Admin training (part 5/5): Operating and improving an ISMS and reporting compliance
We will present ways for successfully operating and continuously improving your ISMS.
This is the fourth webinar on a 5-part webinar series "Become a Cyberday expert". Parts 2-4 cover most important features that are required for setting up systematic information security management in an organization. Part 5 covers staying compliant, improving the ISMS and demostrating compliance for stakeholders.
The webinar series utilizes Cyberday as training tool (cyberday.ai). It will be used to build your organization's own management system and gather all information needed for the certification audit to one single place.
Webinar is well suited for anyone interested in utilizing Cyberday or new core team members / admins in organizations already using Cyberday.
1. Importance of personnel awareness to organization's cyber security
2. Effective and staff-motivating procedure for guidance and training
3. Guidebook = Employee's view into the information security management system
4. Tips for work
We welcome questions and comments throughout the webinar! These are also an important part of the webinar content.
P.s. Registering for the webinar doesn't commit you to anything. You may also participate either "live" or via the recording, which you will receive automatically via email after the webinar is over.
Yes you will find many kind of references to ISO 27001 information security standards. The official the full name of ISO 27001 is “ISO/IEC 27001 – Information technology — Security techniques — Information security management systems — Requirements.”
ISO 27001 is the leading international standard focused on information security, published by these two mentioned organizations, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Both of these are leading international organizations that develop international standards.
ISO 27001 standard is the main part of a set of standards developed to handle information security: the ISO/IEC 27000 series. The series is deliberately broad in scope, covering more than just privacy, confidentiality and IT/technical/cybersecurity issues.
27001 ISO, framework ISO 27001, ISO 27k... all refer to the same thing.
Not only does the standard provide companies with the necessary know-how for protecting their most valuable information, but a company can also get certified against ISO 27001 and, in this way, prove to its customers and partners that it safeguards their data. ISO 27001 certification is probably the best proof for customers that information security is taken seriously and systematically managed in the organization.
Individuals can also get ISO 27001-certified by attending a course and passing the exam and, in this way, prove their skills to potential employers.
Because it is an international standard, ISO 27001 is easily recognized all around the world, increasing business opportunities for organizations and professionals.
Click yourself to the desired webinar from the list above and fill out the registration form at the bottom of the page.
If you wish, you can also subscribe to our free newsletter, in which we provide weekly the most important digital security news with short interpretations and a list of upcoming webinars.
We use the Livestorm webinar software and you need to accept its termos of use when registering.
Yes - you will automatically receive a link to the recording in your email if you have registered for the webinar. You can also forward the recording to your colleagues if you wish.
Once registered, you will receive a message in your email with a direct link to the webinar room. You'll need a personal passcode, which can also be found in the email.
Chrome, Firefox, or Safari are recommended for participation, but with all modern browsers the webinar usually works great.
No worries - you will automatically receive a link to the recording in your email and you can participate by viewing it at a time that suits you. If the webinar raises questions, you can ask, for example, directly at email@example.com.
Yes, of course. In a webinar, you can comment either publicly using the Chat view or privately using the Questions tab.
Participants will not see other participants in the webinar. If you comment in the public Chat section, your first name and comment will also be visible to others.
We will present creating an automatized personnel cyber security guidance and training process.