How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

Malware Training Sets: FollowUP

Security Affairs

The popular expert Marco Ramilli provided a follow up to its Malware classification activity by adding a scripting section which would be useful for several purposes. On 2016 I was working hard to find a way to classify Malware families through artificial intelligence (machine learning).

How to become a certified DPO

IT Governance

The EU GDPR (General Data Protection Regulation) requires certain organisations to appoint a DPO (data protection officer) to help them comply with the Regulation. The GDPR stipulates that DPOs should have appropriate experience and qualifications to fulfil the role.

Records Management Training for Local Governments – Registration Open!

The Texas Record

We are hosting local government classes on September 11-12, 2019. Class size is limited to 24 people so register today! Introduction to Records Management – Full Day Workshop. Learn the basic concepts of records management: legal obligations, definitions, and how to read a retention schedule. We will also cover the disposition process for how to handle records at the end of their life cycle. Training Local Governments

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. Here are three reasons to consider it: Reduce the risk of data breaches. GDPR training courses.

How to become an ethical hacking master

IT Governance

Does the idea of being paid to hack into organisations’ systems sound appealing? The pay is good, it’s creative and you get to test your skills every day. You can implement all the defences you like, but you won’t know whether they work or not until someone tries to get past them.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. How much experience do you need? You should try to take an internship or volunteer, but we understand this isn’t always possible.

Tips 79

How to detect a data breach

IT Governance

Having systems in place to help identify and contain breaches promptly should be a priority for all management teams. Organisations must also deploy modern breach detection tools, and keep as up to date as possible with the constantly evolving threat landscape. The need for speed.

How to make sure your cyber insurance policy pays out

IT Governance

With the ever-present danger of data breaches and cyber attacks, organisations must be sure that they have the financial backing to respond appropriately. Most policies include provisions requiring organisations to follow certain information security best practices.

How to improve your cyber resilience

IT Governance

It’s not as simple as finding off-the-shelf tools to plug into your organisation. Rather, you must tailor your approach to your needs, assessing the way any one solution affects the whole. Cyber resilience is the ability to prepare for, respond to and recover from cyber attacks.

How to Automate Classification Without Losing Control

Everteam

This blog addresses ways to balance velocity, accuracy, and control to achieve the optimum outcome. Many people will often select rules-based classification because they feel it gives them control of how content is classified. Interested in seeing how it works?

How to become an ISO 27001 lead implementer

IT Governance

If you have some knowledge of ISO 27001 and want to further your career, you should consider becoming an ISO 27001 lead implementer. Anyone interested in the position will need to pass the ISO27001 Certified ISMS Lead Implementer (CIS LI) exam. What you need to know.

How to Ensure Your Digital Security During the Rugby World Cup

Thales eSecurity

Now that it’s September, the excitement is beginning to build in earnest for the 2019 Rugby World Cup. Sports fans aren’t the only ones who are looking forward to this event. We urge you to take precautions to protect your personal information when you are on the Internet.

IoT 75

Records Management Training for Local Governments – Registration Open!

The Texas Record

We are hosting local government classes in March and May 2019. Class size is limited to 24 people so register today! Introduction to Records Management – Full Day Workshop. Learn the basic concepts of records management: legal obligations, definitions, and how to read a retention schedule. We will also cover the disposition process for how to handle records at the end of their life cycle. News Training Local Governments

Local Government Records Management Training – Register Now!

The Texas Record

Local government classes will be held June 12-13, 2018. Class size is limited to 24 people so register today! Local Government Classes. Introduction to Records Management – Full Day Workshop. Learn how to apply records management principles to records through face-to-face instruction and hands-on activities. To register for these classes, visit our website here: [link]. News Training Local Governments

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security. There is a growing demand for experts , leading to increased salaries and job opportunities. As with most industries, you’re much more likely to get ahead in cyber security if you have experience.

Local Government Records Management Training – Register Now!

The Texas Record

Local government classes will be held March 27-28, 2018. Class size is limited to 24 people so register today! Local Government Classes. Introduction to Records Management – Full Day Workshop. Learn how to apply records management principles to records through face-to-face instruction and hands-on activities. To register for these classes, visit our website here: [link]. Not able to attend in March?

Why your DPO needs specialised training

IT Governance

The broad range of skills required to succeed as a DPO (data protection officer) makes it a tough position to fill. We therefore wouldn’t expect an organisation to simply tell its newly appointed DPO to get straight to work.

How to write a business continuity plan: the easy way

IT Governance

The threat of disruption looms over organisations more ominously than ever, thanks to the increasing infiltration of technology in business processes, consumer expectations and the rapid rise in cyber crime. In this blog, we explain how a BCP works, what it covers and how to create one.

Information security and compliance training for the healthcare sector

IT Governance

Healthcare is one of the hardest-hit industries when it comes to data breaches. Healthcare providers (HCPs) and industry partners process significant amounts of data which that is both attractive and valuable to cyber criminals. This is not exclusive to doctors and nurses.

NEW TECH: Circadence deploys ‘gamification’ training to shrink cybersecurity skills gap

The Last Watchdog

It’s clear that closing the cybersecurity skills gap has to happen in order to make our internet-centric world as private and secure as it ought to be. Related: The need for diversity in cybersecurity personnel One of the top innovators in the training space is Circadence ®. I had the chance at RSA 2019 to visit again with Circadence security evangelist Keenan Skelly. Give a listen to the full interview via the accompanying podcast. Everyone likes to win.

