Cyber Vigilance

Image

Cyber-Vigilance Training Plans

This article will guide you in understanding the on-site training plans of Cyber-Vigilance Academy, Berlin. To provide a more comprehensive overview of our modules, we have separated them into Three Learning categories. These diagrams depict the links between separate modules and suggest a training sequence.

Compliance Category

Organizational alignment in cybersecurity is required to ensure legal security and compliance.

 

The Basics and Beyond category

Fundamental knowledge for employees and management that should be understood by all.


Technical Category

Insight into technical factors and practical application for overcoming cybersecurity challenges and finding solutions.

Our Training Plan

Standard Plan

All modules with the Basic skill level.

Security First: Onboarding for employees (Integrating safety principles into the onboarding process for new staff.)

  • Practice-oriented       
  • Resources included
  • Workshop
  • Interactive
Training Overview

The session “Security First: Holistic onboarding for employees with essential security measures” focuses on introducing new employees to the company’s core security procedures from the outset. The onboarding process incorporates topics such as password management, data protection basics, the secure usage of artificial intelligence (AI), and security awareness. Practical training and interactive activities enable participants to actively incorporate security measures into their daily work and become aware of security dangers.

  • Communicating the value of security during the onboarding process
  • Learning good password management and the fundamentals of data security
  • Raising awareness of security risks and threats from the outset of the firm.
  • Actively engaging in security-related behaviors such as phishing detection and secure data handling.
  • Promoting comprehensive security awareness as an important component of business culture.
Organizational requirements

Duration: Four hours.
Format: Presence workshop / Online
Target audience: new employees in the organisation, HR managers
Number of participants: 6-12.
Skill level: basic
Prior knowledge: none.

Cyber-attacks on companies and institutions

Strategies for detecting, preventing, and responding to cyberattacks in businesses and institutions.

  • Practice-oriented       
  • Resources included
  • Workshop
  • Interactive
Training Overview

The Training workshop “Cyberattacks on Companies and institutions: Current Trends, Holistic Security Concepts, and Effective Response Strategies” provides a comprehensive overview of the most recent advances and trends in the field of cyber-attacks on enterprises. Participants will learn how to identify potential attack scenarios, take precautions, and respond effectively to security problems. Practical examples and case studies will help learners strengthen their organization’s security posture and respond effectively to cyber threats. Participants will also learn how to create a comprehensive security strategy that addresses the most recent threats. Participants will be equipped with real-world examples and case studies to design and implement effective response methods to safeguard their organisation from cyberattacks.

Goals

  • Recognise the many forms of cyberattacks and their potential impact on companies.
  • Understanding current trends and advancements in the field of cyber attacks on companies.
  • Create a comprehensive security concept that addresses multiple security aspects.
  • Insight into previous attacks, including their procedures and measures
  • Creating effective response and emergency plans for coping with cyber threats.
  • Increasing participants’ sensitivity and security awareness when dealing with current risks.

Organizational requirements

Duration: Four hours.
Format: Presence workshop / Online
Target audience: new employees in the organisation, HR managers
Number of participants: 6-12.
Skill level: basic
Prior knowledge: none.

Cybersecurity fundamentals for employees

IT Fundamental safety principles and procedures for all employees.

  • Practice-oriented       
  • Resources included
  • Workshop
  • Interactive
  • Training Overview

Short description

The session “Cybersecurity Basics for Employees” focusses on teaching basic security principles and practices that are applicable to employees from diverse departments inside the firm. A holistic approach demonstrates that cybersecurity is vital in all roles and that every employee is responsible for the security of company data. Participants are sensitised and enabled to identify and respond to security hazards through interactive discussions and hands-on exercises.

Goals

  • Understand the importance of cybersecurity in various aspects of the firm.
  • Learn basic security ideas and methods adapted to the respective function.
  • Recognise prevalent cybersecurity threats and attack tactics.
  • Identify role-specific security risks and obstacles.
  • Learn the best behaviours and security procedures targeted to each specific function in the firm.
  • Develop the skills to proactively help safeguard firm data and resources in your respective function.

Organizational requirements

Duration: Four hours.
Format: Presence workshop / Online
Target audience: new employees in the organisation, HR managers
Number of participants: 10-25.
Skill level: basic
Prior knowledge: none.

Gold Plan

All modules are at the Advanced skill level.

Data protection : Managing company/institutional and organisations data.

Protection of sensitive data and compliance with legal data protection rules.

  • Practice-oriented       
  • Resources included
  • Workshop
  • Interactive
Training Overview

The workshop “Data Protection: Handling Company Data” provides a thorough introduction to developing a data protection plan for businesses. Participants will learn how to effectively protect sensitive company data in order to meet regulatory requirements while also maintaining their customers’ trust.

