SlideShare a Scribd company logo
1 of 4
Download to read offline
CERTIFIED ISO 27034
LEAD IMPLEMENTER
MASTERING THE IMPLEMENTATION OF MANAGEMENT IN IT - SECURITY TECHNIQUES
– APPLICATION SECURITY BASED ON ISO 27034
SUMMARY
This five-day intensive course enables the participants to develop, acquire, implement and use trustworthy applications, at an
acceptable (or tolerable) security cost. More specifically, these components, processes and frameworks provide verifiable evidence
that applications have reached and maintained a targeted level of trust as specified in ISO/IEC 27034. The purpose of ISO/IEC
27034 Lead Implementer is to assist organizations in integrating security seamlessly throughout the life cycle of their applications.
Application Security applies to the original software of an application and to its contributing factors that impact its security, such as
data, technology, application development life cycle processes, supporting processes and actors, and it applies to all sizes and all
types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) exposed to risks associated
with applications.

COURSE AGENDA

DURATION: 5 DAYS

DAY 1
Introduction to IT - Security techniques –
Application Security overview and concepts
as required by ISO 27034
▶▶ 	ntroduction to Security techniques – Application
I
Security and the process approach
▶▶ 	 resentation of the standards ISO 27034-1, ISO
P
27034-2, ISO 27034-3, ISO 27034-4, ISO 27034-5,
ISO 27034-6 and regulatory framework
▶▶ 	 undamental principles of Security techniques –
F
Application Security
▶▶ 	 verview and concepts of Application Security
O
▶▶ 	 efinitions, concepts, principles and processes
D
involved in Application Security

DAY 3
Protocols and application security control
data structure based on ISO 27034
▶▶ 	 pplication security control data structure
A
requirements, descriptions, graphical representation
▶▶ 	 ML schema, based on ISO/TS 15000: Electronic
X
business extensible Markup Language ebXML
▶▶ 	 acilitation the implementation of the ISO/IEC 27034
F
▶▶ 	 ommunication and exchange of ASCs
C
▶▶ 	 stablishment of libraries of Application Security unctions
E
▶▶ Provisioning and operating the application

DAY 5

DAY 2
Implementation of IT - Security Techniques
– Application Security based on ISO 27034
▶▶ 	 rganization normative framework
O
▶▶ Definition of the scope in Application Security
▶▶ Relationships and support of processes to the
Application Security management process
▶▶ Implementation of ISO/IEC 27034 and integration of it
into its existing processes
▶▶ Realization, operation and validation of application of
security throughout its life cycle
▶▶ 	 ecurity into application project
S
▶▶ 	 evelopment of Application Security validation
D
▶▶ 	 rafting the certification process
D

DAY 4
Security guidance for specific applications
▶▶ 	 pplications Security Controls based on ISO 27034
A
▶▶ 	 evelopment of metrics, performance indicators and
D
dashboards in accordance with ISO 27034
▶▶ 	SO 27034 internal audit
I
▶▶ 	 eview of IT - Security techniques – Application
R
Security
▶▶ 	mplementation of a continual improvement program
I
▶▶ 	 reparing for an ISO 27034 certification audit
P

Certification Exam
www.pecb.org
WHO SHOULD ATTEND?
▶▶ 	 roject managers or consultants wanting to prepare and to support an organization in the implementation of an
P
Application Security
▶▶ 	SO 27034 auditors who wish to fully understand the Application Security implementation process
I
▶▶ 	 dministrators
A
▶▶ 	 oftware acquirers
S
▶▶ 	 oftware development managers
S
▶▶ 	 pplication owners
A
▶▶ 	 ine managers, who supervise employees
L

LEARNING OBJECTIVES
▶▶ 	 o understand the implementation of an IT - Security techniques – Application Security in accordance with ISO 27034
T
▶▶ 	 o gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques
T
required for the effective management of Security techniques – Application Security
▶▶ 	 o understand the relationship between the components of an Application Security including risk management,
T
controls and compliance with the requirements of different stakeholders of the organization
▶▶ 	 o acquire necessary expertise to support an organization in implementing, managing and maintaining an
T
Application Security as specified in ISO 27034
▶▶ 	 o acquire necessary expertise to manage a team implementing ISO 27034
T
▶▶ 	 o develop knowledge and skills required to advise organizations on best practices in the management of
T
Application Security
▶▶ 	 o improve the capacity for analysis and decision making in the context of Application Security
T

PECB

www.pecb.org

Certified
ISO 27034
Lead Implementer
EXAMINATION
▶▶ The “Certified ISO/IEC 27034 Lead Implementer” exam fully meets the requirements of the PECB Examination and
Certification Program (ECP). The exam covers the following competence domains:
DOMAIN 1: FUNDAMENTAL PRINCIPLES AND CONCEPTS IN APPLICATION SECURITY

