EET Logo

Data Security & Compliance

Data Security & Compliance
Business, Operations & Compliance

About This Course

In the modern digital economy, data has become the most valuable asset for organizations, but also their most vulnerable. Increasing threats such as ransomware, phishing, insider misuse, and accidental data leaks expose Malaysian businesses to severe risks of financial loss, reputational damage, and regulatory penalties. This 2-day training provides participants with a strong foundation in data security frameworks, best practices, and compliance requirements, including Malaysia’s Personal Data Protection Act (PDPA) 2010 and Bank Negara Malaysia (BNM) standards. Through case studies, group discussions, and response plan development, participants will learn to prevent data breaches, manage risks effectively, and build a security-focused culture across their organization. This HRD Corp (HRDC) Claimable Course (Previously Known as SBL-Khas) Is Delivered by a Penang-Based Training Provider Registered with HRD Corp (Formerly Known as HRDF), Specializing in Corporate Skills Development and Workforce Upskilling Across Malaysia. 100% HRD Corp Claimable | Penang Training Provider | Corporate Training Malaysia

Course Outline

DAY 1

Module 1: Introduction to Data Security

  • Importance of data as a business asset

  • Common threats: hacking, ransomware, insider threats, phishing

  • Local case studies: Malaysian data breach incidents

Module 2: Legal & Regulatory Landscape

  • Overview of PDPA 2010 (data security principle)

  • Risk Management Framework

  • Cybersecurity Malaysia frameworks & national strategies

Lunch

Module 3: Building a Data Security Framework

  • Governance and accountability

  • Data classification and access control

  • Encryption, backups, and secure disposal

  • Vendor and third-party risk management

Module 4: Practical Implementation

  • Developing security policies and procedures

  • Security awareness and staff training

  • Tools for monitoring and detection

  • Handling Data Subject Access Requests (DSARs) with security in mind

  • Activity : Group Discussion & Presentation

DAY 2

Module 5: Threats, Risks & Vulnerabilities

  • Identifying vulnerabilities (technical, human, organizational)

  • Cyber risk assessment methods

  • Activity : Red team vs. blue team exercises (discussion-based)

Module 6: Data Breach & Incident Management

  • Breach identification and containment

  • Notification requirements (PDPA and regulator expectations)

  • Communication strategy – customers, regulators, and media

  • Post-breach review & lessons learned

Lunch

Module 7: Governance & Best Practices

  • Embedding data security in corporate governance

  • Continuous monitoring, auditing & reporting

  • Integration with global compliance frameworks

  • Building a security culture across departments

Module 8: Case Study & Group Presentation

  • Malaysian breach case analysis

  • Activity : Teams design a Data Security Response Plan

  • Presentation & trainer feedback

Interested in this Course?
Contact us for more details
Course TypeIn House & Public
Course LevelMaster Class
AvailabilityAvailable
Flexible scheduling available
Data Security & Compliance | HRDC Certified Training | Eco Essential Technologies