Change Location × Gibraltar, Gibraltar

    Recent Locations

      SEQUREST - General Data Protection Regulation - Policy and Planning in Gibraltar


      • SEQUREST - General Data Protection Regulation - Policy and Planning Photo #1
      1 of 1
      February 26, 2018

      Monday   9:30 AM

      3 Europa Road
      Gibraltar, Gibraltar

      Performers:
      • No Performers Listed
      EVENT DETAILS
      SEQUREST - General Data Protection Regulation - Policy and Planning

      TRAINING COURSE IN GDPR PLANNING Sequrest is pleased to announce that it can now offer Cyber Security training courses, in London, overseas and on the internet. The first of these, to be run in Gibraltar on 27 February 2018, is ‘How to Write an Information Security Policy (GDPR covered)’.  The training is carried out in conjunction with our Training Supplier, techUK. techUK is a trade association of over 950 companies, ranging from FTSE 100 companies to SMEs. The main emphasis of its activities is in Cyber Security. techUK has access to the top experts and lecturers in the various specialist areas within Cyber Security. The course is identical to that carried out regularly at techUK, London, with the advantage of savings in travel and subsistence costs for Gibraltar clients. This full day course (09:30 – 16:15) will be held in at the Rock Hotel Gibraltar. It is designed to give a practical introduction about the importance of having an information security policy and to provide clear guidelines on how to develop and to document a well-thought through and effective policy that ensures information security, is aligned with the business strategy, reduces the impact of identified and diverse risks, manages resources and infrastructure effectively and efficiently and delivers value for the security investment made.  What is the course about? With the adoption of the GDPR (General Data Protection Regulation) in May 2016, we are almost half way through the two-year journey towards its application in all member states, including the UK on May 25th, 2018. The GDPR will replace the Data Protection Directive 95/46/EC and therefore the Data Protection Act 1998 in the UK. Brexit will not change this, as even the earliest possible Brexit would mean several months of compliance requirement while still part of the EU and independent of that, businesses are trading with the EU and are holding data that fall within the scope of the Directive and will therefore have to comply. In order to be compliant with national and international information and data protection laws and regulations, organisations need to introduce appropriate and effective cyber security and data protection controls. The Information Security Policy forms the basis of these controls. A well thought through information security policy will also address the human factor and take the organisation’s specificities into consideration. We are all aware that no matter how strong or advanced security applications or technical controls are, protecting the company’s data assets will heavily depend on the people within the organisation. People unfortunately are the weakest link in any information security and privacy programme albeit rarely intentionally. The Board and the executive team are ultimately responsible for security breaches, no matter if they occur due to an employee’s misconduct, plain negligence or for the simple reason that employees are not aware of threat and how to protect against them. A comprehensive Information Security Policy therefore covers a range of topics, from identifying data assets, defining security objectives to establishing and enforcing formal, written policies and guidelines which govern employees’ behaviour. This full day course is designed to give a practical introduction about the importance of having an information security policy and to provide clear guidelines on how to develop and to document a well-thought through and effective policy that ensures information security, is aligned with the business strategy, reduces the impact of identified and diverse risks, manages resources and infrastructure effectively and efficiently and delivers value for the security investment made.   Who should attend this course? Board members, C-suite executives and everyone responsible for the protection of the organisation’s data and assets (CEO, COO, CFO CTO, CISO, CSO, and Directors of IT, Data Protection, Compliance Officer and Information security personal).   What is the course outcome? At the end of the course attendees will: Understand the central role of the Information Security Policy in securing business assets and delivering value to the business Have practical knowledge of the different types of information security policies and their core components Develop, implement, and maintain various types of information security policies What is the agenda? 09.30am: Registration at course venue reception 10.00am: Introduction to the course and getting to know each other 10.20am: What is an information security policy and why it is important. 11.20am: Coffee break 11.45pm: When and How to write an information security policy: part 1 12.40pm: Lunch break 13.45pm: How to write and develop an information security policy: part 2 15.05pm: Tea break 15.30pm: Implementing and maintaining an information security policy 16.15pm: Course summary and thank you Who is the Course Leader? The course will be delivered by Shadi A. Razak, Partner and Head of Cyber Security and Compliance at CyNation. Shadi is a cyber security and business digitalisation expert, with a strong foundation in business and IT strategy. His expertise in information security management, security governance and compliance, cloud security and business digitalisation has made him a sought-after advisor to and coach for a number of international blue chip companies, government organisations, and SME’s in the UK, and the MENA region for the past 15 years. He has been a visiting lecturer at a number of international and British universities and is currently a Board Member and President of the Information Security Group (ISG) Alumni, Technology and Finance Society and a mentor for a number of FinTech and SecurityTech start-ups in London.

      Categories: Business & Networking

      Event details may change at any time, always check with the event organizer when planning to attend this event or purchase tickets.
      COMMENTS ABOUT SEQUREST - General Data Protection Regulation - Policy and Planning
      MORE EVENTS