How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

How to implement a GDPR staff awareness training programme

IT Governance

When organisations look to initiate a GDPR compliance programme, the ‘people’ factor is often overlooked. To help you get started with your GDPR staff awareness training, we’ve highlighted our top seven tips for ensuring your programme is a success. .

Malware Training Sets: FollowUP

Security Affairs

The popular expert Marco Ramilli provided a follow up to its Malware classification activity by adding a scripting section which would be useful for several purposes. On 2016 I was working hard to find a way to classify Malware families through artificial intelligence (machine learning).

How to become a certified DPO

IT Governance

The EU GDPR (General Data Protection Regulation) requires certain organisations to appoint a DPO (data protection officer) to help them comply with the Regulation. The GDPR stipulates that DPOs should have appropriate experience and qualifications to fulfil the role.

How to Prepare for the Brazil Data Protection Law

InfoGoTo

With the new August 2020 effective date of the Brazil data protection law moving ever closer, organizations subject to its requirements may want to implement changes now, so they will be fully ready.

B2B 56

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. Here are three reasons to consider it: Reduce the risk of data breaches. GDPR training courses.

How to become an ethical hacking master

IT Governance

Does the idea of being paid to hack into organisations’ systems sound appealing? The pay is good, it’s creative and you get to test your skills every day. You can implement all the defences you like, but you won’t know whether they work or not until someone tries to get past them.

ISO 27001 training in Birmingham

IT Governance

Achieving certification to ISO 27001 demonstrates to existing and potential customers that your organisation has defined and put in place best-practice information security processes. ISO27001 Certified ISMS Foundation Training Course.

How to Foster Collaboration in your Workplace

AIIM

An overabundance of motivation can lead to stress, fatigue, and burnout. Clearly, we need better ways to manage time. Agile environments are conducive to cooperation and collaboration. Learn more about AIIM's Training on the Emerging Technologies in Information Management].

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. How much experience do you need? You should try to take an internship or volunteer, but we understand this isn’t always possible.

Tips 78

How to detect a data breach

IT Governance

Having systems in place to help identify and contain breaches promptly should be a priority for all management teams. Organisations must also deploy modern breach detection tools, and keep as up to date as possible with the constantly evolving threat landscape. The need for speed.

How to train your AI

DXC Technology

I was supposed to remember the multiplication tables all the way to 20? I don’t know about you but learning basic mathematics was a traumatic experience for me. Addition was easy — I could (literally) count on my fingers and toes — but multiplication was a nightmare. Just between you and me, I never really […]. Australia and New Zealand artificial intelligence

NEW TECH: Circadence deploys ‘gamification’ training to shrink cybersecurity skills gap

The Last Watchdog

It’s clear that closing the cybersecurity skills gap has to happen in order to make our internet-centric world as private and secure as it ought to be. Related: The need for diversity in cybersecurity personnel One of the top innovators in the training space is Circadence ®. I had the chance at RSA 2019 to visit again with Circadence security evangelist Keenan Skelly. Give a listen to the full interview via the accompanying podcast. Everyone likes to win.

How to Run a Threat Hunting Program

eSecurity Planet

What is threat hunting, how do you do it, and what tools and training do you need to do it right? We answer all that and more about this security tool

How to improve your cyber resilience

IT Governance

It’s not as simple as finding off-the-shelf tools to plug into your organisation. Rather, you must tailor your approach to your needs, assessing the way any one solution affects the whole. Cyber resilience is the ability to prepare for, respond to and recover from cyber attacks.

How to make sure your cyber insurance policy pays out

IT Governance

With the ever-present danger of data breaches and cyber attacks, organisations must be sure that they have the financial backing to respond appropriately. Most policies include provisions requiring organisations to follow certain information security best practices.

9 Topics to Cover in Your Privacy Awareness Training Program

MediaPro

That’s why it’s important to implement a privacy awareness training program so all your employees can actively protect sensitive data. A privacy awareness program needs to cover the basics. How to label data. How to organize data.

How to become an ISO 27001 lead implementer

IT Governance

If you have some knowledge of ISO 27001 and want to further your career, you should consider becoming an ISO 27001 lead implementer. Anyone interested in the position will need to pass the ISO27001 Certified ISMS Lead Implementer (CIS LI) exam. What you need to know.

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security. There is a growing demand for experts , leading to increased salaries and job opportunities. As with most industries, you’re much more likely to get ahead in cyber security if you have experience.

How to Ensure Your Digital Security During the Rugby World Cup

Thales eSecurity

Now that it’s September, the excitement is beginning to build in earnest for the 2019 Rugby World Cup. Sports fans aren’t the only ones who are looking forward to this event. We urge you to take precautions to protect your personal information when you are on the Internet.

