Remove Course Remove Education Remove Government Remove Training
article thumbnail

Train Your Team to Ensure You Achieve ISO 27001 Certification

IT Governance

Your implementation team must be appropriately trained to ensure the success of your ISO 27001 project. They are also usually responsible for selecting and training an implementation team that includes risk management, information security, audit and compliance specialists. Leadership is key. Risk management skills are essential.

article thumbnail

TKM TRAINING COURSES PLEDGE FOR DEC UKRAINE APPEAL

Managing Your Information

to donate a percentage of all training course earnings this year to the Disasters Emergency Committee’s Ukraine Appeal. For each person that books a full or half-day course we pledge £20; for a three-day booking it is £35 and those who book the practitioner level course we will donate £50.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

In several recent posts, I’ve talked about professional development options for information management professionals and provided guidance on how to determine whether a particular course or certification is a good fit. For the most part, I’ve stayed away from blogging about AIIM's training for two reasons.

ECM 116
article thumbnail

TKM AND FYI TRAINING COURSES PLEDGE FOR DEC UKRAINE APPEAL

Managing Your Information

to donate some of our training course earnings this year to the Disasters Emergency Committee’s Ukraine Humanitarian Appeal. For each person that books a full or half-day course we pledge £20; for a three-day booking it is £35 and those who book the practitioner level course we will donate £50.

article thumbnail

GUEST ESSAY: A Memorial Day call to upskill more veterans for in-demand cybersecurity roles

The Last Watchdog

Meanwhile, 200,000 well-trained and technically skilled military service members are discharged each year. Fundamentally, cybersecurity professionals identify weaknesses and design systems and processes to protect any organization — government agencies, private companies — from cyberattacks.

article thumbnail

The Best Training for Records Managers

AIIM

Most turn out to be a perfect fit for AIIM's training , certification , research , webinars , or some combination of these. But I'll be the first to admit that our educational offerings aren't a perfect fit for everyone and I often get asked, "What are some of the quality training options outside of AIIM?".

article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

The benefits of partnering with us, and our partner-exclusive event IT Governance launched its partner programme in 2017, which now includes more than 400 organisations. And why should organisations consider partnering with IT Governance? What is it that makes IT Governance special? What else can partners expect from the event?