Data Security For Business Analysts

Description:

In the modern enterprise, the data in our possession is the most valuable asset that we have.  Our information allows us to know who our customers are and what their preferences are. It allows us to track how our organisation is performing and identify improvements.  It can be the digital products and services that we provide and whole data centres can be stood up or torn down through Infrastructure as Code.  It can even be used to train AI tools to create new content, derive valuable insights or perform business activities.  When something is as powerful and valuable as our information, it should come as no surprise that it requires special measures to keep it safe and preserve its value.

This course is designed for business analysts with some experience of delivering change and provides an understanding of how the security of the data that your business relies on can be compromised.  We will explore what the basic requirements are necessary for ensuring that information can be protected from theft or unauthorised access using controls such as encryption, data loss prevention (DLP) and also how to protect against tampering and corruption using certificates and integrity checks.  You will learn how to discuss data security concerns with a range of different stakeholders including fraud prevention, legal and compliance, and operational teams and understand how to begin the process of shaping an effective information protection strategy.

Objectives:

After the course you will be able to:

  • Describe the six steps of the information lifecycle.

  • Describe the qualities of information security and give examples of both threats to that security and the corresponding controls that are available to protect against those threats.

  • Understand how data security ties into your organisation’s obligations to ensure that customer data, intellectual property and data that is required for reporting or as evidence is appropriately protected.

  • Understand the importance of information classification and categorisation and how to find a balance between preserving data, and when it should be securely destroyed.

  • Understand what the characteristics of a robust backup and recovery strategy are and when this is required.

Structure:

This course is delivered as a 2 day course, or equivalent.

There are currently no spaces available on this course. If you are interested in booking a place on a future course, please let us know via the button below.