Select regional store:

ISO 27001 Webinars

ISO/IEC 27001 certification demonstrates to existing and potential customers that an organization has defined and put in place best-practice information security processes. ISO 27001 is the only auditable international standard that defines the requirements of an information security management system (ISMS). An ISMS is a set of policies, procedures, processes, and systems that manage information risks, such as cyber attacks, hacks, data leaks, or theft.

By implementing an ISMS certified to ISO 27001, your organization can benefit greatly: avoiding the losses and financial penalties associated with data breaches, winning new business, and strengthening relationships with existing clientele.

ISO 27001 webinars on demand

Webinar: The transition strategy for ISO 27001:2022

Presenter: Alan Calder, Founder and Executive Chairman

The ISO 27001 standard has recently been updated, introducing key changes organisations must adopt to remain compliant. As a result, many companies may need some pointers on how to effectively transition from ISO 27001:2013 to ISO 27001:2022.

This webinar will discuss:

  • The key changes introduced by the new ISO 27001 standard
  • How the new version affects organizations that are implementing ISO 27001
  • What it means for organizations already certified to ISO 27001:2013
  • How to develop an effective transition strategy
  • Practical advice and solutions for implementing ISO 27001:2022

Your journey to ISO 27001 – Project initiation, securing management support, and gap analysis

Presenter: Alan Calder, Founder and Executive Chairman

This webinar will discuss:

  • The growing importance of implementing an ISO 27001-compliant ISMS
  • How to secure management support and initiate an implementation project
  • The benefits of conducting an ISO 27001 gap analysis
  • Compliance requirements, controls, and measures
  • Practical steps and solutions to conduct a gap analysis

Your journey to ISO 27001 – Updates, transition strategy, and implementation

Presenter: Alan Calder, Founder and Executive Chairman

This webinar will discuss:

  • Updates to ISO 27001 and how to create a transition strategy
  • The baseline security criteria to implement an ISO 27001-compliant ISMS
  • The five steps to conducting ISO 27001 information security risk assessments
  • How to secure organization-wide commitment
  • Practical steps and solutions to implement ISO 27001

Your journey to ISO 27001 – Privacy integration

Presenter: Alan Calder, Founder and Executive Chairman

This webinar will discuss:

  • The importance of integrating privacy into your ISO 27001-compliant ISMS
  • An introduction to the structure and controls of ISO 27701 and ISO 27002
  • ISO 27701 implementation and what it means for your business
  • How NIST and SOC 2 can simplify your ISO 27001 implementation project
  • Practical steps and solutions to integrate privacy into your ISMS

Your journey to ISO 27001 – Internal audit and certification

Presenter: Alan Calder, Founder and Executive Chairman

This webinar will discuss:

  • Internal audits and preparing for a certification audit
  • The steps to conduct an internal audit
  • Common audit pitfalls and how to avoid them
  • The certification audit process
  • Choosing a certification body and why it is important to make the right decision

ISO 27001 vs SOC 2: What’s the difference?

Presenter: Alan Calder, Founder and Executive Chairman

Aimed at senior management, board members, and heads of department, as well as cybersecurity and data protection professionals deciding between ISO 27001 certification and SOC 2 certification, this live webinar provides a high-level overview of the differences between the two frameworks and the key compliance aspects organizations need to consider.

Join IT Governance’s founder and Executive chairman Alan Calder to discover:

  • The similarities and differences between ISO 27001 and SOC 2
  • The certification process for both frameworks
  • Which framework is right for your organization

Five information security challenges your tech company faces and how ISO 27001 can solve them

Presenter: Preston Bukaty, IT Governance USA consultant

Information security is crucial for technology companies to stay afloat. Existing and potential customers, clients, and stakeholders want assurance that your business can adequately protect the personal data it holds. Furthermore, data breaches can be very costly and may lead to customer distrust and loss of business.

