Internal training

A practical approach to implementing an ISMS according to ISO 27001

A professionally prepared training course on implementing the Information Security Management System (ISMS) covers the skills, knowledge, and procedures necessary to effectively meet the requirements of ISO 27001, taking into account the changes in the PN-EN ISO/IEC 27001:2022 standard.

About the training

Effective training for individuals looking to expand their knowledge in the field of information security.

The training is conducted in the form of a lecture and workshops, ensuring an effective translation of the new knowledge and skills into practical actions for participants. We focus not only on delivering theoretical knowledge but, above all, on providing effective, practical methods and techniques, along with valuable experiences and best practices.

The training is one-day, and upon completion, participants will receive a certificate of participation.

Exclusively dedicated to your organization – this approach ensures comfort and freedom to thoroughly discuss example topics and the situation within your company. We understand that every business is unique, so to effectively translate the acquired knowledge to your organization, we tailor the presented examples to your specific needs and business context

Training program

Day 1
9:00 - 16:00

  • Welcoming participants
  • Introduction to Information Security Management

  • What is Information Security Management?

  • Basic terms and definitions

  • Structure of the ISO 27001 standard

  • Requirements of the ISO 27001 standard

  • Context of the organization

  • Stakeholder analysis

  • Leadership

  • PDCA approach in the context of information security management

  • Information security areas (physical security, IT security, personnel, organizational and legal aspects)

  • Break

  • Practical approach to identifying the organization’s context

  • Break

  • Estimating resources necessary for successful ISMS implementation

  • Break

  • Practical approach to ISMS topics

  • Practical approach to identifying and inventorying information assets

  • Practical approach to classifying information groups

Day 2
9:00-16:00

  • Risk analysis within ISMS

  • Risk assessment for identified assets and development of a risk treatment plan

  • Break

  • Risk analysis within ISMS – continued

  • Verification of the effectiveness of applied controls

  • Development of the statement of applicability

  • Break

  • Prevention and management of information security incidents

  • Evaluation of ISMS effectiveness and improvement

  • Risk assessment for identified assets

  • Development of a risk treatment plan

  • Verification of the effectiveness of applied controls

  • Break

  • Improvement of the information security management system

  • Operation of the system within the organization

  • Possible work related to development

  • Summary – questions and discussion

How does it work?

Step 1

REGISTRATION

In the first step, fill out the application form to let us know your interest in organizing a dedicated training session at your company.

Step 2

DATE

We will set the date and location of the training—adapting to your availability and individual expectations.

Step 3

PRICE

We will present you with the commercial terms for organizing the training based on the agreed parameters and number of participants.

Step 4

TRAINING

We will deliver the dedicated training in accordance with the agreed terms.

Request a quote for an internal training session