Internal training
Training for an internal auditor according to the ISO/IEC 27001 standard
Internal Auditor ISO/IEC 27001 – an intensive training based on the practical aspects and responsibilities arising from the PN-ISO/IEC 27001 standard (Information Security Management Systems specification) and PN-EN ISO 19011 (guidelines for auditing management systems).
About the training
Practical approach to information security management according to the ISO/IEC 27001 standard
During the training, participants will learn how to verify and assess whether the measures taken in the area of information protection are properly managed and supervised, and whether the intended results are being achieved. The skills gained during the training enable participants to independently conduct audits within an organization. The requirements of the PN-ISO/IEC 27001 standard (Information Security Management Systems specification) and PN-EN ISO 19011 (guidelines for auditing management systems) are also presented. Based on practical exercises, participants are shown how to plan and conduct internal audits.
The training is delivered in the form of lectures and workshops, ensuring an effective translation of the participants’ new knowledge and skills into practical actions. From a content perspective, particular attention is paid not only to delivering theoretical knowledge but, most importantly, to providing effective, practical methods and techniques, valuable experiences, and best practices that participants can use immediately after the training.
The offered training scope is divided into two stages, which we present below.
Training objective
- The ability to plan and conduct an information security audit in accordance with the applicable regulations.
- The ability to document and prepare an audit report, including the ability to formulate corrective actions.
- The ability to identify non-conformities and effectively highlight them.
Target audience of the training
The training is intended for individuals responsible for information security within an organization, employed at all organizational levels, with particular emphasis on current and future internal auditors according to ISO/IEC 27001.
Language of the training
The training is conducted in Polish.
There is the possibility of organizing the training in English.
Training methodology
Achieving the proper training outcomes is possible thanks to selecting the right topics and training methods tailored to the participants’ needs and the subject matter of the training. Below, we present the methods and techniques we use:
LECTURE
We deliver knowledge to the participants using dedicated teaching aids, such as multimedia presentations. This is the foundational part of the training, during which we introduce the topic, discuss key concepts, and describe roles, processes, procedures, etc.
PRACTICAL EXAMPLES
As practitioners, we base the training program on real-life events related to specific problems. We assist participants in independently reaching conclusions or solutions. Our training is strongly focused on practice and skill development.
DISCUSSION
Participants express their opinions and exchange experiences. A well-structured discussion topic, thanks to the clash of at least two arguments, usually generates strong emotional engagement. The discussion allows for the development of a common solution or prepares arguments regarding the given topic.
BRAINSTORMING
In a short time, we generate many ideas and solutions for specific problems and situations. We engage participants, stimulate their thinking, and encourage creativity.
EXERCISES
Practical tasks related to the training subject, e.g., creating a process, conducting a case study, etc. This complements the lecture and practical examples effectively.
TESTS
We verify the participant’s level of knowledge and skills. We identify competency gaps and plan the education process accordingly to improve the participant’s skills. Depending on the type of training, this may be done using various tools, such as knowledge tests and practical tasks.
SIMULATIONS
These provide an excellent representation of reality, where participants actively engage and experience the consequences of their actions.
SUMMARY
After completing each topic, we summarize the material discussed. This is done by the trainer and allows for a recap of the most important issues related to the topic while giving participants the chance to verify their understanding.
Trainer
Izabela Selwestruk
A graduate of Economics from the University of Białystok and postgraduate studies: Information Systems Auditor at the Polish Academy of Sciences in Warsaw and Computer Science at the Białystok University of Technology. An expert in the field of institutional control in government administration, information security, and risk management. She has over 18 years of experience in government administration (including managerial positions) in areas such as conducting control proceedings, conducting IT audits, and organizing training on control methodology, auditing, and risk analysis. She participated in the implementation of the information security management system. During her time in government administration, through her persistent work, she was appointed as a civil service officer. Currently, she works at PBSG as a consultant for ISMS, KSC, and business continuity. Her professional interests are currently focused on information security, including cybersecurity. In her personal life, she loves motorcycle riding and participating in ultra races, including mountain races. She has participated in half-marathons, marathons, and 50 km races. She plans to compete in 100 km and 150 km races. Her dream is to participate in the UTMB (Ultra-Trail du Mont-Blanc) race.
Dedicated exclusively to your organization – this approach guarantees comfort and freedom to thoroughly discuss sample topics and the situation within your organization. We know that every enterprise is different, so to effectively translate the acquired knowledge into your organization, we tailor the presented examples to your specific needs and business context.
Training program
Day 1
9.00-16.00
- Welcome to the participants
- Introduction to information security
- Information security standards
Requirements of the PN-ISO/IEC 27001 standard - Break
- Requirements of the PN-ISO/IEC 27001 standard
- The auditing process
- Questions
Day 2
9.00-16.00
- Workshop Part I
- Audit steps and planning
- Opening meeting
- Checklists
- Identification and description of findings
- Workshop Part II
- Audit scenarios
- Interpersonal skills
- Break
- Workshop Part III
- Identification of non-conformities
- Workshop Part IV
- Closing audit meeting
- Outline of the final report and post-audit actions
- Summary
How does it work?
Step 1
REGISTRATION
In the first step, fill out the application form to express your interest in organizing dedicated training at your company.
Step 2
DATE
We will set the date and location of the training – tailored to your availability and individual expectations.
Step 3
PRICE
We will present the commercial terms for organizing the training based on the agreed parameters and number of participants.
Step 4
TRAINING
We will deliver the dedicated training according to the agreed terms.