{"id":9677,"date":"2024-04-25T11:59:22","date_gmt":"2024-04-25T09:59:22","guid":{"rendered":"https:\/\/cyberacademy.altaydagistan.com\/?post_type=mec-events&#038;p=9677"},"modified":"2026-01-12T11:46:18","modified_gmt":"2026-01-12T10:46:18","slug":"formations-iso-iec-27035-lead-incident-manager","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/formations-iso-iec-27035-lead-incident-manager\/","title":{"rendered":"PECB CERTIFIED ISO\/IEC 27035 Lead Incident Manager"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"9677\" class=\"elementor elementor-9677\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7903786 e-con-full e-flex e-con e-child\" data-id=\"7903786\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9845bd9 elementor-widget elementor-widget-image\" data-id=\"9845bd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"203\" height=\"248\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/04\/images-removebg-preview-1.png\" class=\"attachment-medium size-medium wp-image-14850\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fb90f1 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"6fb90f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-174ce1c elementor-widget elementor-widget-image\" data-id=\"174ce1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"200\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb.png\" class=\"attachment-large size-large wp-image-6392\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb.png 500w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/03\/pecb-300x120.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2271b4b elementor-widget elementor-widget-spacer\" data-id=\"2271b4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32887ac4 elementor-widget elementor-widget-text-editor\" data-id=\"32887ac4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"description td td-subTitle text-white opacity-90\"><div class=\"description td td-subTitle text-white opacity-90\"><div class=\"description td td-subTitle text-white opacity-90\"><div class=\"description td td-subTitle text-white opacity-90\"><div class=\"description td td-subTitle text-white opacity-90\"><div class=\"description td td-subTitle text-white opacity-90\"><div class=\"description td td-subTitle text-white opacity-90\">Master the management of information security incidents in accordance with ISO\/IEC 27035.<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ad7b056 elementor-widget elementor-widget-heading\" data-id=\"4ad7b056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The target audience for training<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Information security incident managers<\/li><li>ICT managers<\/li><li>Information technology auditors<\/li><li>Managers wishing to set up an incident response team<\/li><li>Managers wishing to learn more about the effective operation of an incident response team<\/li><li>Information security risk managers<\/li><li>Professional IT systems administrators<\/li><li>Professional computer network administrators<\/li><li>Members of the incident response team<\/li><li>People responsible for information security within an organisation<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d6e3ac1 e-flex e-con-boxed e-con e-child\" data-id=\"5d6e3ac1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What you will learn<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"has-show-more-inner-content bg-transparent\"><div class=\"td td-description\"><p>The ISO\/IEC 27035 Lead Incident Manager course will give you the expertise you need to help an organization implement an information security incident management plan in accordance with the ISO\/IEC 27035 standard. During this course, you will acquire in-depth knowledge of the process model used to design and develop an organisation's incident management plan. The compatibility of this course with ISO\/IEC 27035 also supports ISO\/IEC 27001 by providing guidelines for information security incident management.<\/p><p>Once you have mastered all the concepts relating to information security incident management, you can sit the exam and apply for the title of \"PECB Certified ISO\/IEC 27035 Lead Incident Manager\". By holding a PECB Lead Incident Manager certification, you will demonstrate that you have the practical knowledge and professional skills needed to support and lead a team in the management of information security incidents.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71419de5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"71419de5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca12bed elementor-widget elementor-widget-heading\" data-id=\"1ca12bed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training programme <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10905e70 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"10905e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration: 5 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8268162 elementor-widget elementor-widget-n-accordion\" data-id=\"8268162\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1360\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1360\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 1: Introduction to information security incident management concepts, as defined by ISO\/IEC 27035 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1360\" class=\"elementor-element elementor-element-4209905 e-con-full e-flex e-con e-child\" data-id=\"4209905\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34ed7555 elementor-widget elementor-widget-text-editor\" data-id=\"34ed7555\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li class=\"text-2xl\">Objectives and structure of the course<\/li>\n<li class=\"text-2xl\">Standards and regulatory frameworks<\/li>\n<li class=\"text-2xl\">Information security incident management<\/li>\n<li class=\"text-2xl\">ISO\/IEC 27035 core processes<\/li>\n<li class=\"text-2xl\">Fundamental principles of information