NIS2
NIS2 Essential training for all management levels
Introduction to the NIS2 directive
Understand the scope and objectives of the NIS2 directive and explore its implications for managers. Compliance is no longer solely an IT concern; it's also your responsibility.
Which organisations are affected?
Understanding NIS2 reach
Discover which organistions fall under the NIS2 directive by exploring key terms and classifications, so you can clearly understand the directive's impact and what you’re up against.
What measures should you take?
Part 1 (Art. 21)
Understand the fundamental cybersecurity measures required by NIS2 and how to implement them. This module covers risk analysis, incident handling, business continuity, and supply chain security.
What measures should you take?
Part 2 (Art. 21)
Explore advanced cybersecurity measures such as secure system development, effectiveness assessments, cyber hygiene practices and cybersecurity training, cryptography and encryption.
What measures should you take?
Part 3 (Art. 21)
Complete your cybersecurity strategy with HR management, access control, asset tracking, authentication, secure communications and emergency communication systems.
How to report?
Your obligations explained (Art. 23)
This module focuses on how reporting cyber incidents and sharing information can help organisations and sectors collaborate to minimise the impact of cyber threats across the EU.
Governance, roles and responsibilities (Art. 31 to 37)
Learn how NIS2 holds top management accountable for cybersecurity. This module outlines the roles of the board of directors, executive management, CISO, and ISM in establishing and maintaining a robust cybersecurity framework.
Supervision, enforcement and penalties
Understand the severe repercussions of non-compliance with NIS2. This final module explains the responsibilities of national authorities and the financial and operational penalties organisations may face for failing to meet NIS2 standards.
Bronze
Why this Cyber
Resilience training?
Explore why Cyber Resilience is crucial for personal and professional security.
✔ IBP FO ✔ NIS2 ✔ ISO27001
How is your
Cyber Resilience?
Assess your own Cyber Resilience levels and identify areas for improvement.
✔ IBP FO ✔ NIS2
Security risks at
home and at work
Identify security risks present both in your home and workplace environments.
✔ NIS2 ✔ ISO27001
Deepfakes
& AI images
Explore the world of deepfakes and AI-generated images and their impacts.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Do you recognise these
phishing messages?
Learn to spot phishing messages through practical examples.
✔ IBP FO ✔ NIS2
How to create secure
and strong passwords
Guidance on creating passwords that are both secure and memorable.
✔ IBP FO ✔ NIS2 ✔ ISO27001 ✔ ISO27701
First aid
for phishing!
Immediate steps to take if you've fallen victim to a phishing scam.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2
Do you recognise these
Cyber Resilience terms?
Familiarise yourself with key Cyber Resilience terminology and concepts.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2
You and your colleagues
as the Human Firewall
Discover how you and your colleagues can act as a strong Human Firewall.
✔ NIS2 ✔ ISO27001 ✔ SOC2 ✔ IBP FO
Silver
Financial fraud 101: Safeguard
your bank accounts
Understand the common types of wire fraud and what you do best to protect yourself from these scams.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Hybrid work-arounds:
Securing your home office
Discover the perils of remote work and learn how to establish workflows that keep you as cyber secure at home as in the office.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Mobile security: Safeguarding your physical devices
Explore the essentials of mobile device configuration and safeguard both personal and corporate safety with a mobile device policy.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO
App safety 101: Making
informed choices
Master the art of secure app selection in this session. Learn 7 essential steps, from consulting IT to app testing, to ensure you're making safe choices.
✔ NIS2 ✔ ISO27001
How to handle cyber
security incidents: Part 1
Learn how to handle 5 cyber incidents based on previous sessions: ID fraud, oversharing, online ordering, bank fraud and parcel management.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Gold
Keep recruitment secure: HR cyber security essentials
Gain a behind-the-scenes understanding of why cyber security matters to everyone, not just HR professionals.
