Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged Risk

Rss Feed Group items tagged

tech writer

Certified ISO 27005 ISMS Risk Management Training Course | IT Governance UK - 0 views

  •  
    Certified ISO27005 Risk Management (CIS RM) develops practical risk management skills; ISO/IEC 17024-certificated, practitioner-delivered, real-world insights. Learn how to conduct an information security risk assessment from start to finish with this specialist-led training course. Learn practical risk management methodologies, including ISO 27005 and other risk management techniques. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. Our Classroom / Live Online option allows you to study your way, keeping travel and costs down to a minimum. IBITGQ accredited three-day training course. Successful completion of the course and included exam leads to the ISO 27005 Certified ISMS Risk Management (CIS RM) qualification and 21 CPD/CPE points.
tech writer

Business Continuity Risk Management Pack | IT Governance UK - 0 views

  •  
    Understand the risks faced by your organization with the Business Continuity Risk Management Pack. Assessing your risk will enable you to implement business continuity measures to suit your organization's needs. The Business Continuity Risk Management Pack will enable you to develop business continuity plans tailored to your organization's risk appetite, and ensure your organization is fully prepared to recover critical business functions as quickly as possible in the event of a disruptive incident.
tech writer

Cyber Security Risk Management Training | Security Risk Assessment | Learning Tree - 0 views

  •  
    Cyber Security Risk Management Training | Security Risk Assessment | Learning Tree - Learn to protect your organization by employing a standards-based risk management process in this cyber security risk assessment & management course.
tech writer

Certified ISO 27001 Lead Implementer / ISO 27005 RM Combo Course | IT Governance UK - 0 views

  •  
    Become an ISO27001 Risk Expert: 1 purchase, 2 courses, 2 IBITGQ qualifications - Lead Implementer and ISO27005 Risk Manager Course combination. This six-day course teaches specialist consultants how to implement and maintain ISO 27001 best practices and certification. Acquire the knowledge and practical skills required to fully implement an effective ISO 27001-compliant risk management program, building on ISO 27005 best practices. Train without the travel with our instructor-led or classroom/online combination courses giving you all the benefits of classroom study without the hassle, uncertainty, and cost of travel. The classroom/online courses offer you the option to attend in person or online if circumstances change. Successful completion of the course and included exam leads to the ISO 17024-certificated ISO 27001 Certified ISMS Lead Implementer (CIS LI) and ISO 27005 ISMS Risk Management (CIS RM) qualifications and 21 CPD/CPE points.
tech writer

Governance and Internal Controls for Cutting Edge IT | IT Governance UK - 0 views

  •  
    Shows you how to manage the risks of adopting cutting-edge technology for your business in the context of COBIT 5 and related standards. To remain competitive we rely on being early adopters of new technologies - but there are inherent risks. As we implement these technologies, how do we manage the risks without hindering the progress of the business? Governance and Internal Controls for Cutting Edge IT shows you how to manage the risks of adopting cutting edge technology for your business in the context of COBIT® 5 and related standards.
tech writer

CRISC Training Course | ITGovernance | IT Governance UK - 0 views

  •  
    Learn how to identify and manage risks with this 3-day exam preparation course enabling you to pass the CRISC exam the first time. Get ahead with CRISC® (Certified in Risk and Information Systems Control®) certification, the world-renowned standard of achievement for enterprise IT risk and information systems control managers. Build your senior career in IT risk management with a four-day exam preparation course. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. This course uses the official ISACA® curriculum and includes the ISACA CRISC Review and Questions, Answers & Explanations study guides. Successful completion of the course leads to 28 CPD points.
tech writer

Supply Chain Cyber Security Risk Management | Learning Tree - 0 views

  •  
    Supply Chain Cyber Security Risk Management | Learning Tree - This course provides an introduction to fundamental cybersecurity risk management concepts and how they are applied to modern supply chains.
tech writer

In Hindsight: A compendium of Business Continuity case studies - 0 views

  •  
    Analyzes the causes and effects of poor disaster management. An essential guide for anyone working in business continuity planning or disaster recovery. Reveals the themes that contributed to major disasters from the last 30 years. Proposes measures that could have minimized the risks and consequences. Explains how you can avoid making similar mistakes, reduce risks, and enable faster recovery when things do go wrong [business continuity, BCM, disaster planning, disaster management, business continuity case study, case studies, disaster recovery]
tech writer

Cyber Security for Executive Management Instructor-Led Online Course | IT Governance UK - 0 views

  •  
    Cyber security training for executive and board-level management. Learn the risks and impacts of threats, and your legal, regulatory and contractual obligations. Train with cyber security experts to get an understanding of your legal, regulatory and contractual responsibilities in relation to cyber security. Learn about the biggest threats in cyber security today and find out how you can mitigate the risk of cyber attacks. Unique three-hour instructor-led online awareness course. Learn from anywhere with our Live Online and Self-Paced options that allow you to study your way, keeping travel and costs down to a minimum.
tech writer

In Hindsight: A compendium of Business Continuity case studies | IT Governance UK - 0 views

