IET logo
Cyber Essentials (logo)
 
Cyber Essentials Fundamentals 2017 (header)

Cyber Essentials Fundamentals 2017

 
Prove to your customers that your business is cyber secure

21 - 22 September 2017 | IET London: Savoy Place

CPD 16 hours IET London: Savoy Place (logo)
 

Introduction

Share This..

 Share  

Second edition of Cyber Essentials Fundamentals will take place at the IET London: Savoy Place on 21 - 22 September 2017 and will incorporate information on the GDPR compliance requirements.

Cyber Essentials is a UK Government-backed and industry supported scheme to guide businesses in protecting themselves against cyber threats.

If you want to bid for a Government contract (such as a supply contractor to the MOD), Cyber Essentials certification is now mandatory!

The EU General Data Protection Regulation (GDPR) will require all UK business to be complaint from 25 May 2018. The EU GDPR will affect every UK organisation that processes the personal data of EU residents.

This new training course from the IET and MASS will help you gain the certification you need in an efficient manner.Through two 1-day modules, the course offers ample learning and networking opportunities including group exercises to implement network changes, which lets you put what you learn into practice.

If you have any questions about this event contact Olexander Hryb, Event Producer.

 

Module 1: Cyber Essentials (CE) Fundamentals for Senior Managers

Suitable for senior managers, such as Chief Technical Officers (CTO), Chief Information Security Officers (CISO), Chief Information Officers (CIO) and Supply Chain Managers.

You will learn about:

  • Understanding the security threat landscape
  • Defining the assessment scope
  • Recommended Risk Methodologies and treatments
  • How CE contributes as part of continuous monitoring and control

Module 2: Cyber Essentials (CE) Fundamentals for IT Security Professionals

Suitable for IT and security professionals, including IT Managers, Network Managers, Information Security Managers and Technical Officers and Cyber Security specialists.

You will learn about:

  • Understanding and defining the assessment scope
  • Commonly used tools – what they are good at
  • External and Internal Vulnerability Scans
  • Email Binaries and Payloads
 
 

Supporters