www.urmconsulting.com Open in urlscan Pro
35.152.104.113  Public Scan

Submitted URL: https://mailer.mailcloudserver.net/l/AhuaYYIrOa0kDXu8hJlQXg/JNi07HXOIM0jUft1zaTOrw/22BJ0TgePS7nxhTpXmusGw
Effective URL: https://www.urmconsulting.com/training/course-schedule
Submission: On November 14 via api from IE — Scanned from GB

Form analysis 1 forms found in the DOM

/search

<form action="/search" bind="aa7e5c55-72ff-54ae-45f8-625c3e041221" class="search-utility w-form"><input class="search-input-line w-input" maxlength="256" name="query" placeholder="Search…" type="search" id="search"
    bind="aa7e5c55-72ff-54ae-45f8-625c3e041224" required=""><input type="submit" bind="aa7e5c55-72ff-54ae-45f8-625c3e041225" class="search-btn w-button" value="Search"></form>

Text Content

info@urmconsulting.com
0118 206 5410

Consultancy and Services
Information Security
ISO 27001
What is ISO 27001?Gap AnalysisRisk AssessmentImplementationConsultancy Services
PCI DSS
What is PCI DSS?Penetration TestingScope ReductionGap
AnalysisImplementationAssessment and AuditingConsultancy Services
SOC 2
What is SOC 2?Gap AnalysisRemediationAudit and AssessmentTrainingConsultancy
Services
CMMC
What is CMMC?Gap AnalysisImplementationAssessmentConsultancy Services
GC RTS
What is GC RTS?Gap AnalysisImplementationAssessmentConsultancy Services
SWIFT CSP
What is SWIFT CSP?Gap AnalysisImplementationAssessment and AuditingConsultancy
Services
NIST CSF
What is NIST CSF?ImplementationAssessmentConsultancy Services
Information Security Consultancy Services
URM provides consultancy services on:
ISO 27001
PCI DSS
SOC 2
CMMC
GC RTS
SWIFT CSP
NIST CSF

Cyber Security

PENETRATION TESTING

Penetration Testing
What is Pen Testing?Network and InfrastructureWeb ApplicationCloudMobile
ApplicationBusiness-ledServices

CYBER ESSENTIALS

Cyber Essentials
What is Cyber Essentials?AssessmentGap AnalysisApplication ReviewCyber
Essentials PlusCyber AdvisorCertified by URMConsultancy Services
Register now

CYBER SECURITY

NIS 2
What is NIS 2?Services
Vulnerability Scanning
What is it?ASV ScanningServices
Social Engineering
What is Social Engineering?Penetration TestingServices
Incident Response
What is Incident Response?Cyber Incident ExerciseServices
Cyber Security Services
URM provides services on:
Penetration Testing
Cyber Essentials
Vulnerability Scanning
Social Engineering
Incident Response

Data Protection
Data Protection
A set of practices, laws, and policies designed to safeguard personal data from
unauthorised access, misuse, disclosure, destruction, or loss.

GDPR
A comprehensive data protection law designed to protect personal data and
privacy rights in the EU and the UK.
Gap Analysis
Helps identify the "gaps" or areas where the organisation is not meeting GDPR
standards.

DPIA
A vital process that helps organisations systematically identify and address
privacy risks in their data processing activities.

ROPA
A fundamental GDPR requirement that helps organisations maintain transparency,
accountability, and compliance in their data processing activities.
Virtual DPO
An effective solution for organisations seeking to comply with GDPR requirements
without the need for a full-time, in-house data protection officer.

DSAR
A mechanism that allows individuals to request access to the personal data that
an organisation holds about them.

Awareness Training
A critical component of an organisation's data protection strategy.
Data Protection Consultancy and Services
URM provides consultancy and services on:
GDPR
GDPR Gap Analysis
Virtual DPO
DPIA
ROPA
DSAR
GDPR Training and Awareness

Business Continuity
Business Continuity
Processes and procedures an organisation implements to ensure that essential
functions can continue during and after a disaster or disruption.

ISO 22301
An international standard for Business Continuity Management Systems (BCMS). It
provides a framework and guidelines for organisations to prepare for, respond
to, and recover from disruptive incidents.
ISO 22301 Gap Analysis
Evaluates an organisation's  business continuity management practices against
the requirements of the ISO 22301 standard.

ISO 22301 Implementation
The process of establishing, operating, monitoring, reviewing, and continually
improving a BCMS in accordance with the ISO 22301 standard
Business Impact Analysis
A systematic process used to identify and evaluate the potential effects of
disruptions to critical business operations.

Business Continuity Plan
A comprehensive document that outlines the procedures and actions to ensure that
critical business functions can continue during and after a disruptive incident.

Exercising
Testing and validating BC plans through various types of drills and exercises.
Business Continuity Consultancy and Services
URM provides consultancy and services on:
ISO 22301
ISO 22301 Gap Analysis
ISO 22301 Implementation
Business Impact Analysis
Business Continuity Plans
Exercising BCPs and IMPs

Internal Audit
Internal Audit
An independent, objective assurance and consulting activity designed to add
value and improve an organisation's operations. It helps an organisation
accomplish its objectives by bringing a systematic, disciplined approach to
evaluate and improve the effectiveness of risk management, control, and
governance processes.
Outsourced Service
The practice of an organisation hiring an external service provider to perform
internal audit activities instead of using its in-house audit team.
Audit Schedules
Planned timetable and sequence of audit activities to be conducted over a
specific period, usually a year.

