Risk Management 27005 Risk Methodologies

Risk Management 27005 Risk Methodologies, risk management, risk management methodologies

Acquire the expertise to establish and operate an Information Security Risk Management (ISRM) program based on ISO/IEC 27005 and supported by well-known information risk management methodologies.

 

The Risk Management 27005 Risk Methodologies course is a course based on ISO/IEC 27005 and supported by international recognized information security risk methodologies. The course follows a real-world adapted case-study approach so students can be better prepared to apply the concepts of this ISO information security risk management standard on a real-world scenario. Based on a practical methodology developed by Behaviour, this course prepares the students to the establishment and operation of an Information Security Risk Management (ISRM) program based on ISO/IEC 27005 that can be implemented as part of any organization, legislation, or regulation requirements, or even, as part of the implementation of an Information Security Management System (ISMS) in compliance with the requirements of ISO/IEC 270001.

The second part of the course includes the presentation and implementation of several well-known information security methodologies on the market considering the case-study provided. The presented methodologies include, the NIST-800-30r1, MSRMG, OCTAVE, MAGERIT, EBIOS and a high-level presentation of the MEHARI, FAIR and M_o_R methods.

The knowledge of the Risk Management 27005 Manager course is included, so it is not a prerequisite or a training path.

Training materials updated with the last released editions of all the related best practices, including any related draft published.

 


Next GUARANTEED DATES       18-Apr-2022, Live Training   Register now       20-Jun-2022, Live Training   Register now       


course evaluation     4.6 in 5

Risk Management 27005 Risk Methodologies, risk management, risk management methodologies

Introduction


This course is available to be delivered in a classroom and Live-Training model.
Live Training brings you the dynamic environment of the classroom, to your desk. Using your computer, you interact with the trainer and the trainees as if you were with them in the classroom.

Risk Management 27005 Risk Methodologies Path

On this course, the students will acquire the expertise to establish and operate an Information Security Risk Management (ISRM) program based on ISO/IEC 27005 and supported by well-known information risk management methodologies.

Besides the fundamental concepts related with information security and risk management and an overview clause-by-clause of the ISO/IEC 27005 standard and related guidance, the course leads the students through a step-by-step BEHAVIOUR customized methodology to implement an Information Security Risk Management (ISRM) program based on the ISO/IEC 27005 international standard in an organization, either as part of an new or existing isolated ISRM program, or, in support to the implementation of an Information Security Management System (ISMS) based on the ISO/IEC 27001.

The information security risk management implementation process covered on this course is supported by the ISO/IEC 27005, and related ISO/IEC 27000 family standards (ISO/IEC 27001, ISO/IEC 27002, among others), and additional recognized international guidance such as ISO 31000 standards, NIST information security risk standards (including NIST 800-30r1), among others.

The second part of the course includes the presentation and implementation of several well-known information security methodologies on the market considering the case-study provided. Through the course the students are presented with a more in depth or more high-level details to implement each one of these methods (note that the in-depth details presented will depend on method to method). The presented methodologies include, the NIST-800-30r1, MSRMG, OCTAVE, MAGERIT, EBIOS and a high-level presentation of the MEHARI, FAIR and M_o_R methods.

Based on a real-world adapted case-study organization, and supported by several approaches, templates, and other tools, including discussions and practical exercises, the students will team-up with their peers during this course and will be challenged to demonstrate their Manager skills to implement an ISRM program for this organization. This training methodology train and prepare students for successfully implement the ISO/IEC 27005 standard in a real-world environment with the support of well-known risk management methodologies.

Training Methodology
This course is based on theorical, and practical sessions supported by a real-world adapted case-study.
The course includes hands-on practical and theorical exercises to:
  • better prepare the students for the real-world challenges, and
  • to prepare and increase the likelihood of success on the certification exam, and
  • train and prepare professionals for participating in an ISRM implementation program based on ISO/IEC 27005 or as part of an ISMS implementation based on ISO/IEC 27001.
  • prepare participants to select and implement the most suitable information security risk method in response to the need of their organization
This course is available to be delivered in a Classroom and Live-Training model.
Live Training brings you the dynamic environment of the classroom, to your desk. Using your computer, you interact with the trainer and the trainees as if you were with them in the classroom.

