Cyber training

Cyber Security training


Training is a fundamental tool in the processes of preventing and mitigating cyber risk.

What is that


Training is a fundamental tool in the processes of preventing and mitigating cyber risk.


Data indicates that the human factor is the main vulnerability and that training reduces the risks of phishing and malware infections by up to 90%.


The methods:

Frontal training

Anti-phishing training

1. FRONTAL TRAINING

CHARACTERISTICS

Duration, 90-120 min.

Classroom, 1-2 sessions/day.

Video conference, multiple sessions.

Webinar if 20 participants.

Certificate of attendance.

Learning check, optional.

Duration, topics and training material will be defined based on the needs of the company.

RECIPIENTS

Manager (strategy, budget, control, etc.)

Users of company information systems (Cyber Security and GDPR)

IT Manager (Cyber Security, Business Continuity; Privacy by Design e by Default

MODE

    On site (in the classroom and individual courses/tutoringWebinar E-learning (multimedia tutorial courses on GDPR and Cyber)Tutoring

GOALS

Raising awareness of cyber risks.

Training on company regulations/policies for the use of IT resources.

BASIC TOPICS

    COMPUTER SECURITY

New forms of delinquency; more widespread cyber incidents; risks and threats to the company; malware; data breach; phishing; scams and e-crime; role of users in the defense of information assets; prevention and protection measures, etc.

    CORPORATE SECURITY POLICY

Use of workstations and tools; credential and password management; email; Internet; smartphones; smart working; Social Networks; company disciplinary system, etc.

    GDPR-PRIVACY UPDATE

Types of data; summary general framework on the obligations of the GDPR; duties of those authorized to process; good practices for the processing of business and personal data, etc.

2. ANTIPHISHING TRAINING

We design and deliver anti-phishing campaigns to verify the level of awareness and knowledge of staff and to raise awareness and train them to recognize these dangers and avoid them.

GOALS

    Check the level of attention and preparation of users Raise awareness and train staff to recognize and avoid "phishing" attempts Significantly reduce the possibility of a ramsoware attack or scam

Tabletop Exercise

What is that

In order to effectively manage a critical event, the Business Continuity Team must be trained and trained regularly.

We organize classroom training sessions, "table top exercises" in which a crisis situation is simulated and other training activities based on the needs of the organization.

The “table top exercise” is a discussion-based exercise in which personnel with roles and responsibilities in the BCP gather in a classroom or in working groups to validate the content of the plan by discussing their roles during an emergency and the own responses to a particular emergency situation.

Mode

    It is a stimulating managerial challenge that requires both operational thinking and a strategic approach. It is based on a crisis scenario, which typically includes a primary incident aggravated by secondary events and circumstances. It is conducted in timed phases, with time jumps, which allow the exploration and simulation of medium and long-term impacts. Includes facilitated time-outs to consider impacts and develop corresponding response strategies. Provides opportunities for reflection and crisis management training. Includes a debriefing, immediately after the end of the exercise.

Goals

    Create a theoretical environment in which to analyze current crisis response procedures, management and internal and external communications in a defined scope Test the effectiveness of the roles and responsibilities of the Business Continuity or Crisis Management Management Team, as defined by the organization
    Improve the team's strategic and proactive planning and thinking in a crisis Evaluate the effectiveness of crisis management documentation Identify any systemic weaknesses Improve the Team's awareness of crisis management issues and best practices

I nostri partners


Unforeseen events?

Risks to prevent?

How to increase resilience?


Tell us your needs

Contact us
Share by: