GDPR and Cyber Security Content Workflow

Courses

Gain unlimited, unrestricted access to Content Workflows with either our Tempus Safety Management or Tempus Safety Management Plus membership plans. Our courses can be consumed by your users as often as you see fit with all activity, results, refreshers and certificates instantly reportable. All our courses are updated and maintained by us, meaning you are always up to date with legislation and regulation! If this wasn’t enough, we are continually adding content to each workflow.

Essentials of GDPR

Overview

The General Data Protection Regulation (GDPR) is a law for the protection of personal data. This essential regulation impacts every business, regardless of size. This course introduces the learner to the new General Data Protection Regulation (GDPR) and how it is different from the Data Protection Act.

What's covered?

The General Data Protection Regulation
The transition to GDPR
Potential penalties
Definition of personal data
Founding principles of GDPR
GDPR Regulations

Essentials of Data Protection

Overview

This course should be completed by all employees who deal with data in some form, such as accessing and amending client or supplier accounts or working with personal and financial data. It is essential to protect both Commercial and Personnel Data.

What's covered?

What is Information, data and data security
International standards that apply
Data protection law
Eight principles of Data Protection
Marketing
Roles and responsibilities
Consequences of non-compliace

Essentials of Information Security

Overview

Information comes in many forms and different formats with differing degrees of classification; it is the lifeblood of every business and as such, should be valued and protected. Information Security is the practice of defending information from unauthorised access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.   Regardless of the nature of the data stored or conveyed, there is a legal and moral duty to be aware of its sensitivity and follow the correct procedures.

What's covered?

Why information is important
How information security is implemented
The relationship between data and privacy
The rules on the disclosure of information
Communication
The eight principles

Essentials of Information Security Measures

Overview

At the heart of Information Security is the need to establish robust control measures that prevent security breaches.  A regular risk assessment will lead to the continued improvement of information security controls and procedures.  However, it is the responsibility of everyone to be aware of the vulnerability of the information they handle, the nature of potential threats and the steps to protect both data and systems.

What's covered?

The classification of data
Computer related security issues
Operating a back-up procedure
Managing mobile devices
Responsibilities for information security
Information security risk assessments

Essentials of Protecting Information

Overview

Information is the lifeblood of every business and as such, should be valued and protected.  Should information security practices not be understood by employees and relevant procedures followed, then the organisation will be vulnerable to security breaches. Information Security is the practice of defending information from unauthorised access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

What's covered?

Security procedures
How to manage passwords
Physical security
Protecting confidential waste
The use of mobile storage and external media

 

Essentials of Cyber Security

Overview

This course provides nominated Fire Marshalls with the knowledge required to carry out their duties and to contribute to the organisation’s prevention of fire measures. In this course, the learner will learn about fire safety and related work practices of a Fire Marshall.

What's covered?

Forms of cyber-attacks
Phishing, Baiting and Social Engineering
The nature of cybersquatting
Forms of malware and the danger they pose
Preventative measures
The need for policy and procedural reviews
The role of a compliance officer
Sources of suspicion
The advantages of a whistle blower policy
Establishing investigation teams

Are you the target?

Overview

Often the simplest way to hack into an organisation is by targeting its employees. Many people are vulnerable because they mistakenly believe they are not a target for a cyber-attack and that their information or computer has no value.  Both these assumptions are untrue. In addition to the monetary value of the device itself, a computer can also hold information that hackers can take advantage of to access work-related business systems and the sensitive data stored, for these reasons; you are one of the cyber criminal’s primary targets.

What's covered?

Explains why and how you are the target
Risks to business systems
Risks when personal computers are hacked
Explains how to create a secure experiance
How to recognise you have been hacked
What to do if you have been hacked

Insider Threat Awareness

Overview

It is a legal requirement to ensure that fire-resisting doors are correctly installed and adequately maintained, so they are fit for purpose. Buildings must have a ‘competent person’ as referenced in the Fire Safety Order to help them comply with fire door regulations. Fire doors should be regularly inspected for damage that may prevent the door from performing in the event of a fire.

What's covered?

The nature of the threat
The potential repercussion of a data breach
Motives of an inside attacker
Potential business consequence of an attack
Employee responsibilities

Creating an Insider Threat Awareness Programme

Overview

Insiders pose a substantial threat to every organisation because employees and contractors have the knowledge and access to business-critical systems that allow them to bypass security measures through legitimate means. The nature of insider threats is different from other cybersecurity challenges; these threats require a different strategy for preventing breaches. This course provides an insight as to why an Insider Threat Detection Programme is needed and practical guidance for its creation.

What's covered?

Key governance elements of a programme
Targeting communications effectively
Leadership responsibilities
Five steps to establishing a programme

Payment Card Security

Overview

The use of credit and debit cards has become the preferred method of payment for many consumers and suppliers alike. However, there are security implications that you need to be aware of when processing card payments. The course covers essential training about payment cards; why they could be useful for your business and the security measures that will help protect against fraud when transacting payments by card payment.

What's covered?

Types of card related fraud
Security measures when accepting payments
Card not present fraud
Actions if a void  or fake card is presented
What to do if you suspect a customer

Payment Card Industry Data Security Standard

Overview

It is a legal requirement to ensure that fire-resisting doors are correctly installed and adequately maintained, so they are fit for purpose. Buildings must have a ‘competent person’ as referenced in the Fire Safety Order to help them comply with fire door regulations. Fire doors should be regularly inspected for damage that may prevent the door from performing in the event of a fire.

What's covered?

Areas where PCI DSS controls apply
Standards of control
Risks PCI DSS seeks to counter
The importance of training and confidentiality
Cyber-attack technology counter measures
Understanding payment environments
How to conduct PCI DSS audits
How to carry out non-hosted PCI DSS audits

Forms

Gain instant access to every form within the workflow. Customise, schedule and complete tasks online, allowing you to track, report and monitor safety standards and be alerted to non-conformities and or potential issues.

Information Security Breach
ISO 27001 – 4. Assessment – Gap Analysis
ISO 27001 – 5. Leadership and Workforce Participation – Gap Analysis
ISO 27001 – 6. Planning Gap Analysis
ISO 27001 – 7. Support Gap Analysis
ISO 27001 – 8. Operation – Gap Analysis
ISO 27001 – 9. Performance Evaluation – Gap Analysis
ISO 27001 -10. Improvement – Gap Analysis
PCI DSS Gap Analysis – Section One
IT audit series
PCI DSS Audit – Section One

Data Policy Agreement

Note: Workflows and there allocated training content and forms are continually growing.  Therefore the items listed may not be an exhaustive list. However, the content listed are correct at the time of publishing and does represent the minimum number of items preloaded.

Get unlimited unrestricted access to all our courses and forms with our Tempus Safety Management Plus plan!

Scroll to Top