Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws
The session can happen ONLINE or IN PERSON. If online and you wish to receive the cacao bar via mail, material and shipment costs will be applied, otherwise I will suggest where to purchase your ceremonial cacao. Cacao is a sacred plant for the indigenous people, who call it 'The Drink of the Gods'. This is also the meaning of the scientific name given to the cacao plant Theobroma Cacao (Theo - God, broma - drink). To give the cacao spirit the opportunity to enter the person who takes it, the traditional way is to do it through a specific ceremony. It has been used for millennia by the indigenous peoples of Central America as an essential element in rituals. The Cacao Spirit was considered one of the most important deities in the Mayan cosmovision. In Mexico, the Aztecs considered it so precious that cocoa beans were regarded as coins. Ceremonial cacao is very different from the cacao found in our supermarkets. It is produced by simply cold milling cocoa beans from indigenous plants, after which the beans are lightly roasted and peeled. In this way, the cacao contains all the elements of the fruit in its entirety, including the cacao butter, which in industrial production is immediately separated. Returning to the ceremony, the intake of cacao is a sacred moment to connect with the Divine through a deep inner journey from the heart. Cacao has the property of encouraging a loving opening of the heart, allowing you to listen to the deepest parts of yourself. it is through the Heart that the connection with Heaven, Heart of Heaven, and with Earth, Heart of Earth, takes place. The heart is the seat of love in all traditional cultures, sometimes it is also the seat of some wounds that one receives in life, that is why Cacao has an effect first of all of releasing and releasing the emotions that bring the pains of life, but later it connects the individual with the true and great Heart, seat of infinite, unlimited Love. Mama Cacao also works on our Ancestors, it has the ability to release and heal the suffering that was theirs. The Cacao Ceremony leads to a very profound experience of healing, especially towards the awareness that each person's life is in any case imbued with Pure Love, from the moment of conception to the moment of the present breath. Love, also in the Mayan tradition, is the engine of all life, it is the source and source of well-being, harmony and balance of the entire Cosmos. Before attending, you will receive a full form to fill and extra info. The only medical contraindications are mixing Ceremonial Cacao with antidepressants, anti-psychotics, suffering from heart conditions, low blood pressure or serious illness.If you are on any anti-depressants, antipsychotics or any medication for mental health please get in touch with me. Ceremonial Cacao can cause serious interactions.Please arrive with an empty stomach - no food for 2/3 hours prior to the ceremony. Some light fruit is fine. Please avoid caffeine, alcohol, dairy, red meat for 24 hours before and after - they do not mix well with Cacao. Keep well hydrated by drinking plenty of water. If you smoke, please try to reduce as much as possible, especially if it is not pure tobacco due to the chemicals as cacao is a strong stimulant & detoxifier.If you want to get the very best out of the ceremony and support your integration, it is recommended to continue this diet for 48-72 hours before and after. By attending to our classes, workshops, 1 to 1 sessions and retreats you agree to our TERMS AND CONDITIONS Payment Bookings are non-refundable. Disclaimer By booking a class or workshop or retreat or 1-1 session -online or any other venues – with us, you release Giada Gaslini, Invisible Caims and any business partners working with Invisible Caims from any liability arising out of any personal injuries, emotional or physical release, death, expectations of results, theft in the venue or damages that may happen to people and objects while attending. We recommend that you consult your GP regarding the suitability of undertaking an exercise programme, if the class you are booking includes it like with yoga or similar, and following all the safety instructions required before beginning to exercise. When participating in an exercise, there is the possibility of sustaining a physical injury. If you engage in this exercise programme, you agree that you do so at your own risk, are voluntarily participating in these activities and assume all risk of injury to yourself. You acknowledge that coaching, shamanic healing and counselling are not to be used as a substitute for psychotherapy, psychoanalysis, mental health care, or other professional advice by legal, medical or other professionals. Our sessions are aimed at inner research, problem solving and personal growth, they do not replace the work of doctors and psychotherapists because they do not consider, treat or aim to solve pathologies and symptoms that are strictly medical. All contracts subject to and governed by the law according to my current insurance. Added element of the disclaimer If the class happens in any venue and you are causing any damage to the property, you are taking responsibility of your actions. It is down to the individual to take personal responsibility when participating in physical activity and when entering a space that is used and shared by other parties. Invisible Caims does not take any responsibility about possible risks that may arise but can only advise and enforce guidelines and legal requirements as defined by the Scottish Government and local authorities.
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers DR and BCP Engineers Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Disaster Recovery Engineer students will be able to establish industry acceptable DR & BCP standards with current best practices and policies. Students will also be prepared to competently take the C)DRE exam. A Certified Disaster Recovery Engineer, C)DRE, is the superhero of an information System! When a business is hit by a natural disaster, cybercrime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in theÿ Certified Disaster Recovery Engineer certification course. Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in the event of a disruption. The C)DRE prepares students to plan and present the latest methodologies and best practices for real-world system recovery. Course Outline Welcome to Disaster Recovery Training Business Impact Analysis Risk Analysis Design & Development Phase (BCP Strategies) IT Recovery Strategies Implementation Phase Testing and Exercise Maintenance and Updating Pandemics Case Studies and Templates
Whetstone Communications and comms2point0 are pleased to bring you the Data Bites series of free webinars. Our aim is to boost interest and levels of data literacy among not-for-profit communicators.
