This document proposes a Combatant Fire Team Leadership refresher and upskilling program delivered by Risk and Emergency. The 7-10 day on-site training program aims to refresh, improve and develop the knowledge and skills of emergency services officers and team leaders. The training will cover topics like incident command, control and planning, resource management, standard operating procedures and post-incident procedures. The goal is to enhance emergency response capabilities and ensure compliance with regulatory and industry standards. Risk and Emergency has expertise in emergency response training and experience working with fire services, mining and other heavy industries.
The Chartered Institute for the Management of Assessment Practice (CIMAP) is a professional body supporting the needs of all stakeholders involved in Assessment, Moderation and ETD Practice in South Africa.
Advanced Certificate in Security Management360 BSI
The Advanced Certificate in Security Management training program uses tested and true methods, advanced technology combined with relevant practical experience, train your staff on best practices in security, recognise potential threats and equip them, if necessary, to respond to security risk situations.
You will:
explore some new management strategies in the security environment
be able emphasize on the importance in communication and teamwork
establish the difference in ‘DO’ and ‘DON’T’
secrecy & confidentiality of your organization be able to understand and examine the needs of your security team, their advantage and short-comings
learn how to identify your security team training needs, write and deliver a security training course
understand how to set priority in communication and writing reports, internally and externally (media and peers)
discover best practices in time management, team management and project management
The Advanced Certificate in Security Management course is designed and delivered for any industry where there is a potential risk to their employees or infrastructure from internal and external threats.
Contact Kris at kris@360bsi.com for further details or to book your seats.
The Chartered Institute for the Management of Assessment Practice (CIMAP) is a professional body supporting the needs of all stakeholders involved in Assessment, Moderation and ETD Practice in South Africa.
Advanced Certificate in Security Management360 BSI
The Advanced Certificate in Security Management training program uses tested and true methods, advanced technology combined with relevant practical experience, train your staff on best practices in security, recognise potential threats and equip them, if necessary, to respond to security risk situations.
You will:
explore some new management strategies in the security environment
be able emphasize on the importance in communication and teamwork
establish the difference in ‘DO’ and ‘DON’T’
secrecy & confidentiality of your organization be able to understand and examine the needs of your security team, their advantage and short-comings
learn how to identify your security team training needs, write and deliver a security training course
understand how to set priority in communication and writing reports, internally and externally (media and peers)
discover best practices in time management, team management and project management
The Advanced Certificate in Security Management course is designed and delivered for any industry where there is a potential risk to their employees or infrastructure from internal and external threats.
Contact Kris at kris@360bsi.com for further details or to book your seats.
Making best use of Jisc eCollections: Historical Texts, Journal Archives and ...Jisc
Led by Hazel White, account manager and Scott Gibbens, senior service manager (Jisc eCollections) - both Jisc.
in this session you’ll hear about how you can make best use of Jisc eCollections: Historical Texts, Journal Archives and MediaHub.
A critical review of the literature pertaining to the networking behaviours of young jobseekers, in both offline and online environments. A model from information behaviour theory is proposed as a suitable theoretical framework for future research in this area.
Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural in nature.
The Business Continuity Plan addresses an organization’s ability to continue functioning when normal operations are disrupted. A Disaster Recovery Plan is used to define the resources, action, tasks, and data required to manage the business recovery process in the event of a disaster.
In this workshop you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You will learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
Benefits of Attending:
Using a carefully selected case study, course participants will:
- Create, document and test continuity arrangements for an organization
- Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities
- Select and deploy an alternate site for continuity of mission-critical activities
- Identify appropriate strategies to recover the infrastructure and processes
- Organize and manage recovery teams
- Test and maintain an effective recovery plan in a rapidly changing technology environment
Exclusive:
- Bring your BCP/DRP for private consultation review
- BCP/DRP Step-by-step Guide
- BCP/DRP templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop
- FREE CD containing course material, case studies, and other related items of the training workshop
Who should attend:
- Vice Presidents, Directors, General Managers
- Chief Information Officers
- Chief Security Officers
- Chief Information Security Officers
- Chief Technology Officers
- Heads of Departments in Information Security Management
Contact Kris at kris@360bsi.com to register.
Risk management is the process of identifying vulnerabilities and associated threats, followed by estimating the level of risk and its impact on the organisation. Based on international standards (ISO/IEC27001) and guidelines (ISO/IEC 27005, NIST800-30, ISO/IEC 31000), the Certified Data Centre Risk Professional course is a two-day course designed to expose attendants to the overall risk management process.
The CDFOM® (Certied Data Centre Facilities Operations
Manager) course is a three-day course which will enable data
centre managers to gain in-depth knowledge of managing data
centre operations from planning to monitoring and reporting.
This course breaks down the complexity of managing a
mission-critical high-availability data centre facility into
manageable and systematic processes. Not only are the topics
covered based on international standards, the course includes
best-practises by seasoned data centre professionals with many
years’ experience managing global data centre facilities. The
CDFOM® is an intensive course packed with a lot of information
which brings tremendous value to the participants, enabling
them to improve the operations of their data centre. The course is
fully aligned with the DCOS® (Data Centre Operations Standard)
The CDFOS® (Certied Data Centre Facilities Operations
Specialist) course is a three-day course which will enable
participants to fully understand the requirements of running the
day-to-day operations of a mission critical data centre.
Participants will gain all the required competences for running
the daily operations, understand which processes should be in
place, and the critical elements of those processes and how to
execute them. The course is fully aligned with the DCOS® (Data
Centre Operations Standard)
The webinar will cover why we should document the BCMS plan and how it can be done.
Main points covered:
· Why do we need to document
· What is included in the documentation
· How is the documentation used
Presenter:
Barbro Thöyrä, MBA., holds certificates in ISO 22301 Master and Lead Auditor, ICT Disaster Recovery Manager, ISO 28000 Provisional Implementer, PECB Certified Outsourcing Manager and DRI Risk Management. She is an approved PECB and DRI trainer and BCI Instructor.
She has several years of experience as an IT manager, product manager and subject matter expert in BCMS. She has worked as a senior consultant, project management, IT architect, wrote manuals and developed services within BCMS and CRM. Furthermore, she is a trainer in IT and BCMS and carried out several international BCMS and IT projects as an expert and project manager.
Link of the webinar published on YouTube: https://youtu.be/q3Jr9k-tbic
Making best use of Jisc eCollections: Historical Texts, Journal Archives and ...Jisc
Led by Hazel White, account manager and Scott Gibbens, senior service manager (Jisc eCollections) - both Jisc.
in this session you’ll hear about how you can make best use of Jisc eCollections: Historical Texts, Journal Archives and MediaHub.
A critical review of the literature pertaining to the networking behaviours of young jobseekers, in both offline and online environments. A model from information behaviour theory is proposed as a suitable theoretical framework for future research in this area.
Disasters could cripple your organization, suspending mission-critical processes and disrupting service to your customers. These disasters could be man-made or natural in nature.
The Business Continuity Plan addresses an organization’s ability to continue functioning when normal operations are disrupted. A Disaster Recovery Plan is used to define the resources, action, tasks, and data required to manage the business recovery process in the event of a disaster.
In this workshop you learn to identify vulnerabilities and implement appropriate countermeasures to prevent and mitigate threats to your mission-critical processes. You will learn techniques for creating a business continuity plan (BCP) and the methodology for building an infrastructure that supports its effective implementation.
Benefits of Attending:
Using a carefully selected case study, course participants will:
- Create, document and test continuity arrangements for an organization
- Perform a risk assessment and Business Impact Assessment (BIA) to identify vulnerabilities
- Select and deploy an alternate site for continuity of mission-critical activities
- Identify appropriate strategies to recover the infrastructure and processes
- Organize and manage recovery teams
- Test and maintain an effective recovery plan in a rapidly changing technology environment
Exclusive:
- Bring your BCP/DRP for private consultation review
- BCP/DRP Step-by-step Guide
- BCP/DRP templates and worksheets to aid you in applying and putting into practice what you have learned from this workshop
- FREE CD containing course material, case studies, and other related items of the training workshop
Who should attend:
- Vice Presidents, Directors, General Managers
- Chief Information Officers
- Chief Security Officers
- Chief Information Security Officers
- Chief Technology Officers
- Heads of Departments in Information Security Management
Contact Kris at kris@360bsi.com to register.
Risk management is the process of identifying vulnerabilities and associated threats, followed by estimating the level of risk and its impact on the organisation. Based on international standards (ISO/IEC27001) and guidelines (ISO/IEC 27005, NIST800-30, ISO/IEC 31000), the Certified Data Centre Risk Professional course is a two-day course designed to expose attendants to the overall risk management process.
The CDFOM® (Certied Data Centre Facilities Operations
Manager) course is a three-day course which will enable data
centre managers to gain in-depth knowledge of managing data
centre operations from planning to monitoring and reporting.
This course breaks down the complexity of managing a
mission-critical high-availability data centre facility into
manageable and systematic processes. Not only are the topics
covered based on international standards, the course includes
best-practises by seasoned data centre professionals with many
years’ experience managing global data centre facilities. The
CDFOM® is an intensive course packed with a lot of information
which brings tremendous value to the participants, enabling
them to improve the operations of their data centre. The course is
fully aligned with the DCOS® (Data Centre Operations Standard)
The CDFOS® (Certied Data Centre Facilities Operations
Specialist) course is a three-day course which will enable
participants to fully understand the requirements of running the
day-to-day operations of a mission critical data centre.
Participants will gain all the required competences for running
the daily operations, understand which processes should be in
place, and the critical elements of those processes and how to
execute them. The course is fully aligned with the DCOS® (Data
Centre Operations Standard)
The webinar will cover why we should document the BCMS plan and how it can be done.
Main points covered:
· Why do we need to document
· What is included in the documentation
· How is the documentation used
Presenter:
Barbro Thöyrä, MBA., holds certificates in ISO 22301 Master and Lead Auditor, ICT Disaster Recovery Manager, ISO 28000 Provisional Implementer, PECB Certified Outsourcing Manager and DRI Risk Management. She is an approved PECB and DRI trainer and BCI Instructor.
She has several years of experience as an IT manager, product manager and subject matter expert in BCMS. She has worked as a senior consultant, project management, IT architect, wrote manuals and developed services within BCMS and CRM. Furthermore, she is a trainer in IT and BCMS and carried out several international BCMS and IT projects as an expert and project manager.
Link of the webinar published on YouTube: https://youtu.be/q3Jr9k-tbic
The EastNets Academy is a unique learning community specifically designed for collaborative learning, sharing strategies and techniques to help its members excel in using EastNets technology to improve financial crime protection, resilience and regulatory controls.