Master cybersecurity, information governance, legal risk management, and ISO records management controls. Protect your organization's sensitive information, ensure compliance, and mitigate risks.

Cybersecurity, Information Governance, Legal Risk Management, and Compliance with ISO Records Management Controls Course

Course Overview

This Power BI for Finance Professionals training course will highlight the potential benefits of Microsoft’s powerful tool for data analysis, visualisation, reporting, and producing dashboards.  In today’s dynamic world of rapid change and disruption, the ability to effectively analyse data and present actionable insights is vital for driving informed decision-making and maintaining a competitive advantage. Power BI empowers finance professionals to harness the power of data analysis, visualisation, and reporting to transform raw data into meaningful insights and dynamic interactive dashboards.

This training course will explore how Power BI enables finance professionals to unlock the full potential of their financial data. From financial reporting and budgeting to forecasting and trend analysis, Power BI offers a comprehensive suite of features and functionalities tailored to the unique needs of finance departments. By taking advantage of its intuitive interface, robust data modeling capabilities, and interactive visualizations, finance professionals can streamline their workflow, automate repetitive tasks, and gain deeper insights into key financial metrics and alignment of resources with strategic objectives.

Course Duration

5 Days

Who Should Attend

  • IT managers and professionals
  • Information security officers
  • Risk management professionals
  • Legal and compliance officers
  • Records management professionals
  • Auditors
  • Data protection officers
  • Any professionals responsible for information governance and cybersecurity within their organization
Course Level: Intermediate

Course Objectives

By the end of this course, participants will:

  • Understand the fundamentals of cybersecurity and the latest threat landscapes
  • Develop and implement effective information governance frameworks
  • Manage legal risks related to information security and data privacy
  • Ensure compliance with ISO records management standards and controls
  • Apply best practices in cybersecurity to protect organizational data
  • Conduct risk assessments and develop mitigation strategies
  • Design and implement policies and procedures for legal risk management
  • Understand the legal and regulatory environment affecting information governance

Course Outline:

Module 1: Cybersecurity and Information Security Management

  • Introduction to cybersecurity
  • Online threats, risks and issues
  • Business continuity, fraud and disaster management
  • ISO 27001 and its family of standards
  • Data, information and records governance
  • Establishing information governance, roles and responsibilities

Module 2: Audit, Legal, Risk and ISO Standards

  • Categorizing Physical and Electronic Risk
  • Audit, legal risks and management of compliance
  • Document and records management compliance
  • ISO 15489 Records Management review
  • Applying ISO27001 Information Security controls
  • Developing policies, procedures and standards
  • Current Threat and Trend Analysis

Module 3: Project, Implementation and Training for the New Technologies

  • Key Risk Indicator (KRI)
  • Project implementation plans and controls
  • Risk and issue management
  • Developing business continuity plan
  • Cybersecurity Incident Management
  • Cybersecurity Crisis Management

Module 4: Systems and IT Applications

  • Network Protocols and Communications
  • Network Access
  • Firewalls, application and network security
  • Role based access controls and user management
  • Encryption technologies and standards
  • Email and web security
  • Cybersecurity systems

Module 5: New Trends in Cybersecurity - Cloud, IoT and Blockchain

  • Cloud types (public, private, hybrid)
  • Blockchain technology
  • Hacking principles
  • Mathematics of hacking
  • Vulnerabilities in the systems and how they are traced
Customized Training

This training can be tailored to your institution needs and delivered at a location of your choice upon request.

Requirements

Participants need to be proficient in English.

Training Fee

The fee covers tuition, training materials, refreshments, lunch, and study visits. Participants are responsible for their own travel, visa, insurance, and personal expenses.

Certification

A certificate from Ideal Sense & Workplace Solutions is awarded upon successful completion.

Accommodation

Accommodation can be arranged upon request. Contact via email for reservations.

Payment

Payment should be made before the training starts, with proof of payment sent to outreach@idealsense.org.
For further inquiries, please contact us on details below:

Email: outreach@idealsense.org
Mobile: +254759708394

Register for the Course

Classroom Training Schedules


Sorry, no scheduled dates available. Contact us for a custom date.

Online Training Schedules


Sorry, no scheduled dates available. Contact us for a custom date.

For customized training dates or further enquiries, kindly contact us on +254759708394 or email us at outreach@idealsense.org.

Related Courses


Learners' Benefits

See What Our Learners Get

World Class Learning
Ideal Workplace Solutions

Subscribe to the Ideal Workplace Solutions Guide!

Get updates on the latest posts and more from Ideal Workplace Solutions straight to your inbox.