We offer a range of training courses and presentations. Sessions include:
Awareness training is designed to address one problem that computers cannot solve: how to make people behave securely. Although most security incidents can be attributed to human error, when given proper training, humans can detect and prevent novel attacks that computers will miss. By helping employees understand how security breaches occur and how cybercriminals operate, organisations can defend themselves more effectively, and minimise the damage from successful attacks.
The Chain's security awareness training sessions raise awareness through an engaging presentation, real-life war-stories and hacking demonstrations.
What your staff will learn:
All organisations that process credit card transactions must meet the requirements of the Payment Card Industry Data Security Standard (PCI DSS). As of January 1st 2015 PCI DSS version 3 came into force. This new version contains many important changes and new requirements. Most organisations have struggled to comply with version 2 and the new standard sets the bar even higher.
This presentation will provide a summary of what’s new as well as some reminders of existing requirements.
Attendees will learn about key changes in PCI requirements such as:
There will also be some reminders and clarification on often-misunderstood areas such as:
Who should attend?
Typically professionals in IT, compliance, finance, and legal, as well as anyone else who is involved with PCI compliance.
This short lecture offers an insight into the fascinating world of computer forensics. Electronic evidence is everywhere and holds many secrets about our activities – public and private. Courts and industrial tribunals are seeing increasing amounts of electronic evidence. Failing to understand and properly handle electronic evidence can lead to missed opportunities and legal disasters. This presentation aims to increase awareness of the subject so that organisations are better placed to deal with incidents and respond to litigation.
After a short explanation of the theory and application of forensics a series of case studies are used to teach attendees when, where and how to use forensics.
The presentation is designed to provide an understanding of what computer forensics is and show just how effective it can be in supporting a wide range of investigations and disputes. The session will also outline the investigative process and highlight some of the common mistakes made when handing electronic evidence. After the course attendees will know how to utilise forensics investigations in their own organisations.
Litigation teams, in-house legal counsel, internal auditors, compliance and risk officers, MLRO’s, HR, IT, security staff, directors, other senior management and anyone likely to be involved in dealing with an investigation or litigation.