Tom Considine & Associates
"Information Privacy Professionals"
Information Protection Manager Training Program
Our Information Protection Manager (IPM) training program is broken into three levels of training.
Three-day comprehensive seminar
This program is designed for Small and Mid-sized
Businesses (SMBs) with a limited amount of sensitive information and privacy
regulations affecting the SMB. The program covers understanding laws and
industry mandates, information inventory methods, data flow analysis, risk
assessments and mitigation practices, simple written policy and procedure
development with supplied templates. This course is also a perfect
refresher training for those who have not utilized auditing procedures for some
time.
One-week organizational development program
The Essentials for Information Protection Managers & Compliance Training.
This must-attend training program features a comprehensive update on the very latest data protection laws, rules and compliance guidelines. In addition, it provides you with intensive training in solid, real-world solutions for maintaining compliance — and maintaining a secure workplace.
Plus, You Learn How to Handle One of Today’s Biggest Security Threats: Computer System Security
Information Protection Managers attending this program will receive:
· Information & Data Security Risk Assessment and Audit Manual - The manual contains a methodology for conducting data protection compliance audits together with a series of checklists aimed at testing compliance with each of the laws main provisions. Rather than simply being tailored to a single law, it has been written in such a way that any Information Protection Manager can use it to help judge their own information protection compliance. Similarly, it may also be used by other organizations offering such services to Information Protection Managers. Given that potential users may have different levels of existing audit expertise, the manual also includes general guidance on compliance auditing.
This is the Most Important Two Days of Training You'll Ever Have The Opportunity to Attend
That’s because you’ll learn crucial information that can literally save your organization from crippling fines, regulatory oversight and protect your most vital assets — your business partners and customers. The Essentials for Information Protection Managers & Compliance Training is the fastest and best way available to get the know-how you need to protect your organizations information from security breaches and insider attacks from rogue employees — and the information compliance strategies you need to meet your compliance requirements to protect your organization.
What You'll Learn: Nevada 603A & Senate Bill SB 227 Compliance training
Who Should Attend?
Massachusetts 201 CMR 17 Data Protection Compliance Training, MA 201 CMR 17
2. Privacy Laws
3. Case Studies: An in-depth look at actual cases
4. Web Privacy Information and Security
A. Information security controls
- Information security control strategies
- Authentication
- Intrusion prevention
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
- Firewalls
- Content scanning
- Anti virus software
B. Information Infrastructure
- Data management
- Computer hardware
- Platforms
- Documented Operating Procedures
- Incident Management Procedures
- Segregation of Duties
- Protection Against Malicious software
- Information Backup
- Network Controls
C. Media Handling and Security
- Management of Removable Computer Media
- Disposal of Media
- Information Handling Procedures
- Electronic Commerce Security
- Security of Electronic Mail
- Security of Electronic Office Systems
5. Protecting your business
- Awareness
- Best practices
- Training
- Audits
- Monitoring
- Physical Security
6. Information Protection Audits
- Aims of the Information Protection Compliance Audit
- Why Should we Audit?
- Audit Objectives
- What is an Audit?
- Audit Categories
- First Party Audits
- Second Party Audits
- Compliance Investigations
- Conducting Third Party Audits on Vendors
7. Written Information Security Programs and Policies
- Introduction to Security Policies
- Policy Development Instructions
- Specific Policies
- Sample Security Policies
- Templates on developing your Written Information Security Program (WISP)
Tom Considine & Associates
Information Privacy Professionals
Ph: (702) 722-3492