Workshops

FSV Risk Advisory kan voor u de volgende workshops/trainingen verzorgen, zowel in company als op een andere, in overleg te bepalen, lokatie:

Cybersecurity

Cybersecurity risks in general don’t need much explanation. However every business has its specific risks and the question is, “does the management have appropriately addressed the risks involved and are they a board-room topic”? As professionals we are aware that it’s impossible to safeguard against every risk. However awareness is essential to key personnel. Addressing cybersecurity risks as a topic to be mitigated according measurable controls is better than living in fear of not being in control. This includes focusing on measuring cyber resilience. Gaining insight and finding the right balance between conventional cybersecurity and cyber resilience measures will be key upcoming years.

Workshop Cybersecurity, Cyber Resilience and Privacy
To understand the cybersecurity posture of an environment we will share information of how to analyze through a resilience lens. Understanding the threat-within (APT) and follow the evidence to reorganize the systems involved and mitigate the risks appropriately. At last we would like to give you guidance how to deal with privacy related information exchange between EU and non EU parties. This workshop will take you into the cyber dimension within a timeframe of max 3hrs. including a demo of a cyber related behavioral analysis.

You could spend a fortune purchasing technology and services and your network infrastructure could still remain vulnerable to old fashioned manipulation. If your goal is to protect your network, you cannot rely on technology alone.” Welcome in the world of Social Engineering where owning the attack vector is a matter of days. Social engineering is a technique where someone is trying to obtain information through the abuse of the weakest link in security, namely humans.

Workshop Social Engineering and IT Security

The workshop presents a method of approach to prevent improper access to information, locations, and systems through the abuse of the weakest link in security: humans. Goal of the workshop is making participants aware of the weak links in the security of access to information, locations and systems. A workshop or a Master Class can take from 2.5 to 4 hours and combines theoretical insights with a real live case.

Cyber Security

Cybersecurity

Cybersecurity risks in general don’t need much explanation. However every business has its specific risks and the question is, “does the management have appropriately addressed the risks involved and are they a board-room topic”? As professionals we are aware that it’s impossible to safeguard against every risk. However awareness is essential to key personnel. Addressing cybersecurity risks as a topic to be mitigated according measurable controls is better than living in fear of not being in control. This includes focusing on measuring cyber resilience. Gaining insight and finding the right balance between conventional cybersecurity and cyber resilience measures will be key upcoming years.

Workshop Cybersecurity, Cyber Resilience and Privacy
To understand the cybersecurity posture of an environment we will share information of how to analyze through a resilience lens. Understanding the threat-within (APT) and follow the evidence to reorganize the systems involved and mitigate the risks appropriately. At last we would like to give you guidance how to deal with privacy related information exchange between EU and non EU parties. This workshop will take you into the cyber dimension within a timeframe of max 3hrs. including a demo of a cyber related behavioral analysis.

Social Engineering and IT Security

You could spend a fortune purchasing technology and services and your network infrastructure could still remain vulnerable to old fashioned manipulation. If your goal is to protect your network, you cannot rely on technology alone.” Welcome in the world of Social Engineering where owning the attack vector is a matter of days. Social engineering is a technique where someone is trying to obtain information through the abuse of the weakest link in security, namely humans.

Workshop Social Engineering and IT Security

The workshop presents a method of approach to prevent improper access to information, locations, and systems through the abuse of the weakest link in security: humans. Goal of the workshop is making participants aware of the weak links in the security of access to information, locations and systems. A workshop or a Master Class can take from 2.5 to 4 hours and combines theoretical insights with a real live case.