Haven taking part of development of international standard for almost a decade or more, I think that the toolbox presented by ISO when it comes to information security and other management systems is stronger than ever. But, however this is something which is continuously evolving, which means that for any individual or organization to make sure that they have the resources they need, with the competence they need.
They need to continuously monitor on what is happening, but also to make sure that their experts internal or external have the knowledge they seek. And one way, for making sure that they get this is to make sure that the person they take on board as consultant or as internal staff have the relevant certification. Also for, let’s say internal staff to be on top of the situation, to continuously evolve with the standard is important for them to make sure that they take part of the training at hand. I would say that PECB courses are very..very well aligned with what is happening with ISO for example. I also appreciate the fact as a trainer, as a certified trainer that the courses are rather about the “how” than the “what”, so to speak. If you attend the PECB course let’s say Lead Auditor course, you get the toolkit you need to go out there and to successfully lead or run audits by yourself. And as for the Lead Implementer courses for example, what I know is widely appreciated by our customers, my customers and organizations.
This is the fact the people get the whole picture, they are able to run the project to set successfully and they know what pitfalls there are, and they also have the opportunity in the classes to discuss with other people in the same position about what to look for and what to avoid, so to speak. So, I think that the whole setup of PECB courses is way of addressing, both individuals, but also the organization for success when it comes both for the implementation and the maintenance of an ISMS. And definitely for organization going for certification, this is something to recommend, because it means that when they are starting out, or later on the process, they know that they have their people on board who can engage with the certification body, in a discussion on the relevant topics.
Speaker
Anders Carlstedt
Is the CEO of Parabellum CyberSecurity and the Managing Director of PECB Nordics. He is an experienced leader and expert within Governance, Risk and Compliance (GRC). He is also a technical expert on information security management for ISO/IEC projects since 2002, and ISO/IEC’s project manager/editor for three (3) of eight (8) fundamental standards in the ISO/IEC 27000-series on information security management. Anders has a vast experience in Consulting, Audit & Training for Multinationals and SMEs in various industries globally as well as for Government Agencies in the Nordics.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.