security<\/li>\n<li class=\"text-2xl\">Correlation with business continuity<\/li>\n<li class=\"text-2xl\">Legal and ethical issues<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1361\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1361\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 2: Designing and preparing an information security incident management plan <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1361\" class=\"elementor-element elementor-element-640b294 e-con-full e-flex e-con e-child\" data-id=\"640b294\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1361\" class=\"elementor-element elementor-element-38b4cae e-flex e-con-boxed e-con e-child\" data-id=\"38b4cae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c90ae00 elementor-widget elementor-widget-text-editor\" data-id=\"6c90ae00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"text-2xl\">Launch of an information security incident management process<\/li><li class=\"text-2xl\">Understanding the organisation and clarifying the objectives of information security incident management<\/li><li class=\"text-2xl\">Planning and preparation<\/li><li class=\"text-2xl\">Roles and functions<\/li><li class=\"text-2xl\">Policies and procedures<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1362\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1362\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 3: Launching an incident management process and handling information security incidents <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1362\" class=\"elementor-element elementor-element-b0a0112 e-con-full e-flex e-con e-child\" data-id=\"b0a0112\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1362\" class=\"elementor-element elementor-element-39336508 e-flex e-con-boxed e-con e-child\" data-id=\"39336508\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71291d4a elementor-widget elementor-widget-text-editor\" data-id=\"71291d4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"text-2xl\">Communication planning<\/li><li class=\"text-2xl\">First stages of implementation<\/li><li class=\"text-2xl\">Fitting the support elements<\/li><li class=\"text-2xl\">Detection and reporting<\/li><li class=\"text-2xl\">Assessment and decisions<\/li><li class=\"text-2xl\">Answers<\/li><li class=\"text-2xl\">Lessons learned<\/li><li class=\"text-2xl\">Transition to operations<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1363\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1363\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 4: Monitoring and continuous improvement of the information security incident management plan <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1363\" class=\"elementor-element elementor-element-802366e e-flex e-con-boxed e-con e-child\" data-id=\"802366e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1363\" class=\"elementor-element elementor-element-1d1243e e-con-full e-flex e-con e-child\" data-id=\"1d1243e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7aec362 elementor-widget elementor-widget-text-editor\" data-id=\"7aec362\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"text-2xl\">Additional analysis<\/li><li class=\"text-2xl\">Analysis of lessons learned<\/li><li class=\"text-2xl\">Corrective measures<\/li><li class=\"text-2xl\">Competence and assessment of incident managers<\/li><li class=\"text-2xl\">Closing the course<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1364\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1364\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Day 5: Certification exam <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-8fb0739 e-flex e-con-boxed e-con e-child\" data-id=\"8fb0739\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1364\" class=\"elementor-element elementor-element-831094b e-con-full e-flex e-con e-child\" data-id=\"831094b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-158cfaa elementor-widget elementor-widget-text-editor\" data-id=\"158cfaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Examination <b>\"PECB Certified ISO\/IEC 27035 Lead Incident Manager <\/b>meets the requirements of the PECB examination and certification programme. The examination covers the following areas of competence: <b>Duration: 3 hours<\/b><\/p><ul><li><b>Area 1: <\/b>Fundamental principles and concepts relating to information security incident management<\/li><li><b>Area 2:<\/b> Best practice in information security incident management in accordance with ISO\/IEC 27035<\/li><li><b>Area 3:<\/b> Design and development of an organisational incident management process in accordance with ISO\/IEC 27035<\/li><li><b>Area 4:<\/b> Preparing for information security incidents and implementing an incident management plan<\/li><li><b>Area 5: <\/b>Launch of the incident management process and handling of information security incidents<\/li><li><b>Area 6:<\/b> Monitoring and measuring performance<\/li><li><b>Area 7:<\/b> Improve incident management processes and activities<\/li><\/ul><p>\u00a0<\/p><ul><li>Review of the main concepts and stages in the incident management cycle.<\/li><li>Reminder of the objectives of the exam: structure, duration, format of questions.<\/li><li>Presentation of the PECB certification process.<\/li><li>Mock exam and revision quiz to put participants in a real-life situation.<\/li><li>Advice on how to pass the exam.<\/li><li>Passage de l\u2019examen de certification.<\/li><li>Attendance certificates are handed out and participants evaluate the course.<br \/><ul><li>Interactive quiz (30 min) on LMS with group correction to validate and consolidate the knowledge acquired.<br \/>acquired.