seela logo

Standards & Regulations

Dive into the standards and regulations of the Cyber domain, with a focus on the ISO27K standard and the RGPD.

General Data Protection Regulation

3 Lessons - 20 min

Learn the basics of the General Data Protection Regulation (GDPR).

01. Introduction to the course

An introduction to cybersecurity

Data is ubiquitous and is now at the heart of the value creation chain of companies. The legal context is adapting to keep up with changes in technology and in our societies, such as the increased use of digital technology and the development of online commerce.

💡 The General Data Protection Regulation went into effect on May 25, 2018.

Thus, to adapt to the challenges of digital technology and ensure better control of personal data, a new European regulation, the General Data Protection Regulation, came into force on May 25, 2018. It strengthens the rights of individuals and makes public and private organizations that process their data more accountable.

The criterion for compliance is the volume or sensitivity of the data processed, not the size or number of employees of a company. Nevertheless, non-compliance with the regulations can result in a fine of up to 20 million euros or 4% of the company's annual worldwide turnover, with a criminal risk for the company's managers. Beyond compliance with the regulations, it is above all a matter of common sense and organization.

Also, the RGPD offers new business opportunities and can, in this sense, constitute a corporate project and be a value creator. Thanks to an overview of the main reflections to be carried out and actions to be implemented, this course offers you practical keys of understanding to engage within your company, a RGPD compliance approach.

02. Generalities RCPD

30 min.

An introduction to cybersecurity

03. Presentation of the regulation (by Oriana)

25 min

An introduction to cybersecurity

04. The actors of compliance (by Oriana)

10 min.

An introduction to cybersecurity

05. The tools of compliance (by Oriana)

10 min.

An introduction to cybersecurity

06. The procedures (by Oriana)

10 min.

An introduction to cybersecurity

QUIZ. RCPD

20 minutes

An introduction to cybersecurity

ISO 27k standards

2 Lessons - 35 min

ISO/IEC 27005 is an international standard for information security published jointly by the International Organization for Standardization(ISO) and the International Electrotechnical Commission (IEC).

01. Introduction to the course

An introduction to cybersecurity

02. The ISO 27005 standard

20 minutes

An introduction to cybersecurity

QUIZ. ISO 27005 standard

15 minutes

An introduction to cybersecurity

Safety approval

4 Lessons - 80 min

Safety certification and SSI self-diagnosis.

01. Introduction to the course

An introduction to cybersecurity

02. Diagnosis of security needs

15 minutes

An introduction to cybersecurity

03. Maturity level and SSI self-diagnosis

15 minutes

An introduction to cybersecurity

04. Approval

30 min.

An introduction to cybersecurity

QUIZ. Registration process and approach

20 minutes

An introduction to cybersecurity

Information Security Governance

3 Lessons - 40 min

Information security governance is a strategic approach to security aimed at protecting information assets. This posture requires risk management and consideration of information security issues at the highest level of the organization.

01. Introduction to the course

An introduction to cybersecurity

02. Information Security Governance ISMS

15 minutes

An introduction to cybersecurity

03. Risk analysis and management approach

15 minutes

An introduction to cybersecurity

QUIZ. Risk analysis and management approach

10 min.

An introduction to cybersecurity

Departmental Policy on Computer Defence

2 Lessons - 15 min

The protection of computer networks and information systems is the first line of defense to prevent a cyber attack. The Ministry of the Armed Forces' ministerial LID policy is presented in the form of a ministerial instruction, nr.101000/MINARM of 01 December 2018. It specifies the organization and missions that apply to all organizations under the authority of the Minister of the Armed Forces, as well as the expectations and constraints of those who contribute to its commitment.

The main lines of this new LID policy are summarized in this course inspired by the policy of the Ministry of the Army.

01. Introduction to the course

An introduction to cybersecurity

02. Presentation of the Departmental Policy

15 minutes

An introduction to cybersecurity

Mail

information@seela.io