Viewable by the world
|
|
...
The training requirements set the minimum threshold for appropriate training - you and your line management are responsible for identifying additional training you need to do your work in a secure manner.
Required Training
The Computer Protection Program Cyber Security Operations and IT Policy reviews, as necessary, but at least annually, the content of required training courses. The JHA training system implements the applicability for each training and provides management reporting and individual tracking.
...