• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

167 Risk Assessment courses in Cardiff delivered Live Online

Audit Programmes and Risk Assessment

By Research Quality Association

Course Information This one day course is designed to provide you with comprehensive guidance and practical help for when designing and implementing audit programmes. Using the guidance of ISO 19011 with reference to PV, GCP, GMP and GLP audit programmes, you will explore audit programme design, operation, review and improvement. The course will work through why audits are important and understanding the drivers behind a good audit programme. It will discuss how to identify and assess the risks in your organisation, linking them with organisational goals, using these risks as a basis for the design of a risk-based audit programme during facilitated practical workshops. Delegates will have the opportunity to consider and discuss common issues and constraints that may shape their audit programmes. By the end of the course you will have: A clear understanding of the role of audit programmes in managing compliance and of the drivers and risks behind audit programmes An understanding of the roles and responsibilities of management and personnel An appreciation of resourcing implications and auditor attributes A good insight into the practicalities and activities required for design of risk based audit programmes A comparison of your circumstances, challenges, common issues and ways to approach managing audit programmes with other delegates on the course. Tutors Tutors will be comprised of (click the photos for biographies): Louise Handy Director, Handy Consulting Ltd Programme Please note timings may be subject to alteration. Day 1 08:50 Registration 09:00 Welcome and Introduction 09:15 Why do we Need to Audit? Exploring risk and regulation, responsibility and performance. 09:45 Discussion - Programmes, Needs, Commonalities Understanding the needs of delegates' own organisation and comparing common themes and threats. 10:00 Establishing an Audit Programme Design, objectives, risk and resources. This session discusses the consideration when designing audit programmes. 10:30 Break 10:45 Risk Management Considerations, guidance and methods for assessing and controlling risk. 11:00 Workshop 1 - Risks, Prioritisation and Control Looking at specific risks, assessing and evaluating to feed into audit programme management. 12:00 Workshop 1 - Feedback 12:30 Lunch 13:30 Putting it into Practice Resources, practicalities and challenges - the realities of auditing, including selection of auditors, ensuring practice will meet expectations and the reasons to note audit results. 13:45 Workshop 2- Designing Audit Programmes Designing audit programmes using output from risk assessment process. Challenges and flexibility. 15:00 Break 15:15 Workshop 2 - Feedback 15:30 Monitoring, Reviewing and Improving Why or when should existing processes change, understanding the implications of change or inaction and exploring how to improve the audit programme. 16:15 Panel Session This final session will address any outstanding issues raised by delegates. 16:30 Close of Course Extra Information Remote Course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device< Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points   Development Level Develop

Audit Programmes and Risk Assessment
Delivered OnlineFlexible Dates
£382 to £512

BRCGS HARA (2 Days)

5.0(43)

By Ask Sonia Limited

Official BRCGS Product Safety Management course: HARA Delivered online (Zoom) by a live BRCGS Approved Training Partner. Exam and Certificate fee included in the price.

BRCGS HARA (2 Days)
Delivered Online
£570

Risk Assessing

By Prima Cura Training

This course is designed to enable learners to increase their understanding of risk assessment and risk management in Health and Social Care settings.

Risk Assessing
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Risk Assessing in the Care Sector

By Prima Cura Training

This course is designed to enable learners to increase their understanding of risk assessment and risk management in Health and Social Care settings.

Risk Assessing in the Care Sector
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Certified Data Centre Risk Professional (CDRP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified Data Centre Risk Professional (CDRP)
Delivered OnlineFlexible Dates
Price on Enquiry

HoardingUK Choice and Control in Hoarding Behaviour

5.0(6)

By HoardingUK

Hoarding training designed to be an educational, interactive and empowering day that works to positively impact attendees active client work.

HoardingUK Choice and Control in Hoarding Behaviour
Delivered Online
FREE to £95

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered OnlineFlexible Dates
£2,037

CPD Accredited Threat Management TACCP (2-3 hours)

5.0(1)

By Ask Sonia Limited

CPD accredited Threat Management TACCP course. Delivered online (Zoom) by a live tutor. Exam and Certificate fee included in the price.

CPD Accredited Threat Management TACCP (2-3 hours)
Delivered Online
£80

C20M02 - Closed circuit television systems (CCTV) - Foundation (online)

5.0(1)

By Ember Compliance

Learners will be introduced to the design, installation, commissioning, and maintenance of CCTV systems.

C20M02 - Closed circuit television systems (CCTV) - Foundation (online)
Delivered Online + more
£230

Navigating The UK Sanctions Compliance As A Law Firm Course

By DG Legal

Are you doing sanction checks in your law firm? In the intricate landscape of legal practice, understanding and adhering to the UK's sanctions regime is not just a recommendation; it is mandatory and it is imperative. This course aims to set clear expectations and offer practical support to firms, guiding them away from the pitfalls of breaching the UK's sanctions regime. This course will cover: What are sanctions What do you need to know about the sanctions for your firm How is it different to the AML regime? What controls to put in place? If the firm offers services to sanction areas – what controls? My client has been sanctioned – what do I do? Reporting obligations Using screening tools Licensing How does this impact Legal Professional Privilege? Sanction Risk Assessment Red flags factors Enforcement actions Target Audience This 90 minute course is for all legal firms, irrespective of the services provided. Whether you are navigating the sanctions regime independently or operating under a license from the Office of Financial Sanctions Implementation (OFSI), this course is for you. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Helen Torresi, Consultant, DG Legal Helen is a qualified solicitor with a diverse professional background spanning leadership roles in both the legal and tech/corporate sectors. Throughout her career, she has held key positions such as COLP, HOLP, MLCO, MLRO and DPO for law firms and various regulated businesses and services. Helen’s specialised areas encompass AML, complaint and firm negligence handling, DPA compliance, file review and auditing, law management, and operational effectiveness in law firms, particularly in conveyancing (CQS).

Navigating The UK Sanctions Compliance As A Law Firm Course
Delivered Online + more
£67.50 to £90