Senior Information Risk Owner (SIRO) Training: All you need to know
This is a one day in depth course that covers the role and responsibilities of the SIRO. We will cover how to manage working relationships with your Information Asset Owners, Data Protection Officer and other Information Governance team members. How to develop and maintain an Information Risk Register. We will guide you through threats, hazards, controls, and the use of Data Protection Impact Assessments (DPIA). New to the role of Senior Information Risk Owner (SIRO) or need an update, this is the course for you. It is an in depth course covering the role and responsibilities of the SIRO. We will cover how to manage working relationships with your Information Asset Owners, Data Protection Officer and other Information Governance team members. How to develop and maintain an Information Risk Register. We will guide you through threats, hazards, controls, and the use of Data Protection Impact Assessments (DPIA).
The course also covers the legal framework of General Data Protection Regulation (GDPR), Data Protection Act 2018, e-Privacy regulations, cyber resilience and ISO 27001, all of which you will need to have knowledge of as a SIRO. We will also look at the importance of leadership, supporting and developing a compliance program, the accountability principle and records of processing activities.
|9.15 - 9:30||Coffee and Registration|
|9.30 - 10:00||Welcome|
|10.00 - 11:30||
Background to Senior Information Risk Owner (SIRO) roles and responsibilities. Risks, Threats, Vulnerabilities, Controls and Potential outcomes.
|11.30 - 11:45||Coffee|
|11.45 - 13:00||National Reviews & Standards Legal Framework and GDPR Information Risk Management. Data breach management.|
|13.00 - 13:30||Lunch|
|13.30 - 14:45||Information Asset Management & Data Flow Mapping and Create Your Own Data Flow Map. Pseudonymisation, Anonymisation and Encryption. Primary and Secondary use of data.|
|14.45 - 15:00||Coffee|
|15.00 - 16:30||What are Data Protection Impact Assessments? Information Security Management Systems and how to build an Information Asset Management culture.|
|16.30||Summary and Final Questions|
|London||6th June 2019|
|Cardiff||10th July 2019|
|Manchester||5th September 2019|
|London||10th October 2019|
|Cardiff||7th November 2019|
Want to know more about our Trainers?
Our Trainers are amazing, between us we have over 100 years of experience working in information Governance.
Leadership Through Data provide bespoke training courses that are custom made to your needs. Bespoke courses provide an exclusive learning and development opportunity which is cost effective.
If you did not find the course you are looking please contact us and we can discuss and design the right course for you. For a no obligation quote, email email@example.com or call 07931566007 or 01206 807267
All prices include the attendance of 15 delegates, a course workbook, additional reading, slide handouts, an LTD delegate folder, a pen and a CPD certificate. If booked in advance, we offer a 4 week after care package.