close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

ISO 27701 Lead Implementer Training Course Outline

Module 1: Introduction to ISO 27701

  • Introduction
  • Scope
  • Normative References
  • Terms, Definitions, and Abbreviations

Module 2: General

  • Structure of this Document
  • Application of ISO/IEC 27001:2013 Requirements
  • Application of ISO/IEC 27002:2013 Guidelines
  • Customer

Module 3: Information Management

  • What is Information Management?
  • Importance of Information Management
  • Areas of Information Management
  • Challenges Involved in Information Management
  • Managerial Function

Module 4: PIMS-Specific Requirements Related to ISO/IEC 27001

  • General
  • Context of the Organisation
  • Leadership
  • Planning
  • Support
  • Operation
  • Performance Evaluation
  • Improvement

Module 5: PIMS-Specific Guidance Related to ISO/IEC 27002

  • General
  • Information Security Policies
  • Organisation of Information Security
  • Human Resource Security
  • Asset Management
  • Access Control
  • Cryptography
  • Physical and Environmental Security
  • Operations Security
  • Communications Security
  • Systems Acquisition, Development, and Maintenance
  • Supplier Relationships
  • Information Security Incident Management
  • Information Security Aspects of Business Continuity Management
  • Compliance

Module 6: Personally Identifiable Information (PII)

  • What is Personally Identifiable Information (PII)?
  • Compliance Environment
  • PII Security Controls
  • Sensitive Vs Non-Sensitive PII
  • Safeguarding PII
  • PII Vs Personal Data

Module 7: Introduction to Internal Auditing

  • What is Internal Audit?
  • Who is Internal Auditor?
  • Types of Internal Audit
  • Internal Audit Functions
  • Internal Vs External Audit

Module 8: Information System Audit

  • Need for Information System Audit
  • Information System Auditing Standards
  • Auditing Guidelines

Module 9: Audit Preparation and Planning

  • Audit Scope and Charter
  • Audit Planning
  • Risk-Based Approach
  • Audit Staffing
  • Audit Schedule
  • Communication of Audit Plan
  • Computer Assisted Auditing Techniques

Module 10: Information Security Risk Assessment

  • Introduction to Risk Management
  • Why Perform an Information Security Risk Assessment?
  • Principles of Risk Assessment
  • Risk Assessment Process
  • Quantitative Vs Qualitative Security Risk Assessment Methods

Module 11: Additional ISO/IEC 27002 Guidance for PII Controllers and Processors

  • General
  • Conditions for Collection and Processing
  • Obligations to PII Principals
  • Privacy by Design and Privacy by Default
  • PII Sharing, Transfer, and Disclosure

Module 12: Implementation of Information Management System

  • Steps for Successful Systems Implementation
  • Considerations When Implementing an Information Management System
  • Potential Pitfalls of New IT System Implementation

Module 13: Implement ISO 27701

  • Requirements of ISO 27701
  • Why Implementing ISO 27701:2019 Matters?
  • Managing Personal Information with ISO/IEC 27701
  • Common Fallacies in Implementing ISO 27701
  • Maintenance and Continuous Improvement

Module 14: Correlation Between ISO/IEC 27701, ISO/IEC 27001, and ISO/IEC 27002

  • Relationship Between ISO/IEC 27701, ISO/IEC 27001, and ISO/IEC 27002
  • How Does ISO 27701 Relate to ISO 27001?
  • Implement Security Controls
  • Be Compliant with the GDPR, ISO 27001, and ISO 27002

Module 15: PII Compliance

  • What is PII Compliance?
  • PII Data Classification
  • PII Compliance Checklist
    • Identify and Classify PII
    • Create a PII Compliance Policy
    • Implement Data Security Tools
    • Practice IAM
    • Monitor and Respond

Module 16: Logging and Monitoring

  • Event Logging
    • References ISO 27002 Control 8.15
    • Event Types
    • Log Protection
    • Log Analysis
    • Log Monitoring
  • Protection of Log Information
  • Clock Synchronisation

Show moredowndown

Prerequisites

There are no formal prerequisites for attending this ISO 27701 Lead Implementer Training course.

Audience

This training is suitable for everyone who wants to learn about implementing the Privacy Information Management System (PIMS) in compliance with the guidance of ISO 27701.