✔ SOC2 ✔ ISO27001 ✔ NIS2 ✔ IBP FO
Securing the
Supply Chain: basics
Understand the basics of supply chain security, focusing on risk assessment and initial protective measures.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Secure onboarding:
welcoming new employees safely
Explore best practices for onboarding new employees, ensuring they adhere to your company’s cyber security policies from day one.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Secure offboarding:
protecting your assets
Understand the importance of a secure offboarding process, including revoking access and protecting sensitive information when employees leave.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Securing the Supply Chain: advanced
Build on the foundational measures with advanced strategies to secure your supply chain against cyber threats.
✔ NIS2 ✔ ISO27001 ✔ SOC2 ✔ IBP FO
Mastering Encryption Techniques:
robust communication
Understand the fundamentals of encryption, cryptography and blockchain to secure your communication within your organisation.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ GDPR ✔ IBP FO
Platinum
Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Secure connectivity techniques:
explore advanced methods
Learn how to secure network connections, including best practices for Wi-Fi security, Virtual Private Networks (VPNs), and zero trust security models.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Hybrid working:
cybersecurity best practices
Learn how to maintain a cyber proof hybrid work environment, protecting both in-office and remote employees.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Cybersecure collaboration : working in team
Learn how to build a team risk inventory and how to mitigate those risks with best practices for your team’s security.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
GDPR Training for admins
What is GDPR? When and where does it apply?
Understand the basics of GDPR, its importance, and its impact on data subjects.
The 6 principles
of GDPR
Understand the core principles of GDPR that guide data processing.
The rights of data subjects
Learn about the rights individuals have under the GDPR and how to respect them.
Dealing with data subject requests
Understand the difference between data controllers and data processors and learn who’s responsible for answering questions from data subjects.
The role of a
Data Protection Officer
Learn what a Data Protection Officer does and whether your organisation is obliged to hire one.
What to do in case of
a data breach?
This module focuses on how reporting cyber incidents and sharing information can help organisations and sectors collaborate to minimise the impact of cyber threats across the EU.
International
data transfers
Learn the rules for transferring personal data outside the EU.
Bronze
What about
your online privacy?
Learn strategies to protect your online privacy from potential threats.
✔ GDPR ✔ ISO27701 ✔ SOC2 ✔ IBP FO
First aid
for phishing!
Immediate steps to take if you've fallen victim to a phishing scam.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2
Do you recognise these
Cyber Resilience terms?
Familiarise yourself with key Cyber Resilience terminology and concepts.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2
Silver
Prevent identity fraud:
Don't be a target
Discover the dangers of identity fraud and learn how to protect your personal information from misuse.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Oversharing risks:
From loose lips to loose clicks
In this session, you will learn that the internet forgets nothing and how you can safely manage your digital footprint.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Financial fraud 101: Safeguard
your bank accounts
Understand the common types of wire fraud and what you do best to protect yourself from these scams.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Online ordering risks:
How to stay safe
Find out how to assess the security of websites and choose wisely what personal data you share while ordering online.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Physical access control:
Cybersecure approach
Dive into the essentials of access control policies and grasp their crucial role ensuring only authorised access.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Protect your physical assets:
Keep resources secure
Learn how to keep your physical assets safe by understanding the link with digital assets, taking ownership and reporting incidents correctly.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO
Identifying, reporting and
handling cyber events
This session teaches you the difference between a cyber security event and a cyber security incident and explains how to react to cyber events.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO
Identifying, reporting and
handling cyber incidents
Explore the essentials of handling cyber security incidents in this session, focusing on recognition, reporting, and the importance of timely responses.