Are your staff GDPR trained? Find out what you need to do

IT Governance

Staff awareness training is a core component of GDPR compliance, yet many organisations haven’t implemented the necessary measures. For all the attention that organisations pay to information security, the biggest threat continues to come from employees.

Are your staff GDPR trained? Find out what you need to do

IT Governance

Staff awareness training is a core component of GDPR compliance, yet many organisations haven’t implemented the necessary measures. For all the attention that organisations pay to information security, the biggest threat continues to come from employees.

Data Governance Framework: Three Steps to Successful & Sustainable Implementation

erwin

A strong data governance framework is central to the success of any data-driven organization because it ensures this valuable asset is properly maintained, protected and maximized. With this in mind, here are three steps we recommend for implementing a data governance framework.

New Online Course For Local Governments

The Texas Record

SLRM is excited to announce the relaunch of our Introduction to Records Management Course for local governments! You may remember a previous iteration of the IRM course available on our training page. Based on feedback from users, we’ve updated it to better reflect our in-person trainings. Still to come: Knowledge checks. We are moving our trainings away from make or break quizzes. News Training Compliance Inventory Local Governments

How to avoid the security mistakes that cost an estate agency £80,000 in fines

IT Governance

The incident occurred when the London-based estate agency transferred personal data from its server to a partner organisation but failed to implement access controls. Unfortunately, many organisations are vulnerable to the same mistakes.

ISO 27001 staff awareness training – meeting the requirements

IT Governance

After all, technology won’t help you if an employee leaves their password written down for anyone to see or misplaces a removable device. You need to account for each of these and make a note of the knowledge and skills that are required to stay secure. How to deliver training.

Finance sector must simplify staff awareness training

IT Governance

Financial services firms must do more to educate employees about cyber security, according to the FCA (Financial Conduct Authority). In a report published last month , the FCA urged organisations to tackle staff awareness training at all levels, and to ensure the lessons are simple and appropriate to the environment that employees work in. Organisations need to make staff awareness training a board-level priority.

Why Cybersecurity Pros Should Care About Governance

Getting Information Done

For the last several years, CISOs have focused almost exclusively on protecting the perimeter (even going as far as to use endpoint protection). If most agree that they will likely experience a data breach, then this attention to the perimeter only addresses a portion of the risk.

How to Dominate the Domains of the NEW CIP - D4: Automating Governance and Compliance

AIIM

Welcome back to this continuing series on the updated Certified Information Professional (CIP) exam. In this post, I'll be focusing on Domain 4, Automating Governance and Compliance. You can also refer back to the posts for Domain 1, Creating and Capturing Information , Domain 2, Extracting Intelligence from Information , and Domain 3, Digitalizing Core Business Processes. In addition, they aren't trained to do these types of tasks.

GDPR Training in Belfast – save 10%

IT Governance

Many organisations are struggling to fill a skills gap created by the EU General Data Protection Regulation (GDPR) and need staff with knowledge of the Regulation. One way to fill this gap is to build on the knowledge of existing staff through training.

How to implement an ISMS aligned with ISO 27001

IT Governance

Many have chosen to mitigate the risk by implementing an information security management system (ISMS). It also protects and improves your reputation, proving to customers that you take information security seriously and are doing everything you can to keep data secure.

Small Breaches Can Make Big News: How to Protect Your Organization

Adam Levin

Significant mistake, I’m not minimizing that, but it was just an honest mistake,” said Tim Lynch the associate vice president for Strategic Communications to a campus newspaper. And that’s saying nothing about the damage caused by a breach or compromise to an organization’s reputation.

How to report a data breach to the ICO

IT Governance

With 43% of businesses already having suffered a breach or attack , it’s vital that you know the steps you need to take to report a breach. You need to give the ICO information about what happened, what went wrong and how it happened.

Why you should train your staff to think securely

IT Governance

Other staff, meanwhile, tend to have little knowledge of or interest in information security practices, which they often believe have been designed to hinder their day-to-day work. How your staff help attackers.

IT Governance featured on Gibraltar News about common cyber threats 

IT Governance

One of IT Governance’s governance and risk management consultants, Andrew Pattison, was interviewed by GBC News last week about the most common types of cyber threats after delivering IT Governance’s three-day training course on “Effective Protection against Cyber crime”.

How to comply with Article 30 of the GDPR

IT Governance

Article 30 of the EU General Data Protection Regulation (GDPR) sets out what exactly organisations need to document in order to comply with the Regulation. What do you need to do to comply with Article 30? Where to begin with a data flow map?

How to create documentation to comply with the DSP Toolkit

IT Governance

The Data Security and Protection (DSP) Toolkit has superseded the Information Governance (IG) Toolkit as the standard for cyber and data security for healthcare organisations. Data Security Standard 3: Training. Data Security Standard 6: Responding to Incidents.

NIS Directive consultation feedback published – how to comply

IT Governance

In August 2017 the UK government issued a consultation document on compliance requirements for the upcoming Directive on security of network and information systems (NIS Directive). The role of the competent authority and how powers may be delegated to agencies.