1

Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can understand, interpret and
illustrate the main Application Security concepts related to an Information Technology Application Security (AS)
DOMAIN 2: APPLICATION SECURITY CONTROL BEST PRACTICE BASED ON ISO 27002

2

Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can understand, interpret and provide
guidance on how to implement and manage Application Security controls best practices based on ISO 27002
DOMAIN 3: PLANNING AN AS BASED ON ISO 27034

3

Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can plan the implementation of an AS
in preparation for an ISO 27034 certification
DOMAIN 4: IMPLEMENTING AN AS BASED ON ISO 27034

4

Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can implement the processes and
security controls of an AS required for an ISO 27034 certification
DOMAIN 5: PERFORMANCE EVALUATION, MONITORING AND MEASUREMENT OF AN AS BASED ON

5

ISO 27034
Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can evaluate, monitor and measure
the performance of an AS in the context of an ISO 27034 certification
DOMAIN 6: CONTINUOUS IMPROVEMENT OF AN AS BASED ON ISO 27034

6

Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can provide guidance on the
continuous improvement of an AS in the context of ISO 27034
DOMAIN 7: PREPARATION FOR AN AS CERTIFICATION AUDIT

7

Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can prepare and assist an
organization for the certification of an AS against the ISO 27034 standard

▶▶ The “Certified ISO/IEC 27034 Lead Implementer” exam is available in different languages, including English,
French, Spanish and Portuguese
▶▶ Duration: 3 hours
▶▶ For more information about the exam, please visit: www.pecb.org

www.pecb.org
CERTIFICATION
▶▶ 	 fter successfully completing the exam, participants can apply for the credentials of Certified ISO/IEC 27034
A
Provisional Implementer, Certified ISO/IEC 27034 Implementer or Certified ISO/IEC 27034 Lead Implementer,
depending on their level of experience
▶▶ 	 certificate will be issued to participants who successfully pass the exam and comply with all the other
A
requirements related to the selected credential:
Credential

Exam

Professional
Experience

ITST Audit
Experience

ITST Project
Experience

Other
Requirements

ISO 27034
Provisional
Implementer

ISO 27034 Lead
Implementer
Exam

None

None

None

Signing the
PECB
code of ethics

ISO 27034 Lead
Implementer
Exam

Two years
One year of
Information
Technology Security
Techniques work
experience

None

Project activities
totaling
200 hours

Signing the
PECB
code of ethics

ISO 27034 Lead
Implementer
Exam

Five years
Two years of
Information
Technology Security
Techniques work
experience

None

Project activities
totaling
300 hours

Signing the
PECB
code of ethics

ISO 27034
Implementer

ISO 27034
Lead
Implementer

GENERAL INFORMATION
▶▶
▶▶
▶▶
▶▶

C
	 ertification fees are included in the exam price
P
	 articipant manual contains over 450 pages of information and practical examples
A
	 participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to participants
I
	n case of failure of the exam, participants are allowed to retake it for free under certain conditions

For additional information,
please contact us at info@pecb.org

www.pecb.org

PECB

Certified
ISO 27034
Lead Implementer

More Related Content

Similar to ISO 27034 Lead Implementer - Four Page Brochure

Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020
Anne Starr
 
I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020
Anne Starr
 

Similar to ISO 27034 Lead Implementer - Four Page Brochure (20)

ISO 27034 Lead Auditor - Four Page Brochure
ISO 27034 Lead Auditor - Four Page Brochure	ISO 27034 Lead Auditor - Four Page Brochure
ISO 27034 Lead Auditor - Four Page Brochure
 
ISO 27034 Foundation - One Page Brochure
ISO 27034 Foundation - One Page Brochure ISO 27034 Foundation - One Page Brochure
ISO 27034 Foundation - One Page Brochure
 
ISO 27034 Lead Implementer - One Page Brochure
ISO 27034 Lead Implementer - One Page Brochure	ISO 27034 Lead Implementer - One Page Brochure
ISO 27034 Lead Implementer - One Page Brochure
 
english_bok_ismp_202306.pptx
english_bok_ismp_202306.pptxenglish_bok_ismp_202306.pptx
english_bok_ismp_202306.pptx
 
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCALead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
 
ISO 27001 Lead Auditor Training Course | ISO 27001 Lead Auditor Certification...
ISO 27001 Lead Auditor Training Course | ISO 27001 Lead Auditor Certification...ISO 27001 Lead Auditor Training Course | ISO 27001 Lead Auditor Certification...
ISO 27001 Lead Auditor Training Course | ISO 27001 Lead Auditor Certification...
 
ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!
 
CQI-IRCA 27001:2013 Lead Auditor Course
CQI-IRCA 27001:2013  Lead Auditor Course CQI-IRCA 27001:2013  Lead Auditor Course
CQI-IRCA 27001:2013 Lead Auditor Course
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
ISO 21500 Lead Implementer - Four Page Brochure
ISO 21500 Lead Implementer - Four Page BrochureISO 21500 Lead Implementer - Four Page Brochure
ISO 21500 Lead Implementer - Four Page Brochure
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
 
Certified ISO 27005 Risk Manager - Four Page Brochure
Certified ISO 27005 Risk Manager - Four Page BrochureCertified ISO 27005 Risk Manager - Four Page Brochure
Certified ISO 27005 Risk Manager - Four Page Brochure
 
Training brochure la isms
Training brochure la ismsTraining brochure la isms
Training brochure la isms
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020
 
I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020
 
ISO 20121 Lead Auditor - Four Page Brochure
ISO 20121 Lead Auditor - Four Page BrochureISO 20121 Lead Auditor - Four Page Brochure
ISO 20121 Lead Auditor - Four Page Brochure
 
ISO 13053 Lead Auditor - Four Page Brochure
ISO 13053 Lead Auditor - Four Page Brochure	ISO 13053 Lead Auditor - Four Page Brochure
ISO 13053 Lead Auditor - Four Page Brochure
 
ISO 13053 Lead Implementer - Four Page Brochure
ISO 13053 Lead Implementer - Four Page Brochure	ISO 13053 Lead Implementer - Four Page Brochure
ISO 13053 Lead Implementer - Four Page Brochure
 
Qsys Profile
Qsys ProfileQsys Profile
Qsys Profile
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

