Duration 5 Days 30 CPD hours This course is intended for This course is designed for technology leaders, solution developers, project managers, organizational decision makers, and other individuals seeking to demonstrate a vendor-neutral, cross-industry understanding of ethics in emerging data-driven technologies, such as AI, robotics, IoT, and data science. This course is also designed for professionals who want to pursue the CertNexus Certification Exam CET-110: Certified Ethical Emerging Technologies. Overview In this course, you will incorporate ethics into data-driven technologies such as AI, IoT, and data science. You will: Describe general concepts, theories, and challenges related to ethics and emerging technologies. Identify ethical risks. Practice ethical reasoning. Identify and mitigate safety and security risks. Identify and mitigate privacy risks. Identify and mitigate fairness and bias risks. Identify and mitigate transparency and explainability risks. Identify and mitigate accountability risks. Build an ethical organization. Develop ethical systems in technology-focused organizations. Mutually reinforcing innovations in computing and engineering are catapulting advances in technological production. From blockchain and artificial intelligence (AI) to gene editing and the Internet of Things (IoT), these advances come with tremendous opportunities for improvement in productivity, efficiency, and human well-being. But as scandals increasingly demonstrate, these advances also introduce new and serious risks of conflict and harm.Technology professionals now face growing demands to identify and mitigate ethical risks to human rights and the environment, as well as to navigate ethical tradeoffs between qualities such as privacy and accuracy, fairness and utility, and safety and accountability. This course provides the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. It distills ethical theory, public regulations, and industry best practices into concrete skills and guidelines needed for the responsible development of digital products and services. By following the course's practical, problems-based approach, learners will become adept at applying theories, principles, frameworks, and techniques in their own roles and organizations. Introduction to Ethics of Emerging Technologies Topic A: What?s at Stake Topic B: Ethics and Why It Matters Topic C: Ethical Decision-Making in Practice Topic D: Causes of Ethical Failures Identifying Ethical Risks Topic A: Ethical Reasons Topic B: Stumbling Blocks for Ethical Reasoning Topic C: Identify Ethical Risks in Product Development Topic D: Tools for Identifying Ethical Risks Topic E: Use Regulations, Standards, and Human Rights to Identify Ethical Risks Ethical Reasoning in Practice Topic A: Ethical Theories Topic B: Use Ethical Decision-Making Frameworks Topic C: Select Options for Action Topic D: Avoid Problems in Ethical Decision-Making Identifying and Mitigating Security Risks Topic A: What Is Security? Topic B: Identify Security Risks Topic C: Security Tradeoffs Topic D: Mitigate Security Risks Identifying and Mitigating Privacy Risks Topic A: What Is Privacy? Topic B: Identify Privacy Risks Topic C: Privacy Tradeoffs Topic D: Mitigate Privacy Risks Identifying and Mitigating Fairness and Bias Risks Topic A: What Are Fairness and Bias? Topic B: Identify Bias Risks Topic C: Fairness Tradeoffs Topic D: Mitigate Bias Risks Identifying and Mitigating Transparency and Explainability Risks Topic A: What Are Transparency and Explainability? Topic B: Identify Transparency and Explainability Risks Topic C: Transparency and Explainability Tradeoffs Topic D: Mitigate Transparency and Explainability Risks Identifying and Mitigating Accountability Risks Topic A: What Is Accountability? Topic B: Identify Accountability Risks Topic C: Accountability Tradeoffs Topic D: Mitigate Accountability Risks Building an Ethical Organization Topic A: What Are Ethical Organizations? Topic B: Organizational Purpose Topic C: Ethics Awareness Topic D: Develop Professional Ethics within Organizations Developing Ethical Systems in Technology-Focused Organizations Topic A: Policy and Compliance Topic B: Metrics and Monitoring Topic C: Communication and Stakeholder Engagement Topic D: Ethical Leadership
Duration 3 Days 18 CPD hours This course is intended for Project Team Members Consultants Overview This course will prepare you to: Configure selected application areas of Compliance Management, Customs Management and Risk Management. This course covers selected application areas of Compliance Management, Customs Management and Risk Management. Course Outline Communication between SAP ERP and SAP Global Trade Services Basic mapping settings Definition and activation of legal regulations Configuration of legal control Configuration of customs processing Configuration of preference determination and vendor declaration management Additional course details: Nexus Humans GTS200 Configuring SAP Global Trade Services training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GTS200 Configuring SAP Global Trade Services course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. Introduction to privacy program management Privacy program management responsibilities Accountability in privacy program management Privacy governance Considerations for developing and implementing a privacy program Position of the privacy function within an organization Role of the DPO Program scope and charter Privacy strategy Support and ongoing involvement of key functions and privacy frameworks Applicable laws and regulations The regulatory environment Common elements across jurisdictions Strategies for aligning compliance with organizational strategy Data assessments Practical processes for creating and using data inventories/maps Generating and applying gap analyses Privacy assessments Privacy impact assessments/data protection impact assessments Vendor assessments Policies Common types of privacy-related policies Policy components Strategies for implementation Data subject rights Operational considerations for communicating and ensuring data subject rights Privacy notice Choice and consent Access and rectification Data portability Erasure Training and awareness Developing privacy training and awareness programs Implementing privacy training and awareness programs Protecting personal information Holistic approach to protecting personal information Privacy by design Data breach incident plans Planning for a data security incident or breach Responding to a data security incident or breach Monitoring and auditing program performance Common practices for monitoring privacy program performance Measuring, analyzing and auditing privacy programs Additional course details: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study
