У нас вы можете посмотреть бесплатно ISO 27000:2018 Professional Training – Part 4 I Clause 4.5.1 to 4.5.5 I Identify Assess Treat Select или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Edicent Quality Registrar (EQR) Services: Certification, Training and Advising Contact Details: +91-8802650960; info@edicentcertification.org 🔐 ISO/IEC 27000:2018 Training – Part 4 ISMS Risk Assessment, Risk Treatment & Control Selection In this video, Part 4 of our thorough ISO/IEC 27000:2018 training series, we focus on how organizations establish, monitor, maintain, and continually improve an Information Security Management System (ISMS) through structured risk assessment and risk treatment processes. This session explains how ISO 27000 manages information security risks on an ongoing, loop-based approach, ensuring that the ISMS remains effective, relevant, and aligned with business objectives. 🔹 Establishing, Monitoring & Improving the ISMS ISO/IEC 27000 requires organizations to undertake ISMS activities on an ongoing basis, following a continuous improvement loop. This includes requirements aligned with Clauses 4.5.2, 4.5.3, 4.5.4, 4.5.5, and 4.5.6, ensuring that the ISMS is not static but evolves with changing risks and business conditions. 🔹 Identifying Information Security Requirements Effective risk management starts with understanding information security requirements, including: Defining business information boundaries Understanding information assets, their value, and security needs Identifying requirements related to processing, storage, and communication Considering interested party requirements Performing a methodical assessment of potential risks Evaluating both materialized risks and perceived impacts This step ensures that risks are assessed within the correct organizational and business context. 🔹 Assessing Information Security Risks Risk assessment is a core ISMS activity and involves structured risk management practices to: Identify, quantify, and prioritize risks Guide decision-making through defined criteria Perform risk analysis and risk evaluation Produce comparable and reproducible results Be conducted periodically and upon significant change Maintain relationships with risks in other organizational areas ISO/IEC 27000 aligns closely with ISO/IEC 27005, which provides guidance on information security risk management. 🔹 Treating Information Security Risks Once risks are assessed, organizations must determine how to address them. Risk treatment options include: Reducing risk through implementation of controls Accepting risk, knowingly and objectively, with proper justification Avoiding risk by eliminating the risk source or activity Sharing risk through insurance or contractual arrangements All risk acceptance decisions must be formally recorded, and selected treatment options must be implemented effectively. 🔹 Selecting & Implementing Information Security Controls Control selection and implementation must align with Clauses 4.5.2, 4.5.3, and 4.5.4, ensuring risks are reduced to acceptable levels. Key considerations include: Legal and regulatory requirements Organizational objectives and operational constraints Cost of control implementation and operation Balance between security investment and risk reduction Achievement of objective compliance Controls are typically selected with reference to ISO/IEC 27002, ideally during the design stage of the ISMS. Control decisions must consider risk tolerability, achieve completeness, and be recorded as documented evidence. 🎯 Who Should Watch ✔ ISMS Implementers & Managers ✔ Risk & Compliance Professionals ✔ Internal & Lead Auditors ✔ Consultants & Information Security Teams ✔ Organizations preparing for ISO 27001 certification 📌 In the next part of this series, we move further into operationalizing controls, performance evaluation, and continual improvement under ISO/IEC 27000:2018. With the help of this channel, we want to refine thinking about international standards knowledge and implementation, as we worked over more than 3000 companies since 2014, we are seeing a gap in understanding and relating the information of standard in implementation, in practices of system management the management team is feeling standards as obstacle but all business leaders globally have a strong management system and their sustainability key, any scale business should collapse and taken over by any strong management system business. Compliance of any international standard has three pillars management team, audit, and training only, it adds more valuable than marketing in short and long term run, compliance importance and usefulness is all belong to a business internally itself not on external dependence. You may connect for our service at www.edicentcertification.org, please like, subscribe and share. Bank account details for your support EQR Account Detail: Bank Name: HDFC Bank Current Account Name: Edicent Quality Registrar Current Account Number: 50200086783433 IFSC Code: HDFC0005269 SWIFT Code: HDFCINBBDEL UPI ID: 8882814173@hdfcbank Paypal ID: https://paypal.me/EQRQuality Thank you.