professional development courses

  • Professional Development Courses

    Our courses are designed to deliver highly focussed, practical training on an open enrollement basis, covering all professionals, industries and regions.

  • Training by Regional and Sector

    Courses can either isolate regional or sector differences or celebrate them through both course delivery and trainee participation

  • It takes the best to train the best

    We employ the best trainers from unrivalled access to the world's leading minds in all industries and regional markets. Carefully selected for their mix of practical experience, consultative background in a broad range of companies and proven training delivery. You need the best, we insist on it!

  • Our training philosophy

    Our expert trainers combine with our cutting edge course content to focus on delivering content through expert facilitation and dynamic presentations with relevant and transferable practical case studies bringing the theory to life.

Enterprise Data Security & Risk Management

Data Security has increasingly become an issue of concern. The more we add technology to our lives and go online, the more we need to get sensitive data involved and therefore risks of it being breached and subsequently utilized for undesired purposes. The consequences of data breach or loss may be devastating: customer’s trust at risk, failure of compliance with existing regulations, business-sensitive information loss, etc. Companies need to invest in data protection. Making sure data security and risk mitigation is appropriately managed has to do with knowing exactly how to understand and classify the data, how to deal with the threats and prevent the issues derived from misuse and attacks. Learning about data security and risk mitigation management means enhancing the ability to develop wiser, better data protection strategies, understanding the risks and more effective implementation and better tools to mitigate those risks. This 2-day course covers a series of key areas to understand your security risks, analyse and learn best practice for data security, risk mitigation management and the appropriate level of security needed to protect your organization from the risks involved. There is an undoubted value in the course as it will enhance participants’ ability to implement the most efficient security schemes to protect one the most valuable assets their companies have: Data

Turning 'Theory' into 'Practice'?

This program will comprise a series of very important concepts and key knowledge in order to understand what is crucial in data security management, how it should be handled appropriately, what needs to be protected and how to do it efficiently. Valuable knowledge regarding identification of threats, response and prevention is disseminated in different topics dealt with in the course. Data protection and risk mitigation methodologies will be discussed and Real-life cases will be useful in order to show a more practical and applicable approach.

Who should attend?

Chief Officers, SVP’s, VP’s,  Heads, Directors and Managers in: CISO and CSO Security Information Technology (IT) Information and Data- Security, Protection, Controls IT Security Architecture IT Audit & Compliance IT Investigations & Audit Sensitive and Customer Data Protection Data Regulations and Compliance Data, Network and Systems Architecture Cyber Security Network Security Risk Management Security Compliance Corporate Security

Key areas to be covered in the programme and documentation

Appropriate classification of information and data for security planning   ·Data management and data classification ·Classification criteria: asking the right questions ·Identifying the value and load of the data ·Defining the purpose of your data: What do I want to do with it? ·Accessibility: who do I want to have access to my data? ·Protecting data at each classification

Understanding the levels and likelihood of risk entailed in the data   ·Low, mid and high risk to data ·Low, mid and high likelihood of risk to data ·Assessments of security schemes in place, undesired penetration risks and Testing and Security Awareness  

Existing and emerging threats to data: planning for all possible types of data intrusion   ·Types of threat to data. (Internal/External/Trusted Third Parties) ·Reasons for possible data breach ·Data breach and hacking for financial gain ·Corporate (unlawful) competition ·Hacktivism ·Identity Thieves 

Understanding and assessing the impact of data breaches   ·Potential damage to systems and other technology devices ·Impact on business operations, brand and reputation ·Financial issues as a result of data loss or breach ·Liability – legal consequences  

Current trends in data security management – storage, access controls and mobile devices   ·The storage discussion: NAS (Network-attached storage) vs. Cloud. Differences and Advantages. ·Suitability and affordability when choosing how and where to manage data. ·Other alternatives for data management and protection ·Mobil Devices and Smartphones; a window to data risk exposure. ·The role of Physical Security, Technical Security and Access Controls  

Risk mitigation – methodology, implementation and response in case of a breach   ·Mitigating the threats, minimizing the risks ·Allocation of roles and responsibilities within the organization ·Mitigation methodology and management ·Reaction to data breach – responses to the sudden and the unexpected 

