Upcoming events

  • No upcoming events

Latest ISLF News

Menu
Log in

Information Security Leadership Forum Interational

A Community of Today and Tomorrow's Leaders

Certified ISO 27001 Lead Implementer Course

The Certified ISO 27001 Lead Implementer - Information Security Management System (ISMS) Course is a 5-day information packed learning experience. Check out the course overview video, day-by-day course curriculum, and more details on this page.

Course Overview

The Certified ISO 27001 Lead Implementer course is a five-day information packed learning experience, based on the new 2022 version of the standard. It is designed to develop a level of competence to support the design, development, roll-out and maintenance of an organizational Information Security Management System. During this course, student will participate in a series of practical exercises leading to a capstone practical exam in the form of a group presentation to a panel of distinguished business and technology executives.

To develop a well-rounded understanding of the standard’s expectations, we will be drawing upon best practices from ISO 27001, 27002, 27003, 27004, 27005, 27017, 27034, 27035, 55000 among others. This approach enables students to understand the expectations to meet the design, development, roll-out and maintenance of an ISO 27001-based information security management system.

WHO SHOULD TAKE THIS COURSE

  Information Security professionals and managers involved in any aspect of the development, roll-out or operational maintenance of an Information Security Management System (ISMS)


  IT Managers and Technical specialist to prepare and support an organization in the implementation or maintenance of an Information Security Management System (ISMS), or transition to an information security role


  Auditors who want to understand and be able to demonstrate competence in an Information Security Management System implementation


  Project Managers and Consultants looking to understand and support clients implementing an information security management system


  Corporate / industrial / physical security specialists looking to understand the dynamics of an information security program and their role in supporting it


  Data Privacy, compliance managers and specialists charged with the responsibility for information security conformity in an organization in a regulated or service industry

How Does The ISO 27001 Lead Implementer Course Relate to Me?

Select the role below that best suite your situation

Disclaimer: these are not customer testimonials, but rather stories of real companies and situations to help you appreciate how this course may be seen or affect people in different roles. Names and details have been altered for privacy reasons.

Information Security Specialist

IT Management

IT Auditor

Project Management Office

IT Stafff & Consultants

Business Leaders

Agenda


Introduction and Planning for an Information Security Management System (ISMS)

  • Course introduction
  • A primer on the ISO 27000 family of standards and guides
  • An ISO 27001 ISMS
  • Acclimating to the organization
  • Business Process Mapping
  • Performing an Asset Inventory to support a risk assessment
  • Defining ISMS Program Goals & Priorities
  • Defining the scope of the ISMS


Planning for an ISMS and Risk Management

  • Understanding and building a Business Case for an ISMS
  • Understanding the requirement for, and performing the mandatory legal & regulatory review
  • Understanding the mandatory Statement of Applicability, and how to create one
  • Fundamental of a risk assessment
  • Familiarization with and understanding how to perform a Gap and Impact Assessments, and prepare the mitigation plan
  • Understanding the need for an ISMS Program Charter Development and familiarization on how to build one
  • Understanding a practical approach to developing governance for your ISMS, including Information Security Policy, Policy
  • Standards, Technical Security Operating Standards, and Technical Security Configuration Standards


Develop and Implement ISMS

  • ISMS Governance continued with Standard Security Operating Processes, and Technical Security Operating Directives (procedures)
  • Performance Management
  • Communications Program
  • Mitigation Plan Implementation
  • Operational Transfer and Acceptance


Management Oversight, Auditing and Managing an ISMS based on ISO 27001

  • A walk through of the ISO 27001 Annex A Control Objectives & Controls
  • Understanding the mandatory requirement for an independent security assessment
  • How to develop an Internal Audit program to support an ISMS
  • Understanding the requirements for an ISMS Leadership Review, including direction for continuous improvement
  • Understanding the end-to-end ISMS certification process, including the certification audit and its requirements
  • Understanding the standard's requirement for the establishment and ongoing management of Information Security Incident with an ISMS


Practical & Written Certification Exams

  • Morning: 3 hour written exam
  • Afternoon: Practical Exam - Formal Presentation of ISMS Business Case to the Organization's Board of Directors

NOTES:

1. Both written and practical exams are mandatory, in order to meet the certification requirements set out by the Information Security Leadership Forum, this course's certifying body.

2. Formal business attire is mandatory for you practical exam. Please be sure to pack / dress appropriately. Men are required to wear a jacket and tie, and women the equivalent.

