The benefits of Live Online training

IT Governance

And thanks to the growing popularity of Live Online training, it’s easier than ever to get started. Live Online combines the advantage of classroom training and e-learning. You study remotely via an online client, but the lessons are delivered in real-time by an expert trainer. Let’s look at some of the reasons to consider Live Online training. One of the sticking points when it comes to taking a training course is the cost. Study online with IT Governance.

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. They should therefore do whatever they can to support employees who want to go on training courses.

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. They should therefore do whatever they can to support employees who want to go on training courses.

Why your DPO needs specialised training

IT Governance

Instead, they should be given specialist training to help them excel. Here are three reasons why you should invest in specialised DPO training. DPOs are naturally expected to have expert understanding of data protection law, and they should have received GDPR training.

Train your team to ensure you achieve ISO 27001 certification

IT Governance

It is therefore essential that your implementation team is appropriately trained in order to ensure the success of the project. Self-study vs training course. E-learning is more effective but in many ways just offers a digital version of the self-study option.

Why you need ITIL 4 Foundation training

IT Governance

Once you have completed both the MP and SL designation streams, you can study to become an ITIL Master. There are two options open to you, depending on how far you’ve got with your ITIL v3 study. If you are studying for ITIL v3 Foundation or are already certified, you should take ITIL 4 Foundation to be able to transition to the new certification scheme. ITIL 4 Foundation Training Course: book your place today.

New choices, new directions: Piloting the 2018 Mexican Government Web Archive

Archive-It

On July 1, 2018 Mexican voters went to the polls to decide the fate of their entire federal government: one president, 500 members of congress, and 128 senators. We were then able to attend training and got our logins and access to the platform. Case Studies

e-Records 2017 – “Information Governance: Take Control and Succeed” Conference Recap

The Texas Record

The 2017 e-Records conference delivered on all fronts hosting a variety of vendors, local government and state agency representatives and, of course, plenty of staff from the two hosting state agencies: Department of Information Resources (DIR) and Texas State Library and Archives Commission (TSLAC).

Cyber resilience: What does this mean for Scotland?

IT Governance

One of the easiest ways to achieve this is to undertake training from industry experts. . More importantly, public sector organisations must conduct staff awareness training to ensure the whole organisation is aware of their obligation towards cyber security. .

e-Records 2019: Registration Open!

The Texas Record

Registration for the 2019 e-Records Conference is now open to state agencies and local governments. Get a full day of training and networking for the early bird rate of $70 if you sign up by October 25. Once again, the Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) have joined forces to bring you another outstanding selection of speakers sharing case studies and presentations.

Infographic: 5 benefits of distance learning

IT Governance

This month, IT Governance launched its ISO27001 Certified ISMS Foundation (Distance Learning) training course. But what benefits does distance learning offer over traditional training methods, and is it the right format for you?

Top cyber security courses for 2018

IT Governance

Find out how to pick the best training course and qualification to advance your cyber security career. Training courses are generally tailored to specific careers, so the first thing you need to decide is what aspect of cyber security interests you most. Cyber Security Training

What is incident response management and why do you need it?

IT Governance

As Ponemon Institute’s 2019 Cost of a Data Breach Study found, the damages associated with undetected security incidents can quickly add up, with the average cost of recovery being £3.17 Testing does not simply confirm that the plan works, but also trains staff to respond as efficiently as possible. Conduct incident response training. Those with business continuity duties should also receive appropriate training. appeared first on IT Governance Blog.

Risk 50

How to start your career in cyber security

IT Governance

Study. Books and e-learning courses might be better options, as they allow you to study specific topics at your own pace. It’s the globally accepted standard of achievement among information security, information systems audit and IT governance professionals.

How to start your career in cyber security

IT Governance

We have many resources to help you learn about ISO 27001, but for a thorough introduction, you should attend our ISO27001 Certified ISMS Foundation Training Course. Cyber Security ISO 27001 ISO 27001 trainingA version of this blog was originally published on 8 December 2017.

Tips 79

How to become an ISO 27001 lead implementer

IT Governance

It is much more cost-effective to enrol on an ISO 27001 lead implementer training course that includes the exam in its programme rather than pay for the two separately.

5 reasons you should get CISSP qualified in 2019

IT Governance

Those who think they’re ready should take a look at our CISSP Accelerated Training Programme. This training course prepares you for the CISSP exam intensively and comprehensively. The post 5 reasons you should get CISSP qualified in 2019 appeared first on IT Governance Blog.

GDPR: What’s the difference between personal data and sensitive data?

IT Governance

Nuances like this are common throughout the GDPR, and any organisation that hasn’t taken the time to study its compliance requirements thoroughly is liable to be tripped up. Avoid a regulatory fine with GDPR training . appeared first on IT Governance Blog.

GDPR 56

e-Records Conference 2018: Call for Presentations

The Texas Record

This event promotes improved electronic records management in Texas government by bringing together staff responsible for and interested in records management and information technology. News Training DIR electronic records erecords 2018 Local Governments State Agencies TSLAC

Introducing ISO 27001 distance learning

IT Governance

IT Governance is excited to announce the launch of its ISO27001 Certified ISMS Foundation (Distance Learning) training course. If you have a busy schedule and cannot commit to a whole day’s uninterrupted training, this is the solution for you.

Study 58

Data breaches: the financial cost of poor planning

IT Governance

Ponemon Institute’s 2018 Cost of a Data Breach Study considers the financial impact associated with a breach. One of the study’s key findings is that loss of customer trust has serious financial consequences. Training to suit your needs.

e-Records Conference 2018: Registration Open!

The Texas Record

Registration is open to state agency and local government staff for the 2018 e-Records Conference. From data management initiatives to information governance, here is an opportunity to share hear about best practices, challenges and lessons learned. Once again, the Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) have joined forces to bring you another outstanding selection of speakers sharing case studies and presentations.

