What's In It For Me

  • Understand the basic concepts of cybersecurity and privacy laws in Singapore
  • Identify the cybersecurity and privacy compliance gaps at a typical MICE event
  • Evaluate good cybersecurity practices that apply to MICE events
  • Adopt best practices to address cybersecurity and compliance gaps

 

Course Overview

NTUC LearningHub Course Code: SACEOS1

The course is designed especially for MICE employees. The objective is to manage and assess Cyber security risks and apply countermeasures at an ongoing Event. It comprises of a one full day or 8 hours of a facilitated workshop. The course encompasses 5 topics that cover all the essential elements of the cybersecurity compliance requirements, basic concepts of Cybersecurity, the requirements of the MICE industry, the good practices of Cybersecurity for MICE, provisions of Data Privacy and compliance requirements and practicing the Cyber and Data Privacy hygiene habits.

 

Who Should Attend

  • Staff from Organisations within the MICE Industry
  • Staffs of organisations that carry out MICE Events

 

Course Duration

1 Days / 8 Hours

 

Course Outline

  • Key Concepts in Cybersecurity and Personal Data Privacy
  • Personal Data Protection Obligations
  • MICE Sector and Elements of Privacy and Cybersecurity
  • Cybersecurity Problems and Solutions

Key Concepts in Cybersecurity and Personal Data Privacy

  • Principles of confidentiality, integrity and availability for information security
  • Five Basic Laws of Cybersecurity
  • Hacking scenarios
  • Cybersecurity and Privacy Laws in Singapore

Personal Data Protection Obligations

  • What is personal data?
  • Business Contact Information
  • Data Intermediaries
  • Application of the Personal Data Protection Act
  • Main Obligations
  • Do Not Call Provisions

MICE Sector and Elements Of Privacy And Security

  • Remember Cybersecurity and Privacy when Planning a Safe Event
  • Privacy Issues in Planning and Executing an Event
  • New Guidelines for collection of NRICs
  • Using Tech to Keep Data Safe
  • Post Event Issues

Cybersecurity problems and solutions

  • Methods used in a typical Cyberattack
  • Solutions, preventions and countermeasures
  • Physical Measures for cyber hygiene and data privacy at the workplace

Checklists

  • Consolidated Checklist of Good Practices
  • Consolidated Checklist of Enhanced Practices

 

Categories
More Information
  • (Local Institution) NTUC LearningHub
  • No comments yet.
  • Add a review
    error: Content is protected !!