PCI DSS Training – “location” (Payment Card Industry Data Security Standard v3)
PCI DSS, the results of the convergence of Visa, Master Card, American Express and other payment brands respective security standards, is here to stay. More so, Visa and Mater Card are fining institutions that process/store/transmit payment data for lack of compliance. PCI DSS impacts all companies that process/store/transmit payment card information.
Attendees of this training are able to maintain and facilitate PCI DSS corporate implementation. It is a 1 day informal and interactive training; attendees should have an ICT or audit/control or project management or Payment background.
This training module will benefit Card Issuers and processors, Top and Middle management from Banking, Heads of Operations, Head of Internal and External Audit, Compliance Managers, Compliance Officers, Head of IT & Security, Staff from Operations Department, Compliance Department, IT & Security Department, Internal and External Audit Department.
Gain an understanding of the importance of the Standard to all organisations using, processing or transmitting credit card information An appreciation of the controls necessary to be able to continue dealing with cardholder data The history of the PCI DSS standard Key principles and requirements of the standard Compliance with the standard - who does it relate to & at what level? The route to compliance - self assessment & audit Preparing an implementation plan The PCI- DSS training program is rich in knowledge and techniques and includes:-
PCI Security Council objectives and documentation Specific terminology and its application to existing situations How the Standard applies to everyone involved with cardholder information How the implementation of the Standard is validated, dependent on levels of activity Cardholder data that can/cannot be held The relevance of different system components Detailed requirements of the Standard How compliance is assessed and whether compensating controls are acceptable Compilation of the Report on Compliance (ROC) Special considerations for hosting providers An action plan to achieve compliance
Facilitated by NetHost Legislation (UK) PCI DSS Qualified Security Assessor Company in partnership with Dolphins Group and 3QS
The above training programme is facilitated by a PCI DSS Qualified Security Assessor (QSA) Company based in the United Kingdom; moreso, the facilitator is a QSA with extensive years in the information security compliance industry and has carried out over 50 payment system training worldwide This is an opportunity to get training by a seasoned professional QSA and security practitioner, and get answers to ALL your PCI DSS challenges.
Day 2 ISO27001:2013 Information Security Management Systems Internal Auditor Training…
What is it?
Information security management system gives you a best practice framework to improve data protection and remove the threat of security breach. Critical to this is the way you monitor the system’s performance. An internal audit allows you to assess the way you manage information security in detail. Take the next steps to make sure your information security management system stays compliant and effective in protecting your company and customer data
Why do I need it?
Auditing keeps your information security management on track, helping you to maintain the highest level of data protection. As your business grows and technology evolves, it’s critical that your management system remains robust, effective and compliant with the Information Security Standard. Internal auditing skills help you identify gaps in the way you currently manage information security.
They also give you the knowledge needed to close these gaps and the confidence to continually improve your data protection.
How will I benefit?
If you understand the scope of the Information Security Management System Standard (ISMS), you will also understand how it can impact the way you manage your company and customer data – for the better. And by auditing your information security management system you will demonstrate that you have a robust data protection framework in place. You will also build a culture of security awareness within your organization, maintaining compliance with ISO/IEC 27001 and strengthening customer trust in your ability to protect their data.
What will I learn?
This course will give you an in-depth understanding of ISO/IEC 27001 requirements within the context of an audit. You’ll learn how to keep your information security management system compliant and achieve long-term best practice.
We’ll help you close any gaps in your understanding of ISO/IEC 27001 so you can plan, perform and report on an internal audit. And you’ll discover how your findings help to improve the way you protect company and customer data.
An overview of available standards and management system documentation. The benefits of ISMS certification. An overview of ISO27001 and its application. Key elements of ISMS implementation project planning. The core elements of the ISMS. The key steps of an ISO27001 risk assessment. An overview of the ISO27001 Annex A controls. Audit Methodology
Who are we?
As an Information Security Compliance Company, our expertise in shaping business standards spans many years. Our tutors are skilled in transferring knowledge contained within each standard to help you embed excellence within your organization. With over a 100 training provided, you can trust us to help you perform better, reduce risk and grow sustainably.
Trainer Profile Our trainer is an information security professional with over 17 years’ experience. A lead ISO27001 Auditor, PCI DSS QSA, BSI External Assessor, with over 30 training courses facilitated.
Why train with us?
We’ve trained and audited many of businesses using the same standards so we can genuinely benchmark performance. And we can take you from beginner to certification quickly then support you with follow-up courses and webinars
Did you know?
“ISO/IEC 27001 is becoming a common standard for Compliance; two-fifths of large organizations have been asked by their customers to comply with the ISO… ISO/IEC 27001 is increasingly becoming the lingua franca for information security”
Source: PwC Information Security Breaches Survey
What our customers say
“A very worthwhile course in terms of delivery and content which will provide the foundations for us to build on within the workplace.”
“Highly informative and beneficial thanks to the flexibility of the tutor in responding to our requirements.”
“The course cleared a lot of misconceptions I had about the auditing process. The practical knowledge shared by the tutor and other delegates will be invaluable.”
ISO22301: 2013 Business Continuity Management System (BCMS) Implementer Training….
This training programme provides comprehensive and practical coverage of all aspects of implementing an ISO22301 compliant business continuity management system (BCMS). Implementing ISO22301 will demonstrate to your stakeholders - employees, customers, suppliers, shareholders - that your organisation is fully prepared for any disruptive incident that might otherwise affect its key organizational goals.
