The National Skills Academy for IT. Cyber Security

Size: px
Start display at page:

Download "The National Skills Academy for IT. Cyber Security"

Transcription

1 The National Skills Academy for IT Cyber Security 1

2 WELCOME The Rt. Hon. David Blunkett welcomes employers and stakeholders from the Cyber Security Industry NATIONAL SKILLS ACADEMY for IT PLANS FOR TRAINING SOLUTIONS in CYBER SECURITY & REQUESTS for YOUR HELP & SUPPORT e-skills UK supported by EURIM February 28, 2011 e-skills UK

3 e-skills UK Strategy e-skills UK Mission Unite industry, educators and government to ensure the UK has the technology-related skills to compete in the global economy. e-skills UK Vision That the UK is recognised as a global leader in delivering business value from technology: The IT workforce is recognised as best in the world for solving business problems, enabling global leadership in high value services, innovation and IT-enabled change; Managers and leaders in every sector are able to fully exploit the strategic potential of technology; All individuals have the IT user skills needed to participate in employment and society; and Educators have the knowledge and skills to support development of a world-class IT skills pool.

4 e-skills UK Employer Board(s) IT & Telecoms Industry Board David Thomlinson, Country Managing Director, UK & Ireland, Accenture Sally Davis, Chief Executive, BT Wholesale John Pluthero, Executive Chairman, UK, Cable & Wireless Worldwide Phil Smith, VP and Chief Executive, UK & Ireland, Cisco Craig Wilson - Managing Director and VP, UK & Ireland, HP Enterprise Services Stephan Leonard, Chief Executive UK & Ireland, IBM Andy Green (Chair & Chair e-skills UK), CEO, Logica Gordon Frazer MD, UK and VP, MS International, Microsoft David Callaghan, Senior Vice President, Oracle Gayna Hart, MD, Quicksilva A. S. Lakshminarayanan, VP & Head of Europe, Tata Consultancy Services Nick Read, CEO of Asia-Pacific & Middle East Regions, Vodafone CIO Board Paul Coby (Chair), CIO, British Airways Philip Langsdale, CIO, BAA Tiffany Hall, CIO, BBC Lesley Hume, CIO, Cabinet Office (also Head of Government IT Profession) Simon Post, Chief Technology Officer, Carphone Warehouse Ailsa Beaton, Director of Information, Metropolitan Police Service David Lister, CIO, National Grid Catherine Doran, Director Corporate Development, Network Rail Rob Fraser, IT Director, Sainsbury s Richard Thwaite, CIO, Global Asset Management, UBS Ben Wishart, Change and Information Director, Whitbread

5 Employers & employer intermediaries educators government and agencies Strategic objective 1: Strategic objective 2: Strategic objective 3: Future talent Motivate talented students to pursue IT-related careers, and better prepare all young people for work in a technologyenabled world IT professionals Develop the IT professional skill pool as the best in the world for deriving business benefit from technology The IT Nation Promote the compelling benefits of increased IT capability to organisations and individuals in every sector sector solutions Employer engagement Generate exceptional employer engagement which raises demand and investment in skills Research Deliver authoritative labour market intelligence which enables effective influence on policy, strategy &solution development Standards & qualifications Implement a coherent sector qualifications & learning strategy which ensures skills supply is driven by the needs of employers and learners core activities Partnerships Establish strategically-aligned partnerships which capitalise on the power of collective action to deliver on this strategy

6 e-skills UK research Jan 2011 Jan Technology Insights 2011: UK 500,000 IT & Telecoms professionals needed in UK over 5 years Cyber Security is in top 3 of future UK skills needs

7 National Skills Academy for IT - Purpose THE THE NATIONAL SKILLS ACADEMY FOR FOR IT IT The The Academy is is an an independent, vendor vendor neutral, not-for-profit organisation with with unprecedented employer backing to to secure secure the the best best possible return return on on investment in in learning and and development by by helping: Individuals can can develop the the skills skills that that will will make make the the most most difference to to their their careers; Smaller companies to to win win more more business by by getting getting the the right right skills skills at at the the right right time; time; Larger Larger companies to to accelerate the the business contribution of of their their people people and and integrate fresh fresh talent talent more more quickly. Education and and training providers to to increase their their revenues by by participating in in the the new new and and growing markets. 7

