Global examination body APMG-International has launched an online portal to help businesses better navigate the complex landscape of cybersecurity certifications and accreditation schemes.
In response to mounting risks in a digital age, APMG has cultivated a broad range of cybersecurity education schemes with internet security and data protection at their center, developed in conjunction with UK government bodies such as CESG, the Information Security arm of GCHQ, the Defence Science and Technology Laboratory, and industry specialists like AXELOS.
The mobile-optimised portal provides a tool that allows users to locate Accredited Training Providers (ATOs), and features in-depth information about all of APMG’s 11 cybersecurity and resilience products, to assist with the selection process.
It houses resources for the full range of schemes currently available, from ISO 27001 to specialist schemes such as RESILIA. RESILIA is an AXELOS product comprising a portfolio of training, learning and certification tracks, designed to help organizations define what good cyber-resilience looks like and embed it into existing management systems, by utilizing the Cyber Resilience Best Practice Guide.
Other schemes include courses on the Cyber Defence Capability Assessment Tool, CESG Certified Professional certification, Cloud Industry Forum Code of Practice and OBASHI certification, which enables organizations to make better decisions through operational transparency.
“Data breaches are on the rise, both in terms of frequency and economic impact, so it’s important that businesses have access to clear, straightforward advice that can cut through the incredibly noisy cybersecurity market,” said Richard Pharro, CEO of APMG. “Technological solutions, such as encryption and firewalls, can only go so far to protect your data; organizational set-up and culture are just as important, if not more so, which is why business-relevant accreditation and certification schemes are key. The cybersecurity frameworks we have developed are key to embedding sound practices within organizations, helping them to adopt a best practice approach to securing their data.”
View the original content and more from this author here: http://ift.tt/1GsaIEt
from cyber security caucus http://ift.tt/1GYZjzd
via IFTTT
No comments:
Post a Comment