Overview
There is no successful information security program without an effective information security awareness training program for all managers and employees of a company or an organization, that are usually the weakest link in information security.
If managers and employees do not understand the risks and the consequences, it is unlikely to comply with corporate policies. They will continue to cut corners and compromise security in the name of convenience.
Process owners and persons having access to systems and data must understand the cyber security threats, and they must learn what they can do to protect themselves, their firm or organization, and the critical infrastructure.
Target Audience
The program is beneficial to all managers and employees of companies and organizations of the private and the public sector.
Duration
One hour to one day, depending on the needs, the content of the program and the case studies. We always tailor the program to the needs of each client.
Instructor
Our instructors are professionals with extensive, real-world experience in their respective fields. They are equipped to deliver full-time, part-time, or short-form programs, all customized to suit your specific requirements. Beyond teaching, our instructors provide hands-on guidance, offering real-world insights that help bridge the gap between theory and practice. You will always be informed ahead of time about the instructor leading your program.
Course Synopsis:
Understanding the importance of information security.
- Legal and regulatory obligations.
- Importance of information security for the organization and the country.
- Importance of information security for the employees and contractors.
Desktop Security.
- A password-protected screen saver.
- Locking computers when users walk away from them.
- Shoulder surfing.
- Key loggers.
Password Security.
- Eliminating default passwords.
- What constitutes a strong, secure passphrase.
- Cracking passwords.
- Minimum password requirements.
- Sharing passwords.
- Examples of passphrases.
Wireless Security.
- The ease of use vs. security.
- The wireless networks and possible security problems.
- Mobile Devices and Wireless.
Email Security.
- Protecting information when using the internet and email.
Malware.
- Viruses, worms, trojans, spyware, adware.
- Examples and case studies.
Phishing.
- What is phishing.
- Examples and case studies.
- Things to avoid.
- Clicking on links provided in e-mails.
Social engineering, hoaxes, scams.
- Social engineering examples and case studies.
- Types of hoaxes.
- Examples and case studies.
- Comparing hoaxes to viruses.
- Preventing the spread of hoaxes.
- Social Engineering.
Social Media.
- Risks to the person and the organization.
- Exploiting human networks.
Legal issues.
- File sharing and copyright.
- Downloading unknown or unsolicited programs or files.
- Copyrighted documents in the corporate network.
- Recordings, videos, software.
- Illegal file sharing and downloading.
Travel Security.
- Laptops.
- Corporate data and intellectual property.
- Examples and case studies.
Reporting security incidents.
- The importance of reporting, from policies to reality.
Closing remarks.
- Examples and case studies.
For more information, you may contact us.
Terms and conditions
You may visit: https://www.cyber-risk-gmbh.com/Terms.html
Cyber security is ofter boring for employees. We can make it exciting.