Contact Us
Search Icon

Suggested region and language based on your location

    Your current region and language

    ISO/IEC 27005:2018 Information Security Risk Management

    ISO/IEC 27005:2018 Information Security Risk Management

    Level Understanding Duration 2 days
    Available to book: Public classroom PHP15500 Book your training now
    Available to quote: In-house Get quotation for in-house training

    With the increasing number of internal and external information security threats, organizations recognize the importance of adopting a formal risk management programme. Without a mechanism to identify, analyse and manage information security risks, it’s difficult for organizations to prioritize their security remediation efforts and resource allocation and associated costs. This leaves organizations more susceptible to security breaches, which can lead to financial and reputational damage.

    Building on the concepts and framework specified in ISO/IEC 27001, ISO/IEC 27005:2018 provides guidelines for adopting an information security risk management approach that is appropriate to all organizations.

    This course aims to provide you with clear and practical guidance on the framework and steps involved to identify, analyse and manage information security risks. It will help you to review your existing risk treatments and controls and ensure they are appropriate to manage and reduce the identified risks. This will give you the confidence to get the most effective allocation of resources in place to address information security issues for your organization.

    How will I benefit?

    This course will help you:

    • Identify key benefits associated with using ISO/IEC 27005:2018 for protecting information assets, as part of an effective information security management system (ISMS)
    • Understand the best practice risk management processes contained in    ISO/IEC 27005:2018
    • Understand the rationale behind the processes, usage and implementation
    • Establish an acceptable level of risk for your information assets based on a knowledge and understanding of the risks your organization faces
    • Develop processes for assessing and managing the many different risks related to your organization’s information assets
    • This course will help organizations investigate and score information security risks in a robust, quantifiable and repeatable way.
    • By the end of this course delegates will be able to:

      • Explain concepts specific to information risk management, including terms and definitions
      • Recognize typical information security risks faced by organizations
      • Identify typical information security risk management concerns
      • Communicate ISO/IEC 27005:2018 introduction, background, purpose, scope and structure
      • Explain how ISO/IEC 27005:2018 integrates and interfaces with other standards, such as ISO/IEC 27001:2013
      • Implement the topics covered in ISO/IEC 27005:2018 within your organization
      • Determine the value of the information assets under your control
      • Evaluate threats to information assets
      • Identify, analyse and evaluate information security risks
      • Prioritize and choose appropriate risk treatments
    • Anyone who wants to learn about:

      • Identifying and analysing information security risks
      • How risks can be evaluated
      • What treatments, controls and measures can be implemented in order to mitigate risks
      • Ongoing governance and risk monitoring processes

      The course is applicable to individuals from any size or type of organization who are currently involved in (or will be in the future) planning, implementing, maintaining, supervising or assessing information security, as part of an ISO/IEC 27001 ISMS or a standalone system. 

      Prerequisites

      You should have a basic knowledge of the latest versions of ISO 27001 and ISO 27002, as well as an understanding of the key principles of an ISMS.

      We also recommend that you have an awareness of generic risk assessments and basic understanding of information security principles and terminology.

      Some delegates on this course will have already attended our Information Security Management System (ISMS) Requirements of ISO 27001:2013 or Information Security Management System (ISMS) Implementing ISO/IEC 27001:2013 course. 

      We also recommend delegates have an understanding of the risk assessment approach currently employed in their organizations, should one exist. 

       

      • Lunch and refreshments
      • Course notes
      • On completion, you will be awarded an internationally recognized BSI Training Academy certificate.
    Contact Us

    Let's shape your organization's future together

    Reach out and see how we can help guide you on your path to sustainable operational success.

    Get in touch