Why your DPO needs specialised training

IT Governance

Instead, they should be given specialist training to help them excel. Here are three reasons why you should invest in specialised DPO training. DPOs are naturally expected to have expert understanding of data protection law, and they should have received GDPR training.

GDPR Training in Belfast – save 10%

IT Governance

One way to fill this gap is to build on the knowledge of existing staff through training. IT Governance runs two levels of GDPR training courses across the UK to train staff on the Regulation, giving them the knowledge required to manage a GDPR compliance project.

Weekly podcast: myPersonality, train Wi-Fi and Kaspersky Lab

IT Governance

This week, we discuss the exposure of millions of Facebook users’ data, security failings in train passenger networks and Kaspersky Lab’s relocation to Switzerland. Hello and welcome to the IT Governance podcast for Friday, 18 May 2018.

Ready for In-Depth eDiscovery Training? Head to Georgetown: eDiscovery Best Practices

eDiscovery Daily

There are training courses and there are training courses, but there is no more in-depth eDiscovery training course than the Georgetown Law Center eDiscovery Training Academy. With plenty of exercises to test your knowledge and Mock 26(f) Conferences on the last day.

New course dates for GDPR training in Edinburgh and Glasgow

IT Governance

One way this awareness can be achieved is through staff training, and IT Governance can support you every step of the way. Certified EU GDPR Foundation Training Course. Next training dates: Edinburgh: 21 May, 18 June, 23 July, 22 August, 24 September.

Is Artificial Intelligence the ‘Killer App’ for Data Governance?

Perficient Data & Analytics

For many years data governance was the thing that we knew we should do because it was the correct thing to do but somehow it never got the priority it should get. It was like exercising or flossing or eating vegetables (depending upon your proclivities). AI may, in fact, be the ‘killer app’ that pushes even the stodgiest of companies to embrace a data culture and improve their data governance and data quality.

Intelligent Information Management - Learning from CHOCOLATE?!


Automating governance and compliance. One of the exercises I developed was called "The Taxonomy of Salad". on them, I'd switch that exercise out for a much sweeter one focused on developing a taxonomy of chocolate.

Free Emergency Planning Workshop Series

The Texas Record

The first day will focus on emergency preparedness, and the second day will focus on response, including a wet salvage exercise. Disaster Resources News Archives Emergency Preparedness Local Governments State Agencies Training

How to become an ISO 27001 lead implementer

IT Governance

It is much more cost-effective to enrol on an ISO 27001 lead implementer training course that includes the exam in its programme rather than pay for the two separately.

How to start your career in cyber security

IT Governance

It’s the globally accepted standard of achievement among information security, information systems audit and IT governance professionals. Find out more about our ISO 27001 Certified ISMS Foundation Training Course >> Cyber Security ISO 27001 ISO 27001 training

BCS Data Protection Courses Available for 2019!

Managing Your Information

Tkm is now an accredited training partner for the BCS and has added their data protection professional certifications to our training portfolio. Tkm’s qualifications cover managing risk and the role of information governance, and are rated on the SCQF. Other Training.

The Unanimous Declaration of the Thirteen United States of America

Adam Shostack

It’s not about jingoism, or the results of a plebiscite, but about a “long train of abuses and usurpations, pursuing invariably the same Object,” and the proper response to such acts.). But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

My reporting trip included meetings with Michigan-based cybersecurity vendors pursuing leading-edge innovations, as well as a tour of a number of thriving public-private cybersecurity incubator and training programs. He pulled together the Michigan Cyber Range , an unclassified, private cloud network initially set up to teach, test and train IT staff to defend their organizations’ networks.

How to Ensure Your Digital Security During the Rugby World Cup

Thales eSecurity

Just a couple of months after that, World Rugby itself announced that one of its training websites had suffered a security breach that exposed subscribers’ account information. Now that it’s September, the excitement is beginning to build in earnest for the 2019 Rugby World Cup.

