How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

GDPR 71

How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

GDPR 71

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Malware Training Sets: FollowUP

Security Affairs

The popular expert Marco Ramilli provided a follow up to its Malware classification activity by adding a scripting section which would be useful for several purposes. On 2016 I was working hard to find a way to classify Malware families through artificial intelligence (machine learning).

Learn more about web archiving with Archive-It Advanced Training

Archive-It

There are lots of ongoing training opportunities for web archivists of all experience levels. You can always check out the highlights from our past trainings here in the Archive-It Help Center and register for the next upcoming webinars. Interested in boosting access to your own?

How to become a certified DPO

IT Governance

The EU GDPR (General Data Protection Regulation) requires certain organisations to appoint a DPO (data protection officer) to help them comply with the Regulation. The GDPR stipulates that DPOs should have appropriate experience and qualifications to fulfil the role.

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. Here are three reasons to consider it: Reduce the risk of data breaches. GDPR training courses.

How to Run a Threat Hunting Program

eSecurity Planet

What is threat hunting, how do you do it, and what tools and training do you need to do it right? We answer all that and more about this security tool

IT 92

How to foster a culture that values data privacy

Collibra

Similarly, Lockheed Martin indicates data protection and cybersecurity as focal points in its strategy to improve operational efficiency and gain competitive advantage. They put data at the forefront of their strategies to get ahead of competitors. Nevertheless, nothing seems to stick.

ISO 27001 training in Birmingham

IT Governance

Achieving certification to ISO 27001 demonstrates to existing and potential customers that your organisation has defined and put in place best-practice information security processes. ISO27001 Certified ISMS Foundation Training Course.

GDPR 71

How to Foster Collaboration in your Workplace

AIIM

An overabundance of motivation can lead to stress, fatigue, and burnout. Clearly, we need better ways to manage time. Agile environments are conducive to cooperation and collaboration. Learn more about AIIM's Training on the Emerging Technologies in Information Management].

How to detect a data breach

IT Governance

Having systems in place to help identify and contain breaches promptly should be a priority for all management teams. Organisations must also deploy modern breach detection tools, and keep as up to date as possible with the constantly evolving threat landscape. The need for speed.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. How much experience do you need? You should try to take an internship or volunteer, but we understand this isn’t always possible.

How to Keep Your WFH Employees Safe From new Cybersecurity Attacks

InfoGoTo

With many experts predicting that large work-at-home populations will be with us for the foreseeable future, there are some basic steps every organization needs to take to cope with this disruption. Here’s what you need to know. ” Double Down on User Training.

NEW TECH: Circadence deploys ‘gamification’ training to shrink cybersecurity skills gap

The Last Watchdog

It’s clear that closing the cybersecurity skills gap has to happen in order to make our internet-centric world as private and secure as it ought to be. Related: The need for diversity in cybersecurity personnel One of the top innovators in the training space is Circadence ®. I had the chance at RSA 2019 to visit again with Circadence security evangelist Keenan Skelly. Give a listen to the full interview via the accompanying podcast. Everyone likes to win.

How to develop a robust cyber security policy

IT Governance

Technological defences and staff training are two of the most frequently touted measures for preventing data breaches, but their effectiveness is dependent on the way organisations implement them. How data will be backed up.

Records Management Training for Local Governments – Registration Open!

The Texas Record

We are excited to announce that we will be hosting local government classes on: March 18 – 19, 2020 May 6 – 7, 2020. Class size is limited to 24 people so register today ! Introduction to Records Management – Full Day Workshop. Learn the basic concepts of records management: legal obligations, definitions, and how to read a retention schedule. We will also cover the disposition process for how to handle records at the end of their life cycle.

How to become an ethical hacking master

IT Governance

Does the idea of being paid to hack into organisations’ systems sound appealing? The pay is good, it’s creative and you get to test your skills every day. You can implement all the defences you like, but you won’t know whether they work or not until someone tries to get past them.

How to Prepare for the Brazil Data Protection Law

InfoGoTo

With the new August 2020 effective date of the Brazil data protection law moving ever closer, organizations subject to its requirements may want to implement changes now, so they will be fully ready.

B2B 56

Uptick in RPA Software Adoption Reveals Need for Anti-Hacking Training

Security Affairs

With smart-working many companies turn to tools like robotic process automation (RPA software) to help make adjustments on the business processes … is it secure? In response to the Coronavirus pandemic, many companies have adjusted how they do business.

How to improve your cyber resilience

IT Governance

It’s not as simple as finding off-the-shelf tools to plug into your organisation. Rather, you must tailor your approach to your needs, assessing the way any one solution affects the whole. Cyber resilience is the ability to prepare for, respond to and recover from cyber attacks.

Risk 80

How to Become an Internal Influencer for Change

AIIM

Enacting change is easier when you don’t have to go at it alone. In fact, a major factor in the success of organizational change comes down to internal buy-in with your co-workers. The old adage about there being ‘strength in numbers’ holds true when it comes to change management.

