Information Security Management Systems (ISMS) provide a systematic approach to managing sensitive company information, ensuring it remains confidential, secure, and available. ISMS is primarily based on the ISO/IEC 27001 standard, which establishes best practices for managing information security risks.
This training program is designed to help professionals understand, implement, and maintain an effective ISMS in alignment with Bureau of Indian Standards (BIS) guidelines and ISO 27001
This program is beneficial for:
DURATION | SUBJECT |
---|---|
9:30 - 10:00 AM | Introduction & Program Objectives |
10:00 - 11:15 AM | Fundamentals of ISMS & ISO 27001 - Overview of Information Security - Importance of ISMS - Understanding ISO 27001:2013 framework |
11:15 - 11:30 AM | Tea Break |
11:30 - 1:00 PM | Information Security Risks & Threats - Cyber threats and vulnerabilities - Risk assessment methodologies |
1:00 - 2:00 PM | Lunch Break |
2:00 - 3:30 PM | ISMS Policy Development & Implementation - Key policies: Access control, data protection, incident management - Security controls and preventive measures |
3:30 - 3:45 PM | Tea Break |
3:45 - 5:30 PM | Business Continuity & Incident Response - Cyber incident handling - Disaster recovery planning |
DURATION | SUBJECT |
---|---|
9:30 - 10:00 AM | Quick Review of Previous Day |
10:00 - 10:30 AM | Legal, Regulatory & Compliance Requirements - Indian IT Act 2000 - GDPR, Data Protection Laws |
10:30 - 11:15 AM | Risk Management in ISMS - Identifying and mitigating security risks - Role of internal audits in ISMS |
11:15 - 11:30 AM | Tea Break |
11:30 - 1:00 PM | Security Awareness & Employee Training - Best practices for information security - Preventing phishing and social engineering attacks |
1:00 - 2:00 PM | Lunch Break |
2:00 - 2:30 PM | Workshop: Security Risk Assessment |
2:30 - 3:30 PM | Workshop: Developing an ISMS Policy |
3:30 - 3:35 PM | Tea Break |
3:45 - 4:30 PM | Case Studies on Cybersecurity Breaches & Lessons Learned |
4:30 - 5:00 PM | Discussion, Feedback & Conclusion |