Your Tutor: Kevin Hawkins (Founder and Managing Director)

Barry Cryer

Founder and Managing Director, Kevin Hawkins established H2 Cyber Risk Advisory Services in 2016, as a specialist cyber security and data protection company that focuses on providing innovative and robust security solutions to the UK SME sector.

Kevin started in Information Security at the MOD at a time when IT and databases were in their infancy.  He was therefore in on the ground floor and got a start in what was then IT Security as early as the late 1980s.  

He has since worked for HP/HPE, CSC and Symantec.  He has been involved in and led many major cyber security projects in the public and private sectors, focusing on major Government departments and Fortune 500 companies.  

He designed and commissioned the first Security Operations Centre for the FCO, carried out several projects for the MOD, led the security team designing the security system for the Passport Office, as well as lead security projects for Barclays and Lloyds amongst others.  

In 2013 HP asked him to go to the Middle East to set up a Cyber Security team covering the UAE, Bahrain, Saudi Arabia, and Qatar.  With a standing start of just three people, he grew the team to 24 before the merger between HPE and CSC.  

On returning to the UK, he set up H2 alongside Bob Hay who returned from the Middle East at the same time.

An Introduction to Data Protection - £48.00 Discounted from £66.00

Block booking for many students? Click here
Designed for staff working in an organisation who are likely to be involved in processing personal data as defined in the DPA 2018/GDPR, from managers to new employees.  Particularly useful for induction courses and to ensure staff understand the problems that can occur when doing business in a connected world.  
Read more below!

Your tutor: Kevin Hawkins

Founder and Managing Director, Kevin Hawkins established H2 Cyber Risk Advisory Services in 2016, as a specialist cyber security and data...

View full profile

Aims

The course aims to identify potential problems that can and do, cause issues. It aims to avoid situations where staff inadvertently give away or otherwise compromise personal data, and process that data not in accordance with the Act, not because they are doing it deliberately, but because they don't know that they shouldn't carry out such activities.

Requirements

There are no requirements for this course. However Cyber Security is an iterative process and this training should be carried out annually.

 

Details

If you are new to a company, or if you are unaware of the potential damage that can be done to the company by the inadvertent release of or compromise of personal data, or the consequences of such a release or compromise, then this course is for you.

Modules you'll take on this course

transparent gif

What is Data Protection?

This module discusses what Data Protection actually is, and what is covers.  It discusses GDPR and the Data Protection Act 2018, and why they both exist.

Aims

The aim of this module is to introduce the subject of data protection, and the reasons why it is important for members of staff, and individuals, to understand the basic concepts.

Enter to view video
transparent gif

What is the Difference Between GDPR and the DPA 2018

This module discusses the differences between GDPR and DPA 2018 in more detail.  It explains why the UK introduced DPA2018 and when GDPR still applies to UK companies, and when it doesn't.

Aims

The aim is introduce students to the differences between GDPR and DPA2018.

Enter to view video
transparent gif

The Principles of Data Protection

This discusses the data protection principles as set out in the Act, in sufficient detail to give students a strong understanding of how and why they should comply with the act.

Aims

The aim is to describe the data protection principles.

Enter to view video
transparent gif

Responsibilities

This modules identifies the roles and responsibilities that each organisation must have in order to meet the requirements of the Act.

Aims

The aim is to identify each role and discuss its responsibilities and how an employee should be able to identify who in the organisation holds those roles.

Enter to view video
transparent gif

Enforcement

In this final module, we discuss the potential penalties that might be imposed by the Information Commissioners Office and what actions should be taken to avoid such punitive action.

Aims

The aim of this final module is to discuss how the Information Commissioner might view a breach of data and how an organisation should approach that breach, as well as to discuss potential penalties in failing to adhere to the Act.

Enter to view video
transparent gif

Technical and Organisational Measures

This refers to an organisations implementation of appropriate technical and organisational measures to adequately protect the personal data they are processing.

Aims

The aim of the module is to provide an introduction to the measures that an organisation is required to take, in order that an employee can raise awareness of any issue that they may perceive as breaching this requirement.

Enter to view video
 

Add to your basket and start learning for just £48.00 Discounted from £66.00

transparent gif