CYBER
AWARENESS PROGRAM

End users pose the greatest risk to the cybersecurity of any organization. 91% of all attacks begin with a phishing email to an unsuspecting victim, thus Cybersecurity systems must consider the risks posed by end users and provide a symmetrical response.

 

ISSP offers a complex cyber awareness and cyber hygiene program that addresses behavior-based cybersecurity risks

WHAT’S NEW?

WHAT’S UNIQUE?

A comprehensive cyber security awareness program consists of many components. Our core technical platform for training employees and assessing residual cyber risks is based on a project first implemented in 2015–2017 by the Estonian and Latvian ministries of defense and the European Defense Agency as a direct response to sophisticated, targeted cyber attacks. The CybExer Technical Platform offers access to an interactive tool consisting of a training module and two modules for testing user behavior in cyberspace.

The first stages of our program identify risk areas of individual employees, departments and the entire organization, allowing you to manage cyber threats at the level of your whole company as well as at the level of individual employees. This approach makes it possible to effectively implement security policies and make informed investment decisions to address cyber threats. 

  • The program targets managers, regular users, and specialists, addressing specific concerns and threats associated with each of these groups. 

  • Testing and learning are based on analysis of everyday computer and device usage. Participants need to react to situations and questions they’re presented with during the course. 

  • The test is not pass or fail. Instead, it seeks to identify specific risk areas in which participants may be affected.  

  • Participants are assessed against a systemic risk matrix that highlights the level of risk along each threat vector.

CYBER HYGIENE TESTING ON THE CYBEXER PLATFORM

CYBER HYGIENE LEARNING ON THE CYBEXER PLATFORM

CYBER HYGIENE LEARNING ON THE CYBEXER PLATFORM

  • Unrestricted access to the platform allows users to learn and test themselves regularly at any interval.

  • The program is constantly updated to reflect relevant global, country-specific and industry-specific threats.

  • The learning process is supported by our trainers, project managers, and technical support team.

5_3.png
 

FEEDBACK AND ENCOURAGEMENT

  • Periodic newsletters informing employees about recent cyberattacks, current threats and other cybersecurity developments.

  • Distribution of articles, graphics and video materials to improve learning using associative memorization techniques.

  • Printed materials and souvenirs serving as reminders of the need to comply with cyber hygiene rules.

Phishing-attack-simulation.png

PHISHING ATTACK SIMULATION

  • Phishing emails are created and distributed to employees based on the results of their training and identified risk areas.

  • The surprise effect and personal experience provided by these emails significantly improves understanding of threats and negative consequences for the company.

  • Employees’ responses to the phishing attack simulation allow you to plan effective measures to deal with dangerous behavior: additional training, administrative penalties, etc.

Targeted-Cybersecurity-Training-Courses.png

TARGETED CYBERSECURITY TRAINING COURSES

  • High-risk employees are identified based on their level of cyber hygiene.

  • Professional trainers together with an organization’s CISO group employees by risk type.

  • Trainers develop and conduct short but intensive training courses to address identified risks for different groups.

 
 
 
TC-(2).png
 

WHY ISSP? 

  • A professional training center with accreditation from ISC2, EC-Council, and Mile2.

  • A strategic CybExer partner in Poland, Ukraine, Georgia and Kazakhstan.

  • The ThreatSCALE cyberattack investigation methodology developed by ISSP Labs has been acknowledged by prominent research institutions (MIT, Dartmouth College), industry organizations (SANS Institute) and global vendors (Honeywell).

  • ISSP holds globally recognized certifications including Certified Ethical Hacker (CEH) and Computer Hacking Forensics Investigator (CHFI).

  • Training courses are developed in-house based on extensive practice of ISSP Labs, SOC and our Integration Department.

  • We’ve conducted successful training programs for different law enforcement and government authorities.

Contact us today by filling the form below: