Target Audience
Directors, Admin Managers and Non-Technical Head of Departments Programme Standards
- Maximum 6 attendees - 30 days of one to one support - Handouts - Programme director/s with at least a Masters Degree in the subject - Convenient morning timings or in-house at any time for a minimum of two bookings - Can be configured to address a number of professions and industry sectors Price
EUR248 ex VAT per participant. |
Cyber Security for non-IT Specialist Workshop
By addressing these key topics in a workshop tailored to supervisors and managers in small SMEs, participants can enhance their understanding of cybersecurity principles and practices, enabling them to play a proactive role in protecting their organization's digital assets and reputation. Topics Covered
1. Cybersecurity Awareness Training: - Overview of common cybersecurity threats and risks facing small businesses, such as phishing attacks, malware, ransomware, and social engineering. - Importance of maintaining strong passwords, recognizing suspicious emails or links, and practicing safe browsing habits. - Strategies for promoting a cybersecurity-conscious culture within the organization, including regular training sessions, awareness campaigns, and incident reporting procedures. 2. Data Protection and Privacy Compliance: - Understanding of data protection laws and regulations relevant to the SME's operations, such as the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA). - Importance of safeguarding sensitive data, including customer information, financial records, and intellectual property. - Implementation of data protection policies, procedures, and controls to ensure compliance with legal requirements and industry standards. - Roles and responsibilities of supervisors and managers in overseeing data protection efforts and responding to data breaches or incidents. 3. Risk Management and Incident Response: - Identification and assessment of cybersecurity risks specific to the SME's business environment, infrastructure, and operations. - Development of a risk management framework and incident response plan to mitigate potential threats and minimize the impact of security incidents. - Training on how to recognize and respond to cybersecurity incidents effectively, including containment, eradication, and recovery measures. - Collaboration with internal stakeholders, external partners, and regulatory authorities in managing cybersecurity risks and incidents. 4. Secure Technology Usage and Policy Enforcement: - Best practices for securely using technology and digital tools in the workplace, including email, cloud services, mobile devices, and remote access solutions. - Implementation of cybersecurity policies, guidelines, and procedures to enforce security standards and protocols across the organization. - Monitoring and enforcement of access controls, user permissions, and authentication mechanisms to prevent unauthorized access to sensitive information and systems. - Regular audits, assessments, and reviews of cybersecurity practices to identify vulnerabilities, gaps, and areas for improvement. |