Information is critical to most of the functions of an education organisation, whether for teaching, research, administration, employment or funding. The effective operation of all those functions depends on reliably accurate information being available when it is needed by those who are authorised to see it, and is not disclosed to those who are not authorised to see it.
This course takes a broad view of risks to these aspects – accuracy, availability and confidentiality – of information security. We examine the origin of these risks in behaviours, processes, physical, technical and environmental factors; and consider how policies can be used to mitigate and manage the risks.
This course is led by Andrew Cormack, chief regulatory adviser, Jisc technologies.
- Share good practice and learn from others from within academic networking
- Share best practice from the sector
- Targeted assignments let you apply your knowledge to your organisation
- No travel, attend from your own desk!
- Advice on how to assess risks and choose appropriate treatments
- One year of online support following the course
The sessions will involve presentations, audio and interactive chat both as a whole class and in break-out groups.
During the sessions you will have plenty of opportunities for discussions and communication with your peers. We encourage participation and hope that you will feel able to share your experiences and examples of good practice with the group.
These sessions are delivered over Adobe Connect, which you can access using the Adobe Connect app or directly via your browser. You'll also need a headset or headphones and a microphone.
Further detailed instructions will be sent following booking.
Who should attend
The course is intended for staff who will be developing or implementing systems, processes or policies affecting information security.
Delegates should have an awareness of risks to information and how these could affect their organisations.
What we cover
- Recognising risks
- Analysing risks
- Treating risks
- From risks to policies
- Managing information security
- Policies and the organisation
On completion of this online course, delegates will be able to:
- Describe the different sources of risk to information security
- Explain the different ways that risks can harm information security
- Describe the impact of user perception on information security
- Analyse, and give examples of, the different components of risk
- Propose and assess different ways of treating risks
- Use different approaches to identifying risks
- Identify which risks are a priority for treatment
- Understand the advantages and disadvantages of using standard security policy frameworks (e.g. ISO27001, UCISA toolkit)
- Use risk assessment as a basis for organisational policies that reduce risks
- Explain the need for policies to be part of an information security management system (ISMS)
- Explain the plan/do/check/act model of an ISMS
- Identify relevant feedback mechanisms to improve policies and the ISMS
- Explain the usefulness of an information security forum
- Analyse the criticality of a system and select appropriate risk mitigation
Pricing and eligibility
24 November and 1 December - 10% discount for delegates attending the Jisc security conference 2021
- Jisc members1 - £200 + VAT2
- Non-member3 , not-for-profit - £250 + VAT
- Other organisations4 - £350 + VAT
- 1 All Jisc members – typically publicly funded FE, HE and Research institutions
- 2 VAT is charged at 20% of the value of the service. If you are a member of Jisc’s VAT-exempt cost sharing group, and you are able to provide confirmation of the exact taxable/exempt use of the service, we will be able to reduce the amount of VAT chargeable to reflect the taxable business use proportion of the service only. This additional information is required as a result of a change to HMRC policy. Please contact email@example.com if you require more information.
- 3 Eligible local government, public sector, private/independent education providers and non-profit customers
- 4 All non-member commercial partners
For more information, email firstname.lastname@example.org or phone 01235 822242.
An easy route to procurement
We are an approved supplier on the Crown Commercial Service dynamic purchasing system (DPS). This provides a simple and trusted way for public sector buyers and our members to procure Jisc cyber security services and training.