✔ GDPR ✔ ISO27001 ✔ IBP FO
How to handle cyber
security incidents: Part 1
Learn how to handle 5 cyber incidents based on previous sessions: ID fraud, oversharing, online ordering, bank fraud and parcel management.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Gold
HR confidential:protecting sensitive data
Understand the importance of managing application data securely and the skills needed to protect sensitive information.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Mastering Encryption Techniques:
robust communication
Understand the fundamentals of encryption, cryptography and blockchain to secure your communication within your organisation.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ GDPR ✔ IBP FO
Platinum
Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Secure connectivity techniques:
explore advanced methods
Learn how to secure network connections, including best practices for Wi-Fi security, Virtual Private Networks (VPNs), and zero trust security models.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Hybrid working:
cybersecurity best practices
Learn how to maintain a cyber proof hybrid work environment, protecting both in-office and remote employees.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Cybersecure collaboration : working in team
Learn how to build a team risk inventory and how to mitigate those risks with best practices for your team’s security.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
ISO27001
Bronze
Why this Cyber
Resilience training?
Explore why Cyber Resilience is crucial for personal and professional security.
✔ IBP FO ✔ NIS2 ✔ ISO27001
Security risks at
home and at work
Identify security risks present both in your home and workplace environments.
✔ NIS2 ✔ ISO27001
Deepfakes
& AI images
Explore the world of deepfakes and AI-generated images and their impacts.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
How to create secure
and strong passwords
Guidance on creating passwords that are both secure and memorable.
✔ IBP FO ✔ NIS2 ✔ ISO27001 ✔ ISO27701
Silver
Financial fraud 101: Safeguard
your bank accounts
Understand the common types of wire fraud and what you do best to protect yourself from these scams.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Hacker-proof parcel
management: Do's & don'ts
Find out how to send and receive parcels safely. Considering the sensitive information on labels and possible manipulation.
✔ SOC2 ✔ ISO27001 ✔ IBP FO
Confidential data: Store,
classify and send securely
Gain a solid foundation in classifying, labeling, storing, sharing and securily disposing of confidential data.
✔ SOC2 ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Physical access control:
Cybersecure approach
Dive into the essentials of access control policies and grasp their crucial role ensuring only authorised access.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Hybrid work-arounds:
Securing your home office
Discover the perils of remote work and learn how to establish workflows that keep you as cyber secure at home as in the office.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
First aid
for phishing!
Immediate steps to take if you've fallen victim to a phishing scam.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2
Do you recognise these
Cyber Resilience terms?
Familiarise yourself with key Cyber Resilience terminology and concepts.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2
App safety 101: Making
informed choices
Master the art of secure app selection in this session. Learn 7 essential steps, from consulting IT to app testing, to ensure you're making safe choices.
✔ NIS2 ✔ ISO27001
Identifying, reporting and
handling cyber events
This session teaches you the difference between a cyber security event and a cyber security incident and explains how to react to cyber events.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO
Identifying, reporting and
handling cyber incidents
Explore the essentials of handling cyber security incidents in this session, focusing on recognition, reporting, and the importance of timely responses.
✔ GDPR ✔ ISO27001 ✔ IBP FO
How to handle cyber
security incidents: Part 1
Learn how to handle 5 cyber incidents based on previous sessions: ID fraud, oversharing, online ordering, bank fraud and parcel management.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
How to handle cyber
security incidents: Part 2
Dive into practical strategies for handling key cyber incidents: access control, asset management, mobile devices, apps, and hybrid working.
✔ GDPR ✔ ISO27001 ✔ IBP FO
Gold
Keep recruitment secure: HR cyber security essentials
Gain a behind-the-scenes understanding of why cyber security matters to everyone, not just HR professionals.
✔ SOC2 ✔ ISO27001 ✔ NIS2 ✔ IBP FO
Securing the
Supply Chain: basics
Understand the basics of supply chain security, focusing on risk assessment and initial protective measures.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Secure onboarding:
welcoming new employees safely
Explore best practices for onboarding new employees, ensuring they adhere to your company’s cyber security policies from day one.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Securing the Supply Chain: advanced
Build on the foundational measures with advanced strategies to secure your supply chain against cyber threats.
