Cyber Security Training
The training requirements set the minimum threshold for appropriate training - you and your line management are responsible for identifying additional training you need to do your work in a secure manner. IT Policy periodically reviews, as necessary, but at least annually compliance to required training.
Cyber Security Operations and IT Policy reviews, as necessary, but at least annually, the content of required training courses. The JHA training system implements the applicability for each training and provides management reporting and individual tracking.