RISKY BUSINESS MANAGING YOUR INFORMATION RISK

MANAGING YOUR INFORMATION RISK

RISKY BUSINESS

logo lockcode.png

What is Risk Management?

According to the UK's National Cyber Security Centre (NCSC), part of GCHQ, the purpose of risk management is not to chase the unattainable goal of perfectly secure systems and a risk-free business; it is to make sure that you have thought about what can go wrong, and that this thinking has influenced your organisation's decisions.

In this course we examine the fundamentals of Risk Management, develop an understanding of the outcomes of GDPR and consider the privacy and security concerns for drones in the UK. 

Course Content

9

Activities

9

Downloadables

6

Months' Access

2

Quick Quizzes

Certificate of Completion

INTRODUCTION TO

RISK MANAGEMENT

RISK MANAGEMENT

10 STEPS TO CYBER

Activity 1

10 STEPS

DEEPER DIVE

Activity 2

RISK MANAGEMENT

Quiz

RISK MANAGEMENT

METHODS & FRAMEWORKS

10-minute

Further Reading Activity

FUNDAMENTALS OF RISK MANAGEMENT

10-minute

Further Reading Activity

RISK MANAGEMENT PRINCIPLES FOR CYBER SECURITY

10-minute

Further Reading Activity

GENERAL DATA PROTECTION REGULATION

(GDPR)

GDPR FOR MICROS AND SMALL BUSINESSES

Activity 3

ICO ENFORCEMENT ACTION

Activity 4

GDPR SECURITY OUTCOMES

10-minute

Further Reading Activity

GDPR SECURITY OUTCOMES

Quiz

CONSULTATION ON THE SAFE USE OF DRONES

Activity 5

CONGRATULATIONS

course survey and next steps...

Screenshot 2019-07-18 at 15.29.49.png

Download the official GCHQ Certified Training  brochure

GCHQ Certified Training

Individuals undertaking a GCHQ-approved cyber security training course can be confident that they’re in expert hands.

Screenshot 2019-07-18 at 16.13.31.png

How we achieved Accreditation 

GCHQ Certified Training (GCT) helps individuals and companies identify high quality cyber security training

MANAGING YOUR INFORMATION RISK

RISKY BUSINESS

logo lockcode.png

SKILLS & COMPETENCIES

GCHQ Certified Training courses are currently assessed against the Institute of Information Security Professionals (IISP) Skills Framework.

Information Security Management:

  • Governance

  • Information Security Awareness and Training

  • Legal and Regulatory Environment

 

Information Risk Management:

  • Risk Assessment

  • Risk Management

Risky Business: Managing Your Information Risk GCHQ Certified Training (GCT) Skills:

Individuals undertaking a GCHQ-approved cyber security training course can be confident that they’re in expert hands.

The Framework describes the range of competencies expected of Information Security and Information Assurance Professionals in the effective performance of their roles.

It was developed through collaboration between both private and public sector organisations and world-renowned academics and security leaders.

The Framework defines the skills and capability expected of security professionals in practical application and not just an assessment of their knowledge. 

Source: www.iisp.org

With the abundance of cyber security training courses on offer, it can be difficult for customers to identify highly competent trainers and good quality courses. GCT addresses this issue – providing customers with a choice of rigorously assessed training providers and thus you can feel confident you’ll receive training that is consistent with industry best practice.

GCHQ Certified Training

Introduction to Cyber Security Leadership and Governance

Skills and Scenarios

For todays leaders in technology risk, Artificial Intelligence, information and cyber security

GCHQ Certified Training

The Cyber Threat to UK Businesses

CyberCrime in 60

7 days of CyberCrime in 60-second bite-sized training with optional, daily 5-minute extras

GCHQ Certified Training

Risky Business: Managing your Information Risk

Introduction to CyberCrime

Introducing you to cybercrime, cyber-dependent crime, cyber-enabled crime and social media offences.

Contact Us Today

Copyright © Lockcode Limited 2018

Registered in England 2004

Company No. 05078345

CCS_2935_Supplier_AW_300dpi.jpg