✔ NIS2 ✔ ISO27001 ✔ NIS2 ✔ IBP FO
Platinum
Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Secure connectivity techniques:
explore advanced methods
Learn how to secure network connections, including best practices for Wi-Fi security, Virtual Private Networks (VPNs), and zero trust security models.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Hybrid working:
cybersecurity best practices
Learn how to maintain a cyber proof hybrid work environment, protecting both in-office and remote employees.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Cybersecure collaboration : working in team
Learn how to build a team risk inventory and how to mitigate those risks with best practices for your team’s security.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
ISO27701
Bronze
What about
your online privacy?
Learn strategies to protect your online privacy from potential threats.
✔ GDPR ✔ ISO27701 ✔ SOC2 ✔ IBP FO
How to create secure
and strong passwords
Guidance on creating passwords that are both secure and memorable.
✔ IBP FO ✔ NIS2 ✔ ISO27001 ✔ ISO27701
Silver
Prevent identity fraud:
Don't be a target
Discover the dangers of identity fraud and learn how to protect your personal information from misuse.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Oversharing risks:
From loose lips to loose clicks
In this session, you will learn that the internet forgets nothing and how you can safely manage your digital footprint.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Online ordering risks:
How to stay safe
Find out how to assess the security of websites and choose wisely what personal data you share while ordering online.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Confidential data: Store,
classify and send securely
Gain a solid foundation in classifying, labeling, storing, sharing and securily disposing of confidential data.
✔ SOC2 ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Physical access control:
Cybersecure approach
Dive into the essentials of access control policies and grasp their crucial role ensuring only authorised access.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Gold
HR confidential: protecting sensitive data
Understand the importance of managing application data securely and the skills needed to protect sensitive information.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
SOC2
Bronze
What about
your online privacy?
Learn strategies to protect your online privacy from potential threats.
✔ GDPR ✔ ISO27701 ✔ SOC2 ✔ IBP FO
You and your colleagues
as the Human Firewall
Discover how you and your colleagues can act as a strong Human Firewall.
✔ NIS2 ✔ ISO27001 ✔ SOC2 ✔ IBP FO
Silver
Prevent identity fraud:
Don't be a target
Discover the dangers of identity fraud and learn how to protect your personal information from misuse.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Oversharing risks:
From loose lips to loose clicks
In this session, you will learn that the internet forgets nothing and how you can safely manage your digital footprint.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Online ordering risks:
How to stay safe
Find out how to assess the security of websites and choose wisely what personal data you share while ordering online.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Hacker-proof parcel
management: Do's & don'ts
Find out how to send and receive parcels safely. Considering the sensitive information on labels and possible manipulation.
✔ SOC2 ✔ ISO27001 ✔ IBP FO
Confidential data: Store,
classify and send securely
Gain a solid foundation in classifying, labeling, storing, sharing and securily disposing of confidential data.
✔ SOC2 ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Physical access control:
Cybersecure approach
Dive into the essentials of access control policies and grasp their crucial role ensuring only authorised access.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Protect your physical assets:
Keep resources secure
Learn how to keep your physical assets safe by understanding the link with digital assets, taking ownership and reporting incidents correctly.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO
Mobile security: Safeguarding your physical devices
Explore the essentials of mobile device configuration and safeguard both personal and corporate safety with a mobile device policy.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Identifying, reporting and
handling cyber events
This session teaches you the difference between a cyber security event and a cyber security incident and explains how to react to cyber events.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO
Gold
Keep recruitment secure: HR cyber security essentials
Gain a behind-the-scenes understanding of why cyber security matters to everyone, not just HR professionals.
✔ SOC2 ✔ ISO27001 ✔ NIS2 ✔ IBP FO
HR confidential:protecting sensitive data
Understand the importance of managing application data securely and the skills needed to protect sensitive information.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Mastering Encryption Techniques:
robust communication
Understand the fundamentals of encryption, cryptography and blockchain to secure your communication within your organisation.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ GDPR ✔ IBP FO
Platinum
Authentication techniques:
explore cutting-edge methods
Dive deep into advanced authentication strategies, including authentication keys, hardware hacking, behavioural biometrics, EIDAS 2.0 and MFA for top-notch security.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
ICDL
Gold
Smartphone skills: improve your
focus while boosting cyber safety
Master your smartphone use to sharpen your focus and productivity, as well as your cyber security defences.