Audience
This course is intended to:
  • Information Security and/or IT Consultants, Auditors, Managers or Risk Professionals
  • CISO, CIO, CSO or any Executive or Senior Manager responsible to ensure the alignment and delivery of value from Information Security Risk Management to the organization
  • Professionals responsible for the Information Security/IT Governance on the organization
  • Any professional, either, IT, information security, risk manager, business or any other, involved on the establishment, implementation, operations and/or continual improvement of an Information Security Risk Management program, isolated or, as part of an Information Security Management System (ISMS) based on ISO/IEC 27001
  • Anyone who wants to learn the fundamentals of ISO/IEC 27005 and acquire the expertise to implement an ISRM program based on this standard

Prerequisites
Students should understand English as the course documentation is in this language. Please consult BEHAVIOUR to verify the availability of the course on other languages.

Duration (days)
5 days

Learning Objectives
At the end of this course students will be able to:
  • Acquire the fundamental knowledge on the concepts related with information security risk management, including standards, frameworks, and methods
  • Understand the main concepts related with ISO/IEC 27005 and know how to apply and implement the guidance of the standard to support the implementation of an Information Security Risk Management (ISRM) program on an organization
  • Know how to use the ISO/IEC 27005 to support the implementation on an Information Security Management System (ISMS) based on ISO/IEC 27001
  • Draft and adapt a custom based information security risk management plan based on ISO/IEC 27005, ISO 31000, and well-known available methodologies to continually support the business strategy and challenges of an organization
  • Monitor, review and improve a risk management program, including, the maintenance of the risk management practices and residual risk at acceptable levels based on the risk appetite and tolerance
  • Support the organization on the achievement and maintenance of an ISRM program in compliance based on the guidance of ISO/IEC 27005 and in compliance with the ISO/IEC 27001 certification requirements
  • Acquire the knowledge to implement several well-known information security methodologies on the market, including, the NIST-800-30r1, MSRMG, OCTAVE, MAGERIT, EBIOS and a high-level understanding of the MEHARI, FAIR and M_o_R methods

Program
  1. Introduction to Information Security Risk Management, the ISO/IEC 27005 standard, program, and context establishment
    • Course introduction
    • Information security risk management standards, legislation, and regulation
    • Information security risk management fundamentals
    • Presentation and overview of the ISO/IEC 27005 guidance
    • Planning and implementing an information security risk management program
    • Information security risk management context establishment

  2. Information security risk assessment, treatment, and acceptance; risk communication, consultation, monitoring and review
    • Information security risk identification
    • Information security risk analysis: quantitative and qualitative approaches
    • Information security risk evaluation
    • Information security risk treatment: treatment options and selection of controls, drafting the risk treatment plan and identification of residual risks subject to acceptance
    • Information security risk acceptance: approval of risk treatment plans and residual risk
    • Information security risk communication and consultation
    • Information security risk monitoring and review
    • Personnel certification and closing the training

  3. Presentation and implementation of the NIST-800-30r1 and MSRMG methodologies
    • Presentation and implementation of the NIST-800-30r1 method
    • Presentation and implementation of the MSRMG method

  4. Presentation and implementation of the OCTAVE and MAGERIT methodologies
    • Presentation and implementation of the OCTAVE method
    • Presentation and implementation of the MAGERIT method

  5. Presentation and implementation of the EBIOS methodology; Other methods.
    • Presentation and implementation of the EBIOS method
    • Presentation of the MEHARI method
    • Presentation of the FAIR method
    • Presentation of the M_o_R method

  6. Certified Risk Management 27005 Manager (CRM27005M) Exam

Exam
The “Certified Risk Management 27005 Manager” exam covers the following competence domains:
  • Domain 1: Information security risk management fundamentals and ISO/IEC 27005 guidelines
  • Domain 2: Information security risk management program based on ISO/IEC 27005
  • Domain 3: Information security risk assessment based on ISO/IEC 27005
  • Domain 4: Information security risk treatment and acceptance based on ISO/IEC 27005
  • Domain 5: Information security risk communication, monitoring and improvement based on ISO/IEC 27005
Language(s): English and Portuguese (please consult BEHAVIOUR for availability on additional languages).
Duration: 2 hours.
Exam details: One part exam.
Results: “Pass or Fail” qualitative score. In the case of a failure, the result will be accompanied with the list of domains in which you had a mark lower than the passing grade. If the candidate fails the exam, he is entitled to one free retake within a 1-year period from the initial exam date.
Passing score: 700/1000 marks.
Exam type: Scenarios-based open questions.

Certification
After successfully completing the certification exam, participants may apply for one of the two available credentials for this personnel certification scheme, depending on their level of experience.

