Home

Information Security

Leadership Forum

Information Security Leadership Forum

Welcome to the Information Security Leadership Forum's official community member portal, where practitioners from various information technology and assurance disciplines come together to build and learn new practice models and methodologies, share information, network, come together at local and other events, and more. To register as a new member click here to join.

Participate in Information Security Leadership Forum

Work Group Projects in 2022

ISO 27001 Common Body Of Knowledge

Building on our first edition, work with the Information Security Leadership Forum's Project Leader and your peers to expand the ISO 27001 Common Body of Knowledge (CBK) for greater depth and breadth. As you serve in the truest sense of community spirit, you'll be networking with others who have implemented ISO 27001 in a corporate environment in the past as well. In addition to giving back to the community, you'll also be earning Continuing Professional Development hours, as well as being recognized as a contributing author of our next edition. The ISO 27001 CBK serves as the ISLF's Official Study Guide for the ISO 27001 Lead Implementer course.

Topics covered in this CBK includes:

  • a structured approach to designing, developing, implementing, and managing your information security program;
  • understanding your organizational needs for information security;
  • building the business case for a formal information security program;
  • understanding the various components of an Information Security program; and
  • more
iso 27001 and other regulations addressed in work groups of the information security leadership forum

Information Security Governance Body of Knowledge

Building on our first edition, work with the ISLF Information Security Governance Body of Knowledge (CBK) Project Leader and your peers to expand this CBK for greater depth and breadth. As you serve in the truest sense of community spirit, you'll be networking with others who have developed enterprise Information Security Strategies in an organizational environment in the past. Similar to our other CBK Work Group projects, in addition to giving back to the community, you'll also be earning Continuing Professional Development hours, as well as being recognized as a contributing author of our next edition. The Information Security Governance CBK serves as the ISLF's Official Study Guide for the Certified Information Security Governance Manager course.

Topics covered in this CBK include:

  • developing an information security strategy;
  • performing a legal and regulatory review;
  • policy and standards development;
  • information security organizational design;
  • developing competency requirements for personnel supporting the information security program; and
  • developing an organizational Information Security Service Catalog;
  • more
man pointing at a virtual screen

Information Security Risk Management Common Body of Knowledge

Building on our first edition, work with the ISLF Information Security Risk Management Common Body of Knowledge (CBK) Project Leader and your peers to expand this CBK for greater depth and breadth. As you serve in the truest sense of community spirit, you'll be networking with others who have developed enterprise Information Security Risk Management in a corporate environment in the past. Similar to our other CBK Work Group projects, in addition to giving back to the community, you'll also be earning Continuing Professional Development hours, as well as being recognized as a contributing author of our next edition. The Information Risk Management CBK serves as the ISLF's Official Study Guide for the Certified Information Security Risk Manager course.

Topics included in this CBK are:

  • understanding the risk management concepts;
  • a risk management framework based on ISO 27005;
  • a structured risk assessment model
  • risk mitigation strategies; and
  • more
man base jumping

And ... More Work Groups Coming Soon!

Disclosure

Work Group practice model and methodologies are developed and maintained by the Center for Information Management and Assurance (CIMA) for use in our Work Group activities, and integrated into our official study guides and certification training courseware.

close

JOIN THE INFORMATION SECURITY LEADERSHIP NEWSLETTER

Get in-depth security news and analysis from the trusted source in the industry

We don’t spam! Read our privacy policy for more info.

>