Training Module

Information Security Risk Management

Systematically assess, treat & document information security risks with traceable decisions in line with ISO/IEC 27001

Digital lock and data network visualization, representing information security risk management with structured risk assessment, risk treatment, and traceable risk decisions under ISO/IEC 27001.

Does your risk management practice produce artefacts that fail to influence control decisions?

This training module guides you through disciplined risk assessment and treatment aligned with ISO/IEC 27001, producing a clear decision trail.

Digital lock and data network visualization, representing information security risk management with structured risk assessment, risk treatment, and traceable risk decisions under ISO/IEC 27001.

Does your risk management practice produce artefacts that fail to influence control decisions?

This training module guides you through disciplined risk assessment and treatment aligned with ISO/IEC 27001, producing a clear decision trail.

Digital lock and data network visualization, representing information security risk management with structured risk assessment, risk treatment, and traceable risk decisions under ISO/IEC 27001.

Training module overview

Risk registers and scoring exercises often sit in isolation, disconnected from control selection and acceptance decisions.

This training module explains how ISO/IEC 27001 frames risk assessment and treatment, how to define risk criteria and statements, and how to document assessment results in a way that supports treatment planning and residual risk acceptance. Participants learn to produce coherent risk treatment artefacts that link risks, treatment options, selected controls and the Statement of Applicability. The module emphasises traceability and maintenance rather than the mechanics of scoring models.

Applicable environments

This module applies to organisations implementing or operating an information security management system (ISMS) in line with ISO/IEC 27001. It focuses on how the standard’s requirements are interpreted and applied in practice within real organisational contexts.

The content is relevant for organisations seeking certification as well as for those using ISO/IEC 27001 as a reference framework to structure responsibilities, processes, and controls in the information security domain.

Target audience

  • People involved in designing, building, operating, or improving an ISMS aligned with ISO/IEC 27001

  • Executives and department heads accountable for the effectiveness and performance of an ISMS

  • Those responsible for processes, policies, assets, risks, and controls related to information security

  • Auditors of ISO/IEC 27001 who want to deepen their understanding of management-side best practices (not audit technique)

Decision support

Is this module for you?

It is a good fit if you…

  • are responsible for ISMS risk assessment, treatment, or acceptance decisions.

  • struggle with inconsistent risk criteria, weak risk statements, or unclear ownership.

  • need risk outputs that clearly justify control selection and SoA decisions.

  • must produce risk artefacts that hold up in audits and management review.

  • want risk management to function as a repeatable decision process, not a one-off exercise.

If most of the points above apply, this module is likely a good fit.

It may not be the best fit if you…

  • are looking for a general introduction to information security risk concepts.

  • expect quantitative risk modelling or advanced risk analytics.

  • want a tool-specific or template-driven risk assessment walkthrough.

  • already operate a consistent, well-understood, and reviewable ISMS risk process.

Agenda

  • Role of risk management inside an ISMS

  • ISO/IEC 27001 risk terminology and required definitions

  • Risk criteria and consistency requirements

  • Risk assessment outputs that support treatment decisions

  • Risk treatment expectations and artefacts

  • Traceability to controls and the SoA interface

  • Maintaining risk information over time

  • Case-based workshop

Show detailed agenda...

Learning outcomes

Key outcomes

  • Interpret ISO/IEC 27001 risk assessment and treatment requirements in practical terms

  • Define documented elements (criteria, statements, decision records) needed for consistent risk methods

  • Produce risk treatment artefacts that evidence decisions and residual risk acceptance

Additional capabilities

  • Maintain traceability from risks through treatment decisions to controls and the Statement of Applicability

  • Identify common pitfalls in risk assessment and treatment that lead to paper exercises

  • Set maintenance routines and review triggers to keep risk records current and useful

Additional benefits

Learning materials

  • Slide deck

  • Participant workbook

Templates & tools

Practical, reusable artefacts to apply the module directly to your organisation.

  • Information security risk management process

  • Example information security risk register

  • Risk criteria quality check list

  • Risk treatment decision log

  • Risk treatment plan template

  • Supporting AI prompt set for typical use cases

Confirmation

  • Certificate of completion

Module ID

HAM-IS-S-02

Discipline

ISO clause

6: Planning

8: Operation

Audience

Manager

Languages

English

Delivery

Live virtual

Duration

7 h

List price

CHF 550

Excl. VAT. VAT may apply depending on customer location and status.

Delivery & learning format

Virtual live teaching

This module is delivered live, with a strong focus on discussion, practical application, and direct interaction with the instructor.