Cloud 70

How to become an ISO 27001 lead implementer

IT Governance

If you have some knowledge of ISO 27001 and want to further your career, you should consider becoming an ISO 27001 lead implementer. Anyone interested in the position will need to pass the ISO27001 Certified ISMS Lead Implementer (CIS LI) exam. What you need to know.

Risk 64

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security. There is a growing demand for experts , leading to increased salaries and job opportunities. As with most industries, you’re much more likely to get ahead in cyber security if you have experience.

How to Use These 5 Absurd Stock Images in Your Privacy Awareness Program

MediaPro

The post How to Use These 5 Absurd Stock Images in Your Privacy Awareness Program appeared first on MediaPRO. Blog Foundational Privacy Awareness Thought Leadership data privacy data privacy day data privacy training privacy awareness

Records Management Training for Local Governments – Registration Open!

The Texas Record

Class size is limited to 24 people so register today! Introduction to Records Management – Full Day Workshop. Learn the basic concepts of records management: legal obligations, definitions, and how to read a retention schedule. We will also cover the disposition process for how to handle records at the end of their life cycle. To register for these classes, visit our website here: [link]. Training Local Governments

5 Topics CCPA-Compliant Privacy Awareness Training Needs to Cover

MediaPro

Employees handling the sensitive data of California residents need to know this stuff; the California Consumer Privacy Act says so. The California Consumer Privacy Act (CCPA) is set to take effect on January 1, 2020. This means your employees need training—and fast.

How to train your AI

DXC Technology

I was supposed to remember the multiplication tables all the way to 20? I don’t know about you but learning basic mathematics was a traumatic experience for me. Addition was easy — I could (literally) count on my fingers and toes — but multiplication was a nightmare. Just between you and me, I never really […]. Australia and New Zealand artificial intelligence

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

In several recent posts, I’ve talked about professional development options for information management professionals and provided guidance on how to determine whether a particular course or certification is a good fit. When Did AIIM Start Offering Training? Introduction to ECM.

ECM 62

How to make sure your cyber insurance policy pays out

IT Governance

With the ever-present danger of data breaches and cyber attacks, organisations must be sure that they have the financial backing to respond appropriately. Most policies include provisions requiring organisations to follow certain information security best practices.

How to Pick the Right Cybersecurity Vendor for Your Business

Adam Levin

Businesses across the country have had to adjust to their employees working from home. For many it was a last-minute scramble to adjust to what has become “the new normal” in the face of the coronavirus pandemic.

Secure Together: cyber attacks against hospitals and how to protect your home Wi-Fi

IT Governance

As we enter the third week of the UK’s lockdown (yes, it has only been that long), things are starting to take their toll. As a reminder of that, we’re back with more of our experiences and advice on how to manage through the pandemic.

How To Protect Yourself From Hackers

Cyber Info Veritas

Would you like to know how to protect yourself from the ever-present threat of cybercrime perpetrated by black hat hackers? Their main aim is to exploit your “mistakes and vulnerabilities” to blackmail you into sending them money or they’ll leak your private data.

9 Topics to Cover in Your Privacy Awareness Training Program

MediaPro

That’s why it’s important to implement a privacy awareness training program so all your employees can actively protect sensitive data. A privacy awareness program needs to cover the basics. How to label data. How to organize data.

Why your DPO needs specialised training

IT Governance

The broad range of skills required to succeed as a DPO (data protection officer) makes it a tough position to fill. We therefore wouldn’t expect an organisation to simply tell its newly appointed DPO to get straight to work.

Black Hat Europe London: Learn How to Unearth Critical Vulnerabilities

Dark Reading

Black Hat's lineup of Arsenal tools, Briefings, and in-depth Trainings will equip you with the skills you need to protect today's modern devices and operating systems

78

Information security and compliance training for the healthcare sector

IT Governance

Healthcare is one of the hardest-hit industries when it comes to data breaches. Healthcare providers (HCPs) and industry partners process significant amounts of data which that is both attractive and valuable to cyber criminals. This is not exclusive to doctors and nurses.

Don't Make Security Training a 'One-and-Done'

Dark Reading

How to move beyond one-off campaigns and build a true security awareness program

How to write a business continuity plan: the easy way

IT Governance

The threat of disruption looms over organisations more ominously than ever, thanks to the increasing infiltration of technology in business processes, consumer expectations and the rapid rise in cyber crime. In this blog, we explain how a BCP works, what it covers and how to create one.

How to implement an ISMS

IT Governance

ISO 27001 describes best practice for an ISMS, and certifying to the Standard means you can be sure that your organisation’s security measures are as effective as possible. Scoping requires you to decide which information assets to ring-fence and protect.

Risk 62

How to Ensure Your Digital Security During the Rugby World Cup

Thales eSecurity

Now that it’s September, the excitement is beginning to build in earnest for the 2019 Rugby World Cup. Sports fans aren’t the only ones who are looking forward to this event. We urge you to take precautions to protect your personal information when you are on the Internet.

IoT 108