Remove Case Study Remove Compliance Remove Course Remove Information Security
article thumbnail

Elearning Staff Awareness Course Overview: Ransomware

IT Governance

Now, Damian is our head of GRC consultancy, providing clients with pragmatic consultancy advice and support around information security, risk management and ISMSs (information security management systems). He also delivers ISO 27001 training courses. Why is this elearning course so important?

article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. Let’s take a look at five of the best online courses for cyber security. Certified Cyber Security Foundation Training Course.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

Thycotic chief security scientist Joseph Carson told eSecurity Planet that choosing a certification should ultimately be about deciding which skillset or professional direction you want to focus on. AsTech’s Kent said of Security+, “This crosses several domains and is a basic introduction to security.

article thumbnail

How to Manage Information - Growing Your Own Success

AIIM

You can grab a pack of “information seeds” here on Amazon. I’m kidding, of course. But as noted earlier, information already exists all over your business. Organizations implement information management systems in support of creating, capturing, and sharing information and ensuring its usefulness to the organization.”.

ROT 161
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Is user access to data routinely checked and assessed for compliance? Is data encrypted in transit and at rest?

Security 105
article thumbnail

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

Anyone with an interest in information security will have encountered ISO 27001 , the international standard that describes best practice for an ISMS (information security management system). It’s a supplementary standard that provides advice on how to implement the security controls listed in Annex A of ISO 27001.

article thumbnail

4 ways ISO 27001 can enhance your business

IT Governance

If your organisation is concerned about information security, it should have an ISO 27001 -compliant information security management system (ISMS) in place. Implementing an ISMS helps organisations manage their security practices, as well as helping to monitor, audit and improve their information security.