Why your DPO needs specialised training

IT Governance

Instead, they should be given specialist training to help them excel. Here are three reasons why you should invest in specialised DPO training. DPOs are naturally expected to have expert understanding of data protection law, and they should have received GDPR training.

GDPR Training in Belfast – save 10%

IT Governance

One way to fill this gap is to build on the knowledge of existing staff through training. IT Governance runs two levels of GDPR training courses across the UK to train staff on the Regulation, giving them the knowledge required to manage a GDPR compliance project.

Weekly podcast: myPersonality, train Wi-Fi and Kaspersky Lab

IT Governance

This week, we discuss the exposure of millions of Facebook users’ data, security failings in train passenger networks and Kaspersky Lab’s relocation to Switzerland. Have you ever used – or perhaps, given its reliability, I should say tried to use – Wi-Fi on a train?

Ready for In-Depth eDiscovery Training? Head to Georgetown: eDiscovery Best Practices

eDiscovery Daily

There are training courses and there are training courses, but there is no more in-depth eDiscovery training course than the Georgetown Law Center eDiscovery Training Academy. With plenty of exercises to test your knowledge and Mock 26(f) Conferences on the last day.

New course dates for GDPR training in Edinburgh and Glasgow

IT Governance

One way this awareness can be achieved is through staff training, and IT Governance can support you every step of the way. Certified EU GDPR Foundation Training Course. Next training dates: Edinburgh: 21 May, 18 June, 23 July, 22 August, 24 September.

How to Prepare for the Brazil Data Protection Law


Undertaking a data-mapping exercise can help filter out the data that is not subject to the law’s requirements, such as B2B data. An organization’s internal training may need to be updated to reflect the law’s additional requirements.

B2B 56

How to start your career in cyber security

IT Governance

We have many resources to help you learn about ISO 27001, but for a thorough introduction, you should attend our ISO27001 Certified ISMS Foundation Training Course. Cyber Security ISO 27001 ISO 27001 trainingA version of this blog was originally published on 8 December 2017.

Tips 78

How to become an ISO 27001 lead implementer

IT Governance

It is much more cost-effective to enrol on an ISO 27001 lead implementer training course that includes the exam in its programme rather than pay for the two separately.

How to start your career in cyber security

IT Governance

We have many resources to help you learn about ISO 27001, but for a thorough introduction, you should attend our ISO 27001 Certified ISMS Foundation Training Course. There has never been a better time to get into cyber security.

Free Emergency Planning Workshop Series

The Texas Record

The first day will focus on emergency preparedness, and the second day will focus on response, including a wet salvage exercise. Disaster Resources News Archives Emergency Preparedness Local Governments State Agencies Training

BCS Data Protection Courses Available for 2019!

Managing Your Information

Tkm is now an accredited training partner for the BCS and has added their data protection professional certifications to our training portfolio. Other Training. Customised data protection training is available for sessions delivered in house. What courses are available?

Practice Makes Perfect: How the Apollo 11 Crew Prepared for Launch

Unwritten Record

But the years leading up to the launch were full of rigorous training exercises and mock run-throughs performed by the Apollo 11 prime and back-up crews. Astronauts Aldrin, Armstrong, and Collins participate in water egress training in the Gulf of Mexico.

Man Behind Fatal ‘Swatting’ Gets 20 Years

Krebs on Security

Tyler Barriss , a 26-year-old California man who admitted making a phony emergency call to police in late 2017 that led to the shooting death of an innocent Kansas resident, has been sentenced to 20 years in federal prison. Tyler Barriss, in an undated selfie.

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

My reporting trip included meetings with Michigan-based cybersecurity vendors pursuing leading-edge innovations, as well as a tour of a number of thriving public-private cybersecurity incubator and training programs. He pulled together the Michigan Cyber Range , an unclassified, private cloud network initially set up to teach, test and train IT staff to defend their organizations’ networks.

MY TAKE: Here’s how diversity can strengthen cybersecurity — at many levels

The Last Watchdog

Related: How ‘gamification’ makes training stick. military carry out training exercises for real life cyber warfare. That led to a transition into what it is today: a leading supplier of immersive “gamification” training modules designed to keep cyber protection teams in government, military, and corporate entities on their toes. Of the many cybersecurity executives I’ve interviewed, Keenan Skelly’s career path may be the most distinctive.

Calif. Man Pleads Guilty in Fatal Swatting Case, Faces 20+ Years in Prison

Krebs on Security

But it would also be nice if more police forces around the country received additional training on exercising restraint in the use of deadly force, particularly in responding to hostage or bomb threat scenarios that have hallmarks of a swatting hoax.

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Michigan is cultivating a collection of amazing cybersecurity training facilities, called Cyber Range hubs, that are shining models for what’s possible when inspired program leaders are given access to leading-edge resources, wisely supplied by public agencies and private foundations. These two facilities lacked nothing in terms of state-of-the-art telepresence equipment and training and testing curriculums.

National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The Last Watchdog

Related: Using ‘gamification’ for security training. So we’ve boiled the NIST framework down into a very focused workshop exercise. We bring together 150 or so people into a room for morning and just work through exercises. The targeting of Sen. Claire McCaskill by Russian intelligency agency hackers, as she runs for re-election, underscores the need for each individual and organization to take online privacy and security as a core part of our everyday lives.