Financial reporting best practices involve adherence to accounting principles, regulatory requirements, and industry standards. CFOs should stay informed about evolving accounting standards and regulatory changes. Regularly review updates from regulatory bodies such as the Financial Reporting Council (FRC) and International Financial Reporting Standards (IFRS) to ensure compliance. Engage with industry associations and professional networks to stay abreast of best practices and emerging trends in financial reporting. By actively staying informed, CFOs can adapt their processes and policies to meet changing requirements. Regulatory compliance is a key aspect of financial reporting. How do CFOs navigate the landscape of regulatory requirements and ensure compliance within their organisations? Navigating the regulatory landscape requires a proactive and diligent approach. CFOs must develop a deep understanding of the relevant regulations, such as the Companies Act, UK GAAP, or IFRS, depending on the reporting framework. They collaborate with legal teams and auditors to interpret and apply the regulations correctly. Implementing strong internal controls, conducting regular compliance assessments, and engaging in external audits are essential steps to ensure compliance and mitigate potential risks. Compliance is an ongoing process. CFOs should establish a culture of compliance throughout the organization, emphasizing the importance of ethical practices, accuracy, and transparency in financial reporting. Training programs, internal communication, and regular compliance reviews help foster a compliance-conscious culture. By creating a framework that promotes adherence to regulations, CFOs establish a solid foundation for accurate and reliable financial reporting. https://www.fdcapital.co.uk/podcast/the-intricacies-of-financial-reporting-and-compliance-in-the-uk/ Tags Online Events Things To Do Online Online Seminars Online Business Seminars #financial #compliance #reporting #uk #intricacies
This course provides participants with a comprehensive understanding of the requirements of the CDM Regulations 2015 and how these should be implemented in practice. The Regulations are put in context with other key health and safety legislation. The programme sets out clearly the roles and responsibilities of the principal duty holders and explores with the participants how these roles may vary on different types of project and procurement routes. The programme examines the content and appropriate level of information that should be included in the Pre-Construction Information and the Construction Phase Plan. The trainer will discuss best practice in implementing CDM through the new 2015 Regulations and Guidance. This course is essential for anyone who is involved in the procurement, planning, design or implementation of construction work. The course will provide you with: An overview of construction health and safety law, liability and enforcement A detailed understanding of the 2015 CDM Regulations and the part they play with other key legislation An explanation of the roles and responsibilities of all duty holders and the requirements for the CDM documentation Clear advice on current best practice for complying with the principles of the CDM Regulations and the changes introduced by the 2015 Regulations An understanding of how risk assessment should be applied practically throughout the design and how this responsibility is then transferred to contractors 1 Introduction Why manage health and safety? The costs of accidents Construction industry statistics Why CDM? Health and safety culture in the construction industry 2 Overview of health and safety law and liabilities Criminal and civil law Liability Enforcement and prosecution Compliance - how far do we go? Statutory duties 3 Health and safety law in construction Framework of relevant legislation Health and Safety at Work etc Act 1974 Management of Health and Safety at Work Regulations 1999 Construction (Design and Management) Regulations 2015 Who is responsible for the risks created by construction work? Shared workplaces/shared responsibilities Control of contractors - importance of contract law 4 Construction (Design and Management) Regulations 2015 Scope - What is construction? Application - When do they apply? The CDM Management System Duty holders (Client, Domestic Client, Designer, Principal Designer, Principal Contractor, Contractor) Documents (HSE Notification, Pre-Construction Information, Construction Phase Health & Safety Plan, H&S File) Management process The 2015 Guidance 5 Best practice - key issues in the CDM process The client and client management arrangements Competence and resource under CDM 2015 The role of the Principal Designer in practice Design risk assessment and the role of the Designer The CDM Documents (PCI, PCI Pack, Plan and File) Construction health, safety and welfare Making CDM work in practice 6 Questions, discussion and review
