0121 222 5630

Email Aristi Ltd Follow Aristi Ltd on Facebook Follow Aristi Ltd on Twitter Follow Aristi Ltd on LinkedIn

IT SECURITY TRAINING.
MADE EFFECTIVE.

You are here:

SIRO & IAO Training.

Security Training

Aristi has developed a number of training courses to enable key roles within Central & Local Government, Health and Emergency Services to make effective security decisions.

Effective information security is about making good risk based decisions and involves senior management support, good governance and embedding a security culture within the business. Key to this is the identification and training of specific roles such as:

  • Senior Information Risk Owner (SIRO)
  • Information Asset Owners (IAO)

Aristi can provide training for these key roles as well as general security awareness training for staff. Training can be provided on site or at our training facilities in Birmingham. All training courses can be tailored to reflect specific requirements and can be based on your business rather than generic theory.

SIRO Training

Information Security is a business responsibility so the business needs to be involved in establishing security needs to ensure they meet corporate objectives. Our SIRO training is a one day course for  SIROs, board members and senior management to enable them to understand their roles and responsibilities as business owners of information security and the associated risks.

The course covers:

  • SIRO role and responsibilities
  • Key roles and responsibilities required to support the SIRO
  • Development of a governance structure to deliver effective Information Assurance
  • Development of an information risk management regime to support the business
  • Data handling and classification

IAO Training

IAOs play a key role in the risk management process and therefore need to understand their responsibilities to enable them to be effective. Our half day IAO training workshops are designed for groups of IAOs to learn about the role and share knowledge with fellow IAOs. These workshops are often delivered on site as IAOs tend to be senior managers and taking a number of senior people out of the organisation for a day is not always practical.

The course covers:

  • Definition of an IAO
  • IAO role responsibilities and how this meets the requirements of the GDPR
  • Key questions an IAO should be able to answer
  • Risk management for IAOs
  • Data handling and Classification

Course Dates for 2020

Senior Information Risk Owner Training – Birmingham

11th Feb
10th March
7th April
12th May
9th June

IAO Training – on site

Please contact us at training@aristi.co.uk to arrange an onsite IAO workshop.

GET
IN TOUCH

Please contact Aristi to discuss your requirements. Filling in the form below is the quickest way to get in touch with the relevant person at Aristi.

CONNECT
WITH US

Keep up-to-date with insights and info on all areas of Information Assurance, Information Security, Penetration Testing & Data Sharing from the award-winning consultants Aristi.

Latest Tweets

https://t.co/oTtDMQOOL9
Aristi consultant unwinding on our latest office toy. #spaceinvaders https://t.co/fijxBrgpfR
Continuous testing https://t.co/XmIzWuMZjH

Subscribe to our Newsletter

Latest Blog Posts

  • Testing as a Service

    Aristi has developed an innovative new cyber security service to give businesses and public sector organisations reassurance that they are doing all they can to defend against hackers. Many organisations conduct annual IT Health Checks to identify security weaknesses in their IT systems. However, a cyber-attack can occur at any time resulting in significant business […]

    Written on Monday, 24 February 2020
  • Would your business survive a cyber attack?

    A cyber-attack can have a huge impact on your organisation in terms of cost, productivity and reputational damage. Being prepared to detect and quickly respond to incidents will help to reduce the business impact and prevent the attacker from inflicting further damage. If the cyber-attack results in a personal data breach then you have a […]

    Written on Monday, 16 September 2019
  • Cyber Resilience for Charities

    A Round Table Event for Charities Charities are increasingly reliant on IT and technology and are falling victim to a range of malicious cyber activity. The recent government Charity Sector Threat Assessment indicates that losing access to this technology, having funds stolen or suffering a data breach through a cyber-attack can be devastating, both financially and […]

    Written on Thursday, 07 March 2019