how it applies to organizations that are involved in the transaction process.