<\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6b0573 elementor-widget elementor-widget-heading\" data-id=\"a6b0573\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Trainer profile <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An expert consultant-trainer in cybersecurity, combining technical expertise, field experience and teaching know-how, whose technical, professional and teaching skills have been rigorously assessed and validated as part of our internal selection procedures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fb76e9 elementor-widget elementor-widget-heading\" data-id=\"3fb76e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Teaching methods and resources <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49bd769 elementor-widget elementor-widget-text-editor\" data-id=\"49bd769\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The course is based on a balanced combination of theoretical and practical approaches, guaranteeing both the acquisition of knowledge and its operational application:<\/p><ul><li>Structured theoretical input, illustrated by practical examples tailored to the participants' professional context.<\/li><li>Practical exercises at each stage to help you assimilate the knowledge you have acquired.<\/li><li>A case study linking the different skill blocks.<\/li><li>Strong interaction between trainers and trainees, making exchanges more concrete and in correlation with trainees' expectations.<\/li><li>Full educational documentation, supplied in digital format.<\/li><li>Course evaluation questionnaire at the end of the course, analysed by our teaching team.<\/li><li>Certificate of acquired skills sent to the trainee at the end of the course.<\/li><li>End-of-training certificate sent at the same time as the invoice to the company or funding organisation, confirming that the trainee has fully attended the session.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-318071e elementor-widget elementor-widget-heading\" data-id=\"318071e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training objectives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9751571 elementor-widget elementor-widget-text-editor\" data-id=\"9751571\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Master the concepts, approaches, methods, tools and techniques that enable effective management of information security incidents in accordance with ISO\/IEC 27035.\u00a0<\/li><li>Understanding the correlation between ISO\/IEC 27035 and other standards and regulatory frameworks\u00a0<\/li><li>Acquire the expertise needed to support an organisation during the implementation, management and updating of an information security incident response plan\u00a0<\/li><li>Acquire the skills to advise organisations effectively on best practice in information security management\u00a0<\/li><li>Understand the importance of adopting well-structured procedures and policies for incident management processes<\/li><li>Develop the expertise needed to manage an effective incident response team<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25d8f52 elementor-widget elementor-widget-heading\" data-id=\"25d8f52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Assessment method <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4751a79 elementor-widget elementor-widget-text-editor\" data-id=\"4751a79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Practical exercises at every stage of the course.<\/li><li>A case study linking the different skill blocks.<\/li><li>Quiz at the end of each day's training.<\/li><li>Self-assessment of knowledge acquired by the trainee via a questionnaire.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training prerequisites<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"has-show-more-inner-content\"><div class=\"td td-prerequisites\"><div class=\"has-show-more-inner-content\"><div class=\"td td-prerequisites\"><div class=\"has-show-more-inner-content\"><div class=\"td td-prerequisites\"><div class=\"has-show-more-inner-content\"><div class=\"td td-prerequisites\"><div class=\"has-show-more-inner-content\"><div class=\"td td-prerequisites\"><div class=\"has-show-more-inner-content\"><div class=\"td td-prerequisites\"><div class=\"has-show-more-inner-content\"><div class=\"td td-prerequisites\"><p>Avoir une bonne connaissance des processus de gestion des incidents, des principes de s\u00e9curit\u00e9 de l&rsquo;information et de la famille de normes ISO\/IEC 27000.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f29f63b e-flex e-con-boxed e-con e-parent\" data-id=\"f29f63b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-adf690d elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"adf690d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/06\/ISO-IEC-27035-LIM-4p-FR-Partner.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">See the brochure for this course<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Ma\u00eetrisez la gestion des incidents de s\u00e9curit\u00e9 de l&rsquo;information selon la norme ISO\/IEC 27035. L&rsquo; audience cibl\u00e9e par la formation Gestionnaires des incidents de s\u00e9curit\u00e9 de l\u2019information Responsables des TIC Auditeurs des technologies de l\u2019information Responsables souhaitant mettre en place une \u00e9quipe de r\u00e9ponse aux incidents Responsables souhaitant apprendre davantage sur le fonctionnement efficace d\u2019une [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":10229,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[153],"examen":[146],"langue":[144],"niveau":[90],"formateur":[89],"cpf":[],"organismes":[],"organisme":[],"mec_category":[96],"class_list":["post-9677","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","duree-5-jours","examen-oui","langue-francais","niveau-fondamental","formateur-pecb","mec_category-management-de-la-securite-de-linformation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PECB CERTIFIED ISO\/IEC 27035 Lead Incident Manager - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Ma\u00eetrisez la gestion des incidents de s\u00e9curit\u00e9 de l\u2019information selon la normeISO\/IEC 27035\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/formations-iso-iec-27035-lead-incident-manager\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PECB CERTIFIED ISO\/IEC 27035 Lead Incident Manager - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Ma\u00eetrisez la gestion des incidents de s\u00e9curit\u00e9 de l\u2019information selon la normeISO\/IEC 27035\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/formations-iso-iec-27035-lead-incident-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T10:46:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/04\/PECB_CERTIFIED_ISOIEC_27035_Lead_Incident_Manager.