Cybersecurity Trainings
Workshop: Five Cybersecurity Controls Every Business Needs
Format
- Half-day session
- On-site (your office) or online (live, interactive)
- Live hacking demos, real-world stories
- Group size up to 20
What You’ll Learn (and Take Home!)
- Introduction to the CIA Triad: Your Security Foundation
- Control 1: User Access Control
- Control 2: Secure Configuration
- Control 3: Security Update Management
- Control 4: Malware Defenses
- Control 5: Data Protection
- Take-home checklists for all five controls
Who Is This For?
This workshop is designed for help every business guard against the most common cyber attacks. If you handle customer data, rely on digital tools, or simply lie awake wondering, “Are we really safe?”—this is for you. No technical expertise required; just a desire to protect what you’ve built.
How Does It Work?
- Initial Introduction Meeting
- Award of Contract
- Training Day
We will have a 15-minute introduction online meeting. The meeting is to understand your goals, answer questions, and confirm if the training is a good fit.
Book now!If you're happy with booking the training, we'll send over a contract for you to review and sign. Once signed, your session date is locked in.
We come to your location or online as you wish and deliver the interactive, half-day workshop. Your team walks away informed, empowered, and ready to act.
Customized Workshop
In a digital landscape where threats evolve rapidly and technology advances at pace, cybersecurity must be integrated into every aspect of modern software and system development. Whether you're focused on secure coding, protecting software/AI systems, or implementing industry cybersecurity best practices, this workshop is designed to meet your team’s unique needs. Rather than offering a one-size-fits-all program, I work closely with each client to shape the workshop content based on your specific goals and challenges—whether that’s cybersecurity best practices, secure software development processes, or security considerations for software systems. Let’s discuss what matters most to your team. Rather than offering a one-size-fits-all program, I work closely with each client to shape the workshop content based on your specific goals and challenges—whether that’s cybersecurity best practices, secure software development processes, or security considerations for software systems. Let’s discuss what matters most to your team.
Contact me!