Archives: Courses

News and information from the Advent IM team.

Preparing for IAO

  • by Ellie Hurst

Having a robust programme of Information Asset Ownership, enabled by capable and competent IAOs brings huge benefits. It facilitates and ensures compliance with legislative requirements such as the Data Protection Act 2018. Also, through a thorough understanding of what assets you have, why you have them and who needs access to them, it can ensure […]

Read More

Data Protection/ UK GDPR Training

  • by Ellie Hurst

A half-day course for those looking to raise their awareness of Data Protection, the Data Protection Act 2018 and UK GDPR. Available for Police, Private and Public Sector. Training is carried out onsite – minimum of 4 delegates, maximum 12. Full details with booking confirmation and delegate pack. What is Data Protection/ UK GDPR How […]

Read More

NIS Directive Training

  • by Ellie Hurst

The NIS Directive has been incorporated into UK Legislation as the Network and Information Systems (NIS) Regulations 2018, and affects UK operators in a range of sectors including transport, water, energy, transport, health and digital infrastructure. The NIS Regulations also establish a number of Competent Authorities that will provide appropriate oversight and an enforcement regime […]

Read More

Senior Information Risk Owner (SIRO)

  • by Ellie Hurst

  Our 1-day course is designed for Senior Information Risk Owners in both the public and private sectors who need a more developed understanding of their responsibilities as SIRO. You can join our SIRO courses on one of our open dates, or we can deliver a group course at a date to suit you.   […]

Read More

Police Senior Information Risk Owner (SIRO)

  • by Ellie Hurst

  This 1-day course is designed for Senior Information Risk Owners within UK Police Forces who need a more developed understanding of their responsibilities. The course looks at the following key areas: The current threat landscape to UK and Police information and ICT systems The principles of information assurance and information risk management and the […]

Read More