Cyber Risk GmbH



George Lekatis

Cyber Risk GmbH was founded in Horgen, Switzerland, by George Lekatis, an acclaimed expert in risk and compliance management. The company specializes in providing advanced cybersecurity and compliance training, helping organizations navigate and implement complex European, U.S., and international cybersecurity regulations. Additionally, Cyber Risk GmbH supports professionals in completing online training programs, passing exams, and obtaining Certificates of Completion, which serve as independent verification of their expertise for firms and organizations.

George Lekatis serves as the General Manager of Compliance LLC, a company incorporated in Wilmington, NC, with offices in Washington, DC. Compliance LLC provides risk and compliance training in 58 countries. Several of its business units function as highly successful associations, offering a wide range of services to their members, including membership programs, regular updates (weekly or monthly), specialized training, certification, Authorized Certified Trainer (ACT) programs, advocacy, and other professional services.

George is the president of the International Association of Risk and Compliance Professionals (IARCP, https://www.risk-compliance-association.com). He leads the team responsible for developing and maintaining the Certified Risk and Compliance Management Professional (CRCMP) program. The CRCMP certification is widely regarded as a preferred credential by companies and organizations. For more information on the demand for CRCMPs, you may visit: https://www.risk-compliance-association.com/CRCMP_Jobs_Careers.pdf


CRCMP careers

George has accumulated over 20,000 hours of experience as a seminar leader, providing training and executive coaching in information security and risk management to leading global organizations across 36 countries. He holds a Master of Laws (LL.M.) in International Business Law from the University of London (Queen Mary and UCL). Beginning his career as a mathematician, George has since earned 60 professional certifications in information security, risk management, and IT. His credentials include the Certified Information Systems Security Professional (CISSP) lead instructor, Steganography Investigator, and certifications from the Internet Security Systems (ISS) in Internet Scanner, Database Scanner, and System Scanner. He is also a Checkpoint Certified Security Administrator (CCSA), Microsoft Certified Systems Engineer (MCSE), and Microsoft Certified Trainer (MCT). As an expert witness and litigation consultant, he is qualified to investigate and provide testimony on compliance with European, U.S., and international regulations.

George Lekatis is a highly sought-after expert on Basel III, with deep expertise in helping international firms and financial conglomerates develop controls and systems to meet complex regulatory requirements. He serves as the President of the Basel III Compliance Professionals Association (BiiiCPA, https://www.basel-iii-association.com), the world’s largest association of Basel III professionals, dedicated to supporting compliance across the global financial sector.

George also serves as the President of the Sarbanes-Oxley Compliance Professionals Association (SOXCPA, https://www.sarbanes-oxley-association.com), the world’s largest association of Sarbanes-Oxley professionals.

Our instructors are professionals with extensive, real-world experience in their respective fields. They are equipped to deliver full-time, part-time, or short-form programs, all customized to suit your specific requirements. Beyond teaching, our instructors provide hands-on guidance, offering real-world insights that help bridge the gap between theory and practice. You will always be informed ahead of time about the instructor leading your program.


“Cyber Risk GmbH websites” are all websites that belong to Cyber Risk GmbH, and include the following:


a. General, Sectors, Industries.

1. The Hybrid Resilience Initiative (HRI)

2. Cyber Risk GmbH

3. Social Engineering Training

4. Healthcare Cybersecurity

5. Airline Cybersecurity

6. Railway Cybersecurity

7. Maritime Cybersecurity

8. Oil Cybersecurity

9. Electricity Cybersecurity

10. Gas Cybersecurity

11. Hydrogen Cybersecurity

12. Transport Cybersecurity

13. Hotel Cybersecurity

14. Sanctions Risk

15. American Privacy Rights Act of 2024 (APRA)

16. Travel Security


b. Understanding Cybersecurity.

1. What is Disinformation?

2. What is Steganography?

3. What is Cyberbiosecurity?

4. What is Synthetic Identity Fraud?

5. What is a Romance Scam?

6. What is Cyber Espionage?

7. What is Sexspionage?


c. Understanding Cybersecurity in the European Union.

1. The NIS 2 Directive

2. The Digital Operational Resilience Act (DORA)

3. The Critical Entities Resilience Directive (CER)

4. The European Data Act

5. The European Data Governance Act (DGA)

6. The European Cyber Resilience Act (CRA)

7. The Digital Services Act (DSA)

8. The Digital Markets Act (DMA)

9. The European Chips Act

10. The Artificial Intelligence Act

11. The Artificial Intelligence Liability Directive

12. The Framework for Artificial Intelligence Cybersecurity Practices (FAICP)

13. The EU Cyber Solidarity Act

14. The Digital Networks Act (DNA)

15. The European ePrivacy Regulation

16. The European Digital Identity Regulation

17. The European Media Freedom Act (EMFA)

18. The Corporate Sustainability Due Diligence Directive (CSDDD)

19. The Systemic Cyber Incident Coordination Framework (EU-SCICF)

20. The European Health Data Space (EHDS)

21. The European Financial Data Space (EFDS)

22. The Financial Data Access (FiDA) Regulation

23. The Payment Services Directive 3 (PSD3), Payment Services Regulation (PSR)

24. The Internal Market Emergency and Resilience Act (IMERA)

25. The Digital Fairness Act

26. The European Cyber Defence Policy

27. The Strategic Compass of the European Union

28. The European Space Law (EUSL)

29. The EU-US Data Privacy Framework

30. The European Cloud and AI Development Act

31. The European Quantum Act

32. The EU Cyber Diplomacy Toolbox




Cyber Security Training

Cyber security is ofter boring for employees. We can make it exciting.


Online Cybersecurity Training

Online Training

Recorded on-demand training and live webinars.

In-house Cybersecurity Training

In-house Training

Engaging training classes and workshops.

Social Engineering Cybersecurity Training

Social Engineering

Developing the human perimeter to deal with cyber threats.


For the Board Cybersecurity Training

For the Board

Short and comprehensive briefings for the board of directors.


Cybersecurity Assessment

Assessments

Open source intelligence (OSINT) reports and recommendations.


High Value Targets Cybersecurity Training

High Value Targets

They have the most skilled adversaries. We can help.





Which is the next step?

1

You contact us

2

We discuss

3

Our proposal

4

Changes and approval

5

We deliver







Cyber Risk GmbH, Cyber Risk Awareness and Training