Goals

  • Understanding the importance of data protection and the legal framework for dealing with sensitive enterprise data.
  • Knowledge of the most essential data protection concepts and legislation, particularly in relation to the DSGVO/GDPR
  • Ability to recognise sensitive firm data and its hazards to data security
  • Creating a data protection strategy adapted to the company’s specific needs and dangers
  • Awareness of how to regularly review and adjust the data protection plan to meet changing legal standards and business needs

Organizational requirements

Duration: 4h

Formats: Presence workshop/ Online

Target group: Data protection officers, IT security officers, managers, Department heads, HR

Number of participants: 6-12 people

Skill level: Advanced

Prior knowledge required: Basic knowledge of data protection and IT security

Security Baseline: Infrastructure and network

  • Practice-oriented       
  • Resources included
  • Workshop
  • Interactive

Training Overview

The “Security Baseline: Infrastructure and Network” program offers a thorough overview of security fundamentals for IT infrastructures, networks, and cloud computing environments. Participants are given an overview of optimal security practices and technology for improving the security of their IT systems and reducing potential points of vulnerability.

Goals

  • Understand the fundamental security principles for IT infrastructures, networks, and cloud environments.
  • Learn the best security techniques and technology to reduce security threats.
  • Capability to recognise possible areas of attack and vulnerabilities in infrastructure, network, and cloud settings.
  • Gain understanding of how to deploy security solutions and measures in various environments.
  • Raise awareness of the significance of continual monitoring and modifying security strategies to current threats.

Organizational requirements

SecurityDuration: 4 hours

Formats: Presence Workshop/ Online

Target group: IT administrators, security officials, and system architects are the target group.

Number of participants: 6-12 people

Skill Level: Advanced

 

Compliance Baseline: NIS 2 in practice

The structure and requirements of the NIS 2 guideline for corporate compliance.

  • Practice-oriented       
  • Resources included
  • Workshop
  • Interactive

Training Overview

The session “Compliance Baseline: NIS 2 in Practice” provides a thorough introduction to the structure and numerous requirements of the NIS 2 Directive, as well as its practical application in businesses. Participants will learn how to ensure NIS 2 compliance in order to maintain a high level of cybersecurity in Austria and the European Union over time.

Goals

  • Understanding the NIS 2 directive and its significance in the protection of critical infrastructure and digital services
  • Understanding the precise requirements and best practices for NIS 2 compliance.
  • Ability to assess your company’s condition in terms of NIS 2 compliance and highlight the need for action.
  • Develop concrete implementation strategies and action plans for compliance with the NIS 2 Directive.
  • Raising awareness about the continual monitoring and updating of security measures in accordance with NIS 2 standards

Organizational requirements

Duration: 4 h

Formats: Presence workshop

Target group: IT security officers, compliance officers, managers,

Number of participants: 6-12 people

Skill level: Advanced

Required prior knowledge: Basic knowledge of IT security and compliance

Strategic cyber security for executives

Managers should be aware of key cyber security issues and take strategic steps.

  • Practice-oriented       
  • Resources included
  • Workshop
  • Interactive

Training Overview

The learning session “Strategic cybersecurity for managers: strategic measures and legal framework” provides managers with a concise overview of the most important components of cybersecurity. In addition to proposing strategic steps to improve company security, the focus is on Austria’s legislative environment and the potential for cyber attack insurance. Participants will learn practical ideas and quick wins for protecting their businesses against cyber threats.

Goals

  • Understanding the crucial necessity of cybersecurity to the firm
  • Learn about quick wins and practical methods that can be used immediately.
  • Gain knowledge of the legal framework and compliance standards in Austria.
  • Understanding cyber-attack insurance and its significance in risk management.
  • Raising awareness of the importance of continual monitoring and modifying the security approach to current developments

Organizational requirements

Duration: 2-4 h

Formats: Presence workshop

Target group: Managers, decision-makers in the company

Number of participants: 6-12 people

Skill level: Advanced

Prior knowledge required: None (possibly basic knowledge of cyberattacks)

Fundamental cybersecurity strategy

Improve your understanding of modern security procedures to better secure your resources.

  • Practice-oriented       
  • Resources included
  • Workshop
  • Interactive

Training Overview

The session “Basic Cybersecurity Strategy: Setting a Simple Baseline for Your Organisation” offers a step-by-step guidance to creating a basic cybersecurity plan. Participants will learn how to assess threats, determine priorities, and identify acceptable security solutions to provide the groundwork for their organization’s security.

Goals

  • Understanding the significance of a cybersecurity plan for firms of any size.
  • Capability to recognise security dangers and hazards to your own firm.
  • Familiarization with methods and tools for risk assessment and prioritizing security actions.
  • Create an individual cybersecurity plan tailored to the company’s specific needs and dangers.
  • Increasing awareness of the necessity to constantly monitor and adjust the cybersecurity approach to evolving threats and business requirements.