  • Certified Risk Management 27005 Associate Manager: no previous experience required.

  • Certified Risk Management 27005 Manager: 2 years of experience on information security risk management


A certificate will be issued to participants who successfully pass the exam and comply with all the other requirements related to the selected credential. Candidates also receive the digital badge of the certification achieved.

The “Certified Risk Management 27005 Manager” personnel certification program is drafted and maintained according to the ISO/IEC 17024 standard.

Trainer
Our specialists are renowned consultants and auditors, with several years of experience in the areas of implementation, auditing and training in family ISO 27000, with particular focus on standards ISO 27001, ISO 27005, ISO 31000 and their associated standards.

General Information
CLASSROOM TRAINING
  • Training in English language.
  • Training material in English.
  • Step-by-step risk management methodology.
  • Behaviour Participation Certificate of 31 CPD/CPE credits.
  • Certification Exam in English.
  • Digital Certification Diploma and digital certification badge after successful examination and formal process registration. This process has no associated cost.
  • If the candidate fails the exam, he is entitled to one free retake within a 12 month period from the initial exam date.
  • Coffee break in the morning and afternoon (Applies to all training that take place in Behaviour facilities)

LIVE ONLINE TRAINING
  • Training in English language.
  • Online training material in English, with online access.
  • Step-by-step risk management methodology.
  • Digital Behaviour Participation Certificate of 31 CPD/CPE credits.
  • Certification Exam in English, available in paper-based or online proctoring.
  • Digital Certification Diploma and digital certification badge after successful examination and formal process registration. This process has no associated cost.
  • If the candidate fails the exam, he is entitled to one free retake within a 12 month period from the initial exam date.

Benefits
  • ISO/IEC 27005 is a guidance and support standard to information security risk management.

  • ISO/IEC 27005 is not a certifiable standard for an organization; however, this standard was designed to assist the implementation of an information security risk management program, to enable organizations to manage risks that could compromise the organization's information security.

  • Risk Management 27005 Risk Methodologies course bases its pedagogical model in a certification program based on the ISO/IEC 17024 standard, which defines the requirements for certification of people, fulfilling the recommendations of ISO.

  • Risk Management 27005 Risk Methodologies course is oriented towards to master the risk management elements related to all assets of relevance for information security using the ISO/IEC 27005 standard as a reference framework. The course covers the fundamental concepts for information security risk management, and reference is made to the optimal approach to information security risk assessment and to the management of risks through its complete life cycle. This training fits perfectly in the framework of an ISO/IEC 27001standard implementation process.

  • Risk Management 27005 Risk Methodologies course includes the presentation and implementation of several well-known recognized information security risk management methodologies.

  • Certification exam is monitored by an official Behaviour administrator.

  • The Certified Risk Management 27005 Manager certification exam is conducted at the end of the course, on the last day of training, which focuses on development questions and case studies allowing the certifying entity to measure, more effectively, the knowledge of the candidates. Note that this exam only covers the subjects related with ISO/IEC 27005.

  • Upon success in the exam, the professional will achieve one the Risk Management 27005 Manager certification. In case of failure, professional may repeat the exam at no additional cost, within 1 year after the date of the 1st examination.

  • Behaviour Pedagogical Model aims to provide a learning environment conducive to acquisition of competences, in accordance with objectives of each training program. Promoting interaction, participation, and appreciation of experiences, we contribute to meaningful learning, certification, and international recognition but, above all to the development of critical thinking and autonomy.

  • Behaviour is an organization accredited by DGERT (Portuguese Government Entity). Behaviour has its Quality Management System (QMS) implemented in accordance with the requirements of ISO 9001, the requirements of DGERT, the requirements of the European standard NP 4512 and the standard ISO 10015.

Dates and Price

Guaranteed Dates Program
(*) All dates of this course are guaranteed only for the events that take place in Lisbon. In other locations the events are subject to a minimum number of participants.
On Behaviour all courses at Lisbon occur regardless of the number of trainees in room. The concept of setting up classes does not exist in our educational model, which is why all public dates, presented on the website, are guaranteed. So if you're in Portugal or anywhere else in the world, you can prepare your week and your trip, as long as you ensure your registration in the course.

Volume Discounts
For companies, Behaviour offer discounts, starting from the registration of the 2nd participant, in the same course and on the same date.
Simulate the prices for the number of participants you want to register to training@behaviour-group.com or contact us via chat.

Hotels and Useful Information
Know where you can stay in Lisbon, near Behaviour. For more information please see >> Booking <<