TRAINING

Great training requires a strong diverse background and excellent education. We have all that and more and won’t wholly base our learnings on past achievements alone. Rather, we push the envelope and encourage our audiences to challenge conventional theories. This approach of reasoning requires good audience interaction and will likely flesh out hidden evidence that will improve organizational security, business operations, or both. We will conduct detailed customer research for your training. Training may be done in pairs dependant upon what is needed.

We can offer customer training to your I.T. and business staff in the following areas:

  1. Good Cyber Hygiene
  2. The process of Spotting Early Data Breach / Network Intrusion Clues
  3. Creating a Culture of Creativity
  4. How to Identify Organizational Bureaucratic Roadblocks
  5. Influencing Up the Management Chain
  6. Threat Actor Identification and Profiling
  7. Threat Actor Likely Method of Attack