5 Topics CCPA-Compliant Privacy Awareness Training Needs to Cover

MediaPro

Employees handling the sensitive data of California residents need to know this stuff; the California Consumer Privacy Act says so. The California Consumer Privacy Act (CCPA) is set to take effect on January 1, 2020. This means your employees need training—and fast.

Why your DPO needs specialised training

IT Governance

The broad range of skills required to succeed as a DPO (data protection officer) makes it a tough position to fill. We therefore wouldn’t expect an organisation to simply tell its newly appointed DPO to get straight to work.

How to Automate Classification Without Losing Control

Everteam

This blog addresses ways to balance velocity, accuracy, and control to achieve the optimum outcome. Many people will often select rules-based classification because they feel it gives them control of how content is classified. Interested in seeing how it works?

How to Help Teams through the Cycle of Change

AIIM

It is common to take great care in the selection and implementation of new technology. If people resist change, find ways to sabotage your efforts or become angry or withdrawn, it is unlikely that even the best technology strategies will have meaningful success.

eBook 69

How To Protect Yourself From Hackers

Cyber Info Veritas

Would you like to know how to protect yourself from the ever-present threat of cybercrime perpetrated by black hat hackers? Their main aim is to exploit your “mistakes and vulnerabilities” to blackmail you into sending them money or they’ll leak your private data.

How to write a business continuity plan: the easy way

IT Governance

The threat of disruption looms over organisations more ominously than ever, thanks to the increasing infiltration of technology in business processes, consumer expectations and the rapid rise in cyber crime. In this blog, we explain how a BCP works, what it covers and how to create one.

Information security and compliance training for the healthcare sector

IT Governance

Healthcare is one of the hardest-hit industries when it comes to data breaches. Healthcare providers (HCPs) and industry partners process significant amounts of data which that is both attractive and valuable to cyber criminals. This is not exclusive to doctors and nurses.

How to implement an ISMS

IT Governance

ISO 27001 describes best practice for an ISMS, and certifying to the Standard means you can be sure that your organisation’s security measures are as effective as possible. Scoping requires you to decide which information assets to ring-fence and protect.

How to overcome 10 top EHR implementation challenges

Information Management Resources

Cost and training constraints are only the beginning of challenges healthcare organizations face in installing clinical systems. EHR costs EHR training Data privacy EHR interoperability hdm ehr lead

Are your staff GDPR trained? Find out what you need to do

IT Governance

Staff awareness training is a core component of GDPR compliance, yet many organisations haven’t implemented the necessary measures. For all the attention that organisations pay to information security, the biggest threat continues to come from employees.

Are your staff GDPR trained? Find out what you need to do

IT Governance

Staff awareness training is a core component of GDPR compliance, yet many organisations haven’t implemented the necessary measures. For all the attention that organisations pay to information security, the biggest threat continues to come from employees.

Black Hat Europe London: Learn How to Unearth Critical Vulnerabilities

Dark Reading

Black Hat's lineup of Arsenal tools, Briefings, and in-depth Trainings will equip you with the skills you need to protect today's modern devices and operating systems

Records Management Training for Local Governments – Registration Open!

The Texas Record

Class size is limited to 24 people so register today! Introduction to Records Management – Full Day Workshop. Learn the basic concepts of records management: legal obligations, definitions, and how to read a retention schedule. We will also cover the disposition process for how to handle records at the end of their life cycle. To register for these classes, visit our website here: [link]. Training Local Governments

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

and then there's a tale of how risky life was back then compared to today. You know, stuff like having to walk themselves to school without adult supervision, crazy stuff like that which we somehow seem to worry much more about today than what we did then.

How To 114

How To Solve The Cybersecurity Skills Shortage

Cyber Info Veritas

For me, this brings up the question of how to solve the cybersecurity skills shortage. This creativity works only if you are willing to put the effort into applying the solution that this problem requires. Their job isn’t to contribute to closing the skills gap of any profession.

HIPAA Compliance Changes and How to Adjust

InfoGoTo

The Health Insurance Portability and Accountability Act (HIPAA) is returning to the spotlight in 2018. According to the U.S. Department of Health and Human Services (HHS), Fresenius Medical Care North America (FMCNA) has agreed to pay $3.5 million to HHS and the Office of Civil Rights (OCR) in order to settle potential violations of the HIPAA. In addition, they have agreed to implement a wide-ranging corrective action plan.

ISO 27001 staff awareness training – meeting the requirements

IT Governance

After all, technology won’t help you if an employee leaves their password written down for anyone to see or misplaces a removable device. You need to account for each of these and make a note of the knowledge and skills that are required to stay secure. How to deliver training.