How to Ensure Your Digital Security During the Rugby World Cup

Thales eSecurity

Just a couple of months after that, World Rugby itself announced that one of its training websites had suffered a security breach that exposed subscribers’ account information. Now that it’s September, the excitement is beginning to build in earnest for the 2019 Rugby World Cup.

Weekly podcast: Bank of England, the OPM, Patch Tuesday and Japanese minister

IT Governance

This week, we discuss a Bank of England cyber resilience exercise, the latest cyber security news from the US Office of Personnel Management, the highlights of this month’s Patch Tuesday, and a surprising admission by a Japanese cyber security minister.

5 things HR departments need to know about data protection

IT Governance

As such, everyone in the HR department should be trained to recognise when a request has been made and the process they should follow to ensure they get the requisite information and respond within the one-month deadline.

Maintaining independence of the DPO role in healthcare organisations

IT Governance

Training internal staff. Where organisations identify a suitable internal staff member to become the DPO, certain training requirements should be met. The increased scope of the Regulation means DPOs should undertake training in its legal basis and practical implications.

Cybersecurity Rules for Insurance Companies to Take Effect in South Carolina

Hunton Privacy

Among other details, the program must be based on a company’s own risk assessments and must include encryption of information in transit, regular testing of systems, and cybersecurity awareness training for employees. The law will also require insurance companies to “exercise due diligence” in choosing third-party service providers and to ensure that service providers have appropriate information safeguards in place no later than July 1, 2020.

NHS Digital release GDPR guidance for health and social care

IT Governance

GDPR training courses. Certified EU GDPR Foundation Training Course. Book your place now>> Certified EU GDPR Practitioner Training Course.


Practical steps to GDPR compliance in health and social care

IT Governance

View the full checklist >> GDPR training courses. Certified EU GDPR Foundation Training Course. Book your place now>> Certified EU GDPR Practitioner Training Course.

Communicating About Cybersecurity in Plain English

Lenny Zeltser

I’m not suggesting that the resulting statement should replace the original text; instead, I suspect this exercise will train you to write more plainly and succinctly.

The benefits of outsourcing your DPO

IT Governance

Provide advice and guidance on responses to individuals exercising any or all of their rights (informed, access, rectification, object, erasure, data portability, restrict processing, automated decision making and profiling).

How SMEs can improve their data protection practices

IT Governance

Train staff. Human error is one of the leading causes of data breaches, so you must teach staff how to recognise potential threats, like phishing and ransomware scams, and get them into the habit of exercising good data protection practices. Our Certified Introduction to Data Protection Training Course is the perfect place to start. SMEs (small and medium-sized enterprises) tend to be the hardest hit by cyber attacks – and they only have themselves to blame.

Less than two months to go until DSP Toolkit submission deadline

IT Governance

The IG Toolkit mandated certain training procedures, which is roughly in line with the third data security standard: “all staff complete appropriate annual data security training and pass a mandatory test”.


7 mistakes that ISO 27001 auditors make

IT Governance

You can find out more about what it takes to audit against ISO 27001 by enrolling in one of these training courses: ISO 27001 external auditor. Packed with hands-on practical exercises, this five-day course helps you gain the expertise needed to manage an ISMS audit programme.

What are the Data Subject Rights under the GDPR?

IT Governance

Organisations must let individuals know how they can exercise these rights, and meet requests promptly. If you’d like to understand the GDPR further, enrol on our GDPR Foundation Training Course. Updated 15 November 2018.


Is your organisation equipped for long-term GDPR compliance?

IT Governance

It could be a simple tick-box exercise, with the unchecked steps forming the gaps that need to be addressed. Providing this information helps individuals understand their rights and how they can be exercised. Last week, the GDPR (General Data Protection Regulation) turned one year old.


Where does data flow mapping fit into your GDPR compliance project?

IT Governance

You should begin your data mapping exercising by identifying the following key elements: Data items (e.g. A data protection officer will be able to provide expert advice, but you should also commit to GDPR training for anyone involved in handling personal data.


The Customer Journey Digital Transformation Workbook

Bill Schmarzo - Dell EMC

We sought to train our students – tomorrow’s business leaders – to embrace the “Big Data MBA” concepts in creating digital transformation-based business models. To support this training, we created a methodology that guided the students through a digital transformation exercise. What Does “Taking a Vacation” Success Look or Feel Like (a surprisingly interesting and effective exercise). In a future blog, I will share the results of that exercise.

Upcoming webinar: Creating an effective cyber security awareness programme

IT Governance

Organisations run the risk of implementing staff awareness training that is seen as simply a tick-box exercise, which doesn’t often result in heightened awareness. As hard as it is to believe, an organisation’s biggest security risk is often its own.

What is data protection by design and default

IT Governance

Giving individuals a simple, easy-to-access method for adjusting their privacy settings and exercising their data subject rights. Our By Design and By Default solution includes a customisable range of training courses and software to help you achieve demonstrable compliance.

The Copyright Card Game


Copyright the Card Game is an open educational game resource designed to train educators and information / e-learning professionals in HE and other educational institutions in UK copyright law. Introduction - slides 3-11 show a suggested ice-breaker exercise and ?pub exercise.