ISO 27034 Lead Implementer - Four Page Brochure

  • 1. CERTIFIED ISO 27034 LEAD IMPLEMENTER MASTERING THE IMPLEMENTATION OF MANAGEMENT IN IT - SECURITY TECHNIQUES – APPLICATION SECURITY BASED ON ISO 27034 SUMMARY This five-day intensive course enables the participants to develop, acquire, implement and use trustworthy applications, at an acceptable (or tolerable) security cost. More specifically, these components, processes and frameworks provide verifiable evidence that applications have reached and maintained a targeted level of trust as specified in ISO/IEC 27034. The purpose of ISO/IEC 27034 Lead Implementer is to assist organizations in integrating security seamlessly throughout the life cycle of their applications. Application Security applies to the original software of an application and to its contributing factors that impact its security, such as data, technology, application development life cycle processes, supporting processes and actors, and it applies to all sizes and all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) exposed to risks associated with applications. COURSE AGENDA DURATION: 5 DAYS DAY 1 Introduction to IT - Security techniques – Application Security overview and concepts as required by ISO 27034 ▶▶ ntroduction to Security techniques – Application I Security and the process approach ▶▶ resentation of the standards ISO 27034-1, ISO P 27034-2, ISO 27034-3, ISO 27034-4, ISO 27034-5, ISO 27034-6 and regulatory framework ▶▶ undamental principles of Security techniques – F Application Security ▶▶ verview and concepts of Application Security O ▶▶ efinitions, concepts, principles and processes D involved in Application Security DAY 3 Protocols and application security control data structure based on ISO 27034 ▶▶ pplication security control data structure A requirements, descriptions, graphical representation ▶▶ ML schema, based on ISO/TS 15000: Electronic X business extensible Markup Language ebXML ▶▶ acilitation the implementation of the ISO/IEC 27034 F ▶▶ ommunication and exchange of ASCs C ▶▶ stablishment of libraries of Application Security unctions E ▶▶ Provisioning and operating the application DAY 5 DAY 2 Implementation of IT - Security Techniques – Application Security based on ISO 27034 ▶▶ rganization normative framework O ▶▶ Definition of the scope in Application Security ▶▶ Relationships and support of processes to the Application Security management process ▶▶ Implementation of ISO/IEC 27034 and integration of it into its existing processes ▶▶ Realization, operation and validation of application of security throughout its life cycle ▶▶ ecurity into application project S ▶▶ evelopment of Application Security validation D ▶▶ rafting the certification process D DAY 4 Security guidance for specific applications ▶▶ pplications Security Controls based on ISO 27034 A ▶▶ evelopment of metrics, performance indicators and D dashboards in accordance with ISO 27034 ▶▶ SO 27034 internal audit I ▶▶ eview of IT - Security techniques – Application R Security ▶▶ mplementation of a continual improvement program I ▶▶ reparing for an ISO 27034 certification audit P Certification Exam www.pecb.org
  • 2. WHO SHOULD ATTEND? ▶▶ roject managers or consultants wanting to prepare and to support an organization in the implementation of an P Application Security ▶▶ SO 27034 auditors who wish to fully understand the Application Security implementation process I ▶▶ dministrators A ▶▶ oftware acquirers S ▶▶ oftware development managers S ▶▶ pplication owners A ▶▶ ine managers, who supervise employees L LEARNING OBJECTIVES ▶▶ o understand the implementation of an IT - Security techniques – Application Security in accordance with ISO 27034 T ▶▶ o gain a comprehensive understanding of the concepts, approaches, standards, methods and techniques T required for the effective management of Security techniques – Application Security ▶▶ o understand the relationship between the components of an Application Security including risk management, T controls and compliance with the requirements of different stakeholders of the organization ▶▶ o acquire necessary expertise to support an organization in implementing, managing and maintaining an T Application Security as specified in ISO 27034 ▶▶ o acquire necessary expertise to manage a team implementing ISO 27034 T ▶▶ o develop knowledge and skills required to advise organizations on best practices in the management of T Application Security ▶▶ o improve the capacity for analysis and decision making in the context of Application Security T PECB www.pecb.org Certified ISO 27034 Lead Implementer
  • 3. EXAMINATION ▶▶ The “Certified ISO/IEC 27034 Lead Implementer” exam fully meets the requirements of the PECB Examination and Certification Program (ECP). The exam covers the following competence domains: DOMAIN 1: FUNDAMENTAL PRINCIPLES AND CONCEPTS IN APPLICATION SECURITY 1 Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can understand, interpret and illustrate the main Application Security concepts related to an Information Technology Application Security (AS) DOMAIN 2: APPLICATION SECURITY CONTROL BEST PRACTICE BASED ON ISO 27002 2 Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can understand, interpret and provide guidance on how to implement and manage Application Security controls best practices based on ISO 27002 DOMAIN 3: PLANNING AN AS BASED ON ISO 27034 3 Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can plan the implementation of an AS in preparation for an ISO 27034 certification DOMAIN 4: IMPLEMENTING AN AS BASED ON ISO 27034 4 Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can implement the processes and security controls of an AS required for an ISO 27034 certification DOMAIN 5: PERFORMANCE EVALUATION, MONITORING AND MEASUREMENT OF AN AS BASED ON 5 ISO 27034 Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can evaluate, monitor and measure the performance of an AS in the context of an ISO 27034 certification DOMAIN 6: CONTINUOUS IMPROVEMENT OF AN AS BASED ON ISO 27034 6 Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can provide guidance on the continuous improvement of an AS in the context of ISO 27034 DOMAIN 7: PREPARATION FOR AN AS CERTIFICATION AUDIT 7 Main Objective: To ensure that the ISO 27034 Lead Implementer candidate can prepare and assist an organization for the certification of an AS against the ISO 27034 standard ▶▶ The “Certified ISO/IEC 27034 Lead Implementer” exam is available in different languages, including English, French, Spanish and Portuguese ▶▶ Duration: 3 hours ▶▶ For more information about the exam, please visit: www.pecb.org www.pecb.org
  • 4. CERTIFICATION ▶▶ fter successfully completing the exam, participants can apply for the credentials of Certified ISO/IEC 27034 A Provisional Implementer, Certified ISO/IEC 27034 Implementer or Certified ISO/IEC 27034 Lead Implementer, depending on their level of experience ▶▶ certificate will be issued to participants who successfully pass the exam and comply with all the other A requirements related to the selected credential: Credential Exam Professional Experience ITST Audit Experience ITST Project Experience Other Requirements ISO 27034 Provisional Implementer ISO 27034 Lead Implementer Exam None None None Signing the PECB code of ethics ISO 27034 Lead Implementer Exam Two years One year of Information Technology Security Techniques work experience None Project activities totaling 200 hours Signing the PECB code of ethics ISO 27034 Lead Implementer Exam Five years Two years of Information Technology Security Techniques work experience None Project activities totaling 300 hours Signing the PECB code of ethics ISO 27034 Implementer ISO 27034 Lead Implementer GENERAL INFORMATION ▶▶ ▶▶ ▶▶ ▶▶ C ertification fees are included in the exam price P articipant manual contains over 450 pages of information and practical examples A participation certificate of 31 CPD (Continuing Professional Development) credits will be issued to participants I n case of failure of the exam, participants are allowed to retake it for free under certain conditions For additional information, please contact us at info@pecb.org www.pecb.org PECB Certified ISO 27034 Lead Implementer