Day 1: Introduction, risk management program according to ISO 27005
Concepts and definitions related to risk management
Risk management standards, frameworks and methodologies
Implementation of an information security risk management program
Understanding an organization and its context
Day 2: Risk identification and assessment, risk evaluation, treatment, acceptance, communication and surveillance according to ISO 27005
Risk identification
Risk analysis and risk evaluation
Risk assessment with a quantitative method
Risk treatment
Risk acceptance and residual risk management
Information Security Risk Communication and Consultation
Risk monitoring and review
Day 3: Exam and Start of a risk assessment with OCTAVE
Certified ISO 27005Risk Manager Exam (2 hours)
Presentation of OCTAVE
Phase 1 - Process 1 to 3 (Understanding the Organization)
Phase 1 - Process 4 (Create threat profiles)
Phase 2 - Process 5 (Identification of key components)
Day 4: Assessment of vulnerabilities and risk, according to OCTAVE
Phase 2 - Process 5 (Continued)
Phase 2 - Process 6 (Evaluation of selected components)
Phase 3 - Process 7 (Conducting the risk assessment)
Phase 3 - Process 8 (Development of a Protection Strategy)
Day 5: The OCTAVE Method Implementation approach and conclusion
Phase 3 – Process 8 (Development of a Protection Strategy – cont.)
The OCTAVE Method Implementation Guide
OCTAVE – S
OCTAVE Allegro
Summary
"Taken from PECB <https://pecb.com