Course Area
Availability
Available for 90 days after enrollment
Approximate Course Run Time
1 hour
Continuing Education Units
0.1
Course Fee
No charge
E-learning content is available on demand
Course Details
Overview
When it comes to an information security breach, it’s not a matter of ‘if’, it’s a matter of ‘when’. How your organization responds in the aftermath of a security breach determines whether the incident is a hiccup or the end of an organization. As with all ISO Standards, conducting a cause analysis is not only required, it’s the most important tool you can use to determine the cause and strengthen as many weaknesses as possible. A well-executed root cause analysis can reduce the lingering impact of the incident and lower the probability of future breaches.
We’ll look into how to create a ‘process approach’ that you can use to uncover the cause of an information security breach and make your Information Security Management System stronger and get you better prepared for the next one.
Key takeaways and learning objectives
During this educational webinar, you will learn:
- The Ishikawa Fishbone RCA method and how it lines up with Annex A
- How can we use this model to identify contributing issues?
- After we’ve discovered a potential cause
You can never eradicate all threats, but a good root cause analysis will fuel your risk management activities so you can strengthen your Information Security Management System and sleep better.
Presenter information
Speaker - Jim Moran , Training Instructor BSI Group
Host - Caio Cologni, Business Development Manager BSI Group Canada