Introducing ramsac’s board certified cybersecurity training

Remote worker Do your board members have certificates to prove their cybersecurity training? CyberSecurity is an issue for every single one of us, and if your name is listed as a Director at Companies House or if you are a Trustee or a Board Advisor then you have an unavoidable personal liability for a breach within your organisation. Fines levied and prosecutions made as a result of a data breach or cybersecurity attack or error are legally done so under the principles of The General Data Protection Regulation and under GDPR it is a requirement that all staff receive CyberSecurity education. There are plenty of training options for your workforce but a distinct lack of board training offerings. ramsac have created two different workshops which both satisfy these compliance requirements. The training can be delivered to your entire board in a privately booked session or alternatively individual directors or trustees can book a space on one of the monthly courses. Private bookings can either be delivered in person or remotely. The open board sessions are all delivered monthly on a remote training platform and attendees of either session receive a certificate to prove compliancy.

The workshops

Both Board training sessions are delivered by Rob May. Rob is founder and Managing Director of ramsac, he is also an award-winning CyberSecurity Speaker and recently listed in the top 10 CyberSecurity Keynote speakers worldwide. Rob is also the UK Ambassador for Cybersecurity for the Institute of Directors, on the Advisory Board of the South East Cyber Resilience Centre and he is currently ranked No.5 in the Global rankings for CyberSecurity Thought Leaders/Influencers. His TED Talk has now had over 400,000 views (on TEDx YouTube and TED.COM). He is a published author selling his cybersecurity books on Amazon in 7 countries. And he makes a complex yet vital subject fun, entertaining, actionable, and very relevant.

Related Posts

  • Understanding the dangers of ‘Permission Creep’

    Understanding the dangers of ‘Permission Creep’

    Cybersecurity

    This blog post explains what permission creep is, how it can expose sensitive data to unauthorised users, and what steps an organisation can take to prevent permission creep. [...]

    Read article

  • Using cybersecurity training to reduce an organisation’s risk of a cyberattack.

    Using cybersecurity training to reduce an organisation’s risk of a cyberattack.

    Cybersecurity

    Cybersecurity training is an important tool for organisations to prevent and mitigate cyberattacks, we explore the types of training available to organisations. [...]

    Read article

  • The risks of ChatGPT, and the Rise of AI.

    The risks of ChatGPT, and the Rise of AI.

    Cybersecurity

    Artificial intelligence (AI) is a game-changing technology in this blog we explore the risks and benefits of using AI-powered language models such as ChatGPT [...]

    Read article

  • How secure is MFA based on SMS and Voice calls?

    How secure is MFA based on SMS and Voice calls?

    Cybersecurity

    In this blog ramsac's cybersecurity expert Voke Augoye explores how secure Multi-factor authentication is when using SMS and voice calls. [...]

    Read article

  • Microsoft Office – High Severity Vulnerability

    Microsoft Office – High Severity Vulnerability

    Cybersecurity

    Earlier this month Microsoft announced there was a High Severity vulnerability affecting Microsoft Office products. In this blog we explain what the vulnerability is and how to protect against it. [...]

    Read article

  • EDR, MDR, XDR, SIEM, SOC – understanding the jargon in cybersecurity monitoring

    EDR, MDR, XDR, SIEM, SOC – understanding the jargon in cybersecurity monitoring

    Cybersecurity

    The cybersecurity product market is full of acronyms which can make it hard to determine what security monitoring services you need, and what benefits you get from them, this [...]

    Read article