  •  
    Analyses the causes and effects of poor disaster management. An essential guide for anyone working in business continuity planning or disaster recovery. Reveals the themes that contributed to major disasters from the last 30 years. Proposes measures that could have minimized the risks and consequences. It explains how you can avoid making similar mistakes, reduce risks, and enable faster recovery when things do go wrong.
tech writer

Disaster Recovery and Business Continuity, Third Edition | IT Governance UK - 0 views

  •  
    Establish a disaster recovery plan and minimize the risks to your business. If you want to protect your business, you need to put in place a business continuity (BC) and disaster recovery (DR) plan to help your business survive. This book: - Explains how to establish a disaster recovery plan, helping you to minimize the risks to your business; and - Highlights the major causes of IT failure and disaster, enabling the reader to make more effective contingency plans.
tech writer

Resilient Thinking: Protecting Organisations in the 21st Century | IT Governance UK - 0 views

  •  
    Use a resilient thinking approach to ensure business continuity and protect your organization. Crisis management, disaster recovery, and business continuity are covered by a lateral resilience thinking approach. Risk analysis and crisis management - make sure your organization is prepared. Resilient Thinking will revolutionize your approach to risk analysis and crisis management. Even if the worst does happen, you will be fully equipped to handle it. Be equipped. Be prepared. Be ready with this vital guide to organizational survival.
tech writer

In Hindsight: A compendium of Business Continuity case studies | IT Governance UK - 0 views

  •  
    Analyses the causes and effects of poor disaster management. Essential guide for anyone working in business continuity planning or disaster recovery. Reveals the themes that contributed to major disasters from the last 30 years. Proposes measures that could have minimised the risks and consequences. Explains how you can avoid making similar mistakes, reduce risks and enable faster recovery when things do go wrong.
tech writer

Information Security & ISO27001 Staff Awareness E-learning course | IT Governance UK - 0 views

  •  
    Ensure your employees gain a better understanding of information security risks and ISO 27001 compliance requirements with this customisable e-learning course. Educate staff on their responsibilities and current information security threats to mitigate the risk of a breach. Comply with Clause 7.3 and control 7.2.2 of ISO 27001 by raising awareness and encouraging a culture of information security throughout your organisation. Customise the content by adding links to company documents, policies and procedures, and demonstrate compliance with Clause 7.3 and control 7.2.2. Test learner knowledge to prove compliance for auditing purposes. Fast deployment with instant access to the e-learning programme. Reinforce awareness with monthly security updates, which include the latest news and tips.
tech writer

CyberComply | IT Governance UK - 0 views

  •  
    CyberComply makes compliance with cyber security requirements and data privacy laws simple and affordable. Meet your compliance objectives quickly and affordably. Map documentation and data flows, conduct risk assessments and DPIAs (data protection impact assessments), track your compliance gaps, and record actions that are taken - all in one powerful tool. Comprises five fully integrated modules to improve efficiency and simplify compliance. Easily demonstrate GDPR compliance with advanced reports, dashboard views, and task allocation. Quickly act on data security risks by applying controls from built-in libraries. Now updated to reflect UK GDPR requirements. Deliver certainty about privacy compliance across your organization. Cloud-based solution. Single sign-on authentication tool. Available from as little as £199.95 per month. This is a subscription product that you can cancel at any time. (T&Cs apply)
tech writer

CRISC Exam Voucher | IT Governance UK - 0 views

  •  
    Buy the official ISACA CRISC (Certified in Risk and Information Systems Control) examination: Pay the fee to sit the ISACA CRISC® (Certified in Risk and Information Systems Control®) exam. This is a four-hour, multiple-choice online exam, consisting of 150 questions set by ISACA. Order confirmation - You will receive a confirmation email within 48 business hours outlining the next steps for sitting the exam. Please note that the voucher is valid for 12 months.
tech writer

ISO/IEC 27005 2018 Standard | IT Governance UK - 0 views

  •  
    ISO/IEC 27005:2018, Information technology - Security techniques - Information security risk management Standard. The ISO/IEC 27005:2018 standard supports the information security risk management processes specified in ISO/IEC 27001.
tech writer

Bitdefender GravityZone Elite - Integrated Endpoint Protection Platform | Bitdefender E... - 0 views

  •  
    Safeguards your organization from a full spectrum of sophisticated cyber threats. Integrated endpoint protection, risk management, and cyberforensics platform [gravityzone elite, elite security, endpoint protection platform, risk management, cyber forensics, cyberforensics, attack forensics]
tech writer

IT Governance - Governance, Risk Management and Compliance for Information Technology - 0 views

  •  
    The one-stop shop for cyber security and data privacy risk management solutions. 20% off site wide and an extra 20% off IT Governance training promotion
tech writer

Symantec Norton 360 Premium, 75 GB cloud backup, 1 user 10 devices, 12 MO annual licens... - 0 views

  •  
    Any unsecured connection poses a greater risk, but with Norton 360 Premium, this risk can be reduced at any time. By using the software in a targeted manner, it need not be difficult to secure all household devices and provide excellent threat protection. The most important advantages at a glance: Active threat protection in real-time. Integration of a flexible VPN. Implementation of a simple password manager. Quick setup for each area. Modern solutions on numerous devices. Excellent structures for more privacy.
1 - 20 of 266 Next › Last »
Showing 20 items per page