LearnThis free online Introduction to Risk Management course from Alison will teach you the essential terminologies, categories of risks, and risk management approaches and tools which you can apply to your organisation. Risk management helps identify, assess, and manage problems and is essential for the success of any business. With this course, you will get to know useful information about risk management that will serve you well in your career. Learning outcomes;
0 Comments
You can use a risk assessment template to help you keep a simple record of:
Resources for security professionals; Free security and safety management plan, you can download and apply this template to your projects. Document credit and Reference link: GISF
The use of TikTok on government equipment is being prohibited in the UK.
Cabinet ministers requested risk assessments, which prompted the ban. The security risk assessments and cyber security risk assessments that were carried out, looked at the potential exposure of public information from social networking apps on mobile devices and the risks associated with how sensitive information could be acquired and utilised by some platforms. Government policies on the management of third-party purposes will be strengthened, and a preventative restriction on TikTok on government devices is being established, given the undoubtedly sensitive nature of data that is saved on government devices. "The ban on government devices applies to government corporate devices within all government departments. Specific exemptions for the use of TikTok on government devices are being put in place where required for work purposes. Exemptions will only be granted by security teams on a case-by-case basis, with ministerial clearance as appropriate, and with security mitigations put in place. These exemptions will cover areas such as individuals working in relevant enforcement roles, or for example for the purposes of work on online harms." Source and Credit Ref: GOV.UK This is a useful resource for security professionals; A free to use, risk assessment template from the UK government. "A security risk assessment identifies, assesses, and implements key security controls in applications. It also focuses on preventing application security defects and vulnerabilities."
Russia-Ukraine War
Reports of Putin having visited Mariupol, in Ukraine, have been buzzing across the media; These reports come, not long after the ICC issuing arrest warrants for the Russian President. The independent reports; "Kyiv officials described Vladimir Putin as a “criminal” returning to a “crime scene” after the Russian president visited Mariupol in the second of two appearances in Ukraine after a warrant for his arrest was issued by the International Criminal Court." ICC Statement; Today, 17 March 2023, Pre-Trial Chamber II of the International Criminal Court (“ICC” or “the Court”) issued warrants of arrest for two individuals in the context of the situation in Ukraine: Mr Vladimir Vladimirovich Putin and Ms Maria Alekseyevna Lvova-Belova. Mr Vladimir Vladimirovich Putin, born on 7 October 1952, President of the Russian Federation, is allegedly responsible for the war crime of unlawful deportation of population (children) and that of unlawful transfer of population (children) from occupied areas of Ukraine to the Russian Federation (under articles 8(2)(a)(vii) and 8(2)(b)(viii) of the Rome Statute). The crimes were allegedly committed in Ukrainian occupied territory at least from 24 February 2022. There are reasonable grounds to believe that Mr Putin bears individual criminal responsibility for the aforementioned crimes, (i) for having committed the acts directly, jointly with others and/or through others (article 25(3)(a) of the Rome Statute), and (ii) for his failure to exercise control properly over civilian and military subordinates who committed the acts, or allowed for their commission, and who were under his effective authority and control, pursuant to superior responsibility (article 28(b) of the Rome Statute). Ms Maria Alekseyevna Lvova-Belova, born on 25 October 1984, Commissioner for Children’s Rights in the Office of the President of the Russian Federation, is allegedly responsible for the war crime of unlawful deportation of population (children) and that of unlawful transfer of population (children) from occupied areas of Ukraine to the Russian Federation (under articles 8(2)(a)(vii) and 8(2)(b)(viii) of the Rome Statute). The crimes were allegedly committed in Ukrainian occupied territory at least from 24 February 2022. There are reasonable grounds to believe that Ms Lvova-Belova bears individual criminal responsibility for the aforementioned crimes, for having committed the acts directly, jointly with others and/or through others (article 25(3)(a) of the Rome Statute). Pre-Trial Chamber II considered, based on the Prosecution’s applications of 22 February 2023, that there are reasonable grounds to believe that each suspect bears responsibility for the war crime of unlawful deportation of population and that of unlawful transfer of population from occupied areas of Ukraine to the Russian Federation, in prejudice of Ukrainian children. The Chamber considered that the warrants are secret in order to protect victims and witnesses and also to safeguard the investigation. Nevertheless, mindful that the conduct addressed in the present situation is allegedly ongoing, and that the public awareness of the warrants may contribute to the prevention of the further commission of crimes, the Chamber considered that it is in the interests of justice to authorise the Registry to publicly disclose the existence of the warrants, the name of the suspects, the crimes for which the warrants are issued, and the modes of liability as established by the Chamber. The abovementioned warrants of arrests were issued pursuant to the applications submitted by the Prosecution on 22 February 2023. The BBC have released a map and route trace of the Russian President during his visit; BBC extract; "The BBC identified some of the key landmarks along the Russian leader's route. Mr Putin appears to be driving down Kuprina St, turning into Myru Avenue and then into Metalurhiv Avenue, where the Philharmonic Concert Hall is and which he visits later on in the footage. He is sitting next to a man in a black cap, who Russian media identify as Russian Deputy Prime Minister Marat Khusnullin. On his left as they drive down Myru Avenue are sculptures of birds in what was Mariupol's Freedom Square. Further on, on the right and not shown in the footage, is Mariupol's Maternity Hospital Number Three, which was bombed in a notorious incident last March." A bold move by the Russian President, one of further defiance inlight of the move to issue arrest warrants in his name, Mariupol is the first of the Russian occupied territories that Putin is known to have visited. Reference Links; https://www.icc-cpi.int/news/situation-ukraine-icc-judges-issue-arrest-warrants-against-vladimir-vladimirovich-putin-and https://www.reuters.com/world/europe/putin-makes-surprise-trip-mariupol-first-occupied-donbas-ukraine-2023-03-19/ https://www.bbc.co.uk/news/world-europe-65007289 https://www.independent.co.uk/news/world/europe/putin-visits-mariupol-arrest-warrant-b2303950.html Growing a Successful Freelance Business;
Do you want freedom of choice, work and money? Current employment scenarios are changing fast. Working from home is considered the new norm and the ‘gig economy’ is gaining ground. It has resulted in high demand for freelance work. In this entrepreneurship course, we equip you with all the tools, insights and road map to start, run and grow a successful freelance business and live the kind of life you always dreamed of. Happy freelancing!
