Course Category: Information Security

News and information from the Advent IM team.

Preparing for IAO

  • by Ellie Hurst

Having a robust programme of Information Asset Ownership, enabled by capable and competent IAOs brings huge benefits. It facilitates and ensures compliance with legislative requirements such as the Data Protection Act 2018. Also, through a thorough understanding of what assets you have, why you have them and who needs access to them, it can ensure […]

Read More

NIS Directive Training

  • by Ellie Hurst

The NIS Directive has been incorporated into UK Legislation as the Network and Information Systems (NIS) Regulations 2018, and affects UK operators in a range of sectors including transport, water, energy, transport, health and digital infrastructure. The NIS Regulations also establish a number of Competent Authorities that will provide appropriate oversight and an enforcement regime […]

Read More

Senior Information Risk Owner (SIRO)

  • by Ellie Hurst

Our one 1-day course is designed for Senior Information Risk Owners in both the public and private sectors who need a more developed understanding of their responsibilities as SIRO. You can join our SIRO courses on one of our open dates, or we can deliver a group course at a date to suit you.   […]

Read More

Police Data Protection/GDPR Training

  • by Ellie Hurst

Maximum 10 virtual delegates via Zoom or Teams, Maximum 12 delegates for Onsite Training.   Data Protection is high on the agenda of all Police Forces, with employees at all levels offering the first line of defence against failure and a subsequent breach. Ensuring staff and management understand Data Protection whilst being able to carry […]

Read More

Police Senior Information Risk Owner (SIRO)

  • by Ellie Hurst

  This 1 day course is designed for SIROs within UK Police Forces who need a more developed understanding of their responsibilities. The course looks at the following key areas: The current threat landscape to UK and Police information and ICT systems The principles of information assurance and information risk management and the importance of […]

Read More