the discussion and exchange of ideas
RAYMOND JACKSON PAJARILLO - V.Ships Services Oceana, Inc.
Corporate Compliance Training
the discussion and exchange of ideas
RAYMOND JACKSON PAJARILLO - V.Ships Services Oceana, Inc.
The interaction and facts gained / learnt.
Monna Liza Mengullo - V.Ships Services Oceana, Inc.
Marjorie Pepito - V.Ships Services Oceana, Inc.
|basel3||Basel III – Certified Basel Professional||21 hours||Description: Basel III is a global regulatory standard on bank capital adequacy, stress testing and market liquidity risk. Having initially been agreed upon by the Basel Committee on Banking Supervision in 2010–11, changes to The Accord have extended implementation to 31st March 2019. Basel III strengthens bank capital requirements by increasing bank liquidity and decreasing bank leverage. Basel III differs from Basel I & II in that it requires different levels of reserves for different forms of deposits and other types of borrowings, so it does not supersede them so much as it does work alongside Basel I and Basel II. This complex and constantly changing landscape can be hard to keep up with, our course and training will help you manage likely changes and their impact on your institution. We are accredited with and a training partner to the Basel Certification Institute and as such the quality and suitability of our training and material is guaranteed to be up to date and effective Objectives: Preparation for the Certified Basel Professional Examination. Define hands-on strategies and techniques for the definition, measurement, analysis, improvement, and control of operational risk within a banking organization. Target Audience: Board members with risk responsibilities CROs and Heads of Risk Management Members of the Risk Management team Compliance, legal and IT support staff Equity and Credit Analysts Portfolio Managers Rating Agency Analysts Overview: Introduction to Basel norms and amendments to the Basel Accord (III) Regulations for market, credit, counterparty and liquidity risk Stress testing for various risk measures including how to formulate and deliver stress tests The likely effects of Basel III on the international banking industry, including demonstrations of its practical application Need For The New Basel Norms The Basel III Norms Objectives of The Basel III Norms Basel III – Timeline|
|cgeit||CGEIT – Certified in the Governance of Enterprise IT||28 hours||Description: This four day event (CGEIT training) is the ultimate preparation for exam time and is designed to ensure that you pass the challenging CGEIT exam on your first attempt. The CGEIT qualification is an internationally recognised symbol of excellence in IT governance awarded by ISACA. It is designed for professionals responsible for managing IT governance or with significant advisory or assurance responsibility for IT governance. Achieving CGEIT status will provide you with wider recognition in the marketplace, as well as increased influence at executive level. Objectives: This seminar has been designed to prepare Delegates for the CGEIT examination by enabling them to supplement their existing knowledge and understanding so as to be better prepared to pass the exam, as defined by ISACA. Target Audience: Our training course is for IT and business professionals, with significant IT governance experience who are undertaking the CGEIT exam.|
|ciaa||CIAA - Certificate in Information Assurance Architecture||35 hours||Description: The IA Architect is based on a set of skills defined by the Institute of Information Security Professionals (IISP) and the UK Government’s GCHQ department. The IA Architect, also referred to in industry as the Security Architect must be able to drive beneficial security change into an organisation through the development or review of security architectures so that they: Meet business requirements for security. Mitigate identified risks and conform to relevant corporate security policies. Balance information risk against the cost of countermeasures. This course aligns to Level 3 (Skilful Application) competence as defined in the Skills Framework developed by the IISP. Objectives: Candidates that have successfully completed the Practitioner in IA Architecture course should be able to: Describe the business environment and the information risks that apply to systems. Describe and apply security design principles. Identify information risks that arise from potential solution architectures. Design alternate architectures or countermeasures to mitigate identified information risks. Ensure that proposed architectures and countermeasures adequately mitigate identified information risks. Apply ‘standard’ security techniques and architectures to mitigate security risks. Develop new architectures that mitigate the risks posed by new technologies and business practices. Provide consultancy and advice to explain Information Assurance and architectural problems. Securely configure ICT systems in compliance with their approved security architectures. Audience: Candidates who wish to gain the BCS IA Architecture certificate. System Administrators who wish to become Security Architects. Technical Architects looking to move into the field of security architecture. Security professionals wishing to gain an appreciation of the technical and business aspects of their profession, or to move into a more senior architecture role.|
