Internal training
A practical approach to implementing an ISMS according to ISO 27001
A professionally prepared training course on implementing the Information Security Management System (ISMS) covers the skills, knowledge, and procedures necessary to effectively meet the requirements of ISO 27001, taking into account the changes in the PN-EN ISO/IEC 27001:2022 standard.
About the training
Effective training for individuals looking to expand their knowledge in the field of information security.
The training is conducted in the form of a lecture and workshops, ensuring an effective translation of the new knowledge and skills into practical actions for participants. We focus not only on delivering theoretical knowledge but, above all, on providing effective, practical methods and techniques, along with valuable experiences and best practices.
The training is one-day, and upon completion, participants will receive a certificate of participation.
Objective of the training
Training audience
The training on implementing and maintaining an Information Security Management System (ISMS) based on the requirements of the ISO 27001 standard is addressed to board members, management, information security management department staff, internal auditors, and all those interested in ISMS within the organization.
Language of the training
The training will be conducted in Polish.
It is possible to organize the training in English.
Training methodology
- Achieving the right training outcomes is possible by selecting the appropriate topics and methods tailored to the specific needs of participants and the issues addressed in the training. Below are the methods and techniques we use:
- LECTURE
- We provide knowledge to participants based on dedicated teaching materials, such as a multimedia presentation. This is the foundational part of the training, during which we introduce the topic, discuss key concepts, and describe roles, processes, procedures, etc.
- PRACTICAL EXAMPLES
- As practitioners, we base the training program on real-life events presented to address specific issues. We help participants independently come to conclusions or solutions. Our training is highly focused on practical experience and skill development.
- DISCUSSION
- Participants express their opinions and exchange experiences. A well-structured discussion topic, by clashing at least two arguments, typically generates strong emotional involvement. Discussion helps in developing a joint solution or preparing arguments regarding a specific issue.
- BRAINSTORMING
- In a short time, we generate many ideas and solutions for specific problems and situations. We engage participants, encouraging them to think and develop their creativity.
- EXERCISES
- Practical tasks related to the training subject, such as creating a process, conducting a case study, etc. These effectively complement the lecture and practical examples.
- TESTS
- We assess the participant’s knowledge and skills level. We identify competency gaps and appropriately plan the educational process to enhance the participant’s abilities. Depending on the training type, this may involve various tools such as knowledge tests and performance evaluations.
- SIMULATIONS
- These provide an excellent sample of reality, where participants actively engage and experience the consequences of their actions.
- SUMMARY
- After completing each topic, we summarize the discussed material. This activity, carried out by the trainer, allows for a review of the most important aspects related to the topic and gives participants the opportunity to verify their understanding.
Trainer
Jacek Knopik/Iwona Kapela/Marcin Kowalczyk
Marcin Kowalczyk
Graduate of the Faculty of Computer Science and Electronic Economy at the Poznań University of Economics. Certified ITIL Expert. During his long-term cooperation with PBSG, he provided consulting, analytical, and training services in the implementation, improvement, and optimization of IT service management systems based on the most popular international standards. Expert in IT service management, information security, business continuity, and risk management in the field of information security.
He holds the role of project manager and lead consultant in system management projects and implementation of specialized IT tools supporting IT processes and information security. Throughout his career, he successfully completed over 150 implementation projects and conducted more than 100 training sessions. Speaker at numerous conferences dedicated to IT service management, information security, and Governance topics.
Iwona Kapela
Graduate of Management and Marketing at the Warsaw School of Economics, Social Psychology at the SWPS University of Social Sciences and Humanities, and postgraduate studies in “Information Security” at the National Defence University. Since 1991, she has been associated with the telecommunications services market. She has experience in revenue protection, detection of telecommunication fraud, as well as resolving information security incidents. While working with telecommunications companies, she gained knowledge in crisis management and business continuity in relation to ISO 22301, including critical infrastructure protection, closely collaborating with IT and NT technological areas, physical protection, and fire safety. She aims to use her professional experience to focus on practical implementation of information security measures, which protect corporate secrets and ensure business continuity. She holds the ISO 27001 Internal Auditor certificate (Credential ID 641/ISMS/17 BSI) and the CBCP – Certificate of Completion in Business Continuity Planning (DRI).
Jacek Knopik
Graduate of Documentation Management at Adam Mickiewicz University in Poznań. Management representative and internal auditor for information security, quality, environmental, and occupational health and safety management systems. Expert in risk management in the fields of information security, GDPR, quality management, business continuity, and management control. Consultant, implementer, trainer, and software tester for risk management tools. He has over 5 years of experience in local government administration in the fields of documentation management, process management, management control, and the implementation of teleinformation systems.
He executes projects in management systems and the implementation of supporting IT tools both in the private and public sectors.
Exclusively dedicated to your organization – this approach ensures comfort and freedom to thoroughly discuss example topics and the situation within your company. We understand that every business is unique, so to effectively translate the acquired knowledge to your organization, we tailor the presented examples to your specific needs and business context
Training program
Day 1
9:00 - 16:00
- Welcoming participants
-
Introduction to Information Security Management
-
What is Information Security Management?
-
Basic terms and definitions
-
Structure of the ISO 27001 standard
-
Requirements of the ISO 27001 standard
-
Context of the organization
-
Stakeholder analysis
-
Leadership
-
PDCA approach in the context of information security management
-
Information security areas (physical security, IT security, personnel, organizational and legal aspects)
-
Break
-
Practical approach to identifying the organization’s context
-
Break
-
Estimating resources necessary for successful ISMS implementation
-
Break
-
Practical approach to ISMS topics
-
Practical approach to identifying and inventorying information assets
-
Practical approach to classifying information groups
Day 2
9:00-16:00
-
Risk analysis within ISMS
-
Risk assessment for identified assets and development of a risk treatment plan
-
Break
-
Risk analysis within ISMS – continued
-
Verification of the effectiveness of applied controls
-
Development of the statement of applicability
-
Break
-
Prevention and management of information security incidents
-
Evaluation of ISMS effectiveness and improvement
-
Risk assessment for identified assets
-
Development of a risk treatment plan
-
Verification of the effectiveness of applied controls
-
Break
-
Improvement of the information security management system
-
Operation of the system within the organization
-
Possible work related to development
-
Summary – questions and discussion
How does it work?
Step 1
REGISTRATION
In the first step, fill out the application form to let us know your interest in organizing a dedicated training session at your company.
Step 2
DATE
We will set the date and location of the training—adapting to your availability and individual expectations.
Step 3
PRICE
We will present you with the commercial terms for organizing the training based on the agreed parameters and number of participants.
Step 4
TRAINING
We will deliver the dedicated training in accordance with the agreed terms.