✔ ICDL ✔ DigComp
Email, meeting, and calendar skills:
supercharge your security
Implement smarter digital habits to sharpen focus, streamline your workflow, and boost your productivity.
✔ ICDL ✔ DigComp
Home cyber defence:
securing your digital environment
Build a secure digital foundation at home to protect your family’s online activities.
✔ ICDL ✔ DigComp
Cyber talks for parents:
engaging your children in online security
Learn how to discuss online safety with your children, ensuring they understand the critical importance of cyber safety and follow best practices.
✔ ICDL ✔ DigComp
Platinum
Keeping apps & devices safe: how to protect your family
List your family's devices and apps, then apply essential security steps to ensure online safety.
✔ ICDL ✔ DigComp
Advanced family protection: key measures to implement
Boost your family’s digital safety by enhancing privacy settings, regularly updating software, and creating backups.
✔ ICDL ✔ DigComp ✔ GDPR
DIGCOMP
Gold
Smartphone skills: improve your
focus while boosting cyber safety
Master your smartphone use to sharpen your focus and productivity, as well as your cyber security defences.
✔ ICDL ✔ DigComp
Email, meeting, and calendar skills:
supercharge your security
Implement smarter digital habits to sharpen focus, streamline your workflow, and boost your productivity.
✔ ICDL ✔ DigComp
Home cyber defence:
securing your digital environment
Build a secure digital foundation at home to protect your family’s online activities.
✔ ICDL ✔ DigComp
Cyber talks for parents:
engaging your children in online security
Learn how to discuss online safety with your children, ensuring they understand the critical importance of cyber safety and follow best practices.
✔ ICDL ✔ DigComp
Platinum
Keeping apps & devices safe: how to protect your family
List your family's devices and apps, then apply essential security steps to ensure online safety.
✔ ICDL ✔ DigComp
Advanced family protection: key measures to implement
Boost your family’s digital safety by enhancing privacy settings, regularly updating software, and creating backups.
✔ ICDL ✔ DigComp ✔ GDPR
PCI DSS
Platinum
Financial fraud:
deep dive
Dive deep into the sophisticated methods cybercriminals use to commit financial fraud and learn advanced strategies to protect your online presence.
✔ PCI DSS
PCI DSS (coming soon)
Protecting payment data is everyone’s business
If your organisation processes, stores or transmits payment card data, the Payment Card Industry Data Security Standard (PCI DSS) applies. The standard sets out clear rules to protect cardholder information and reduce the risk of fraud. In this level, you’ll learn when PCI DSS applies, what kind of data must be protected, and which technical and organisational controls are required. We’ll explore how to reduce risks, meet compliance expectations, and keep both customer data and your business secure.
IBP FO
Bronze
Why this Cyber
Resilience training?
Explore why Cyber Resilience is crucial for personal and professional security.
✔ IBP FO ✔ NIS2 ✔ ISO27001
How is your
Cyber Resilience?
Assess your own Cyber Resilience levels and identify areas for improvement.
✔ IBP FO ✔ NIS2
Social engineering:
The art of deception
Uncover the techniques of social engineering and how to defend against them.
✔ IBP FO
What about
your online privacy?
Learn strategies to protect your online privacy from potential threats.
✔ GDPR ✔ ISO27701 ✔ SOC2 ✔ IBP FO
Deepfakes
& AI images
Explore the world of deepfakes and AI-generated images and their impacts.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Do you recognise these
phishing messages?
Learn to spot phishing messages through practical examples.
✔ IBP FO ✔ NIS2
How to create secure
and strong passwords
Guidance on creating passwords that are both secure and memorable.
✔ IBP FO ✔ NIS2 ✔ ISO27001 ✔ ISO27701
First aid
for phishing!
Immediate steps to take if you've fallen victim to a phishing scam.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2
Do you recognise these
Cyber Resilience terms?