Learn how ISO 27001 can help address these challenges in our informative webinar, which covers:

  • Information security objectives your company should have
  • Five information security challenges your company faces
  • How implementing ISO 27001 can address objectives and challenges
  • The overall benefits of ISO 27001 certification

How to integrate privacy into your ISO 27001 ISMS

Presenter: Alice Turley, GDPR Consultant, IT Governance Europe

ISO 27701 is the privacy information standard that specifies the requirements for a PIMS (privacy information management system), and can be bolted onto an organization’s existing ISO 27001-compliant ISMS (information security management system) to ensure effective privacy management.  

While ISO 27001 addresses information security, ISO 27701 provides organizations with guidance on implementing privacy control measures to prevent unauthorized use or disclosure of personal data, supporting your organization’s GDPR (General Data Protection Regulation) compliance.  

In this webinar, GDPR consultant Alice Turley gives an overview of ISO 27701 and explains how the Standard can help organizations comply with multiple privacy regimes, discussing:  

  • ISO 27701 implementation and what it means for your business  
  • The benefits of an ISO 27701-compliant PIMS 
  • The structure and controls of ISO 27701  

Keeping Free From COVID-19: How ISO 27001 Protects Remote Workers

COVID-19 has completely transformed the way organizations operate. One of the biggest changes has been the large-scale move to remote working. This has led to increased cyber threats and information security requirements. With remote working now a permanent arrangement for many, we discuss how ISO 27001, the global standard for implementing an ISMS (information security management system), can be used to protect your company.

Led by IT Governance USA consultant Preston Bukaty, the webinar covers:

  • An overview of ISO 27001
  • How ISO 27001 can be used to mitigate risk when working remotely
  • Implementing ISO 27001 for the pandemic and beyond
  • The benefits of ISO 27001 in the new threat landscape

Cybersecurity and the law: How cybersecurity and IT compliance apply to legal practice

Everyone is now a threat of evolving threat actors: Account credentials are easy to steal, but it requires further work to monetize those data elements before controls take effect. What’s more appealing are; trade secrets, valuable information, criminal history and court documents

The webinar will discuss the number of breaches by sectors and the five most common attacks. It will discuss why law firms are a target of attack. Key reasons include the confidential data they hold on behalf of clients. It will discuss the model rules of professional conduct.

 Read more

How to overcome your data security compliance challenges

Increasingly stringent data security laws and regulations both in the US and internationally, combined with a rapidly evolving cyber threat landscape, call for stronger, smarter, and more robust data security solutions.

Security teams are constantly challenged to protect their company information and comply with a growing list of state and federal laws and regulations that require information security measures to avoid data breaches.

 Read more

How to implement an information security management system

Implementing an ISMS based on the best-practice guidance set out by ISO 27001 and ISO 27002 delivers numerous benefits, including reducing your risk of a data breach.

 Read more

Conducting a cybersecurity risk assessment

ISO 27001 is the international standard that sets out the specification of an ISMS, a best-practice approach to addressing information security that encompasses people, processes, and technology.

The assessment and management of information security risks is at the core of ISO 27001, which ensures that the ISMS continually adapts to changes in the organization and the risk environment

Read more

Assessing compliance: the ISO 27001 ISMS internal audit

Testing and assessing your information security measures is essential to ascertain whether the controls you have implemented are working effectively.

Compliance with the international information security standard ISO 27001 requires continual monitoring and regular reviews of the ISMS. An internal audit is an effective measure to assess whether your ISMS is functioning as it should, and one of the requirements for ISO 27001 certification.

 Read more

How can an ISO 27001 compliant ISMS help publicly listed firms achieve SEC regulatory compliance?

This webinar will cover how ISO 27001 can help publicly listed organizations ensure regulatory compliance with SEC regulations. It offers practical advice on how these organizations can improve overall information security to stay in line with new regulations. It will explain how a robust staff awareness program supports cyber resilience and legal compliance.

 Read more

This website uses cookies. View our cookie policy