Viewable by the world
|
|
...
The training requirements set the minimum threshold for appropriate training - you and your line management are responsible for identifying additional training you need to do your work in a secure manner. IT Policy periodically reviews, as necessary, but at least annually compliance to required training.
Required Training
The Cyber Security Operations and IT Policy reviews, as necessary, but at least annually, the content of required training courses. The JHA training system implements the applicability for each training and provides management reporting and individual tracking.
...