About the workshop
In this interconnected world the risk of an attack on our information resources must be a matter of real concern for all of us. As ever more transactions are conducted electronically, this concern can only grow as dangers increase and attacks become more sophisticated. Whilst a key part of protecting ourselves relies on good technological safeguards, these need to be complemented by appropriate information security management policies and procedures implemented by users trained and supported in their application.
Good information security has always been an important aspect of an organisation’s effective functioning, credibility and resilience. For modern organisations it is vital as they face threats which evolve and change and which can now come from anywhere, at any time.
This one-week workshop explores the nature of cybercrime, the key risks to organisations and the ways in which organisational capacity to resist cyber attacks can be enhanced. It also demonstrates what should be done if an attack is suspected and what processes can be put in place to enable an organisation to get back up and functioning rapidly if the worst does happen and its defences are breached.
Who is it for?
Our workshop is aimed at senior decision-makers, records and information managers, records practitioners and anyone concerned with improving corporate governance and organisational effectiveness through better information handling. It will focus on international standards and practical experiences in the UK and in a range of other countries with a view to sharing global good practice. It will be particularly useful for those in organisations considering introducing enhancements to their information infrastructures. As this is a records and information management focused workshop, it is not aimed at systems analysts and IT professionals and will not focus on programming solutions.
How participants will benefit
During the week the workshop will:
- Identify and analyse the key risks to your information resources
- Introduce you to the types of cybercrime and cyber enabled crime, for example, external cyber-attacks against organisations, internal fraud and money laundering
- Explain how these risks can be mitigated
- Show you how to respond to a possible attack
- Discuss the use of specialists and experts
- Demonstrate the key principles of informational security.
Please view our 2019 Brochure (opens in PDF)