8 The Academy Role in Cyber Security The The National Skills Skills Academy for for IT IT is is seeking to: to: Develop and and maintain a comprehensive database of of valued valued IT IT qualifications and and learning; Become a trusted source source of of information for for IT IT professionals and and organisations of of all all sizes sizes to to find find and and compare courses and and qualifications; Define Define and and record record skills skills in in IT IT security enabling training gaps gaps to to be be fulfilled; Focus Focus on on employers needs needs in in this this area area in in order order to to identify, prioritise and and commission new new learning to to continue to to best best fulfil fulfil employers needs. needs. 8

9 Proposed Plan Outline Proposed Plan is is in in the the hand out out Focus of of the the proposed plan is is to to Build on on the the list list of of IT IT security learning and and qualifications; and and Identify and and resolve gaps in in Cyber Security learning provision 9

10 Academy Qualifications and Learning in Cyber Security Establish the the landscape of of Cyber Security qualifications and and learning in in order to: to: Promote the the attainment of of skills and and qualifications Make clear the the purpose and and aims of of qualifications and and learning Enable comparison between different types of of qualificatıon and and learning Link qualifications and and learning to to skills needs and and CPD Support access by by providing a searchable, structured listing of of qualifications, exams and and courses which defines the the qualification structure, course content, level and and assessment 10

11 Qualifications and Learning in Cyber Security Learning and and development includes: Professional qualifications with with exams Vendor-specific technical qualifications Third-party and and vendor-neutral technical qualifications General qualifications Non assessed courses Higher and and further education short courses, and and qualifications (e.g. MSc) Employer own training e-learning 11

12 Provide clarity Clarity of of what qualifıcations and courses mean in in terms of: of: What they deliver (learning outcomes) Different levels of of knowledge, understanding and and competence Delivery format Assessment methodology used Decoupling of of learning and and assessment Relationships between different types of of qualificatıon 12

13 List of IT Security Qualifications Where we have got to: Reviewed and Listed 320 IT Professional Qualifications We require your help and support to complete this activity Vendor/ Qualification BCS ISEB IT Governance, Information and Security Certificate in Information Security Management Principles Check Point Check Point Certified Security Administrator Check Point Certified Security Expert Cisco Cisco Certified Security Professional Computing Technology Industry Association (CompTIA) Security+ GIAC (Global Information Assurance Certification) Audit Forensics Legal Management Security Administration Software Security Hewlett Packard CONFIDENTIAL Qualification Acronym (where given) none none CCSA CCSE CCSP none none none none none none none HP Master Accredited Systems Engineer Security ASE (ISC)² Certified Information Systems Security Professional Certified Secure Software Lifecycle Professional Information Systems Security Architecture Professional Information Systems Security Engineering Professional Systems Security Certified Practitioner Microsoft Microsoft Certified Systems Administrator Security Microsoft Certified Systems Engineer Security CISSP CSSLP ISSAP ISSEP SSCP MCSA MCSE

14 Identifying & Resolving GAPS in Cyber Security provision The The objectives are are to to (in (in the the context of of Cyber Security): Investigate with employers where their training needs are are not not currently being fulfilled or or are are likely to to shift in in the the future Identify and and prioritise with employers opportunities for for new learning development Establish new high quality, cost effective, training provision to to meet market needs. 14

15 Approach and methodology There are are several scenarios for for employers where they may seek new provision of of training: Where there are are gaps in in current learning provision As As a result of of new and and emerging technologies and and practices In In response to to changes in in legislation, policy and and threats 15

16 Meeting the demand for new learning We We aim aim to: to: Engage with with employers to to understand their ongoing priorities for for new training or or fulfilment issues Aggregate and and prioritise new learning opportunities Develop new learning specifications in in response to to the the prioritising of of opportunities Work with with training providers to to commission high quality new learning (content, delivery, quality) Deploy effective new learning 16

17 SUPPORT FOR ACADEMY WE WE NEED NEED YOUR YOUR HELP HELP 17

18 Support to build a database of qualifications and courses Request - industry employer and and stakeholder support to: to: Collect Collect relevant accreditations, qualifications and and courses for for the the security industry which which you you can can access access which which builds builds on: on: The The Academy s work work to to date date collating Cyber Cyber Security courses and and qualifications; and and The The work work to to date date undertaken by by EURIM EURIM and and others others on on identifying qualifications and and courses Above Above updated by by employers and and stakeholders (you) (you) Request e-skills e-skills UK UK will will facilitate a small small Advisory Group Group of of security industry employer experts to to oversee this this exercise Outcome Access Access by by all. all. A report report will will produced in in the the next next few few months months on on its its usage, usage, status, status, progress and and VALUE VALUE to to the the INDUSTRY. 18

