Neem contact met ons op
Search Icon

Suggested region and language based on your location

    Your current region and language

    ISO/IEC 27032:2012 Guidelines for Cybersecurity Training Course

    ISO/IEC 27032:2012 Guidelines for Cybersecurity Training Course

    Duur 2 days
    Beschikbaar om te boeken: View dates, locations and prices

    The cyberspace is a complex environment. It involves different types of interactions between people, software, hardware and physical locations to support with storage, processing, communication and service delivery for a wide range of information. This means the security requirements vary depending upon use, criticality and sensitivity of the information, as well as the level of collaboration between stakeholders.

    International Standards such as ISO/IEC 27002 provide some best practice recommendations on information security controls, however risks relating to cybersecurity need extra technical guidance including:

    • Social engineering attacks
    • Hacking
    • Proliferation of malicious software (malware)
    • Spyware
    • Other potentially unwanted software

    Building on the concepts and framework specified in ISO/IEC 27001, the best practice guidance and techniques in ISO/IEC 27032 help you to manage and respond to these cybersecurity issues, including how to:

    • Prepare for attacks, whether by malware or by unauthorised entities
    • Detect and monitor attacks
    • Respond to attacks

    This course will provide you with knowledge on ISO/IEC 27032 so you can understand, prepare for, detect, respond to and monitor issues related to cybersecurity for your organization.  You will be provided with:

    • An overview of cybersecurity
    • An explanation of the relationship between cybersecurity and other types of security
    • A definition of stakeholders and a description of their roles in cybersecurity
    • Guidance for addressing common cybersecurity issues
    • A framework to enable stakeholders to collaborate on resolving cybersecurity issues

      • Explain the nature of the cyberspace and cybersecurity

      • Who the cybersecurity stakeholders are and what their roles are

      • Recognise what assets, stakeholders, threats and vulnerabilities exist in the cyberspace

      • Identify methods for ensuring cybersecurity attack readiness

      • Explain the benefits of implementing ISO/IEC 27032

      • Utilize the risk management principles to identify and respond to cybersecurity risks

      • Integrate the key concepts and requirements of ISO/IEC 27032 into an ISO/IEC 27001:2013 compliant information security management system (ISMS)

      • Implement the topics covered in ISO/IEC 27032 in your organization
    • Anyone who wants to learn:

      • How to identify, analyse and evaluate risks associated with cybersecurity
      • What techniques, methods and controls can be implemented in order to help mitigate cybersecurity risks
      • What ongoing governance, risk monitoring and collaboration processes can be implemented to ensure that cybersecurity issues continue to be appropriately managed
       
      The course is applicable to individuals from any size or type of organization who is currently, or will in the future, be involved in planning, implementing, maintaining, supervising or assessing information security, particularly as it relates to cybersecurity.

      Prerequisites:

      You should have a basic knowledge of ISO/IEC 27001:2013 and ISO/IEC 27002:2013, as well as an understanding of the key principles of an information security management system.

      It would be advantageous to have a basic understanding of risk management techniques and processes and knowledge of ISO/IEC 27005 or ISO 31000.

      We also recommend that you have an awareness of cybersecurity issues and basic understanding of information security principles and terminology.

      Some delegates on this course will have already attended our Information Security Management System (ISMS) Requirements of ISO 27001:2013, Information Security Management System (ISMS) Implementing ISO/IEC 27001:2013 course or Information Security Risk Management Training Course ISO/IEC 27005:2011. 

      We also recommend delegates have an understanding of the risk assessment approach currently employed in their organizations, should one exist.

      • It's a 2-day course
      • The training can be given in Dutch or English
      • The training materials will be provided in English
      • The standard ISO 27032:2012 isn’t into the training price included. However, during the training course, a loan copy of the standard will be available.
      • Lunch and drinks are included.

      For further information regarding reduced rates at the hotel where the training is being conducted, please contact training.nl@bsigroup.com or call +31-(0)20 346 07 80.

      Online training

      Geeft u de voorkeur aan het gemak van een online training? BSI biedt nu tevens online trainingen aan via een interactief virtueel platform.

      Lees meer over Connected Learning Live

      In-house training
      Voor meer informatie over deze leergang en/of de mogelijkheden van een In-house training voor uw organisatie kunt u contact opnemen met ons training team via 020-346 0780 of stuur een mail naar training.nl@bsigroup.com.

    Contact opnemen

    Samenwerken aan de toekomst van uw organisatie

    Neem contact met ons op en ontdek hoe wij u kunnen helpen met het realiseren van duurzame groei en succes.

    Contact opnemen