Familiarise yourself with key Cyber Resilience terminology and concepts.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2
You and your colleagues
as the Human Firewall
Discover how you and your colleagues can act as a strong Human Firewall.
✔ NIS2 ✔ ISO27001 ✔ SOC2 ✔ IBP FO
Silver
Prevent identity fraud:
Don't be a target
Discover the dangers of identity fraud and learn how to protect your personal information from misuse.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Oversharing risks:
From loose lips to loose clicks
In this session, you will learn that the internet forgets nothing and how you can safely manage your digital footprint.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Financial fraud 101: Safeguard
your bank accounts
Understand the common types of wire fraud and what you do best to protect yourself from these scams.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Online ordering risks:
How to stay safe
Find out how to assess the security of websites and choose wisely what personal data you share while ordering online.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Hacker-proof parcel
management: Do's & don'ts
Find out how to send and receive parcels safely. Considering the sensitive information on labels and possible manipulation.
✔ SOC2 ✔ ISO27001 ✔ IBP FO
Confidential data: Store,
classify and send securely
Gain a solid foundation in classifying, labeling, storing, sharing and securily disposing of confidential data.
✔ SOC2 ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Physical access control:
Cybersecure approach
Dive into the essentials of access control policies and grasp their crucial role ensuring only authorised access.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Hybrid work-arounds:
Securing your home office
Discover the perils of remote work and learn how to establish workflows that keep you as cyber secure at home as in the office.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Protect your physical assets:
Keep resources secure
Learn how to keep your physical assets safe by understanding the link with digital assets, taking ownership and reporting incidents correctly.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO
Mobile security: Safeguarding your physical devices
Explore the essentials of mobile device configuration and safeguard both personal and corporate safety with a mobile device policy.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Identifying, reporting and
handling cyber events
This session teaches you the difference between a cyber security event and a cyber security incident and explains how to react to cyber events.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO
Identifying, reporting and
handling cyber incidents
Explore the essentials of handling cyber security incidents in this session, focusing on recognition, reporting, and the importance of timely responses.
✔ GDPR ✔ ISO27001 ✔ IBP FO
How to handle cyber
security incidents: Part 1
Learn how to handle 5 cyber incidents based on previous sessions: ID fraud, oversharing, online ordering, bank fraud and parcel management.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
How to handle cyber
security incidents: Part 2
Dive into practical strategies for handling key cyber incidents: access control, asset management, mobile devices, apps, and hybrid working.
✔ GDPR ✔ ISO27001 ✔ IBP FO
Gold
Keep recruitment secure: HR cyber security essentials
Gain a behind-the-scenes understanding of why cyber security matters to everyone, not just HR professionals.
✔ SOC2 ✔ ISO27001 ✔ NIS2 ✔ IBP FO
HR confidential: protecting sensitive data
Understand the importance of managing application data securely and the skills needed to protect sensitive information.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
Securing the
Supply Chain: basics
Understand the basics of supply chain security, focusing on risk assessment and initial protective measures.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Secure onboarding:
welcoming new employees safely
Explore best practices for onboarding new employees, ensuring they adhere to your company’s cyber security policies from day one.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Secure offboarding:
protecting your assets
Understand the importance of a secure offboarding process, including revoking access and protecting sensitive information when employees leave.
✔ NIS2 ✔ IBP FO
Securing the Supply Chain: advanced
Build on the foundational measures with advanced strategies to secure your supply chain against cyber threats.
✔ NIS2 ✔ ISO27001 ✔ SOC2 ✔ IBP FO
Mastering Encryption Techniques:
robust communication
Understand the fundamentals of encryption, cryptography and blockchain to secure your communication within your organisation.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ GDPR ✔ IBP FO
Platinum
Authentication techniques:
explore cutting-edge methods
Dive deep into advanced authentication strategies, including authentication keys, hardware hacking, behavioural biometrics, EIDAS 2.0 and MFA for top-notch security.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Secure connectivity techniques:
explore advanced methods
Learn how to secure network connections, including best practices for Wi-Fi security, Virtual Private Networks (VPNs), and zero trust security models.