19 Employer help with research - one to one interviews High High level level research 1-to-1 1-to-1 interviews of of employers to to determine their their immediate needs needs for for short short courses; and and help help identify identify any any gaps gaps in in provision which which the the Academy could could commission and and develop in in the the future future Request to to employers or or employer bodies Please us us know know if if you you are are willing to to be be interviewed. 19

20 NEXT STEPS how to get involved Next Next Steps Steps Get Get Involved form form in in your your pack. pack. Fill Fill in in and and hand hand it it to to an an e-skills e-skills UK UK colleague with with your your business card. card. Or Or simply simply Summary of of Requests Employers and and stakeholders to to provide up-to-date information to to populate the the Academy database of of qualifications and and courses Security industry employers volunteer for for an an Advisory Group Group Employers to to participate in in 1 to to 1 interviews to to determine their their needs. Any Any other other feedback to to ensure success of of the the Academy. 20

21 THE THE Rt. Rt. Hon. Hon. DAVID DAVID BLUNKETT MP. MP. 21

22 THANK YOU Contact : Nigel.Payne@e-skills.com. More information:

Technology Insights 2011. Summary

Technology Insights 2011. Summary Technology Insights 2011 Summary Technology Insights 2011 2010 Reserved, e-skills UK All rights reserved. No part of this material protected by this copyright may be reproduced or utilised in any form,

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

(ISC) 2 2012 Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow

(ISC) 2 2012 Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow (ISC) 2 2012 Career Impact Survey Executive Summary The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow Skilled security professionals enjoy job stability and mobility,

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Developing tomorrow s e-leaders today

Developing tomorrow s e-leaders today Initiative of e-skills / e-leadership / education in the UK Developing tomorrow s e-leaders today Nigel Payne, on behalf of employers of The Tech Partnership June 5, 2015 The Tech Partnership 2015 The

More information

ESKISP6046.02 Direct security architecture development

ESKISP6046.02 Direct security architecture development Overview This standard covers the competencies concerned with directing security architecture activities. It includes setting the strategy and policies for security architecture, and being fully accountable

More information

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org

Security Certifications. A Short Survey. Welcome. Stan Reichardt stan2007@sluug.org Security Certifications A Short Survey Welcome Stan Reichardt stan2007@sluug.org Disclaimer This is just a cursory look at what is out there. I believe certifications are good training tools, but not necessarily

More information

January 2016. Communications Manager: Information for Candidates

January 2016. Communications Manager: Information for Candidates January 2016 Communications Manager: Information for Candidates Thank you for expressing interest in the role of Communications Manager. We have compiled this information pack to tell you more about The

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com

Part-time MSc in Cyber Security from Northumbria University. masters.qa.com Part-time MSc in Cyber Security from Northumbria University masters.qa.com Thank you for your interest in Northumbria University s part-time MSc in Cyber Security programme, delivered in Central London

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

The Information Economy Council Digital Skills Strategy

The Information Economy Council Digital Skills Strategy Industrial Strategy: government and industry in partnership The Information Economy Council Digital Skills Strategy July 2014 Digital Skills Strategy 1 In June 2013, the Information Economy Strategy set

More information

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..

More information

January 2016. Brand and Campaigns Executive: Information for Candidates

January 2016. Brand and Campaigns Executive: Information for Candidates January 2016 Brand and Campaigns Executive: Information for Candidates Thank you for expressing interest in the role of Brand and Campaigns Executive. We have compiled this information pack to tell you

More information

Volunteer Managers National Occupational Standards

Volunteer Managers National Occupational Standards Volunteer Managers National Occupational Standards Contents 00 Forward 00 Section 1 Introduction 00 Who are these standards for? 00 Why should you use them? 00 How can you use them? 00 What s in a Standard?