Organizational requirements

Duration: 4 h

Formats: Presence workshop

Target group: IT managers, managing directors, executives

Number of participants: 6-12 people

Skill level: Advanced

Prior knowledge required: Basic knowledge of IT security

Platinum Plan

ISMS ISO/IEC 27001

The international benchmark for information security management systems. This standard defines the requirements that must be met to establish, implement, maintain, and constantly enhance an efficient ISMS.

  • Practice-oriented       
  • Resources included
  • Workshop
  • Interactive

Training Overview

The workshop ISO/IEC 27001 Information technology – Security techniques – Information security management systems, specifies the requirements for developing, implementing, maintaining, and continuously improving a documented information security management system while taking into account an organization’s context. Furthermore, the standard provides requirements for assessing and treating information security threats based on the organization’s specific needs, taking into account various sorts of organizations (e.g., commercial companies, government organizations, and non-profit organizations). The standard was also issued as a DIN standard and is a member of the ISO/IEC 2700x family.

Participants will learn how to identify, evaluate, and apply the steps required to receive the ISO/IEC 2700x certificate Seal and improve their organization’s cyber security.

Goals

  • Understand the structure and requirements of the ISMS Framework scheme.
  • Ability to detect cyber threats and implement measures in accordance with the scheme’s requirements
  • Understanding the evaluation techniques and criteria for implementing the elements of the Cyber and information Risk Rating Scheme
  • Development of a concrete implementation strategy to meet the essential steps and receive the  ISO/IEC 2700x certificate Seal of approval.
  • Raising awareness of the necessity of a comprehensive approach to Information and cyber security and the continual improvement of security processes within the firm.

Organizational requirements

Duration: 4-6 h

Formats: Presence workshop

Target group: IT security officers, compliance officers, managers

Number of participants: 6-12 people

Skill level: Expert

Required prior knowledge: Advanced knowledge of cyber security and risk management, Information security, BCM and GRC

Security architectures for SMEs

Security architectures are designed with SMEs in mind.

  • Practice-oriented       
  • Resources included
  • Workshop
  • Interactive

Training Overview

The workshop “Security Architectures for SMEs: Strategies for Networks, IoT, Production, Remote Work, and Cloud Deployment” offers a thorough study and design of security architectures customized to the demands of small and medium-sized businesses (SMEs). Attendees will learn about security best practices and solutions for numerous business domains, including networks, IoT, production, remote work, and cloud deployment. Case studies and practical exercises will be used to create actual solutions that efficiently address the security needs of SMEs.

Goals

  • Understanding the unique problems and security requirements of SMEs
  • Knowledge of security best practices and technology for various business domains such as networks, IoT, production, remote work, and cloud deployment.
  • Ability to analyze and assess a SME’s present security architecture, identifying weaknesses and areas for development.
  • Create tailored security architectures for SMEs, taking into account their unique needs and dangers.
  • Raising awareness of the necessity of a holistic approach to security, and ongoing monitoring and adaption of the security architecture in response to evolving threats and business requirements.

Organizational requirements

Duration: 4-6 h

Formats: Presence workshop

Target group: IT managers, managing directors, security consultants for SMEs

Number of participants: 6-12 people

Skill level: Expert

Required prior knowledge: Advanced knowledge of IT security and network architecture

Consulting

IT advice and consulting

With rising digitalization, it is becoming increasingly vital to identify forward-thinking technologies, procedures, and structures for addressing difficulties within a corporation.

Our specialists provide you with thorough knowledge in the quest for personalized and safe IT solutions. They will collaborate with you to analyze IT processes and systems in order to create the optimal IT strategy for your objectives.

  • Identify, assess and prevent threats
  • Risk management & assessment
  • Close gaps, minimize risks

“Work from anywhere” and cloud-based working methods create entirely new attack vectors for cybercriminals. Attacks on a company’s IT systems can cause production disruption, loss of trust, sanctions, and hence hefty expenses. It is thus critical to mitigate risks and adhere to current security standards.

Risk management and assessment can be used to identify, assess, and evaluate hazards to corporate IT. Good management entails the following:

  • Assessment of the current situation: Identifying vulnerabilities, recording, and implementing compliance standards and recommendations.
  • Cybersecurity roadmap: establishment of a roadmap for periodical evaluations of the IT infrastructure, 360° analysis in the form of a managed service, and employee training programs.
  • Implementation of emergency plans: clearly defined processes for all areas of the organization as part of business continuity management in order to sustain continued business operations in the event of an emergency.

Contact our team of specialists about risk management and assessment.