Information Protection Training Consultant in Kenya
Organizations face various threats to information both from internal and external. These information if lost, compromised, or disclosed without authorization, could affect negatively an individual or an organization. Information and intellectual capital is often worth more to an enterprise than its physical assets. Such information is of significant value to adversaries who will strive to get access to it usually unseen and undetected, through theft, solicitation, inadvertent disclosure and hostile interception. This is even more challenging to the organizations since unlike a traditional crime, there may be no evidence of the theft or access to information by the adversary especially with increase in the use of internet in communication thus making it difficult to institute legal action against the adversary.
Organizations should always be aware of the existing and potential threats to information in order to develop security measures to effectively protect it. It is worth to note that treat tempo increases day by day due to rapid innovation and technology in terms of internet connection devices which the adversary in most cases exploits the gaps that arises with new technology. Therefore organizations should always be ahead of the adversary in the technological development loop in order to avoid struggling to catch up with the technology in protecting personal data. Much more focus should be on the employees since their day to day actions may create vulnerability in information protection.
Objectives of this training:
The purpose of this this training is to identify risks to information and to present a range of means to mitigate these risks. Information security can only be achieved through a layered approach, taking into account the many dimensions for exploitation. The training will examine information risks and information security in general.
Outcome of this training: Upon completion of this course participants will be able to:
a. Appreciate the value of information asset.
b. Advice on information threats and vulnerabilities.
c. Recommend approaches to protect information.
d. Implement measures to protect information.
Those who will benefit from the training: This training targets management level staff at any organization.
Duration: This protection of information training is a five day training.
Pre-requisite: There are no pre-requisite this protection of information training, however, it is recommended that participants be at management or supervisory level and should be able to speak and write Basic English.