1. Preview – How to implement Information Security (IS) main technics:
2.Compliance requirement:
3. Review of most popular IS standards:
1. ISO 19011 and ISO 17021 – base of auditing:
2. Risk Management approach recommended in ISO/IEC 27005 (assets, threats, vulnerabilities, strength of controls, impacts, probability of incidents).
3. Risk Management approach recommended in ISO/IEC 29134.
4. Review of risk assessment procedure (based on ISO/IEC 27005).
5. Review of risk treatment procedure (based on ISO/IEC 27005).
6. Review of Excel spreadsheet used to risk assessment and risk treatment.
7. Review of risk management tools.
1. Organization definition for following exercises – type of activity, stakeholders, law, relation with customers and suppliers, organization structure.
2. Exercise 1 – creation of audit plan and audit checklist.
3. Evaluation and discussion.
4. Exercise 2 – performing of risk assessment base of proposed Excel spreadsheet:
5. Evaluation and discussion.
6. Exercise 3 – performing risk treatment.
7. Evaluation and discussion.
1. Hierarchy of ISP document – policies, standards, guidelines, procedures, instructions. How to fit ISP to current customer.
2. Examples of ISP Declaration.
3. Example of ICT Security Policy.
4. Example of User Security Policy.
5. Process approach:
6. Examples of procedures/standards e.g.:
1. Organization definition for exercise – type of activity, stakeholders, law, relation with customers, organization structure.
2. Exercise – Creation ISP documents by students:
3. Evaluation and discussion.