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Risk Manager students will be prepared to pass the CISRM exam. Certified Information Systems Risk Manager, CISRM, course is made for IT and IS professionals who are involved with all aspects of risk management. Requests for this particular area of certification is growing fast in the employment sector. Recent high-profile breaches in both the public and private sectors have increased awareness for the need for Risk Management professionals. Mile2?s CISRM certification exam will test your knowledge in all areas of risk management. If you would like some training and test preparation before taking the Certified Information System Risk Manager Exam we offer the CISRM course as both a live class and a self-study combo. First, you will learn to assess a system, then implement risk controls. Finally, you will be able to monitor and maintain risk procedures. With this training, you will be able to identify risks associated with specific industries. After course completion, you will be able to design, implement, monitor and maintain risk-based, efficient and effective IS controls. Knowledge of all of these areas will be required to pass the CISRM exam. Course Outline The Big Picture Domain 1 ? Risk Identification Assessment and Evaluation Domain 2 ? Risk Response Domain 3 ? Risk Monitoring Domain 4 ? IS Control Design and Implementation
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats. Additionally, they will be prepared to take the C)TIA exam Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is simple, Mile2?s Certified Threat Intelligence Analyst course. Mile2?s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2?s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.ÿ The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company?s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. Course Outline Threat Intelligence Basics Cyber Threats Threat Actors Case Studies Threat Identification Proactive Approach
Duration 4 Days 24 CPD hours This course is intended for Information Assurance Managers/Auditors System Implementors/administrators IT Administrators Auditors/Auditees Federal Agencies/Contractors Security Vendors and Consulting Groups Overview Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the work place. IS20 controls are the Top Twenty Most Critical Security Controls in Information Technology.ÿ This 4 day training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations that maintain sensitive information are adopting these Security Controls. These controls were chosen by leading government and private organizations who are experts on how attacks work and what can be done to prevent them from happening. The controls were selected as the best way to block known attacks as well as help search for and alleviate any damage from the attacks that are successful. This course allows the security professional to see how to implement controls in an existing network through highly effective and economical automation. For management, this training is the best way to distinguish how you will assess whether these security controls are effectively being administered. Introduction Critical Control 1 Critical Control 2 Critical Control 3 Critical Control 4 Critical Control 5 Critical Control 6 Critical Control 7 Critical Control 8 Critical Control 9 Critical Control 10 Critical Control 11 Critical Control 12 Critical Control 13 Critical Control 14 Critical Control 15 Critical Control 16 Critical Control 17 Critical Control 18 Critical Control 19 Critical Control 20
Meetings are a traditional and essential component of local government. For both elected members and officers, meetings serve as a forum for discussion and agreement, planning and monitoring, communication and leadership, and decision-making. Used appropriately, meetings can challenge, inspire, illuminate and inform. And while they are not the only meetings that elected members will be asked to attend, committee meetings, in particular, are a mainstay of the political management process. Effective chairing is important because it can provide clear leadership and direction, ensure that debates are focused and balanced, enable decisions to be reached and ensure that resources are used to best effect. This two-hour 'masterclass'-style workshop will help elected members to understand their role, offer some approaches and ideas that will help to tackle typical challenges, and help to generally improve their effectiveness as a chair. To understand the skills and qualities of a good chair To learn ideas and approaches for chairing a successful meeting that is on time and achieves its outcomes To understand the protocols and boundaries for appropriate meeting etiquette and the chair's role in managing this effectively To appreciate how to manage yourself and others appropriately To take away personal actions to apply to your role 1 Welcome and introductions Objectives What's the challenge for you? 2 We can't go on meeting like this Common meeting challenges for chairs and why they succeed or fail Consequences and impact for the Council What's the context? 3 Roles and responsibilities of an effective chair Activities and input that explore the role, skills and qualities needed Role of the chair: what is it and how to do it well 4 Chairing for success - ideas and approaches to meet the challenges Managing time and boundaries Preparation and planning Creating the right environment Self-management Challenging personalities and good meeting behaviour 5 Final plenary session What's your plan? Take away actions
Duration 3 Days 18 CPD hours This course is intended for This Yellow Belt training is intended for managers and employees from companies or government institutions who want to get acquainted with Lean Six Sigma or (soon) will have to deal with Lean Six Sigma in their own organization Overview During this training you will become acquainted with the essence of Lean Six Sigma and the importance of improvement management. It discusses how a Lean Six Sigma improvement project is approached, who plays an important role in an improvement project, what it yields as an employee or manager if this methodology is introduced in the organization and what should be taken into account when implementing. Theory and practice go hand in hand. The training encourages you to think about the value for your customer and which methodology best suits your role and your value in a process. This makes Lean and Six Sigma understandable and applicable. We also show what is involved in the introduction of LeanSix Sigma and there are various discussions about the introduction and the 'do's and don'ts of Lean Six Sigma. Course Outline Lean & Six Sigma Overview Basic Statistics Lean Six Sigma: the DMAIC Roadmap Lean Six Sigma: Tools Additional course details: Nexus Humans Lean Six Sigma Yellow Belt training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Lean Six Sigma Yellow Belt course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.