|
Cybersecurity Awareness: An Introduction for End-Users
Cybersecurity, data privacy, password management, social-engineering, encryption, malware and the cloud – your employees need to be aware of these topics. Although your network may be locked, every employee still has a key. Cybersecurity Awareness: An Introduction for End-Users educates your employees (at any position or degree of technical comfort) about today’s threats and how to avoid being compromised by the bad-guys.
|
|
|
Cybersecurity Awareness: An Introduction for End-Users
Cybersecurity, data privacy, password management, social-engineering, encryption, malware and the cloud – your employees need to be aware of these topics. Although your network may be locked, every employee still has a key. Cybersecurity Awareness: An Introduction for End-Users educates your employees (at any position or degree of technical comfort) about today’s threats and how to avoid being compromised by the bad-guys.
|
|
|
Cybersecurity Awareness: An Introduction for End-Users balances three key elements:
- an overview of the bad-actors, who they are, how they operate, and why
- how end-users fulfill their part as the “human firewall” in the larger security effort
- your specific policies and procedures, and how to follow them
Cybersecurity Awareness: An Introduction for End-Users is a comprehensive seminar centred around a lively lecture, mixed with in-the-news examples, engaging stories, and incorporating audience questions throughout. It can be tailored for employees with any level of technical savvy, or none at all.
From the top to the bottom of your organization, anyone with access to your systems is a potential target for bad-actors to exploit. Have you provided adequate training?
|
|
|
Cybersecurity Awareness: An Introduction for End-Users balances three key elements:
- an overview of the bad-actors, who they are, how they operate, and why
- how end-users fulfill their part as the “human firewall” in the larger security effort
- your specific policies and procedures, and how to follow them
Cybersecurity Awareness: An Introduction for End-Users is a comprehensive seminar centred around a lively lecture, mixed with in-the-news examples, engaging stories, and incorporating audience questions throughout. It can be tailored for employees with any level of technical savvy, or none at all.
From the top to the bottom of your organization, anyone with access to your systems is a potential target for bad-actors to exploit. Have you provided adequate training?
|
|
|
Perry Feler, of FelerNetworks Corporation, has navigated the world of IT, and related security, for almost a quarter-century. Perry’s approach to data security has always placed a strong emphasis on end-user education, bolstering end-users as the critical network infrastructure that they are. Endlessly-patient, and always approachable, Perry is the natural choice for end-user-oriented training.
|
|
|
Perry Feler, of FelerNetworks Corporation, has navigated the world of IT, and related security, for almost a quarter-century. Perry’s approach to data security has always placed a strong emphasis on end-user education, bolstering end-users as the critical network infrastructure that they are. Endlessly-patient, and always approachable, Perry is the natural choice for end-user-oriented training.
|
|
|
Available as a half- or full-day program, to accommodate your scheduling requirements.
in-advance, optional |
Discussions with your IT department
specific policies, procedures, screenshots, examples, and company stories to be included in the seminar
|
9am – 11am, optional |
Morning Edition (breakfast-catered)
including Q&A throughout, as well as a 15-minute intermission
|
12pm – 2pm |
Mid-Day Edition (lunch-catered)
including Q&A throughout, as well as a 15-minute intermission
|
3pm – 5pm, optional |
Floating Discussions (one-on-ones)
available for individual discussions and detailed questions, including at staff desks and workstations
|
Seminars are formatted for small/large classrooms (catering optional), or lecture halls with a display.
|
|
|
Available as a half- or full-day program, to accommodate your scheduling requirements.
in-advance, optional |
Discussions with your IT department
specific policies, procedures, screenshots, examples, and company stories to be included in the seminar
|
9am – 11am, optional |
Morning Edition (breakfast-catered)
including Q&A throughout, as well as a 15-minute intermission
|
12pm – 2pm |
Mid-Day Edition (lunch-catered)
including Q&A throughout, as well as a 15-minute intermission
|
3pm – 5pm, optional |
Floating Discussions (one-on-ones)
available for individual discussions and detailed questions, including at staff desks and workstations
|
Seminars are formatted for small/large classrooms (catering optional), or lecture halls with a display.
|
|
|
Attendees will receive an overview of the threats present in today’s digital world, specifically those which pass by, or through, the devices that they use every day. Attendees will be given basic skills to help protect the organization, and themselves, from such threats. Throughout, attendees will be guided through your organization’s specific policies and scenarios to ensure that they perform effectively and comfortably on-the-job.
