ISO 27001 staff awareness training – meeting the requirements

IT Governance

There is a three-step process for staff awareness training best practices: 1) Identify what staff need to learn : sensitive information will be accessed and used in a variety of ways across your organisation. Any training course should conclude with some form of test to measure the outcome.

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. Meet compliance requirements. ISO 22301 training courses. PCI DSS training courses.

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. Meet compliance requirements. ISO 22301 training courses. PCI DSS training courses.

8 key elements of an effective staff awareness training programme

IT Governance

Announce it through multiple channels (such as in a meeting and by email) to make sure all your employees are aware of it and what it entails. Training courses are the backbone of any awareness programme, and e-learning is the ideal method. Training staff awareness training

E-learning: the effective way to train your team

IT Governance

Despite the operational challenge of staff turnover, there is still a need to ensure that teams are trained to perform not only their core duties but also to do so safely. Trained staff might not remain loyal to your business, so it can seem unpalatable to invest heavily in training.

How to implement a GDPR staff awareness training programme

IT Governance

one of the biggest cyber security threats is inside your organisation , there’s never been a better time to ensure your organisation has an effective GDPR staff awareness training programme in place. . How to deliver staff awareness training – seven top tips .

Opportunity for Comment: Draft Bulletin – Agency Records Officer Credential Training and Renewal Policy

National Archives Records Express

We are requesting comments on the draft NARA Bulletin , “Agency Records Officer Credential Training and Renewal Policy”. This draft Bulletin describes the replacement of NARA’s Certificate of Federal Records Management Training with the proposed Agency Records Officer Credential (AROC). of the Memorandum indicates agencies must designate an Agency Records Officer who holds the Certificate of Federal Records Management Training. General Bulletin comment draft training

New Online Course For Local Governments

The Texas Record

SLRM is excited to announce the relaunch of our Introduction to Records Management Course for local governments! You may remember a previous iteration of the IRM course available on our training page. Based on feedback from users, we’ve updated it to better reflect our in-person trainings. We are moving our trainings away from make or break quizzes. This can be viewed on the side bar underneath the FAQs on all of our training pages.

Meet Perficient’s Chief Strategists: Christine Livingston

Perficient Data & Analytics

I help many clients develop artificial intelligence roadmaps, including the human elements of the strategy, such as governance and human capital requirements. If our team is engaged early on, we can also help clients avoid losing time, money, and effort to optimize their training cycles.

Weekly podcast: myPersonality, train Wi-Fi and Kaspersky Lab

IT Governance

This week, we discuss the exposure of millions of Facebook users’ data, security failings in train passenger networks and Kaspersky Lab’s relocation to Switzerland. Hello and welcome to the IT Governance podcast for Friday, 18 May 2018.

More than a Nicety: Information Governance is a Growing Necessity

Everteam

This is why organizations need to focus on information governance and how it can affect their organization’s wellbeing. Information governance is more than simply managing information, and it’s a strategy for how that asset is protected, leveraged, and maintained.

Ready for In-Depth eDiscovery Training? Head to Georgetown: eDiscovery Best Practices

eDiscovery Daily

There are training courses and there are training courses, but there is no more in-depth eDiscovery training course than the Georgetown Law Center eDiscovery Training Academy. Have you attended the Georgetown Law Center eDiscovery Training Academy in the past?

IT Governance featured on Gibraltar News about common cyber threats 

IT Governance

One of IT Governance’s governance and risk management consultants, Andrew Pattison, was interviewed by GBC News last week about the most common types of cyber threats after delivering IT Governance’s three-day training course on “Effective Protection against Cyber crime”.

Cyber resilience in the Scottish public sector: meeting the Cyber Essentials certification deadline

IT Governance

The Scottish government therefore launched Safe, secure and prosperous: a cyber resilience strategy for Scotland in 2015 to help develop a culture of cyber resilience across the country. As part of this initiative, the government launched the Public Sector Action Plan in November 2017.

