A security role responsible for conducting a cyber security audit, which may be performed by a person who is trained in this activity and demonstrates professional competence in conducting cyber security audits or information security management system audits. The certificate proving the professional competence of security roles meets the requirements of ISO 17024, which is defined by Decree No. 82/2018 Coll.
We offer flexibility. You can choose from our selection of in-class courses as well as online courses.
Try a live virtual courseThe role of the cyber security auditor is incompatible with the performance of the roles of cyber security manager, cyber security architect, operator of communication and information systems or the role of asset guarantor.
Functions and tasks of the cyber security auditor:
Decree on security measures, cyber security incidents, reactive measures, filing requirements in the field of cyber security and data disposal (Decree on cyber security)
a) Methodology and frameworks of information security audit.
b) Internal audit processes and procedures.
c) The role and function of internal audit.
d) ICT security audit process.
e) Strategic and tactical management of ICT.
f) Acquisition, development and deployment of ICT.
g) Management of ICT operation, maintenance and services.
h) Asset protection.
i) Cyber security assessment, testing and sampling methods.
j) Relevant legislation.
k) ICT security.
Meeting legislative requirements does not necessarily mean investing in new security products and technologies. The law requires the implementation and regular audits of the Information Security Management System. The key pillar is the correct setting of the security policy and its subsequent implementation / auditing across the organization.
Cyber Security Manager
You do not need to know where you come from, you need to know where you are going to adequately manage cyber protection.
Cyber Security Architect
Proactive security (implemented and functional) is less expensive than reactive. Learn to build architecture.
Cyber Security Auditor
Internal audits maintain better protection against cyber attacks. Gain the know-how of a Cyber Security Auditor.
09:00 - 10:30
ISMS
Risk management
Safety requirements
Asset management
10:30 - 10:45
Coffee Break
10:45 - 12:15
Human resources security
Traffic and communication management
Access control and secure user behavior (A)
Analysis, development and maintenance
12:15 - 13:15
Lunch | Lunch menu
13:15 - 15:00
Cyber Events and Incidents Management
Business continuity management
Cyber Security Audit
15:00 - 15:15
Coffee Break
15:15 - 16:00
Conclusion
16:00 - 17:00
Certification
The basis of the Cyber Security Act is the ISMS (Information Security Management System).
Basic knowledge of ISMS (Information Security Management System) according to ISO / IEC 2700
Accredited trainer, Workshop Leader, Coach, co-author of methodologies and TAYLLORCOX Toolkits (sets of templates and sample forms) for IT Service Management ITSM, Project Management PRINCE2 and cyber security according to ISMS ISO / IEC 27001 and ZoKB.
One of the very first IT auditors in the Czech Republic. His rich practice began in 1996 in the company. GiTyFurtherly spent almost 10 years as an ITIL implementer at Český Telekom and since 2007 he has been a key auditor, accredited trainer at the TAYLLORCOX certification body
Graduate of ČVUT FEL, subsequently a consultant with an international dimension in the field of implementation and optimization of the information management system (ITSM) and cyber (ISMS) security. He applies the acquired experience from the position of an accredited Lead Auditor in the areas of IT Service Management, ISMS and GDPR.
As part of the certification, they must demonstrate practical knowledge and skills to implement the ISMS (Information Security Management System) so that it meets legislative requirements and at the same time is in accordance with the ISO / IEC 27001 standard in the current valid version.
Test information
Excellent review ☆☆☆☆☆ from 332 reviewers
What makes our references exceptional? They are not one-off events. Clients come back to us regularly.
Skvělá praktická ukázka legislativy a perfektní zpětná vazba.
Bylo to super.
S organizací a průběhem kurzu jsem spokojen. Kurz splnil mé očekávání. Dávám hodnocení "9" - vždy je co zlepšovat :-)
Výborné školení. Znalostně byl kurz na velice dobré úrovni.
Výborné a vyjasňujicí školení.
Vše bylo výborné, s kurzem jsem spokojen.
Výborná úroveň, zkušený přednášející, získali jsme řadu praktických informací.
Výborné školení. Kladně hodnotím především uvedené odkazy na zdroje a praktické analogie do nonIT světa.
Výborný školitel s dlouholetou praxí vhodně prokládal své zkušenosti z praxe v průběhu výkladu, což vnímám za velmi přínosné.
Výborná organizace kurzu. Bohaté názorné příklady implementace.
View the next 10 reviews of our graduates
View the full list of reference clients.
We are available at +420 222 553 101 Always Monday to Friday: 9am - 5pm.
Would you like a gift for your birtday?