Sessions work through realistic examples, clarify concepts in context, and apply methods directly to participants’ organisational realities.

Custom delivery options

For organisations with specific constraints or learning objectives, the module can be adapted in format or scope, including in-house delivery and contextualised case material.

Not sure if this module is right for you?

Send a short message and describe your context.

Not sure if this module is right for you?

Send a short message and describe your context.

For an optimal learning experience

Preparation guidance

This module is designed as part of a modular training approach. Topics are deliberately distributed across modules and are not repeated in full, in order to avoid unnecessary redundancy. Each module is self-contained and can be taken on its own. Where prior knowledge or experience is helpful, this is indicated below so you can decide whether any preparation is useful for you.

Assumed background

This module assumes participants can already work with general risk concepts and basic management system logic.

Helpful background includes:

  • Understanding of risk terminology, evaluation, and treatment concepts

  • Familiarity with management system roles, documented information, and governance routines

  • Basic information security literacy

Preparatory modules

Foundational modules (depending on background)

Useful if you are new to the underlying concepts or want a shared baseline before attending this module.

Risk Management

Systematically identify, evaluate, treat & monitor risks and opportunities across management systems

7 h

Risk Management

Systematically identify, evaluate, treat & monitor risks and opportunities across management systems

7 h

Supporting modules (optional)

Helpful if you want to deepen related skills, but not required to participate effectively.

System Framing

Analyse organisational context, stakeholders & system boundaries to support effective management systems

7 h

System Framing

Analyse organisational context, stakeholders & system boundaries to support effective management systems

7 h

Continuous learning

Follow-up modules

After completion of this module, the following modules are ideal to further deepen your competence. If you are looking for a structured learning path, modules can also be taken as part of a professional track.

Continuous learning

Follow-up modules

After completion of this module, the following modules are ideal to further deepen your competence. If you are looking for a structured learning path, modules can also be taken as part of a professional track.

Operational Control in Information Security

Plan, implement & operate information security controls consistently in day-to-day activities in line with ISO/IEC 27001

Duration

7 h

List price

CHF 550

View module

Operational Control in Information Security

Plan, implement & operate information security controls consistently in day-to-day activities in line with ISO/IEC 27001

Duration

7 h

List price

CHF 550

View module

Operational Control in Information Security

Plan, implement & operate information security controls consistently in day-to-day activities in line with ISO/IEC 27001

Duration

7 h

List price

CHF 550

View module

ISMS Scope & Statement of Applicability

Define clear ISO/IEC 27001 ISMS scope and boundaries and maintain a defensible Statement of Applicability (SoA)

Duration

7 h

List price

CHF 550

View module

ISMS Scope & Statement of Applicability

Define clear ISO/IEC 27001 ISMS scope and boundaries and maintain a defensible Statement of Applicability (SoA)

Duration

7 h

List price

CHF 550

View module

ISMS Scope & Statement of Applicability

Define clear ISO/IEC 27001 ISMS scope and boundaries and maintain a defensible Statement of Applicability (SoA)

Duration

7 h

List price

CHF 550

View module

Objectives & Performance Management

Define & govern management system objectives and KPIs with clarity and consistency

Duration

7 h

List price

CHF 550

View module

Objectives & Performance Management

Define & govern management system objectives and KPIs with clarity and consistency

Duration

7 h

List price

CHF 550

View module

Objectives & Performance Management

Define & govern management system objectives and KPIs with clarity and consistency

Duration

7 h

List price

CHF 550

View module

Policy Management

Design coherent, auditable policy frameworks that align with strategy, scale across entities, and stay current without excess bureaucracy

Duration

7 h

List price

CHF 550

View module

Policy Management

Design coherent, auditable policy frameworks that align with strategy, scale across entities, and stay current without excess bureaucracy

Duration

7 h

List price

CHF 550

View module

Policy Management

Design coherent, auditable policy frameworks that align with strategy, scale across entities, and stay current without excess bureaucracy

Duration

7 h

List price

CHF 550

View module

Office scene with people standing, walking and sitting

Ready to improve your management systems?

We support continuous improvement by embedding ISO requirements into everyday practice and daily operations.

Office scene with people standing, walking and sitting

Ready to improve your management systems?

We support continuous improvement by embedding ISO requirements into everyday practice and daily operations.

Office scene with people standing, walking and sitting

Ready to improve your management systems?

We support continuous improvement by embedding ISO requirements into everyday practice and daily operations.