Cyber Risk GmbH, About us



George Lekatis

Cyber Risk GmbH has been established in Horgen, Switzerland, by George Lekatis, a well-known expert in risk management and compliance.

George is the general manager of Compliance LLC, incorporated in Wilmington NC and offices in Washington DC, a provider of risk and compliance training and executive coaching in 57 countries.

Several business units of Compliance LLC are very successful associations that offer standard, premium and lifetime membership, weekly or monthly updates, training, certification, Authorized Certified Trainer (ACT) programs, and other services to their members.

George is the president of the International Association of Risk and Compliance Professionals (IARCP, https://www.risk-compliance-association.com). He was in charge of the team that developed the Certified Risk and Compliance Management Professional (CRCMP) program. Companies and organizations like Accenture, USAA etc. consider the CRCMP a preferred certificate.

George is a sought-after expert on Basel III, especially where international firms and financial conglomerates have to develop controls and systems to comply with multiple laws and regulations, including the Sarbanes-Oxley Act, the Basel III Accord and the Solvency II Directive. He is the president of the Basel iii Compliance Professionals Association (BiiiCPA, https://www.basel-iii-association.com), the largest association of Basel iii professionals in the world.

George has more than 20,000 hours experience as a seminar leader. He has provided training and executive coaching in information security and risk management to many leading global organizations, in 36 countries. You can find some testimonials at: https://www.cyber-risk-gmbh.com/George_Lekatis_Testimonials.pdf

George holds a Master of Laws in international business law from the University of London (Queen Mary, UCL). He started his career as a mathematician. He also holds 60 professional certificates in information security, risk management, and IT.

He has become a Certified Information Systems Security Professional (CISSP), CISSP lead instructor, Steganography Investigator, Internet Security Systems (ISS) Certified in Internet Scanner, Database Scanner and System Scanner, Checkpoint Certified Security Administrator (CCSA), Microsoft Certified System Engineer (MCSE), Microsoft Certified Trainer (MCT). As an expert witness and litigation consultant, he is qualified to investigate and testify about risk and compliance management standards and due diligence in firms and organizations.

Our instructors are working professionals that have the necessary knowledge and experience in the fields in which they teach. They can lead full-time, part-time, and short-form programs that are tailored to your needs. You will always know up front who the instructor of the training program will be.


“Cyber Risk GmbH websites” are all websites that belong to Cyber Risk GmbH, and include the following:


a. Sectors and Industries.

1. Cyber Risk GmbH

2. Social Engineering Training

3. Healthcare Cybersecurity

4. Airline Cybersecurity

5. Railway Cybersecurity

6. Maritime Cybersecurity

7. Oil Cybersecurity

8. Electricity Cybersecurity

9. Gas Cybersecurity

10. Hydrogen Cybersecurity

11. Transport Cybersecurity

12. Transport Cybersecurity Toolkit

13. Hotel Cybersecurity

14. Sanctions Risk

15. Travel Security


b. Understanding Cybersecurity.

1. What is Disinformation?

2. What is Steganography?

3. What is Cyberbiosecurity?

4. What is Synthetic Identity Fraud?

5. What is a Romance Scam?

6. What is Cyber Espionage?

7. What is Sexspionage?


c. Understanding Cybersecurity in the European Union.

1. The NIS 2 Directive

2. The European Cyber Resilience Act

3. The Digital Operational Resilience Act (DORA)

4. The Critical Entities Resilience Directive (CER)

5. The Digital Services Act (DSA)

6. The Digital Markets Act (DMA)

7. The European Health Data Space (EHDS)

8. The European Chips Act

9. The European Data Act

10. European Data Governance Act (DGA)

11. The Artificial Intelligence Act

12. The European ePrivacy Regulation

13. The European Cyber Defence Policy

14. The Strategic Compass of the European Union

15. The EU Cyber Diplomacy Toolbox




Cyber Security Training

Cyber security is ofter boring for employees. We can make it exciting.


Online Cybersecurity Training

Online Training

Recorded on-demand training and live webinars.

In-house Cybersecurity Training

In-house Training

Engaging training classes and workshops.

Social Engineering Cybersecurity Training

Social Engineering

Developing the human perimeter to deal with cyber threats.


For the Board Cybersecurity Training

For the Board

Short and comprehensive briefings for the board of directors.


Cybersecurity Assessment

Assessments

Open source intelligence (OSINT) reports and recommendations.


High Value Targets Cybersecurity Training

High Value Targets

They have the most skilled adversaries. We can help.





Which is the next step?

1

You contact us

2

We discuss

3

Our proposal

4

Changes and approval

5

We deliver







Cyber Risk GmbH, Cyber Risk Awareness and Training