Information is today’s most valuable asset, and many companies handle large amounts of business-critical information. Customer records, codes, supplier services and company-unique expertise are examples of assets that often need to be protected. As digitization increases, so does the threat landscape – attackers can now attack your business from halfway around the world. But the biggest threat is often closer than that. In most successful cyberattacks, the human factor is the crucial weakness.
This training focuses on how the people and organizations behind the technology act and the decisions we make in our workplace. It looks at leadership issues such as management’s failure to address security issues and their challenges in making decisions based on value conflicts between security requirements and business needs. From the employees’ perspective, it’s about the human habit of choosing the easiest path for a work task, like reusing passwords or not daring to question a stranger in the workplace.
The information security training will provide participants with a comprehensive view of the field of information security, its challenges and strengths. Participants will gain insight into how to work with information security, how to identify and manage risks, be able to recognize weaknesses and strengths in the culture, and gain insight into working before, during and after a successful attack.
The course is aimed at IT managers and project managers, product owners and developers.
No prior knowledge required.
This course has no certification.
The course leader for this course is Devies Cybersecurity.
What is information security
Why information security should be applied
Managing information security
Results of the security work
What is safety culture
The importance of safety culture
Building a strong safety culture
Training measures meet the needs of the business
What is risk management
Why is risk management important
How does the organization manage risks
Monitor risks continuously
What is an attack
Internal and external threats
How to deal with attacks
Course Overview
1 day
Can’t find a (suitable) date, but are interested in the course? Send in an expression of interest and we will do what we can to find a suitable opportunity.
Customized Courses
The course can be adapted from several perspectives:
In interaction with the course leader, we ensure that the course meets your needs.
Send an expression of interest for the training
Send an expression of interest for the training