ISO22301 Implementer training - what will I learn? During this sessions ,our experienced trainer will use a combination of presentations, case studies and group work to show you how to:
Develop and implement a robust business continuity plan (BCP) Maintain, plan and continuously improve an existing BCP for maximum long-term effectiveness. Our ISO22301 training team are experienced Business Continuity Management consultants who bring extensive experience in implementing standards and integrating BCM into a wider management system to the classroom. If you're responsible for ensuring that your organisation responds to and survives any form of disaster, from an IT service disruption to a major act of nature, this course will equip you with the skills required to achieve compliance to ISO 22301 the international standard for business continuity.
During the ISO22301 Certified BCMS Lead Implementer course you will learn to:-
Define the role and structure of a business continuity policy Determine the scope, policy and objectives of the BCMS Deliver the ISO22301 project using organisational change management techniques Allocate roles and responsibilities in the ISO22301 implementation project Explain how to identify key products and services Explain how to carry out the business impact assessment and the risk assessment (the core competence of business continuity management) Explain how to assess the impact of disruption Explain the importance of an effective incident response structure Explain the importance of an effective communication strategy Write policies and produce other critical documentation Explain the importance of staff and general awareness training Define the key elements of management review Manage and drive continual improvement Prepare the organisation for its initial ISO22301 certification audit, and surveillance visits Identify key issues in ensuring that the organisation passes the audit first time! Who should attend an ISO22301 BCMS Lead Implementer course? This training course is ideal for anyone involved in, or responsible for, implementing a business continuity management system (BCMS) that conforms with ISO22301. This includes:
Business Continuity Managers IT Managers Business Managers Compliance Managers Project Managers Risk Managers Operations Managers Emergency Planners ISO22301 Lead Auditors The above training programme is facilitated by a PCI DSS Qualified Security Assessor (QSA) Company based in the United Kingdom; moreso, the facilitator is a QSA, BSI Assessor, COBIT 5 certified Assessro with extensive years in the information security compliance industry. Our facilitator as been awarded several accolades:- Who is who in science and technology , Excellence for outstanding contribution to positive image for African and African around the world (organised by the Mayor of London ) and member of several international information security conferences/journals and groups. This is an opportunity to get training by a seasoned professional security practitioner, and get answers to ALL your challenges.
The International Standard for Service Management Auditor/Implementer Training
ISO/IEC 20000 is the international standard for IT service management (ITSM). The standard defines an integrated set of management processes required to develop an effective IT Service Management System (SMS) that meets wider business needs. Audit plays a key role in the implementation and maintenance of an effective SMS. Regular audits against ISO 20000 help organisations to achieve compliance and a competitive edge by:
Promoting continual improvement in IT service management Increasing confidence in IT services amongst internal and external customers Ensuring an on-going focus on ITSM processes to ensure they meet changing business needs Providing assessment of processes and activities against an international Standard Identifying areas for improvement, based on best practice This course is suitable for both internal and external auditor roles and will equip you with the knowledge required to perform audits/implement against the ISO 20000 Standard.
What does the ISO 20000 Auditor course cover?
This ISO 20000 auditor/implementer training course covers the following areas: The ISO 20000 Standard The principles of IT Service Management The requirements of an effective ISO 20000 audit Attending the course will enable you to: Develop your knowledge of the structure, requirements and content of ISO 20000 Understand the process of Certification Link ISO 20000 with other ITSM best practice frameworks, particularly ITIL® Explore the key principles, terminology and processes of ITSM Analyse, explain and assess ITSM methods in relation to the requirements of ISO 20000 Review commonly used ITSM tools and evaluate key evidence required for Certification. The above training programme is facilitated by a PCI DSS Qualified Security Assessor (QSA) Company based in the United Kingdom; moreso, the facilitator is a QSA, BSI Assessor, COBIT 5 certified Assessro with extensive years in the information security compliance industry. Our facilitator as been awarded several accolades:- Who is who in science and technology , Excellence for outstanding contribution to positive image for African and African around the world (organised by the Mayor of London ) and member of several international information security conferences/journals and groups. This is an opportunity to get training by a seasoned professional security practitioner, and get answers to ALL your challenges.
Deliver the benefits of COBIT 5 to your organisation
COBIT 5 is the internationally accepted best practice framework for IT governance and control. With a focus on managing processes, COBIT 5 has helped organisations bridge the gaps between control requirements, regulatory compliance and business risks to significantly increase the value of their investment in IT.
Building on existing knowledge, this COBIT 5 Implementation training course provides delegates with a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events and risk scenarios within an organisation. Supported by the use of practical exercises and case-based scenarios, delegates will learn how to apply the COBIT 5 continual improvement life cycle to establish and maintain a sustainable approach to governing and managing enterprise IT as “normal business practice”.
What will you learn on the COBIT 5 Implementation training course?
Delegates attending this course will acquire the following knowledge and skills:-
How the COBIT 5 processes and the Process Reference Model help guide the creation of the 5 principles and the 7 governance and management enablers The basic concepts for the implementation of COBIT 5 The basic concepts of the new Process Assessment Model The COBIT 5 guides and how they interrelate. With Foundation, Implementation and Assessor courses, this training provides/prepares an integrated ‘learning path’, enabling individuals to develop their COBIT 5 knowledge and obtain industry recognised ISACA qualifications exam. Complete COBIT 5 Training Programme
The above training programme is facilitated by a PCI DSS Qualified Security Assessor (QSA) Company based in the United Kingdom; moreso, the facilitator is a QSA, BSI Assessor, COBIT 5 certified Assessro with extensive years in the information security compliance industry. Our facilitator as been awarded several accolades:- Who is who in science and technology , Excellence for outstanding contribution to positive image for African and African around the world (organised by the Mayor of London ) and member of several international information security conferences/journals and groups. This is an opportunity to get training by a seasoned professional security practitioner, and get answers to ALL your challenges.