Social Engineering Training



Cybersecurity is not only a technical challenge

It is also a behavioral challenge. As long as managers and employees can provide access to systems and data, cybersecurity depends on them too.

Employees that have access to critical assets of an organization, become targets. Those that have access to technology and organizational assets are also responsible for the protection of those assets. Are they fit and proper to handle this responsibility? Do they have the awareness and skills necessary to protect themselves and their organisation?

We offer specialized social engineering training and services aiming to develop the organizational human firewall. Our training programs and services can also be provided remotely.


Social Engineering Training: Awareness and Defense

a. Social Engineering Training: Awareness and Defence.

You may visit: https://www.cyber-risk-gmbh.com/2_Social_Engineering_Awareness_Defence.html



Practical Social Engineering Training

b. Practical Social Engineering Defence: Protection of Sensitive Information.

You may visit: https://www.cyber-risk-gmbh.com/3_Practical_Social_Engineering.html



Social Engineering Training Peace of Mind

c. Social Engineering Training – Peace of Mind Service

You may visit: https://www.cyber-risk-gmbh.com/Peace_of_mind.html







Cyber Security Training

Cyber security is ofter boring for employees. We can make it exciting.


Online Cybersecurity Training

Online Training

Recorded on-demand training and live webinars.

In-house Cybersecurity Training

In-house Training

Engaging training classes and workshops.

Social Engineering Cybersecurity Training

Social Engineering

Developing the human perimeter to deal with cyber threats.


For the Board Cybersecurity Training

For the Board

Short and comprehensive briefings for the board of directors.


Cybersecurity Assessment

Assessments

Open source intelligence (OSINT) reports and recommendations.


High Value Targets Cybersecurity Training

High Value Targets

They have the most skilled adversaries. We can help.





Which is the next step?

1

You contact us

2

We discuss

3

Our proposal

4

Changes and approval

5

We deliver









Cyber Risk GmbH, Cyber Risk Awareness and Training