Remove Case Study Remove Course Remove Government Remove Risk
article thumbnail

Successful Information Governance when the Bosses Just Don't Care

AIIM

We regularly discuss the value and importance of information governance - at our conference, in our training courses, in our virtual events. How can you move your organization's information governance program forward in the absence of management support or interest? FREE How-To Guide from AIIM: Information Governance 101].

article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. And why should organisations consider partnering with IT Governance? What is it that makes IT Governance special? What else can partners expect from the event?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. Let’s take a look at five of the best online courses for cyber security. Certified Cyber Security Foundation Training Course.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

“Certifications range from penetration testers , government/industry regulatory compliance , ethical hacking , to industry knowledge,” he said. Prerequisites include either taking a five-day, 20-module training course, or having proof of two years of work experience in a security-related field.

article thumbnail

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Security Affairs

On the other side, Mondelez was requesting the payment of a policy that was promising to conver “ all risks of physical loss or damage ” as well as “ physical loss or damage to electronic data, programs, or software, including loss or damage caused by the malicious introduction of a machine code or instruction.”

article thumbnail

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

To meet these requirements, organisations must: Assemble a project team and initiate the project; Conduct a gap analysis; Scope the ISMS; Initiate high-level policy development; Perform a risk assessment; Select and apply controls; Develop risk documentation; Conduct staff awareness training; Assess, review and conduct an internal audit; and.

article thumbnail

Elearning Staff Awareness Course Overview: Ransomware

IT Governance

In his more than 30 years in the industry, he’s helped both private- and public-sector organisations reduce the risks to their on-site and Cloud-based IT environments. He also has an MSc in cyber security risk management. He also delivers ISO 27001 training courses. Why is this elearning course so important?