Overview
The world of cyber security and privacy is constantly changing. Today, effective cyber security programs involve the entire organization and not only the IT or the information security teams. Employees that have access to critical assets of an organization, have become primary targets of cyber attacks. Those that have access to technology and organizational assets are also responsible for the protection of those assets. Are they fit and proper to handle this responsibility? Do they have the awareness and skills necessary to meet these expectations?
Our training programs have the objective to help managers and employees not only understand the cyber security threats, but also their responsibility towards protecting the assets they handle. We explain how to proactively apply good cyber security practices, how to identify threats and attacks, and what to do to protect themselves and their organizations. Cyber security is a shared responsibility.
Duration
We tailor each program to the needs of the client. We can provide trainings as short as 30 minutes, but we can also deep dive into our topics for 1-2 days. The duration depends entirely on the needs, the agreed content of the program and the case studies.
Our Education Method
In the core of our training approach is to ensure that our delivery is relatable, engaging, and interesting. We always make cyber security training an exciting adventure for our attendees. Our instructors have trained thousands of employees across the globe and have the skills and experience necessary to ensure that our attendees will enjoy the process while they learn. Our training programs may have workshop elements that get everyone involved.
Our Instructors
They are working professionals that have the necessary knowledge and experience in the fields in which they teach. They can lead full-time, part-time, and short-form programs that are tailored to your needs. You will always know up front who the instructor of the training program will be.
Our Training Programs:
1. Information Security Awareness Training: Managers and employees must understand the risk of cyber threats, and why cyber security is a shared responsibility. Process owners and persons having access to systems and data learn practical cyber security best practices to help protect themselves and their organization from cyber threats.
You may visit: https://www.cyber-risk-gmbh.com/1_Information_Security_Awareness_Training.html
2. Social Engineering, Awareness and Defense: About 80% of cyber attacks are being initiated or executed through social engineering. In this course, managers and employees learn to identify social engineering attacks, recognize the red flags, and respond to psychological exploitation from threat actors. Attendees learn to better protect the systems, assets, and information they handle.
You may visit: https://www.cyber-risk-gmbh.com/2_Social_Engineering_Awareness_Defence.html
3. Practical Social Engineering. Defense and Protection of Sensitive Information: Sensitive or classified information is often a powerful, high-value asset that attracts many attackers. Governmental or non-governmental organizations and companies handling this information acquire the skills and knowledge necessary to identify potential threats and respond to them. They also learn to be proactive in avoiding information leaks.
You may visit: https://www.cyber-risk-gmbh.com/3_Practical_Social_Engineering.html
4. Insider Threats Awareness Training: When insiders blend illicit activities with licit business and harm their own organization, other employees often become silent witnesses of this activity. We help employees understand the insider threat, recognize the red flags of insider threat activity, respond to it by informing their organization, and more.
You may visit: https://www.cyber-risk-gmbh.com/4_Insider_Threats_Awareness_Training.html
5. The target is the bank. From hacking to cybercrime to cyberespionage: The number of cyber-attacks directed at financial institutions of all sizes is growing. Cyber risks, like reputational and financial risks, affect a bank’s bottom line. We help key people in financial institutions understand how cyber-criminals operate, the exploitation of IT vulnerabilities or the use of deceptive or manipulative attacks on people to gain access to facilities, systems, and the critical infrastructure.
You may visit: https://www.cyber-risk-gmbh.com/5_The_Target_Is_The_Bank.html
6. Cybersecurity training for managers and employees working in the hospitality industry: For decades, when we were using the words “hotel security”, we were usually referring to “physical security”. It was all about guest protection, locks, safes, and surveillance. Guests and hotel employees today expect that the same level of protection extends to the digital assets that reside not only on their laptops and smartphones, but also on the hotel’s systems.
You may visit: https://www.cyber-risk-gmbh.com/6_Cybersecurity_Training_Hospitality_Industry.html
7. Cybersecurity training for managers and employees working in the commercial and private aviation industry: The commercial and private aviation must comply with cyber security and privacy laws and regulations and must follow international standards and best practices that protect their customers and employees. Aircraft cybersecurity involves the policies, procedures, awareness and training for the prevention, detection, and response to deliberate malicious acts that target systems, persons (via social engineering) and data, to compromise an aircraft's systems and staff.
You may visit: https://www.cyber-risk-gmbh.com/7_Cybersecurity_Training_Aviation_Industry.html
8. Cybersecurity training for managers and employees working in the healthcare industry: In 2020, hospitals, healthcare providers and medical facilities were struggling to handle not only the influx of patients suffering from Covid-19, but also a surge of ransomware attacks, as criminals (including state-sponsored groups) exploited the crisis to hit the sector. Month after month, there are many successful cyberattacks on the healthcare industry. Cybersecurity breaches that expose sensitive data from thousands of people are especially important, as the privacy rules have become a nightmare for healthcare providers.
You may visit: https://www.cyber-risk-gmbh.com/8_Cybersecurity_Training_Healthcare_Industry.html
9. The General Data Protection Regulation (GDPR) for EU and non-EU based companies. The new privacy and security requirements: The GDPR is applicable for EU and non-EU companies that are offering goods or services to identified or identifiable EU natural persons ("data subjects"), organizations processing personal data of EU data subjects, or organizations that monitor the online behaviour of EU data subjects. Non-EU companies that have no local presence in the EU are also in the scope of the GDPR legislation.
You may visit: https://www.cyber-risk-gmbh.com/9_GDPR.html
10. The General Data Protection Regulation (GDPR) for the Board of Directors and the CEO of EU and non-EU based companies: The CEO and the Board must understand the new obligations, must be able to support their organization, and ensure the consistent application of the regulation.
You may visit: https://www.cyber-risk-gmbh.com/10_GDPR_Board.html
11. Your program: Let us know what you have in mind. We can develop and tailor a program to meet your requirements. You may contact us to discuss your needs.
You may also read:
Cyber security is ofter boring for employees. We can make it exciting.