The Cyber Security Manager is responsible for cyber security as a whole. You will learn how to manage security situations, ie managing risks, threats and "switching" from a reactive position to proactive actions. The role is not compatible with the roles responsible for the operation of the information and communication system and with other operational or management roles.
We offer flexibility. You can choose from our selection of in-class courses as well as online courses.
Try a live virtual courseIn practice, the ISMS manager is a kind of intermediate step between the top management - the cyber security management committee (strategic management level) and the operational level.
Duties and tasks of the information security manager:
%20Eli%C5%A1ka%20Houhov%C3%A1,%20Grant%20Thornton%20TAYLLORCOX.jpg)

09:00 - 10:30
ISMS according to Cyber Security Act
Determination of scope, assets Safety documentation Organizational and technical measures Security policy
Policy development Compliance with Act 181/2014 Coll.
10:30 - 10:45
Coffee Break
10:45 - 12:15
Risk management
Risk management plan, measures Declaration of applicability Criteria for threats and vulnerabilities Org. safety
Determining roles Responsibilities Manager, Auditor, Architect
12:15 - 13:15
Lunch
13:15 - 15:00
Security requirements
Supplier audit Requirements analysis The role of suppliers, IS operation Asset management
Identification Records, links, activities 15:00 - 15:15
Coffee break
15:15 - 16:00
Conclusion
Summary Questions, tips
16:00 - 17:00
Exam
Certification
The Cyber Security Manager is responsible for cyber security as a whole. You will learn how to manage security situations, ie managing risks, threats and "switching" from a reactive position to proactive actions. The role is not compatible with the roles responsible for the operation of the information and communication system and with other operational or management roles.
Basic knowledge of ISMS (Information Security Management System) according to ISO / IEC 2700

As part of the certification, they must demonstrate practical knowledge and skills to implement the ISMS (Information Security Management System) so that it meets legislative requirements and at the same time is in accordance with the ISO / IEC 27001 standard in the current valid version.
Test information


Graduate of ČVUT FEL, subsequently a consultant with an international dimension in the field of implementation and optimization of the information management system (ITSM) and cyber (ISMS) security. He applies the acquired experience from the position of an accredited Lead Auditor in the areas of IT Service Management, ISMS and GDPR.

ISO 27001 Auditor | NIS2 compliance | IT právo
Advokátka s více než desetiletou praxí IT práva, auditů kybernetické bezpečnosti, implementace EU Cyber Security nařízení jako NIS2, DORA, CRA a další. Vede pracovní skupinu pro standardizaci rolí dle ECSF (European Cybersecurity Skills Framework), EU regulace NIS2 a zákona č. 264/2025 Sb., vč. vyhlášek. Aktivně se podílí na vzdělávání organizací, které spadají do kategorie „povinných osob“. Lucie vám pomůže více než „splnit zákon“, ale budovat reálnou kybernetickou odolnost a právní jistotu v prostředí rostoucích hrozeb a nových evropských nařízení.

Excellent review ☆☆☆☆☆ from 406 reviewers
What makes our references exceptional? They are not one-off events. Clients come back to us regularly.
Lektorka kvalifikovaná a odborně prezentuje.
Dobře strukturované, hluboká znalost problematiky, právní přesah.
Dobrý přehled problematiky.
Příjemné popovídaní.
Byl jsem spokojen s obsahem a kvalitou kurzu.
Kurz byl velmi přínosný, paní školitelka úžasná.
Výborné školení, praktické a využitelné pro moji praxi.
Skvělá přednáška s praktickými vstupy
Zajímavé podání, vstřícný přístup
Extrémě dobré, líbila se mi ochota a lidský přístup lektora.
View the next 10 reviews of our graduates
View the full list of reference clients.
We are available at +420 222 553 101 Always Monday to Friday: 9am - 5pm.
Would you like a gift for your birtday?