Training

Cyber Security and Data Protection

IT systems are vulnerable to data breaches - are you confident in data protection?

Thousands of IT systems are compromised every single day.

Some attacks are simply for the prestige, some for political motives, but most commonly they are used to steal money or gain commercial advantage, including by breaching secure data.

Are you confident that your cyber security governance regime minimises the risks of this happening to your business?

Often, few organisations are impermeable as they could be and leave their systems and processes vunerable to breaches. The technical level of cyber security lapses can be varied, from the simple sending of an email to the wrong person to a sophisticated cyber attack.

Whilst being completely protected from breaches is challenging to all organisations, our course is designed to offer some practical steps to improve the protection of personal data and the processes that your organisation uses.

The key is effective risk management and awareness.

Information compromise can lead to and myriad of problems… from material financial loss, loss of productivity, of intellectual property, reputational damage, recovery costs, investigation time, regulatory and legal costs. This could lead to reduced competitive advantage, lower market share, impact on profits, adverse media coverage, bankruptcy, or even, where safeguarding data is breached, loss of life.

Why join this course? 

  • Understand why protection from cyber security threats should be at the top of the priorities list for any organisation.
  • Discover how data protection links to cyber security entails and what the key responsibilities are to preventing breaches and managing risk.
  • Learn how to avoid leaving data vulnerable to threats.
  • Understand how to stay compliant with legislative expectations. 
  • Discuss tools needed to support data protection from cyber security threats, through people, technology and adequate processes.
  • Explore options specific to your organisations with thorough teaching and case studies to apply in action. 

Aims of our cyber security and data protection training: 

  • Identify the risks to your information
  • Understand how your governance framework and information risks are vulnerable to attacks across the organisation
  • How to manage cyber risks within corporate governance
  • Learn best practice when implementing security controls and supporting policies that are commensurate with the level of risk tolerated
  • Appreciate what level of security is required for data to be adequately protected
  • Understand what level of security is ‘appropriate’ to the risks presented by your processing and what’s ‘appropriate’ for your organisation
  • Understand what organisational measures  to consider adding or updating to be further protected
  • Learn how to carry out an information risk assessment and build a culture of security awareness within your organisation
  • Explore the various technical and non-technical measures you should consider
  • Develop skills to assess your physical security standards
  • Understand how to design and implement security measures, specific to your organisation and processes
  • Understand the threat and consequences to your organisation or business
  • Take steps and plan to execute an action plan to reduce your cyber and data risks
  • Understand what is best practice for an information risk management regime
  • Learn what responsibilities and actions lie with various departments, particularly at Board level.

How does our online training work?

  • Facilitated via Microsoft ‘Teams’ (2.5 hours duration with 30 additional minutes for questions).
  • Our core presentation will be issued to delegates at least 4 working days in advance.
  • We recommend that you study the course materials prior to the session, so you can highlight any areas that you may be specifically unsure of, or if you any specific issues/scenarios that you may want to discuss. Where possible these will be blended into the session.

After the session, time should be spent reflecting and consolidating training learnt into a development plan.

If you are interested in this course, please check our online training availability to the right or contact us for more information. 

Training at BLS Stay Compliant

Data Protection

Data Protection Officer

Data Protection Officer

Advanced Data Protection Officer

Advanced Data Protection Officer

Data Protection (GDPR) Overview

Data Protection (GDPR) Overview

Data Protection Impact Assessment (DPIA)

Data Protection Impact Assessment (DPIA)
Subject Access Requests

Subject Access Requests & Redaction (SAR Training)

Subject Access Requests & Redaction (SAR Training)

Subject Access Requests Workshop (Advanced)

Subject Access Requests Workshop (Advanced)
RIPA For Local Authorities

Authorisation & Oversight for Senior Officers

Authorisation & Oversight for Senior Officers

A Practical Approach for Enforcement Officers

A Practical Approach for Enforcement Officers
Caldicott Gaurdian

Caldicott Guardian Training

Caldicott Guardian Training

Advanced Caldicott Guardian

Advanced Caldicott Guardian
Senior Information Risk Owner

Senior Risk Owner Training

Senior Risk Owner Training

Advanced Senior Risk Owner Training

Advanced Senior Risk Owner Training
Additional Courses

Safer Recruitment

Safer Recruitment

Information Asset Owner

Information Asset Owner

Freedom of Information & Environmental Information Regulations

Freedom of Information & Environmental Information Regulations

Board Briefings / Senior Staff Training

Board Briefings / Senior Staff Training

Marketing, Fundraising & Data Protection

Marketing, Fundraising & Data Protection
Bespoke Training
Our In House bespoke training is designed around your needs
Online Courses
Find out when our next online courses are and book here
Contact Us
If you have any questions about our services