- ค้นหา BSI
- ตรวจสอบใบรับรอง
Suggested region and language based on your location
Your current region and language
Introduction
Setting up an ISMS can be as simple or as sophisticated as your organization needs it to be. However, even knowing where to start when considering setting up an ISMS can be challenging.
In this one day course, our expert tutors will explain the requirements of the current standard to help you understand how it could apply to your organization and the potential benefits of adopting it.
You will therefore be better prepared to carry out an implementation of an ISMS that conforms to the current standard, as the background, updated concepts, principles, terms and definitions used in ISO/IEC 27001:2013 are fully explained and discussed.
The requirements course will also help you understand how the standard works in preparation for attending the internal and lead auditing training courses.
Implementation
In this three day course, our experienced tutors teach you how to consider the state of your organization’s current information security management practices in preparation to put in an ISMS.
You should already have a good understanding of the requirements of the current standard and our tutors will tap into that knowledge so that you can develop your skill and understanding of the practicalities involved when setting up a typical management system framework that conforms with ISO/IEC 27001:2013.
This will enable you to play a key role in ensuring your organization is compliant to ISO/IEC 27001:2013.
ISO/IEC 27001:2013 provides the model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an ISMS to protect your information assets.
After attending this course, you will be in a position to use this model and be able to develop an ISMS suitably appropriate for your organization.
This is intended for those who will be involved in advising top management on the introduction of ISO/IEC 27001:2013 into an organization. It is especially relevant for those who have the responsibility to implement information security management in a business or provide consultation on the subject.
Suggested job roles and their teams include:
ติดต่อเราเพื่อดูว่าเราจะสามารถช่วยแนะนำคุณบนเส้นทางสู่ความสำเร็จในการดำเนินงานอย่างยั่งยืนได้อย่างไร