ISO 27701 Lead Implementer Training Course Overview

ISO 27701 is intended to permit sector-specific requirements that can be added without creating a new Management System. IT systems can be successfully implemented by following a well-tested information system implementation process that minimises disruption to the business. This training aims to provide learners with knowledge of implementing, maintaining, and improving information management system security under the ISO 27701 standard. Individuals with excellent skills in maintaining information security will get high-profile designations in multinational corporations and quickly climb the ladder of success.

The Knowledge Academy’s 3-day ISO 27701 Lead Implementer Training course provides delegates with a comprehensive knowledge of privacy information management systems and how to implement them successfully. During this training, delegates will learn about information system audit to add reliability, security, and accuracy to the information systems. They will also learn how to manage and use data while adhering to different data privacy regimes. This course will be delivered by our highly skilled instructor, who has years of experience teaching ISO courses and making delegates comprehend security techniques.

Course Objectives

  • To maintain conformance with data privacy regimes requirements
  • To store and analyse a tremendous amount of data and information
  • To manage information privacy using ISO 27701 standard guidelines
  • To implement either separately or as a combined management system
  • To interview employees to ensure that they understand processes and policies
  • To conduct tests to see how the management system works after implementation

After completing this training, delegates will be able to implement and manage PIMS according to the guidance of the ISO 27701 standard and required changes to extend Information Security Management System (ISMS). They will also be able to apply their skills as PII controllers and PII processors holding responsibility and accountability for PII processing.

Show moredowndown

  • Delegate pack consisting of course notes and exercises
  • Courseware
  • Experienced Instructor

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

This is our most popular style of learning. We run courses in 1200 locations, across 200 countries in one of our hand-picked training venues, providing the all important ‘human touch’ which may be missed in other learning styles.

best_trainers

Highly experienced trainers

All our trainers are highly qualified, have 10+ years of real-world experience and will provide you with an engaging learning experience.

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

We limit our class sizes to promote better discussion and ensuring everyone has a personalized experience

value_for_money

Great value for money

Get more bang for your buck! If you find your chosen course cheaper elsewhere, we’ll match it!

This is the same great training as our classroom learning but carried out at your own business premises. This is the perfect option for larger scale training requirements and means less time away from the office.

tailored_learning_experience

Tailored learning experience

Our courses can be adapted to meet your individual project or business requirements regardless of scope.

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

This gives your team a great opportunity to come together, bond, and discuss, which you may not get in a standard classroom setting.

monitor_progress

Monitor employees progress

Keep track of your employees’ progression and performance in your own workspace.

What our customers are saying

ISO 27701 Lead Implementer Training FAQs

FAQ's

ISO 27701 offers specific requirements and guidance for establishing, maintaining, and continuously improving a Privacy Information Management System (PIMS) as an addition to ISO 27001 and ISO 27002 for privacy management within the context of the organisation.
There are no formal prerequisites for attending this ISO 27701 Lead Implementer Training course.
This training is suitable for everyone who wants to learn about implementing the Privacy Information Management System (PIMS) in compliance with the guidance of ISO 27701.
When implementing an information management system, identify scenarios, identify and architect the information, capture the content, create user experience, build or configure findability, and implement a management system.
ISMS implementation can be defined by securing executive support and setting objectives, limiting the scope of the system, evaluating assets and analysing the risk, determining the ISMS, training and building competencies for the roles, system maintenance and monitoring, and certification audit.
ISO 27701 is an integration of the Information Security Management System (ISMS) of ISO 27001, the best practises manual ISO 27002, and the requirements of privacy laws.
In this ISO 27701 Lead Implementer Training course, you will learn about information management, PIMS-specific guidelines, personally identifiable information, internal auditing, information system audit, risk assessment, implementing an information management system, implementing ISO 27701, PII compliance, and other related concepts.
The price for ISO 27701 Lead Implementer Training certification in the United Kingdom starts from £1795
The Knowledge Academy is the Leading global training provider in the world for ISO 27701 Lead Implementer Training.
Please see our ISO 27701 Training courses available in the United Kingdom

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on ISO 27701 Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on 01344203999 and speak to our training experts, we should be able to help you with your requirements.