More information

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3

More information

CEN/ISSS Workshop on ICT-SKILLS. e-certification in Europe

CEN/ISSS Workshop on ICT-SKILLS. e-certification in Europe JOS1 CEN/ISSS Workshop on ICT-SKILLS e-certification in Europe John O Sullivan WCC Milano 10 September 2008 Diapositiva 1 JOS1 John O'Sullivan; 06/09/2008 Project Team John O Sullivan UK Roberto Bellini

More information

Programme Specification

Programme Specification Programme Specification Course record information Name and level of final award: MSc Cyber Security and Forensics Name and level of intermediate awards: Postgraduate Diploma in Cyber Security and Forensics

More information

Full-Speed Ahead: The Demand for Security Certification by James R. Wade

Full-Speed Ahead: The Demand for Security Certification by James R. Wade Full-Speed Ahead: The Demand for Security Certification by James R. Wade It s no secret that technology is creating a more connected world every day. But as new technologies are released and adopted, the

More information

The Value of Information Security Certifications

The Value of Information Security Certifications The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials

More information

Overview TECHIS60241. Carry out risk assessment and management activities

Overview TECHIS60241. Carry out risk assessment and management activities Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection

More information

CLOUD COMPUTING WE VE GOT CLOUD COVERED.

CLOUD COMPUTING WE VE GOT CLOUD COVERED. CLOUD COMPUTING WE VE GOT CLOUD COVERED. Training to maximise your cloud solution We know the development and adoption of Cloud Computing technologies has been rapid. And that fast paced technological

More information

BCS-ISEB Business Analysis Training

BCS-ISEB Business Analysis Training BCS-ISEB Business Analysis Training Qualifications and Training Explained 2012 1 BCS-ISEB Business Analysis Training Business Analysis is where business management skills and IT systems skills meet. It

More information

OFFSHORING: MEETING THE CHALLENGE

OFFSHORING: MEETING THE CHALLENGE OFFSHORING: MEETING THE CHALLENGE Elizabeth Sparrow Chair, BCS Working Party on Offshoring and author A Guide to Global Sourcing going further together Offshoring: meeting the challenge IT service globalization

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

ESKISP6055.01 Manage security testing

ESKISP6055.01 Manage security testing Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting

More information

The Software Experts. Software Asset Management Services & Solutions

The Software Experts. Software Asset Management Services & Solutions The Software Experts Software Asset Management Services & Solutions one WORLD CLASS SOFTWARE ASSET MANAGEMENT Make Optimised IT Simple Simplify the management of IT assets and minimise financial, legal

More information

Identify your future leaders with Kallidus Talent

Identify your future leaders with Kallidus Talent Identify your future leaders with Kallidus Talent kallidus.com/ Future proof and develop your team and safeguard your organisation Kallidus Talent Talent and succession planning needn t be difficult. Kallidus

More information

ISO 27001 Information Security Management Services (Lot 4)

ISO 27001 Information Security Management Services (Lot 4) ISO 27001 Information Security Management Services (Lot 4) CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. LHIS TECHNICAL ASSURANCE SERVICES... 3 3. SERVICE OVERVIEW... 4 4. EXPERIENCE...

More information

Is Cloud Computing Right for You. Eric Ku, PMP, MVP CompTIA Certified Cloud Professional itrain (M) Sdn Bhd eric@itrain.com.my

Is Cloud Computing Right for You. Eric Ku, PMP, MVP CompTIA Certified Cloud Professional itrain (M) Sdn Bhd eric@itrain.com.my Is Cloud Computing Right for You Eric Ku, PMP, MVP CompTIA Certified Cloud Professional itrain (M) Sdn Bhd eric@itrain.com.my About Me Started my career with a Singapore Bank Was Head of IT for a Public

More information

Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure

Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure Vendor/Industry Certifications and a College Degree: A proposed concentration for network infrastructure Dr. Garry L. White Gw06@business.txstate.edu Department of Computer Information Systems Texas State

More information

Brochure More information from http://www.researchandmarkets.com/reports/3493712/

Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Brochure More information from http://www.researchandmarkets.com/reports/3493712/ Security Analytics Market by Application (Network Security, Application Security, Data and Information Security, Endpoint

More information

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 The Australian Computer Society is the gazetted authority within Australia to undertake

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

ICT and Information Security Resources

ICT and Information Security Resources Methods GCloud Service Definition ICT and Information Security Resources HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL t: +44

More information

National Occupational Standards. Compliance

National Occupational Standards. Compliance National Occupational Standards Compliance NOTES ABOUT NATIONAL OCCUPATIONAL STANDARDS What are National Occupational Standards, and why should you use them? National Occupational Standards (NOS) are statements

More information

Technology Approved Certifications

Technology Approved Certifications Date Approved Designation Certificate Name Points Microsoft Systems Engineering 04/16/2002 MCSE Microsoft Certified Systems Engineer 280 06/14/2007 MCSE: WIN 2003 Microsoft Certified Systems Engineer:

More information

ECQA Certified Innovation Manager

ECQA Certified Innovation Manager Become an ECQA Certified Innovation Manager www.ecqa.org How? Through an ECQA Certified Online Training Campus When? Starting date 3. 5. 2010 Starting date 20. 9. 2010 Who? - company managers - innovation

More information

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008 Information Security and Privacy Lynn McNulty, CISSP Advisory Board November 2008 Global leaders in certifying and educating information security professionals with the CISSP and related concentrations,

More information

Middlesbrough Manager Competency Framework. Behaviours Business Skills Middlesbrough Manager

Middlesbrough Manager Competency Framework. Behaviours Business Skills Middlesbrough Manager Middlesbrough Manager Competency Framework + = Behaviours Business Skills Middlesbrough Manager Middlesbrough Manager Competency Framework Background Middlesbrough Council is going through significant

More information

Developing The College of Social Work

Developing The College of Social Work Research, Policy and Planning (2010) 28(2), 129-137 Developing The College of Social Work Dorit Braun 1 and Bridget Robb 2 1 Social Care Institute for Excellence (SCIE) 2 British Association of Social

More information

ESKITP2034.03 Assist in the preparation of change management plans and assignments for IT enabled systems 1

ESKITP2034.03 Assist in the preparation of change management plans and assignments for IT enabled systems 1 Assist in the preparation of change management plans and assignments for IT Overview This sub-discipline, Change Management (203) is concerned with the competencies required to manage the introduction

More information

Career Analysis into Cyber Security: New & Evolving Occupations

Career Analysis into Cyber Security: New & Evolving Occupations Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills

More information

Coaching Scotland 2011-2015 A framework for sports coaching in Scotland

Coaching Scotland 2011-2015 A framework for sports coaching in Scotland Coaching Scotland 2011-2015 A framework for sports coaching in Scotland Introduction Welcome to Coaching Scotland 2011-2015 a framework for sports coaching in Scotland. This framework builds upon our previous

More information

Updates to the Business Systems Development (BSD) Diplomas

Updates to the Business Systems Development (BSD) Diplomas Updates to the Business (BSD) Diplomas Introduction ISEB has been offering the BSD qualification scheme since 1999. Since that time revisions have been made to the modules in order to ensure that the scheme

More information

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies IT Professional Standards Information Security Discipline Sub-discipline 605 Information Security Testing and Information Assurance Methodologies December 2012 Draft Version 0.6 DOCUMENT REVIEW Document

More information

Diploma In Coaching For High Performance & Business Improvement

Diploma In Coaching For High Performance & Business Improvement THE HOUSTON EXCHANGE POWERFUL, PROFITABLE CONVERSATIONS Diploma In Coaching For High Performance & Business Improvement A professional coaching qualification for Leaders, Managers and HR professionals

More information

People Director Job description

People Director Job description People Director Job description About Teaching Leaders Teaching Leaders is an innovative not-for-profit organisation whose mission is to address educational disadvantage by growing a movement of outstanding

More information

Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board

Update on the CSSLP And its Impact on the SDLC Profession. Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board Update on the CSSLP And its Impact on the SDLC Profession Hart Rossman, CSSLP Member, (ISC) 2 Application Security Advisory Board (ISC)² Built the largest, most comprehensive Software Security Body of

More information

Practitioner Certificate Software Asset Management Syllabus. Version 2.0

Practitioner Certificate Software Asset Management Syllabus. Version 2.0 Practitioner Certificate Software Asset Management Syllabus Version 2.0 June 2010 Practitioner Certificate in Software Asset Management The ISEB Practitioner Certificate in Software Asset Management (SAM)

More information

E-LEADERSHIP FOR SMES THE EUROPEAN INITIATIVE

E-LEADERSHIP FOR SMES THE EUROPEAN INITIATIVE E-LEADERSHIP FOR SMES THE EUROPEAN INITIATIVE FUTURE E-LEADERSHIP EDUCATION AND TRAINING FOR SMES AND START-UPS WERNER B. KORTE, EMPIRICA FIFTH EXPERT WORKSHOP E-LEADERSHIP FOR SMES 9 September 2015 Brussels

More information

JOB DESCRIPTION: Senior Manager HR & Talent Management

JOB DESCRIPTION: Senior Manager HR & Talent Management JOB DESCRIPTION: Senior Manager HR & Talent Management RESPONSIBLE TO: RESPONSIBLE FOR: Group Director The overall management and development of all aspects of HR and Talent Management for the company,

More information

Who we are. Our Mission

Who we are. Our Mission Active Member Guide Introduction Welcome to the Royal Town Planning Institute. We are delighted that you have decided to become an active member and hope you will find being actively involved with your

More information

Equality & Diversity Strategy

Equality & Diversity Strategy Equality & Diversity Strategy Last updated March 2014 1 Statement of commitment Ombudsman Services is committed to equality of opportunity and respect for diversity. As an equal opportunities employer,

More information

ESKISP6056.01 Direct security testing

ESKISP6056.01 Direct security testing Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being

More information

Symposium report. The recruitment and retention of nurses in adult social care

Symposium report. The recruitment and retention of nurses in adult social care Symposium report The recruitment and retention of nurses in adult social care Overview 1. Social care employers providing nursing care services have been raising concerns about nursing recruitment and

More information

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack A New Security Publication About Risk and Security for Business Leaders Sponsorship & Advertising Media Pack Introduction from the Team All organisations need to manage and protect their information effectively,

More information

Professional Diploma in Marketing for Business Services & Solutions

Professional Diploma in Marketing for Business Services & Solutions Professional Diploma in Marketing for Business Services & Solutions Contents About this programme 3 About us ITSMA & CIM Academy 4 Overview 5 Programme structure 6 Course content 7 Entry requirements 10

More information

INFORMATION TECHNOLOGY AND MEDIA SERVICES

INFORMATION TECHNOLOGY AND MEDIA SERVICES INFORMATION TECHNOLOGY AND MEDIA SERVICES Programmes and Planning, Core Systems Modernisation Programme CSM BI Data Migration Technical Lead Full Time, Fixed Term (24 months) Grade G: 36,309-45,954 per

More information

Medical leadership for better patient care: Support for healthcare organisations 2015

Medical leadership for better patient care: Support for healthcare organisations 2015 Medical leadership for better patient care: Support for healthcare organisations 2015 1 Our vision is to see and inspire excellence in medical leadership and drive continuous improvement in health and

More information

Cloud Managed Services Market by Services, by Deployment Type, by Organization Size, by Verticals, & by Regions - Global Forecast 2015-2020

Cloud Managed Services Market by Services, by Deployment Type, by Organization Size, by Verticals, & by Regions - Global Forecast 2015-2020 Brochure More information from http://www.researchandmarkets.com/reports/3262278/ Cloud Managed Services Market by Services, by Deployment Type, by Organization Size, by Verticals, & by Regions - Global

More information

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management Alexa Bona s research currently focuses on IT management. As part of the IT Procurement and Asset o Workshop: Six Steps to Preparing and Negotiating Software Contracts o Negotiating effective sustainable

More information

CSP Core Services Summary 2015-16

CSP Core Services Summary 2015-16 CSP Core Services Summary 2015-16 Sport England invests Core Funding into County Sports Partnerships (CSPs) to provide a consistent set of services for National Governing Bodies and for Sport England.

More information

Abstract. Glue Reply works with Sainsbury s to achieve the Holy Grail in Business Driven IT. Scenario. The project

Abstract. Glue Reply works with Sainsbury s to achieve the Holy Grail in Business Driven IT. Scenario. The project Glue Reply works with Sainsbury s to achieve the Holy Grail in Business Driven IT Abstract Sainsbury s embarked on a project to create one IT plan or road map that would cover the entire enterprise. This

More information

Company Overview. Contact: info@ostiasolutions.com. Address: 6 The Mill Building, The Maltings, Bray, Co Wicklow. Web: www.ostiasolutions.