IoT 75

Weekly podcast: Bank of England, the OPM, Patch Tuesday and Japanese minister

IT Governance

This week, we discuss a Bank of England cyber resilience exercise, the latest cyber security news from the US Office of Personnel Management, the highlights of this month’s Patch Tuesday, and a surprising admission by a Japanese cyber security minister.

Maintaining independence of the DPO role in healthcare organisations

IT Governance

Training internal staff. Where organisations identify a suitable internal staff member to become the DPO, certain training requirements should be met. The increased scope of the Regulation means DPOs should undertake training in its legal basis and practical implications.

MY TAKE: Here’s how diversity can strengthen cybersecurity — at many levels

The Last Watchdog

Related: How ‘gamification’ makes training stick. military carry out training exercises for real life cyber warfare. That led to a transition into what it is today: a leading supplier of immersive “gamification” training modules designed to keep cyber protection teams in government, military, and corporate entities on their toes. Of the many cybersecurity executives I’ve interviewed, Keenan Skelly’s career path may be the most distinctive.

Less than two months to go until DSP Toolkit submission deadline

IT Governance

To avoid the disruption caused by not meeting this deadline, organisations need to be aware of the changes that the DSP Toolkit brings compared to its predecessor, the IG (Information Governance) Toolkit.


What Is Our Professional Future?

Brandeis Records Manager

A recent futurist reading binge has been an exercise in masochism, or deer-in-the-headlights simulation, or emperor’s new clothes realization. When we consider that fixed, controlled records following recordkeeping principles and information governance are typical objectives in our programs, it’s not unreasonable to get a little scared by this. Reading through Kelly’s book as a records manager or archivist is an exercise in marathon squirming. George Despres, CRM.

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Michigan is cultivating a collection of amazing cybersecurity training facilities, called Cyber Range hubs, that are shining models for what’s possible when inspired program leaders are given access to leading-edge resources, wisely supplied by public agencies and private foundations. These two facilities lacked nothing in terms of state-of-the-art telepresence equipment and training and testing curriculums.

NHS Digital release GDPR guidance for health and social care

IT Governance

GDPR training courses. Certified EU GDPR Foundation Training Course. Book your place now>> Certified EU GDPR Practitioner Training Course. IT Governance’s founder and GDPR expert, Alan Calder , will be answering your GDPR related queries via Twitter.


Catching up, again, part 4


Is that Governance, or Compliance? Two aspects here, first dealing with the use of a number derived from supposedly unbiased people to govern “your” deal, and, second, the cost of non-compliance, even if long-delayed. Maybe it was not improper or inadequate training; maybe it was improper maintenance. And does the government exercise appropriate oversight/governance given the amount of federal funds involved?

Practical steps to GDPR compliance in health and social care

IT Governance

IT Governance has created a checklist, in accordance with NHS Digital guidance, to advise healthcare providers and their supply chain on how to achieve and demonstrate compliance with the Regulation. View the full checklist >> GDPR training courses.

The benefits of outsourcing your DPO

IT Governance

IT Governance offers DPO as a service on an annual subscription basis. Facilitate GDPR awareness training and the training of staff involved in data processing operations.

Is your organisation equipped for long-term GDPR compliance?

IT Governance

It could be a simple tick-box exercise, with the unchecked steps forming the gaps that need to be addressed. Providing this information helps individuals understand their rights and how they can be exercised. appeared first on IT Governance Blog.


Upcoming webinar: Creating an effective cyber security awareness programme

IT Governance

Organisations run the risk of implementing staff awareness training that is seen as simply a tick-box exercise, which doesn’t often result in heightened awareness. As hard as it is to believe, an organisation’s biggest security risk is often its own.

What is data protection by design and default

IT Governance

Giving individuals a simple, easy-to-access method for adjusting their privacy settings and exercising their data subject rights. Our By Design and By Default solution includes a customisable range of training courses and software to help you achieve demonstrable compliance.

What are the Data Subject Rights under the GDPR?