This course provides participants with a comprehensive understanding of the requirements of the CDM Regulations 2015 and how these should be implemented in practice. The Regulations are put in context with other key health and safety legislation. The programme sets out clearly the roles and responsibilities of the principal duty holders and explores with the participants how these roles may vary on different types of project and procurement routes. The programme examines the content and appropriate level of information that should be included in the Pre-Construction Information and the Construction Phase Plan. The trainer will discuss best practice in implementing CDM through the new 2015 Regulations and Guidance. This course is essential for anyone who is involved in the procurement, planning, design or implementation of construction work. The course will provide you with: An overview of construction health and safety law, liability and enforcement A detailed understanding of the 2015 CDM Regulations and the part they play with other key legislation An explanation of the roles and responsibilities of all duty holders and the requirements for the CDM documentation Clear advice on current best practice for complying with the principles of the CDM Regulations and the changes introduced by the 2015 Regulations An understanding of how risk assessment should be applied practically throughout the design and how this responsibility is then transferred to contractors 1 Introduction Why manage health and safety? The costs of accidents Construction industry statistics Why CDM? Health and safety culture in the construction industry 2 Overview of health and safety law and liabilities Criminal and civil law Liability Enforcement and prosecution Compliance - how far do we go? Statutory duties 3 Health and safety law in construction Framework of relevant legislation Health and Safety at Work etc Act 1974 Management of Health and Safety at Work Regulations 1999 Construction (Design and Management) Regulations 2015 Who is responsible for the risks created by construction work? Shared workplaces/shared responsibilities Control of contractors - importance of contract law 4 Construction (Design and Management) Regulations 2015 Scope - What is construction? Application - When do they apply? The CDM Management System Duty holders (Client, Domestic Client, Designer, Principal Designer, Principal Contractor, Contractor) Documents (HSE Notification, Pre-Construction Information, Construction Phase Health & Safety Plan, H&S File) Management process The 2015 Guidance 5 Best practice - key issues in the CDM process The client and client management arrangements Competence and resource under CDM 2015 The role of the Principal Designer in practice Design risk assessment and the role of the Designer The CDM Documents (PCI, PCI Pack, Plan and File) Construction health, safety and welfare Making CDM work in practice 6 Questions, discussion and review
The learning objectives that we believe you require to be covered within the training include: A detailed understanding of the CDM 2015 Regulations and how they should work in practice An understanding of the key roles (Designer, Principal designer, contractor, principal contractor and client) under CDM 2015 What constitutes design and when you may be acting as a designer The requirements for notification Pre construction information, the construction phase plan and the H&S file An opportunity for delegates to ask questions and gain clarification on specific project requirements 1 Introduction Why manage health and safety? The costs of accidents Construction industry statistics Why CDM 2015? 2 Overview of health and safety law and liabilities Criminal and civil law Liability Enforcement and prosecution Compliance - how far do we go? Statutory duties 3 Health and safety law in construction - the current framework Framework of relevant legislationHealth and Safety at Work etc Act 1974Management of Health and Safety at Work Regulations 1999Construction (Design and Management) Regulations 2015Work at Height Regulations 2005 Who is responsible for the risks created by construction work? Shared workplaces/shared responsibilities Control of contractors - importance of contract law 4 CDM 2015 - the principles and current best practice Scope - what is construction? Application - when do the Regulations apply? The CDM management systemDutyholders (client, designer, principal designer, principal contractor, contractor)Documents (pre construction information, Notification, construction phase Plan, H&S File)Management process The 2015 HSE guidance / industry best practice Clarification of roles and responsibilities 5 Competence under CDM 2015 What is 'Competence'? The criteria to be used in construction Achieving continuous improvement 6 Part 4 Construction Health Safety and Welfare Overview of Part 4 Responsibilities Welfare arrangements 7 Risk assessment and the role of the designer Principles of risk assessment Loss prevention / hazard management What is a suitable risk assessment?Design v construction risk assessmentThe client is a designer?Whose risk is it? 8 Risk assessment exercise Understanding the principles of design risk assessment Identifying hazards under the control of clients and designers Quantifying the risk 9 Questions, discussion and review
Some 60% of injuries at work are caused by lifting heavy objects. This powerful, practical programme is designed to help stop any of your staff from becoming the next statistic. 1 Introduction and objectives 2 Overview of Health and Safety Legislation and HSE Injury Statistics Health and Safety at Work Act 1974 Management of Health and Safety at Work Regulations (MHSWR) 1992 MHSWR 1999 specific duties to risk assess Manual Handling Operations Regulations (MHOR) 1992 Breakdown of injury statistics and costs of poor manual handling 3 The musculoskeletal system explained Prevention and ill-health Ergonomics RSI The spine in detail 4 Risk assessment General principles The TILE method Employees' duties Workplace scenarios