The information of people around the country is increasingly being held, in digital form, by the public sector. Its security is paramount.
Threats are becoming increasingly sophisticated and all organisations have an obligation to be both compliant and proactive in repelling such attacks. This Cultivating Robust Information Security Processes course provides an opportunity for all organisations to refresh their knowledge and, importantly, take-away innovative tools and techniques to protect their database’s information and their organisation’s current, internal processes.
Topics will range from policy knowledge; relevant legislation and future regulations; operational tips to remain vigilant and secure against a plethora of threats; safeguarding the use of mobile and smart devices in an increasingly flexi-workplace; influencing budget decisions to ensure that information security is given the highest priority.
Register your place in this Cultivating Robust Information Security Processes course to give your organisation the edge in safeguarding your most-valuable asset: information.
|About the Chair: Lynn Wyeth
|Lynn is the Information Governance Manager at Leicester City Council. Having previously worked as an MP and MEP’s political assistant, Lynn moved to her local council where she now oversees the Council’s Information Governance agenda including data protection, FOI, information sharing, RIPA and CCTV.
She has also helped health organisations with their information governance procedures. Lynn is the author of two books, A Practical Guide to Handling Freedom of Information Requests and Data Protection: Compliance in Practice. Find out more here.
09:15 - 09:45
09:45 - 10:00
Trainers' Welcome and Introduction
10:00 - 11:00
The Principles of and Up-To-Date Information Security Policy
- The General Data Protection Regulation and the Data Protection Act 2018 and what it means for your organisation
- Compliance obligations
- Types of threats in the current landscape and trends for the future
- Three core competencies of information security: confidentiality, integrity and availability
- Social engineering and what it means for the public-sector
- Outlining the objectives, responsibilities and obligations of all parties
11:00 - 11:15
11:15 - 12:00
Information Security and Daily Operations
- Email management and passwords
- File-sharing and protecting from external, electronic threats
- Flexi-working and its implications on your organisation’s security
- Using encryption that increases security but doesn’t impact daily operations
12:00 - 12:30
Being Cost-Effective and Ensuring Information Security is Budgeted Effectively
- Guaranteeing value-for-money and enhancing ROI: Not just for the private sector
- What should be incorporated in the information security budget? Avoiding a siloed approach
- Conveying the universal nature of information security
- Learning from the private sector
12:30 - 13:00
Monitoring, Performance and Quality Assessment
- Analyse policy complexity and level of risk
- Effectively monitor and benchmark costs and performance
- Identify the potential for obstacles, risk and challenges
- Maximising and identifying savings and efficiencies
14:00 - 15:45
Workshop: Interactive Scenario(s)
Working in groups of five, delegates will work through specific case studies using different skills and techniques that were learnt earlier in the day.
- This session includes the opportunity for delegates to discuss which techniques would work best in the given scenario
- Work through real-life examples
- Take part in developing policies and procedures learnt during the day to advise on the best approach to given security scenarios
15:45 - 16:00
Feedback, Evaluation & Close
etc. Venues – Victoria, London
One Drummond Gate,
020 3735 8600