Third Party Audit
An independent evaluation conducted by an external organisation or auditor that
is not affiliated with the company being audited.
Internal Audit Consultancy and Services
URM provides consultancy and services on:
Internal Audit
Audit Schedules
Third Party Audit

Other Standards
ISO 9001
Standard for quality management systems (QMS). It is part of the ISO 9000 family
of standards and provides a framework for organisations to ensure they meet the
needs and expectations of their customers and other stakeholders.
ISO 13485
ISO 13485 is the standard for medical device quality management system (MDQMS)
that is intended to support the design, development and support of medical
devices which meet applicable regulatory requirements and do no harm to
patients.
ISO 42001
Standard is designed to ensure that AI technologies are developed, deployed, and
maintained in a responsible, transparent, and ethical manner. It addresses
various challenges associated with AI, including risk management, ethical
considerations, transparency, and continuous learning.
Other Standards Consultancy and Services
URM provides consultancy and services on:
ISO 9001
ISO 13485
ISO 42001


Products
Abriska 27001
Information Security Risk Management Software

Abriska 19011
Audit and Action Management Software
Abriska 27036
Supplier Risk Management Software

Abriska 22301
Business Continuity Management Software
Abriska 31000
Enterprise Risk Management Software

Alurna
Online Awareness Training Tool

Training

INFORMATION SECURITY


CISMP
Explores how to manage information and cyber security and address ever-evolving
threats and changes.

Introduction to ISO 27001
Provides essential guidance on how organisations can most effectively improve
their information security.

Migration to ISO 27002
Explores the changes to ISO 27002 and to Annex A of ISO 27001, and how to
implement the new controls.

Transition to ISO 27001
Addresses transitioning both an ISMS and information security controls to ISO
27001:2022.

DATA PROTECTION AND GDPR


CDP
Provides a practical understanding of UK data protection law, including the UK
GDPR.

DPIA
Addresses all aspects of performing a DPIA and provides you with confidence in
your approach.

DSAR
Provides clear and practical instruction on dealing with all aspects of a DSAR.

DTIA
Enhances your understanding of how to conduct a successful and compliant
TRA/DTIA.

RISK MANAGEMENT


PCIRM
Addresses all key aspects of information risk management, risk assessments and
risk treatment plans.


OTHER STANDARDS


Introduction to ISO 42001
Provides essential guidance to organisations looking to implement an AI
management system (AIMS).
Training Schedule
Upcoming Courses:
December 2, 2024
CISMP
February 18, 2025
CDP
February 24, 2025
PCIRM
March 10, 2025
CISMP
See more

Resources
White Papers
URM provides an in-depth exploration of a specific issues and problems related
to information and cyber security.

Data Sheets
URM provides a concise and specific technical information about products and
service.

Case Studies
URM shares detailed examinations of specific subjects to explore causation,
provide insights, and illustrate theories within real-world contexts.

PODCASTS


InfoSec Insider

Talk DP




FAQS


Information Security FAQ

ISO 27001 FAQ

ISO 27001 Internal Auditing FAQ

PCI DSS FAQ

Business Continuity FAQ

Data Protection FAQ

GDPR FAQ

Cyber Essentials FAQ

Penetration Testing FAQ

BLOGS

Frazer Grudgings
Developing an ISO 27001 Information Security Policy

Stuart Skelly
DUA Bill: An Initial Assessment

Mike Emery
Enhancing Security in the Software Supply Chain

Sue West
Internal Auditing of Management Systems

Chris Heighes
SOC 2 Explained

Recent Blog
Information Security
Frazer Grudgings
Developing an ISO 27001 Information Security Policy

URM’s blog discusses how to develop and implement an information security policy
that fully conforms to both your organisation’s and ISO 27001 requirements.

Read more

Events
About Us

ABOUT URM


Overview

URM Core Values

Certifications

CSR

TESTIMONIALS


Consultancy

Cyber

Products

Training

PARTNERS


Our Partners

Become Partner
Subscribe to our mailing list


Contact Us




Home
>
Training
>
Public Course Schedule and Information

training


PUBLIC COURSE SCHEDULE
AND INFORMATION

CISMP FAQGDPR FAQPCIRM FAQ
upcoming courses
Course type: 
Online
CISMP
DATE:
02
December 2024
DATE:
02
December 2024
-
09
December 2024

The course provides the information how to manage information and cyber security
and address the ever-evolving threats and changes.

Register
Course type: 
Online
CDP
DATE:
18
February 2025
DATE:
18
February 2025
-
21
February 2025

The course provides a sound grounding and practical interpretation of the key
elements of UK data protection law, including the UK GDPR

Register
Course type: 
Online
PCIRM
DATE:
24
February 2025
DATE:
24
February 2025
-
03
March 2025

All you need to know about the information risk management, conducting risk
assessments and developing risk treatment plans.

Register
Course type: 
Online
CISMP
DATE:
10
March 2025
DATE:
10
March 2025
-
17
March 2025

The course provides the information how to manage information and cyber security
and address the ever-evolving threats and changes.

Register
"
Daryn and I are very happy with our results, so please pass on our thanks to the
trainer who was an excellent tutor and helped to make the course enjoyable and
informative. We were impressed with the venue and I would certainly recommend
URM services to anyone who is looking at gaining BCS qualifications or
equivalent.
Daryn and Mike
Peel Ports
in association with

Consultancy and Services
Information Security
Cyber Security
Data Protection
Business Continuity
Internal Audit
Other Standards
Company
About us
Partners
Products
Training
Contact Us
Resources
Blog
Events
FAQs
White Papers
Data Sheets
Case Studies
Subscribe to our mailing list
Stay up to date on events and industry updates.
We care about your data in our privacy policy.
© Copyright 2024 URM Consulting Services Ltd. All Rights Reserved.
Terms of BusinessPrivacy PolicyCookies