Attendees will learn:
Knowledge
- Who are the bad-guys, who are their targets, what do they want, and why?
- What does the IT department secure, and why can’t they protect against everything?
- The role of end-users as they pertain to data security and information privacy.
- Types of malware, including viruses & ransomware.
- The dangers of social-engineering including phishing and spear-phishing.
- What is the cloud, benefits vs. exposure, “shadow IT” services, and encryption.
- Public networks, Wi-Fi, security, trust, and best practices.
Skills
- Attendees will be able to choose appropriate passwords, safely manage multiple sets of credentials, lock workstations, and follow existing IT department policies to keep accounts safe.
- Attendees will be able to recognize and avoid basic malware, distinguish between real and fake anti-virus alerts, and to know when they should not guess but call IT instead.
- Attendees will be able to avoid common phishing attacks by revealing/bypassing hyperlinks.
- Attendees will be able to reduce the risk of social-engineering attacks by knowing when, and how, to question and authenticate an executive’s written instructions.
- Attendees will know the risks of working off-site, and follow policies accordingly.
Attitudes
- Attendees will confidently navigate potential threats surrounding their every-day work.
- Attendees will recognize when they are out of their depth and should ask IT for help.
- Attendees will have an appreciation for the IT department and the security it provides.
- Attendees will understand how they could become the weak link in any corporate attack.
Following the seminar, additional assistance will be available to attendees for the remainder of the business day. This is suitable for detailed questions, and one-on-one at-desk discussions.
Seminars tie the lessons learned to steps that end-users can take at home, to protect their families and personal equipment. This is furthered by a take-home-tips handout.
Seminars are modular, and can be formatted to include additional elements, cover custom training, or to exclude inapplicable topics. Interactive discussions are encouraged (subject only to scheduling constraints), with presentation-interrupting questions welcome in classroom settings.
Subsequent seminars can be tailored as refresher courses for annual or quarterly reinforcement.
|
|
|
Attendees will receive an overview of the threats present in today’s digital world, specifically those which pass by, or through, the devices that they use every day. Attendees will be given basic skills to help protect the organization, and themselves, from such threats. Throughout, attendees will be guided through your organization’s specific policies and scenarios to ensure that they perform effectively and comfortably on-the-job.
Attendees will learn:
Knowledge
- Who are the bad-guys, who are their targets, what do they want, and why?
- What does the IT department secure, and why can’t they protect against everything?
- The role of end-users as they pertain to data security and information privacy.
- Types of malware, including viruses & ransomware.
- The dangers of social-engineering including phishing and spear-phishing.
- What is the cloud, benefits vs. exposure, “shadow IT” services, and encryption.
- Public networks, Wi-Fi, security, trust, and best practices.
Skills
- Attendees will be able to choose appropriate passwords, safely manage multiple sets of credentials, lock workstations, and follow existing IT department policies to keep accounts safe.
- Attendees will be able to recognize and avoid basic malware, distinguish between real and fake anti-virus alerts, and to know when they should not guess but call IT instead.
- Attendees will be able to avoid common phishing attacks by revealing/bypassing hyperlinks.
- Attendees will be able to reduce the risk of social-engineering attacks by knowing when, and how, to question and authenticate an executive’s written instructions.
- Attendees will know the risks of working off-site, and follow policies accordingly.
Attitudes
- Attendees will confidently navigate potential threats surrounding their every-day work.
- Attendees will recognize when they are out of their depth and should ask IT for help.
- Attendees will have an appreciation for the IT department and the security it provides.
- Attendees will understand how they could become the weak link in any corporate attack.
Following the seminar, additional assistance will be available to attendees for the remainder of the business day. This is suitable for detailed questions, and one-on-one at-desk discussions.
Seminars tie the lessons learned to steps that end-users can take at home, to protect their families and personal equipment. This is furthered by a take-home-tips handout.
Seminars are modular, and can be formatted to include additional elements, cover custom training, or to exclude inapplicable topics. Interactive discussions are encouraged (subject only to scheduling constraints), with presentation-interrupting questions welcome in classroom settings.
Subsequent seminars can be tailored as refresher courses for annual or quarterly reinforcement.
|
|
|