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1176\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/formations-iso-iec-27035-lead-incident-manager\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/formations-iso-iec-27035-lead-incident-manager\\\/\",\"name\":\"PECB CERTIFIED ISO\\\/IEC 27035 Lead Incident Manager - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/formations-iso-iec-27035-lead-incident-manager\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/formations-iso-iec-27035-lead-incident-manager\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/PECB_CERTIFIED_ISOIEC_27035_Lead_Incident_Manager.jpg\",\"datePublished\":\"2024-04-25T09:59:22+00:00\",\"dateModified\":\"2026-01-12T10:46:18+00:00\",\"description\":\"Ma\u00eetrisez la gestion des incidents de s\u00e9curit\u00e9 de l\u2019information selon la normeISO\\\/IEC 27035\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/formations-iso-iec-27035-lead-incident-manager\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/formations-iso-iec-27035-lead-incident-manager\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/formations-iso-iec-27035-lead-incident-manager\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/PECB_CERTIFIED_ISOIEC_27035_Lead_Incident_Manager.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/PECB_CERTIFIED_ISOIEC_27035_Lead_Incident_Manager.jpg\",\"width\":1920,\"height\":1176,\"caption\":\"Ma\u00eetrisez la gestion des incidents de s\u00e9curit\u00e9 de l\u2019information selon la norme ISO\\\/IEC 27035\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/formations-iso-iec-27035-lead-incident-manager\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PECB CERTIFIED ISO\\\/IEC 27035 Lead Incident Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PECB CERTIFIED ISO\/IEC 27035 Lead Incident Manager - ACG CyberAcademy","description":"Ma\u00eetrisez la gestion des incidents de s\u00e9curit\u00e9 de l\u2019information selon la normeISO\/IEC 27035","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/formations-iso-iec-27035-lead-incident-manager\/","og_locale":"en_GB","og_type":"article","og_title":"PECB CERTIFIED ISO\/IEC 27035 Lead Incident Manager - ACG CyberAcademy","og_description":"Ma\u00eetrisez la gestion des incidents de s\u00e9curit\u00e9 de l\u2019information selon la normeISO\/IEC 27035","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/formations-iso-iec-27035-lead-incident-manager\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-01-12T10:46:18+00:00","og_image":[{"width":1920,"height":1176,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/04\/PECB_CERTIFIED_ISOIEC_27035_Lead_Incident_Manager.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/formations-iso-iec-27035-lead-incident-manager\/","url":"https:\/\/acgcyberacademy.fr\/events\/formations-iso-iec-27035-lead-incident-manager\/","name":"PECB CERTIFIED ISO\/IEC 27035 Lead Incident Manager - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/formations-iso-iec-27035-lead-incident-manager\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/formations-iso-iec-27035-lead-incident-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/04\/PECB_CERTIFIED_ISOIEC_27035_Lead_Incident_Manager.jpg","datePublished":"2024-04-25T09:59:22+00:00","dateModified":"2026-01-12T10:46:18+00:00","description":"Ma\u00eetrisez la gestion des incidents de s\u00e9curit\u00e9 de l\u2019information selon la normeISO\/IEC 27035","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/formations-iso-iec-27035-lead-incident-manager\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/formations-iso-iec-27035-lead-incident-manager\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/formations-iso-iec-27035-lead-incident-manager\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/04\/PECB_CERTIFIED_ISOIEC_27035_Lead_Incident_Manager.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/04\/PECB_CERTIFIED_ISOIEC_27035_Lead_Incident_Manager.jpg","width":1920,"height":1176,"caption":"Ma\u00eetrisez la gestion des incidents de s\u00e9curit\u00e9 de l\u2019information selon la norme ISO\/IEC 27035"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/formations-iso-iec-27035-lead-incident-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"PECB CERTIFIED ISO\/IEC 27035 Lead Incident Manager"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/9677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=9677"}],"version-history":[{"count":4,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/9677\/revisions"}],"predecessor-version":[{"id":18628,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/9677\/revisions\/18628"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/10229"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=9677"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=9677"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=9677"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=9677"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=9677"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=9677"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=9677"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=9677"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=9677"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=9677"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=9677"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=9677"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=9677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}