You wish to progress and learn? The information within the course is free. The certification comes at a cost, you are not obligated to purchase the certificate. To do the course simply click on the Alison logo, log into TCG Training Solutions LMS and the course will be available. Our CPD program is a non-profit idea, profits gained through teaming up with Alison will go towards empowering other professionals and those taking their first steps into professional life, for every certificate awarded and paid by you, TCG will donate £6.90, towards funding a course for another professional, professionals are selected through a competition process and is open to all to enter the competition. How often do you find yourself checking in on social media each day? This course will provide you with the skills and tools you'll need to investigate and monitor an ever-expanding and constantly changing social media ecosystem. Social media intelligence allows one to gather intelligence from social media sites like Facebook, Twitter, Instagram and so on. This type of intelligence gathering is one element of Open-Source Intelligence (OSINT).
ISO/IEC 27001 - Dynamics of Information Security Management System (ISMS)
This free online course on ISO 27001 explains the latest standard on information security management systems (ISMS). You will be introduced to the context of ISMS, and the business case for ISMS. You will also learn about other standards on information security, terminology used in ISMS, the requirements in ISO 27001:2013 and a brief guide on how to implement those requirements. Start learning about information security management systems today. Learning outcomes;
If you wish to progress and learn, the information within the course is free. The certification comes at a cost, you are not obligated to purchase the certificate. To do the course simply click on the Alison logo, log into TCG Training Solutions LMS and the course will be available. Our CPD program is a non-profit idea, profits gained through teaming up with Alison will go towards empowering other professionals and those taking their first steps into professional life, for every certificate awarded and paid by you, TCG will donate £6.90, towards funding a course for another professional, professionals are selected through a competition process and is open to all to enter the competition. TCG has witnessed the growing demand for surveillance and investigation services to protect businesses from a wide range of threats.
These services are increasingly critical in safeguarding companies against corporate espionage, fraud, theft, and other criminal activities. Surveillance services can play a significant role in supporting security operations. By monitoring critical areas, such as data centres, warehouses, and manufacturing plants, businesses can prevent unauthorised access and detect suspicious behaviour. This can be achieved using advanced technologies like video cameras and motion detectors to provide real-time alerts and enable remote monitoring. Surveillance services can also help identify and prevent internal risks. By monitoring employee behaviour, organisations can detect misconduct such as stealing company assets or leaking confidential information. Discreet surveillance can minimise the risk of backlash or legal repercussions and ensure employees remain unaware of the monitoring. Counter-surveillance measures are crucial for businesses as they are increasingly being targeted by rival companies, hackers or foreign governments seeking to steal sensitive information or gain a competitive advantage. Counter-surveillance measures can help detect and neutralise such threats by identifying potential surveillance activities and implementing measures to prevent them. Investigation services are equally important in protecting businesses from threats. These services can investigate fraud, embezzlement, and other crimes that can negatively impact a company's finances and reputation. Skilled investigators can gather evidence, interview witnesses and build a strong case that can be used in court to recover lost assets and prosecute offenders. Investigation services can also identify and neutralise internal threats. For example, employees engaging in illegal activities or violating company policies. Discreet investigations can minimise disruption to business operations and prevent the disclosure of sensitive information. In conclusion, surveillance and investigation services are critical in supporting security operations and protecting businesses from various threats. By employing these services, organisations can enhance their security posture, prevent loss of assets, and safeguard their reputation. |
Int Dept.
Blog Space. Archives
January 2024
Archives
All
|