Overview
There is no successful information security program without an effective information security awareness training program for all managers and employees of a company or an organization, that are usually the weakest link in information security.
If managers and employees do not understand the risks and the consequences, it is unlikely to comply with corporate policies. They will continue to cut corners and compromise security in the name of convenience.
Process owners and persons having access to systems and data must understand the cyber security threats, and they must learn what they can do to protect themselves, their firm or organization, and the critical infrastructure.
Target Audience
The program is beneficial to all managers and employees of companies and organizations of the private and the public sector.
Duration
One hour to one day, depending on the needs, the content of the program and the case studies. We always tailor the program to the needs of each client.
Instructor
Our instructors are working professionals that have the necessary knowledge and experience in the fields in which they teach. They can lead full-time, part-time, and short-form programs that are tailored to your needs. You will always know up front who the instructor of the training program will be.
Course Synopsis:
Understanding the importance of information security.
- Legal and regulatory obligations.
- Importance of information security for the organization and the country.
- Importance of information security for the employees and contractors.
Desktop Security.
- A password-protected screen saver.
- Locking computers when users walk away from them.
- Shoulder surfing.
- Key loggers.
Password Security.
- Eliminating default passwords.
- What constitutes a strong, secure passphrase.
- Cracking passwords.
- Minimum password requirements.
- Sharing passwords.
- Examples of passphrases.
Wireless Security.
- The ease of use vs. security.
- The wireless networks and possible security problems.
- Mobile Devices and Wireless.
Email Security.
- Protecting information when using the internet and email.
Malware.
- Viruses, worms, trojans, spyware, adware.
- Examples and case studies.
Phishing.
- What is phishing.
- Examples and case studies.
- Things to avoid.
- Clicking on links provided in e-mails.
Social engineering, hoaxes, scams.
- Social engineering examples and case studies.
- Types of hoaxes.
- Examples and case studies.
- Comparing hoaxes to viruses.
- Preventing the spread of hoaxes.
- Social Engineering.
Social Media.
- Risks to the person and the organization.
- Exploiting human networks.
Legal issues.
- File sharing and copyright.
- Downloading unknown or unsolicited programs or files.
- Copyrighted documents in the corporate network.
- Recordings, videos, software.
- Illegal file sharing and downloading.
Travel Security.
- Laptops.
- Corporate data and intellectual property.
- Examples and case studies.
Reporting security incidents.
- The importance of reporting, from policies to reality.
Closing remarks.
- Examples and case studies.
For more information, you may contact us.
Terms and conditions
You may visit: https://www.cyber-risk-gmbh.com/Terms.html
Cyber security is ofter boring for employees. We can make it exciting.