Company Overview. Contact: info@ostiasolutions.com. Address: 6 The Mill Building, The Maltings, Bray, Co Wicklow. Web: www.ostiasolutions. Company Overview Contact: info@ostiasolutions.com Address: 6 The Mill Building, The Maltings, Bray, Co Wicklow Web: www.ostiasolutions.com Phone: +353 1 276 80 48 About Ostia Solutions Ostia Solutions

More information

Information Security Principles and Practices

Information Security Principles and Practices Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,

More information

Report of Don McLure, Corporate Director of Resources

Report of Don McLure, Corporate Director of Resources AUDIT COMMITTEE 29 June 2015 Annual Review of the System of Internal Audit 2014 / 2015 Report of Don McLure, Corporate Director of Resources Purpose of the Report 1. The purpose of this report is for members

More information

DCA metrics for the approval of Auditing Firms for Certifications Scheme VERSION 1.0

DCA metrics for the approval of Auditing Firms for Certifications Scheme VERSION 1.0 DCA metrics for the approval of Auditing Firms for Certifications Scheme VERSION 1.0 2013, Data Centre Alliance Limited (www.datacentrealliance.org). All rights reserved. This publication may not be reproduced

More information

Involving employers in 14-19 diplomas a guide

Involving employers in 14-19 diplomas a guide Involving employers in 14-19 diplomas a guide Introduction Literally hundreds of thousands of employers already get involved in primary, secondary and further education. Their contribution is voluntary,

More information

Effective Internal Audit in the Financial Services Sector

Effective Internal Audit in the Financial Services Sector Effective Internal Audit in the Financial Services Sector Recommendations from the Committee on Internal Audit Guidance for Financial Services: How They Relate to the Global Institute of Internal Auditors

More information

Corporate Governance and Risk Management Agenda

Corporate Governance and Risk Management Agenda Policy Paper Corporate Governance and Risk Management Agenda Introduction This Agenda sets out the corporate governance and risk management principles and aims which inform and guide the work of ACCA s

More information

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5

More information

Certified Business Analysis Professional (CBAP) Certification

Certified Business Analysis Professional (CBAP) Certification eskills360 Certification Matrix as of Wednesday, August 07, 2013 When reviewing the contents of this document please keep the following points in mind: 1. Exam requirements are subject to change without

More information

Department of Computer Science. BSc COMPUTER SCIENCE. At the forefront of today s digital world UNDERGRADUATE

Department of Computer Science. BSc COMPUTER SCIENCE. At the forefront of today s digital world UNDERGRADUATE Department of Computer Science BSc COMPUTER SCIENCE At the forefront of today s digital world UNDERGRADUATE COMPUTER SCIENCE AT READING Join the next generation of computer scientists driving the digital

More information

The Institute of Risk Management. International Diploma in Risk Management Building excellence in risk management

The Institute of Risk Management. International Diploma in Risk Management Building excellence in risk management The Institute of Risk International Diploma in Risk Building excellence in risk management For nearly 30 years, IRM s International Diploma in Risk has been the global choice of qualification with risk

More information

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity Expert Reference Series of White Papers Planning a Career Path in Cybersecurity 1-800-COURSES www.globalknowledge.com Planning a Career Path in Cybersecurity James Michael Stewart, CISSP, ISSAP, SSCP,

More information

N252; N250; N250; I120; I160; I210 KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University

N252; N250; N250; I120; I160; I210 KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Management Final award(s), title(s) and credits MSc Crisis, Disaster Management

More information

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid

Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.

More information

EUCIP Model and Related Services Frank Mockler Programme Development Manager, ECDL Foundation. Placeholder for licensee logo

EUCIP Model and Related Services Frank Mockler Programme Development Manager, ECDL Foundation. Placeholder for licensee logo EUCIP Model and Related Services Frank Mockler Programme Development Manager, ECDL Foundation EUCIP What is it for? How is it structured? What are its benefits? More than just a group of related certifications

More information

POSTGRADUATE OPEN DAY

POSTGRADUATE OPEN DAY POSTGRADUATE OPEN DAY Monday 1 December 2014 Dr Ivor Spence SCHOOL OF ELECTRONICS, ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Postgraduate Courses Overview MSc Courses MSc Software Development (Conversion)

More information

THE SANS 2005-2007 INFORMATION SECURITY SALARY & CAREER ADVANCEMENT SURVEY

THE SANS 2005-2007 INFORMATION SECURITY SALARY & CAREER ADVANCEMENT SURVEY THE SANS 2005-2007 INFORMATION SECURITY SALARY & CAREER ADVANCEMENT SURVEY What factors impact compensation? Which security certifications matter? What makes security people mad? What matters for career

More information

Digital Leaders Survey

Digital Leaders Survey Contents 1. Key findings 3 2. Top three management issues 4 3. Top three IT topics or trends 5 4. Additional resources needed to address the issues prioritised 6 5. Skills gaps 7 6. Concerns about future

More information

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013 The University of Alabama at Birmingham Information Technology Strategic Plan 2011 2013 Table of Contents Message from the Vice President... 3 About UAB... 4 About UAB Information Technology Meeting needs

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO QUALIFYING PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

ACCREDITATION. APM Corporate CASE STUDY

ACCREDITATION. APM Corporate CASE STUDY Introduction Established in 1969, The Open University (OU) was the world s first successful distance teaching university, founded on the belief that communications technology could bring high quality,

More information

Senior Executive roles

Senior Executive roles INFORMING POLICY AND PRACTICE IN AUSTRALIA S TRAINING SYSTEM Senior Executive roles National Manager - Statistics and Analytics National Manager - Research and Business Development CANDIDATE INFORMATION

More information

Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019

Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019 Brochure More information from http://www.researchandmarkets.com/reports/3104619/ Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019 Description:

More information

Project Portfolio Management Software Market by Platform, by Business Solutions, by Deployment Mode & by Regions - Global Forecast to 2019

Project Portfolio Management Software Market by Platform, by Business Solutions, by Deployment Mode & by Regions - Global Forecast to 2019 Brochure More information from http://www.researchandmarkets.com/reports/3066444/ Project Portfolio Management Software Market by Platform, by Business Solutions, by Deployment Mode & by Regions - Global

More information

RUSI Cyber Security Conference 2011 Cyber Challenges for National Security

RUSI Cyber Security Conference 2011 Cyber Challenges for National Security RUSI Cyber Security Conference 2011 Cyber Challenges for National Security 15-16 November 2011 Day One: Tuesday 15 November 2011 0830 Registration 0900 Morning Keynote Address Professor Michael Clarke,

More information

Panel Services Australian Public Service Commission. Our Vision. The Panels

Panel Services Australian Public Service Commission. Our Vision. The Panels Panel Services Australian Public Service Commission The Australian Public Service Commission (the Commission) plays a central role within the Australian Public Service (APS) in assisting to build the capability

More information

Job Description Business Analyst / Developer

Job Description Business Analyst / Developer Job Description Business Analyst / Developer Job Element Detail Job Title Business Analyst / Developer Reporting To David Morrow Chief Architect for Business Intelligence (in turn to ) Chris Ellis Solutions

More information

G-Cloud II Services Service Definition Accenture Cloud Infrastructure Implementation Services

G-Cloud II Services Service Definition Accenture Cloud Infrastructure Implementation Services G-Cloud II Services Service Definition Accenture Cloud Infrastructure Implementation Services 1 Table of Contents 1. Scope of our Services... 3 1.1. Data Centre Services... 3 1.2. Cloud Enterprise Services...

More information

Bachelor in Computer Engineering. Brightest. The Best and. World-class education ΑΙΤ makes it possible

Bachelor in Computer Engineering. Brightest. The Best and. World-class education ΑΙΤ makes it possible Bachelor in Computer Engineering The Best and Brightest World-class education ΑΙΤ makes it possible Bachelor in Computer Engineering www.ait.gr/bsc Start thinking about A high quality education AIT is

More information

REVISED GRID FOR MICRO LEVEL APPROACH

REVISED GRID FOR MICRO LEVEL APPROACH Cover sheet Country: Sector: Level: United Kingdom Bank EQF Level: 6 IT NQF Level: 6 Institution (private/state): Name of the study program : Duration (in years/months): University (state) BSc Computer

More information

INFORMATION PACK FOR APPLICANTS FOR THE POST OF EMAIL AND CRM MARKETING ASSISTANT

INFORMATION PACK FOR APPLICANTS FOR THE POST OF EMAIL AND CRM MARKETING ASSISTANT INFORMATION PACK FOR APPLICANTS FOR THE POST OF EMAIL AND CRM MARKETING ASSISTANT Information Pack for Recruitment FT Flexi-time London - January 2013 Paul Smith Ltd. Copyright Page 1 Job Description Job

More information

National Approach to Information Assurance 2014-2017

National Approach to Information Assurance 2014-2017 Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version

More information

Transform your world Executive Education: The International Certificate in Leadership for Property Development

Transform your world Executive Education: The International Certificate in Leadership for Property Development Confidence through professional standards RICS promotes and enforces the highest professional qualifications and standards in the development and management of land, real estate, construction and infrastructure.

More information