Frequently Asked Questions about the Certificate of Federal Records Management Training 

National Archives Records Express

Why should I get NARA’s Certificate of Federal Records Management Training? How does NARA’s Certificate of Federal Records Management Training Program work? What subjects are covered in the Certificate of Federal Records Management Training Program? How does NARA’s Certificate of Federal Records Management Training differ from other records management certification programs? General electronic records management Records Management training

Successful Information Governance when the Bosses Just Don't Care

AIIM

We regularly discuss the value and importance of information governance - at our conference, in our training courses, in our virtual events. How can you move your organization's information governance program forward in the absence of management support or interest? What we'd suggest here is to get very specific about the value of effective information governance from a couple of different perspectives. FREE How-To Guide from AIIM: Information Governance 101].

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

The 2017 e-Records conference delivered on all fronts hosting a variety of vendors, local government and state agency representatives and, of course, plenty of staff from the two hosting state agencies: Department of Information Resources (DIR) and Texas State Library and Archives Commission (TSLAC).

Why is the GDPR still something I should be concerned about?

IT Governance

One way to achieve this is to take dedicated training. . Sign up today for one of our training courses to equip yourself with exceptional knowledge and skills. . Meet us at Holyrood’s Public Sector event. Arrange a meeting with us today >> .

GDPR 86

Data security and the legal sector – ISO 27001 for law firms

IT Governance

Achieving accredited certification to ISO 27001 will put law firms in the running for these tenders and demonstrates that they are committed to protecting their clients’ confidential data, offering a powerful, visible assurance of their commitment to meeting obligations to clients and business partners. The post Data security and the legal sector – ISO 27001 for law firms appeared first on IT Governance Blog.

Project Management, PMP, ITIL, Cost Estimating Business Training & Certification in Virginia

Interactive Information Management

If you're in any way associated with Government contracting, project or program management, project or system cost estimating or resourcing, whether on the job or during acquisition processes and proposal preparation - you may need PMP, ITIL or Cost Estimation Certification and/or training. Working with the government can be difficult. To be fully prepared, it’s important that you have the training and knowledge to function effectively, for the government or your company.

SRA warns about emails falsely claiming to be from a London law firm

IT Governance

Staff training and awareness solutions – ensure everyone is cyber security aware. IT Governance has an extensive suite of tools and training materials to help you develop your staff training and awareness programmes.

Kick-start your career in information security management

IT Governance

If you’re looking to develop a career in information security, the CISMP training course is a great starting point. What will you learn on the CISMP training course? To meet demand, IT Governance has added more training course dates in Birmingham, Glasgow, London and Manchester.

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

As this service has grown, it's become an endless source of material from which I've drawn upon for conference talks, training and indeed many of my blog posts. And this is precisely why I'm writing this piece - to talk about how I'm assisting the UK and Australian governments with access to data about their own domains. Over recent times, I've had a bunch of opportunities to talk to folks in various government roles. For example, the UK government can query any.gov.uk

Top cyber security courses for 2018

IT Governance

Find out how to pick the best training course and qualification to advance your cyber security career. Training courses are generally tailored to specific careers, so the first thing you need to decide is what aspect of cyber security interests you most. Cyber Security Training

ISO 27001 Lead Implementer, Lead Auditor and Internal Auditor – what’s the difference?

IT Governance

Anyone interested in getting into or advancing their career in cyber security probably knows that they will need training and qualifications. Interested in other ISO 27001 training courses? appeared first on IT Governance Blog.

How to start your career in cyber security

IT Governance

Meeting people and making connections is a great way to get your foot in the door. Networking websites such as LinkedIn can be helpful, but we’d suggest face-to-face meetings wherever possible. Cyber Security ISO 27001 ISO 27001 training

Tips 79

GDPR: How the definition of personal data has changed

IT Governance

Let’s start with the circumstances under which the processing of personal data must meet the GDPR’s requirements. Speak to a member of our team to find out more >> The post GDPR: How the definition of personal data has changed appeared first on IT Governance Blog.

How the CCPA and GDPR Are Different

MediaPro

Both the GPDR and the CCPA reference privacy training. The CCPA affects any for-profit entity doing business in California meeting any one of three requirements: A gross revenue greater than $25 million. Publicly available government records.