The anatomy of effective information security management

IT Governance

When contacted by aspiring information security managers about developing their job prospects, we always recommend that they consider studying for the BCS Foundation Certificate in Information Security Management Principles (CISMP).

The 8 CISSP domains explained

IT Governance

It covers: The confidentiality, integrity and availability of information; Security governance principles; Compliance requirements; Legal and regulatory issues relating to information security; IT policies and procedures; and. CISSP training and revision materials. Anyone preparing for that exam should read the official CISSP study guide. Those who are really serious about studying should also enrol on our CISSP Accelerated Training Programme. Training CISSP

Is distance learning right for you?

IT Governance

You might find that some of the benefits of online study make it more appealing than travelling to a classroom-based course. Distance learners can study at their own pace, in their own time and from the comfort of their own home and office.

e-Records 2018: Tackle Tough E-Records Challenges

The Texas Record

We more than met expectations this year with over 350 people in attendance representing about 60 state agencies, 61 local government entities, and 22 vendors. News Conferences eRecords erecords 2018 Local Governments State Agencies Training

Most sought-after certifications for 2018

IT Governance

There is a massive skills shortage in key areas such as IT security, governance and compliance in 2018. This shortfall appears to be exacerbated by changes in government policies and other regulatory pressures and the rise in data breaches.

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

The Texas Record

Case studies: e-Records and e-Government–solutions, best practices, process improvement and lessons learned from projects with other internal or external experts including IRMs, RMOs, vendors, etc. Co-presenters, for example, may be state or local government staff and vendors who collaborated on relevant projects. News Training DIR electronic records erecords 2018 Local Governments State Agencies TSLAC

USGS Malware Infection Linked to Employee’s Porn Habit

Adam Levin

In a study released by the U.S. Department of the Interior, the department’s security audit of “suspicious internet traffic” at a USGS facility in South Dakota was traced back to an unnamed employee with “an extensive history of visiting adult pornography websites” on a government-issued laptop, many of which were routed through Russia and contained malware. Data Security Government Cybersecurity featured russia USGSA network-wide infection of Russian malware at the U.S.

e-Records Conference: Price Increase on October 26!

The Texas Record

Once again, the Texas State Library and Archives Commission (TSLAC) and the Texas Department of Information Resources (DIR) have joined forces to bring you another outstanding selection of speakers sharing case studies and presentations. Information Governance – Managing content, data and electronic records. News Training DIR eRecords erecords 2018 Local Governments State Agencies TSLACReminder to register now and save $25 on your registration fee!

Demo 40

Web archiving and public knowledge: Collaborating with Vancouver Island Archive-It partners

Archive-It

By expanding our duties as Collections Librarians to create “seed collections,” and by partnering with and training colleagues in local communities to do this work as well, we will help provide the research collections of the future. Case Studies Collaborative Collecting

Webinar: Simple Ways to Turn Your Records Liaisons Into Records Ambassadors

The Texas Record

So, we are pleased to announce that Holly will be giving this presentation via webinar training on October 18th at 2pm. This case study shows how the launch, and eventual revamping, of this program has impacted records management across Denton County. Training Local Governments State Agencies WebinarsIn July, some staff were fortunate enough to attend the annual NAGARA Conference in Boise, ID.

“Make It Weird”: Building a collaborative public library web archive in an arts & counterculture community

Archive-It

These gaps or silences often reflect subcultures in our community, stories that were not told on the pages of the local newspaper, or which might not be reflected in the websites of city government or local institutions. Case Studies Collaborative Collecting Community Webs

Chatbots | Technologically Redefining Customer experience

Everteam

Our chatbot solution is equipped with a training ability, administrators are able to give the Bot the necessary information and follow a seamless training process. Information Governance chatbots everteam.chatbot

NCSAM 2018 Week 4: Safeguarding the Nation’s Critical Infrastructure

MediaPro

These systems and functions are so vital to the nation, that their disruption or destruction would have a debilitating effect on our national security, economy, governance, public health and safety, and morale. To help in these efforts, we put together our fourth and final toolkit for NCSAM, with a how-to guide and tip sheet, and key insights from our recent study on the cybersecurity and data privacy awareness IQ of employees in state and local government.

A Rich Content Strategy Empowered by Chatbots | everteam.chatbot

Everteam

4- Case studies. Trained and programmed to use natural language it will almost feel like you’re chatting with an actual human! Artificial Intelligence Big Data Analytics Content Services Information Governance chatbots content services

Why distance learning saves your organisation time and money

IT Governance

Losing staff for days at a time as they go on training courses is a pain. And with the opportunity to study at their own pace – and perhaps even from the workplace – you might barely notice the difference. For example: Train and gain this summer.

Your biggest cyber security threat is inside your organisation

IT Governance

Studies repeatedly show that an organisation is more likely to be breached from an employee misplacing, stealing or being tricked into handing over sensitive information than from a criminal breaking into its systems. Barriers to training. Getting staff awareness training right.

FAQ: Who is the custodian of this record?

The Texas Record

Do you think there could ever be a time when you and another individual within your government or agency would be the custodians of the same record? What about the possibility of two (or more) local governments or agencies being responsible for the retention and disposition of the same record?

GUEST ESSAY: Why the next round of cyber attacks could put many SMBs out of business

The Last Watchdog

In the last year, the news media has been full of stories about vicious cyber breaches on municipal governments. From Atlanta to Baltimore to school districts in Louisiana, cyber criminals have launched a wave of ransomware attacks on governments across the country. Related: SMBs struggle to mitigate cyber attacks As city governments struggle to recover access to their data, hackers are already turning their sites on their next targets: small and medium-sized businesses (SMBs).