Learning Objectives

When designing our Certified ISO 27001 Lead Implementer Course, great care is taken to identify key areas the course must focus on in order to ensure student achieve the goals the course was setup to accomplish. These learning objectives are highlighted as follows:

  • Understand the application of an Information Security Program as prescribed by ISO 27001.
  • Master the concepts, approaches, standards, methods and techniques required for the effective management of an organizational Information Security Program
  • Familiarity with the various sub-programs under an Information Security Program, and their interrelationships to establish a holistic enterprise information security program.
  • Develop the expertise to lead an organization in the design, development, implementation, management and maintenance of an Information Security Program
  • Familiarity with the subject matter experts and stakeholders that need to be engaged, and how to apply their expertise to support an organization in the establishment of an Information Security Management System
  • Develop fundamental knowledge and skills required to manage a team that is implementing the ISO27001 standard

What You Get!

Each student will receive:

  a copy of all slides presented during the class

  a certificate of completion awarding 35 Continuing Professional Development (CDP) credit hours

  An exam and certification application voucher.

Certification Exam Information

  There are two exams for this course, a practical and a written exam. Students are required to participate and achieve a minimum passing grade in both in order to qualify for certification. For this reason it is imperative NOT to book early return flights if you are coming in froun out of town and attending an onsite course.

  The written exam is completed within 3 hours on Friday morning, and is in a multiple choice format. The exam begins punctually at 9:00 AM and ends at 12:00 PM. As such, students must arrive no later than 8:30 AM, at which time the examination facilitator will be read exam instructions to the class, and students may ask any final questions. This exam is an open book exam.

  The practical exam is completed Friday afternoon with a live presentation to a panel of guest executives (CISO, CIO, CFO, COO, CEO, etc.).

  All students are required to sign a non-disclosure agreement prior to commencement of the exam, attesting they will not disclose or discuss anything related to either the practical or written exams with any other person(s).

Special Notes

  Training seats are limited, and we do not maintain a waiting list for courses as they book up fast. As such, registration may be closed before the above time, when fully booked.

  Registration closes at 5:00 PM (US Eastern) on the Thursday, 1 week before the first day of each course, to allow time for us to send electronic versions of course-ware and mandatory communications to each student, which includes provisioning access to course pre-requisite material that students must take prior to beginning the first day of the course. The final registration date for each course is posted on the respective course registration page.

ISLF Event Terms & Conditions

  You understand and agree that you are only entitled to register for an ISLF myself, and you confirm this registration is being made by you without the aide of another or a proxy representative.

  When offered as an on-site course, the ISLF reserves the right to revert any course to Live Online Only, in instances where pandemic restirictions or civil unrest prevail, making it unsafe or unlawful to physically be on premises, or for other reasons at the sole descreation of the ISLF, which are deemed to be beyond our control. In such instances, registered student will be notified with as much advanced notice as possible.

√  Students must understand that they are required to participate in the entire training course to be eligible to particpate in the certification exams.

  Student are prohibited from recording (audio, video or image) any session(s), or portions of any session, no matter whether the student is attending a classroom-based or online version. This includes taking any screen captures of images displayed onscreen, whether the online delivery technology may have such capability enabled.

  All student material for this course will be provided on or before the first day of training, by the course instructor via the Information Security Leadership Forum's Online Training Portal. All course material is copyright protected, and student are prohibited from making any unauthorized electronic or printed copies, or redistributing to any person or entity.

  Student are required to sign a non-disclosure and non-compete agreement, stating they will not discuss any part of the certification exams, nor use the material to create a competing training offering, nor support or participate with any other entity to create and offer ISO 27001 training (fee-based or free offering), including the development of training used internal to their organization.

  Onsite training students must bring with them or otherwise have readily accessible, a copy of their course registration with barcode (printed or electronic format), which will be used to take daily attendance on the course. Anyone failing to have this information may be refused access.

  Students understand that they are individually required to comply with any and all government regulations and restrictions or those imposed by an event venue that are in place, or may be imposed within the jurisdiction where this training is scheduled to take place. This includes regulations related to non-resident visas, pandemic outbreaks, protests or other emergency situations. Please note, the ISLF does not participate as a sponsor for any student related to any immigration visa required for a traveling student to attend an ISLF event.

  The Information Security Leadership Forum, CIMA, affiliate training delivery partners, and venue organizations and their staff, shall not be responsible to provision or assist in the provisioning of any item to assist a student to register or participate in training with us, for compliance with any government imposed requirements i.e. COVID-19 PPE, etc. All students are required to plan for and bring with them, or make arrangements for the provisioning of any and all items that may be required for such situations e.g. facial mask, evidence of virus testing, non-resident visa, etc.

Disclosure Statement

Certification training hosted by the Information Security Leadership Forum International (ISLF), is developed, maintained and delivered by the Center for Information Management and Assurance (CIMA), and certifications are issued and administered by the Information Security Leadership Forum, LLC, the Forum's official certification training partner. As such, your course registration information is shared with our partners for their respective roles in accordance with our posted Privacy Policy.