Prevention and architecture: the design of a highly secure system.   ·Developing the culture of prevention ·Return on Investment (ROI) strategies ·Studying, analyzing and understanding risks prior to systems design ·Ensuring policies and rules are complied with ·The Security Risk Equation ·Ensuring consistence in best practice  

Compliance with current laws related to data protection: GLBA, HIPPA, SOX and PCI   ·Understanding Gramm-Leach-Bliley Act ·Risks of liability in the light of GLB ·GLB and its impact on other industries ·Other Compliance goes hand in hand – HIPPA, SOX, PCI ·Ensuring good practice is also compliant  

Best practice in data security management and real life examples for illustration.   ·Examples of efficient implementation of data ·Real life example 1: The Insider ·Real life example 2: Targeted Attack ·Tailoring the knowledge: How can you apply this to your company/organization

Information about the Trainer – Larry Johnson: Larry Johnson, currently the CEO of Castleworth Global, is one of the few with an exceptional record of leadership experience in both the public and private sectors. From 2009 to 2010, Mr. Johnson served as the Senior Vice President at Hillard Heintze LLC.He worked directly with client leadership on projects involving foreign governments, foreign financial institutions as well as domestic based fortune 500 companies on a wide variety of security issues that are directly related to the success of their organization. From 2006 to 2009, Johnson served as the first Chief Security Officer for Genworth Financial, a Fortune 250 company with multiple lines of business, 7,000 employees and more than $110 billion in assets worldwide. He designed and implemented the company’s first global security strategy to protect its assets, people and operations across all 26 countries in which it conducts business.Johnson established and led the company’s IT Information Security Council, Fraud Management Council, Security Breach Incident Response Team, Supplier Risk Management Team and Penetration Testing Teams, as well as the Regulatory Teams tasked with ensuring compliance with legislative requirements ranging from HIPAA and Sarbanes Oxley to PCI (Payment Card Industry) Acts. Earlier in his career, Johnson served for more than two decades as a U.S. Secret Service Special Agent culminating as Special Agent in Charge of the Criminal Investigative Division. He played a key role in the largest U.S./international cyber criminal investigation in history; initiated the TJX investigation that led to the largest identity theft investigation and indictments in U.S. history.He’s a certified U.S. Secret Service Network Intrusion Investigator; and a member of the Financial Sector Information Sharing and Accountability Center (FS-ISAC), the BITS Fraud and Security steering committees at the Financial Services Roundtable, the Overseas Security Advisory Council, the Information Security Network, the Executive Protection Network, the Financial Crime Risk and Security Group as well as the Security Leaders Working Group  

Benefits to you

·Embrace the concept of data classification and understand its impact on data security management.

·Better understand of the nature and purpose of the data they manage.

·Categorize the data according to its sensitivity.

·Ensure compliance with regulations in force (GBL, HIPPA, PCI, SOX)

·Gain skills to identify threats to data.

·Understand Cyber Crime Overview and the nature and types of the threats.

·Identify and preventthe Insider Threat

·Safely deal with Supplier Management and the threat from Trusted Third Parties

·Evaluate Risk, Threat and Vulnerabilities properly –Assessment Process

·Learn effective ways to plan and implement mitigation strategies

·Learn possible reactions and effective prevention methods against threats of data breach.

·Study mitigation methodology and implementation.

·Enhance physical Security and Access Controls ·Mitigate risks and threats in Mobil Devices

·Observe real-case examples and what other companies are doing in terms of data security.

·Discuss best practices and interact with IT counterparts.

Companies already benefiting include:

Duration of Course

2 days Day Course

Course details

January 24 - 25, 2013, Chicago, IL

Looking to train larger teams in this subject?


Quick Enquiry
Training need Input the below captcha code

Further information

UK Enquiries: +44 (0) 203 002 3057

Non-UK Enquiries: +420 (0)2 5570 7246

North American Enquiries: +1 312 540 3000 X6714 or


"This course will allow my company to develop its existing strategies to a much greater and hopefully profitable level."

Managing Director, Tarmac