IT Governance & Security – How to Apply Cyber Security Best Practice
The venue of this course will be confirmed upon booking.
With the use of the Internet and associated technologies growing rapidly in recent years, so has the opportunity for computer related crime. Websites, social networks, e-mail, mobile computing and file sharing networks can all provide excellent business opportunities, but if unmanaged can prove harmful to the organisation’s operation and reputation.
Threats ranging from staff using Facebook or Twitter to malicious attacks by hackers has the potential to disrupt critical business systems or open up access to your confidential data.
This course considers computer related fraud and risk in business, and reviews the practical steps that can be taken to reduce these risks at the earliest possible stage. By attending this course you will be able to interpret and apply cyber security best practice within your firm.
What You Will Learn
The course will cover the following:
- Developments in computer fraud – cybercrime
- Key IT risks – internal and external (phishing scams, hacking, loss of data)
- Wireless technology – are there risks?
- Concerns in the cloud
- Creating a secure culture – the 10 Steps
- ISO27001 and cyber essentials