|cdp||CDP - Certificate in Data Protection||35 hours||Description: There is a need to provide adequate training on the Data Protection Act 1998 "the Act" and its implications for both organisations and individuals. There are important differences between the Act and its predecessor, the Data Protection Act 1984. In particular, the Act contains important new obligations in relation to manual records and transborder data flows, a new notification system and amended principles. It is important to understand the Act in the European context. Those experienced in data protection issues, as well as those new to the subject, need to be trained so that their organisations are confident that legal compliance is continually addressed. It is necessary to identify issues requiring expert data protection advice in good time in order that organisational reputation and credibility are enhanced through relevant data protection policies and procedures. Objectives: The aim of the syllabus is to promote an understanding of how the data protection principles work rather than simply focusing on the mechanics of regulation. The syllabus places the Act in the context of human rights and promotes good practice within organisations. On attaining the certificate, award holders will possess: an appreciation of the broader context of the Act. an understanding of the way in which the Act and the Privacy and Electronic Communications (EC Directive) Regulations 2003 work a broad understanding of the way associated legislation relates to the Act an understanding of what has to be done to achieve compliance a recognised qualification in data protection Course Synopsis: The syllabus comprises three main parts, each with many sub-sections! Context - this will address the origins of and reasons for the Act together with consideration of privacy in general. Law – Data Protection Act - this will address the main concepts and elements of the Act and subordinate legislation. Application - this will consider how compliance is achieved and how the Act works in practice.|
|datapro||Data Protection||35 hours||This is an Instructor led course, and is the non-certification version of the "CDP - Certificate in Data Protection" course Those experienced in data protection issues, as well as those new to the subject, need to be trained so that their organisations are confident that legal compliance is continually addressed. It is necessary to identify issues requiring expert data protection advice in good time in order that organisational reputation and credibility are enhanced through relevant data protection policies and procedures. Objectives: The aim of the syllabus is to promote an understanding of how the data protection principles work rather than simply focusing on the mechanics of regulation. The syllabus places the Act in the context of human rights and promotes good practice within organisations. On completion you will have: an appreciation of the broader context of the Act. an understanding of the way in which the Act and the Privacy and Electronic Communications (EC Directive) Regulations 2003 work a broad understanding of the way associated legislation relates to the Act an understanding of what has to be done to achieve compliance Course Synopsis: The syllabus comprises three main parts, each sub-sections. Context - this will address the origins of and reasons for the Act together with consideration of privacy in general. Law – Data Protection Act - this will address the main concepts and elements of the Act and subordinate legislation. Application - this will consider how compliance is achieved and how the Act works in practice.|
|grmcfun||Governance, Risk Management & Compliance (GRC) Fundamentals||21 hours||Course goal: To ensure that an individual has the core understanding of GRC processes and capabilities, and the skills to integrate governance, performance management, risk management, internal control, and compliance activities. Overview: GRC Basic terms and definitions Principles of GRC Core components, practices and activities Relationship of GRC to other disciplines|
|GDPR1||GDPR Workshop||7 hours||This one-day course is for people looking for a brief outline of the GDPR – General Data Protection Regulations coming out May 25, 2018. This is ideal for managers, department heads, and employees who need to understand the basics of the GDPR.|
|GDRPAd||GDPR Advanced||21 hours||This is more in-depth and would be for those working a great deal with the GDPR and who may be appointed to the GDPR team. This would be ideal for IT, human resources and marketing employees and they will deal extensively with the GDPR.|
|Course||Venue||Course Date||Course Price [Remote / Classroom]|
|Iridium: Cucumber and Selenium Based Testing||Cardiff||Tue, 2018-02-27 09:30||£1089 / £1389|
|Blockchain - Theory and Practice||Birmingham||Wed, 2018-02-28 09:30||£1287 / £1612|
|Data Mining with R||York - Priory Street Centre||Thu, 2018-03-01 09:30||£1980 / £2280|
|Business Rule Approach with SBVR||St Helier, Jersey, Channel Isles||Tue, 2018-03-06 09:30||£1980 / £2930|
|Unit Testing with Python||Leeds||Tue, 2018-03-13 09:30||£3267 / £3867|
|Statistics Level 1||Swansea- Princess House||Thu, 2018-03-29 09:30||£1980 / £2280|
|Comprehensive Git||Sheffield||Tue, 2018-04-24 09:30||£2970 / £3570|
|Enterprise Architecture Overview||St Helier, Jersey, Channel Isles||Thu, 2018-05-10 09:30||£1980 / £2930|
|Administering MediaWiki||Exeter - The Senate||Mon, 2018-05-21 09:30||£990 / £1290|
|jQuery||St Helier, Jersey, Channel Isles||Thu, 2018-05-24 09:30||£1980 / £2930|
|OCUP2 UML 2.5 Certification - Advanced Exam Preparation||St Helier, Jersey, Channel Isles||Mon, 2018-07-23 09:30||£1980 / £2930|
Corporate compliance and application and industry in the security and collections of the course provides the applications and security dealing the server communication security operators and app int. And examples and stress reliability usage and controller engineers and overview of the ways to app structure of the operations and components of the resources' security install at. App operations setting if the process of the controller for the core flow model and statements in responsibilities in the instance of the sensors and implement and architecture. For procedures in decision to be able to for the related to be course outline how to use the document content of the process of gateway to governance services and command analyst. Controller control and practices for app defining patterns of constructors and model and analyze and perform setting an open security management and control and principles, test.