IT Governance

Organisations must let individuals know how they can exercise these rights, and meet requests promptly. If you’d like to understand the GDPR further, enrol on our GDPR Foundation Training Course. appeared first on IT Governance Blog. Updated 15 November 2018.


UK ICO issues largest ever GDPR privacy fine of £183m ($228m)

Data Matters

Ensuring that a company is properly prepared for and responds to privacy and cyber security threats is a key corporate governance responsibility for directors and senior officers. Develop and carry out regular training to different groups to communicate expectations in respect of breach, prevention identification and reporting including senior managers with regular practical table top exercises which run through and practice dealing with hypothetical cyber incidents.


GPEN and National DPAs Publish Sweep Results on Privacy Accountability

Hunton Privacy

On the same date, some participating DPAs released the results of the Sweep exercise carried out in their respective jurisdiction. Governance: Nearly three quarters of organizations across all sectors and jurisdictions had appointed a dedicated individual or team responsible for ensuring that their organization complied with relevant data protection rules and regulations.

New to the Role of Data Protection Officer? We’ve Put Together a Few Points to Help You Get Started

Managing Your Information

The organisation must also ensure that the DPO is does not receive any instructions regarding the exercise of their tasks. Some of the organisations that provide support for compliance with data protection laws include: Tkm is a training partner of the IRMS. What training is available?

List of free GDPR resources and templates

IT Governance

Conducting a data flow mapping exercise under the GDPR. Alan Calder, the founder and executive chairman of IT Governance, answers the important questions surrounding the GDPR and how it affects businesses in the UK. Updated 14 November 2018.


GDPR compliance for professional services firms: time to get on track

IT Governance

Data protection governance – the extent to which data protection accountability, responsibility, policies and procedures, performance measurement controls and reporting mechanisms to monitor compliance are in place and operating throughout your firm.


What is the Data Protection Act 2018?

IT Governance

The UK government decided that it makes sense to continue using the existing framework, given that it already applies in the UK. The UK government decided that there must be specific data protection requirements for MI5, MI6 and GCHQ. appeared first on IT Governance Blog.


Mapping the threat: an insight into data breaches across Europe

Thales eSecurity

The agreement, aimed at sharing the best possible resources, will focus on five specific areas: exchange of information, education and training, cyber exercises, technical cooperation and strategic and admin.

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

To meet these requirements, organisations must: Assemble a project team and initiate the project; Conduct a gap analysis; Scope the ISMS; Initiate high-level policy development; Perform a risk assessment; Select and apply controls; Develop risk documentation; Conduct staff awareness training; Assess, review and conduct an internal audit; and. You can find out more about how to implement a best-practice ISMS by enrolling on our ISO27001 Certified ISMS Foundation Training Course.

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

Part VI, the written exam, essentially says, “You’ve been hired by Institution X, and their records situation is a train wreck. While vague vendor Web language was nothing new to us, this immersive exercise left us astounded by just how hollow and unclear much of the vendor promotional language is. information governance records managementGeorge Despres. Program Director for University Records Management, Brandeis University.

How to improve your cyber resilience

IT Governance

For example, staff awareness training is a requirement of almost all security frameworks because it helps reduce the likelihood of a variety of risks. Get started now >> The post How to improve your cyber resilience appeared first on IT Governance Blog.

10 key areas to identify gaps in your GDPR compliance

IT Governance

The newly updated EU GDPR Compliance Gap Assessment Tool identifies ten key areas that your organisation should analyse to establish its current stance against the requirements: Governance – awareness of the leadership team, management and functional management.

KM World Covers the Latest Best Practices in IG


The IGI is pleased to share the latest by KM World: a useful best practices whitepaper digging into the details of IG, sponsored in part by IGI Supporter Actiance , that includes the following perspective on the efforts of the Information Governance Initiative. “The Information Governance Initiative, is widely credited with moving the discipline forward. – Employees Need to be Directly Engaged in Design of IG Training.

ECM 20