GDPR 52

5 reasons you should get CISSP qualified in 2019

IT Governance

It was the first credential in the field of information security to meet the requirements of ISO 17024, which describes best practice for certifying individuals. Those who think they’re ready should take a look at our CISSP Accelerated Training Programme. Training CISSP

How to start your career in cyber security

IT Governance

Meeting people and making connections is sometimes essential for getting your foot in the door. Networking websites such as LinkedIn can also be helpful, but face-to-face meetings are much more effective. There has never been a better time to get into cyber security.

How to become an ISO 27001 lead implementer

IT Governance

You will be tasked with overseeing an ISO 27001 project, managing personnel and making sure you meet the Standard’s requirements along the way. IT Governance’s ISO27001 Certified ISMS Lead Implementer training course costs £1,795, and includes three days of training followed by the exam.

Data governance: The secret ingredient for getting the most from data-centric initiatives

CGI

Data governance: The secret ingredient for getting the most from data-centric initiatives. Government and commercial organizations are becoming much more interested in leveraging their data, establishing data labs and standing up self-service environments. In the federal government, agencies are working toward meeting the President's Management Agenda (PMA) objectives in treating data as an asset. As the organization scales up, it has to add a layer of governance.

Data breaches: the financial cost of poor planning

IT Governance

Achieving ISO 27001 certification can also help you to meet the requirements of the GDPR – in particular, the accountability principle – and demonstrate your commitment to information security to existing and potential customers. Training to suit your needs.

The GDPR has arrived – are you compliant?

IT Governance

Join Alan Calder, founder and executive chairman of IT Governance, as he talks you through the first steps towards becoming GDPR-compliant. These include ensuring that the board understands the potential risks of non-compliance, ensuring that all areas of the business are involved in the project, reviewing documentation and training staff. Our interactive e-learning course introduces employees to the GDPR, and highlights the key compliance obligations that organisations must meet.

GDPR 50

BCS Data Protection Courses Available for 2019!

Managing Your Information

Tkm is now an accredited training partner for the BCS and has added their data protection professional certifications to our training portfolio. BCS provides a wide portfolio of professional certification that meets these needs, enhancing skills and encouraging career progression.

Why ISO 27005 risk management is the key to achieving ISO 27001 certification

IT Governance

ISO 27005 provides a detailed but flexible structure to meet its requirements, comprising five stages. Our ISO 27005 Certified ISMS Risk Management training course is the ideal starting point for anyone who wants to know more about how to deal with information security threats. The post Why ISO 27005 risk management is the key to achieving ISO 27001 certification appeared first on IT Governance Blog. Risk Management Training ISO27005 ISO27701

Risk 50

6 keys to enabling holistic agile transformation in the federal government

CGI

6 keys to enabling holistic agile transformation in the federal government. Federal policy direction, rapid technology advances, and the increasing cost of legacy maintenance are driving the need to modernize outdated government systems and develop innovative technology approaches faster than ever before. Yet, despite the inclusion of agile in government recommendations and regulations, many agencies (like many commercial companies) have struggled with successful implementation.

Tools 40

The Three Key Indicators of IG Maturity for Healthcare Compliance

InfoGoTo

Information governance (IG) is essential to secure data management and ensuring healthcare compliance. Without IG, managing information throughout its lifecycle and using that information to support the healthcare organization’s strategy and operations — as well as meeting regulatory, risk and environmental requirements — is not possible. have processes in place to govern policies meant to protect the integrity of information.

AI Evolution: The Next Inflection Point in Legal Technology

InfoGoTo

Predictive coding was based on mathematical algorithms that could learn from examples and training cycles. With computer training cycles, the error rate was 2 or 3% — much lower than human-reviewed documents.

The Relevance of agile enterprise Architecture to devops

erwin

Replaces projects with release trains that minimize batch-waiting time to reduce lead times and waste. You can see the high-level relationship between the strategy and goals of an organization and the projects that deliver the change to meet these goals. How do organizations innovate?