✔ NIS2 ✔ NIST ✔ ISO27001 ✔ IBP FO
Hybrid working:
cybersecurity best practices
Learn how to maintain a cyber proof hybrid work environment, protecting both in-office and remote employees.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
Cybersecure collaboration : working in team
Learn how to build a team risk inventory and how to mitigate those risks with best practices for your team’s security.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
NIST
NIST Essentials
Understanding the NIST Framework
You’ll learn the basics of the US NIST Cyber Security framework: how to link it to real risks, set priorities that fit your context, and define concrete actions and responsibilities. You'll walk away with structure, direction, and the confidence to get started.
Is NIST relevant for you?
It probably is!
Aligning with the NIST Framework is only mandatory for US government agencies, but it’s quickly becoming the norm. Discover how NIST helps your organisation reduce risk, meet customer and partner expectations, and build trust across your supply chain.
What measures should you take? Part 1
You’ll explore four cyber risk areas in detail: risk assessment, incident response, resilience, and supply chain security. You’ll learn what each area involves, what’s expected from your team, and how to take practical steps that make a difference.
What measures should you take? Part 2
Discover how to embed cyber security in your procurement and development processes, especially around software. This session also explores the role of employee training and how to create a culture where good cyber hygiene becomes second nature.
What measures should you take? Part 3
The more connected your systems, the more important it becomes to know who has access—and to what. This session introduces key access and identity management principles: controlling access rights, verifying user identities, and keeping track of your most critical assets.
How to analyse incidents and communicate clearly
Reacting quickly to an incident is essential—but reacting in the right way is just as important. You’ll learn how to investigate incidents thoroughly, communicate with internal and external stakeholders, and use clear documentation to contain damage and support long-term resilience.
Governance, roles & responsibilities
Cyber security needs clear leadership. In this session, we focus on the people side of the framework: how to define roles and ensure that security decisions are supported at the right level. Strong governance is what turns strategy into action.
Oversight, showing compliance & business impact
What does 'being in control' actually look like? This final session covers what it takes to demonstrate compliance—through internal audits, documentation, and board-level oversight. You’ll learn how to link cyber security efforts to business impact and show that your organisation is not just secure, but accountable too.
NIST Implementation (coming soon)
From understanding to applying the framework
This level is designed for those responsible for putting the NIST Framework into practice. You’ll learn how to assess your current posture, define a target profile, and translate the framework into concrete steps tailored to your organisation’s size, sector and risk profile. We’ll also introduce the concept of Implementation Tiers—helping you decide how structured your approach should be, and how to align it with business needs. By the end, you’ll understand how to prioritise next steps, communicate progress with stakeholders, and shape a NIST-based approach that’s realistic, scalable and built to last.
BDSG
What is the BDSG and when does it apply?
Understand how Germany’s BDSG complements the GDPR, when it applies, and to whom. See where European and German law intersect — and what that means in practice for your organisation.
The 6 fundamental principles
The six principles of the GDPR also apply in Germany — but the BDSG makes them stricter in key areas. With practical examples, you’ll see exactly what Germany expects beyond the European standard.
Data protection rights under the BDSG
GDPR rights are familiar. The BDSG goes further, with additional rules for employees and public authorities. This module shows you where Germany raises the bar.
Organising data protection: from the DPO to data requests
The BDSG adds additional rules on appointing a Data Protection Officer, keeping records, and handling requests. Learn how to make compliance systematic rather than ad hoc.
Data protection in the workplace
Employee privacy is at the heart of the BDSG. After this module, you’ll know exactly what is allowed — and what isn’t — in everyday HR and workplace practice.
TISAX (coming soon)
Introduction to Tisax
Learn what TISAX is, how it builds on ISO 27001, and why major automotive manufacturers require it. Discover how a label works — and how it creates new business opportunities.
Step by step towards a successful TISAX audit
Prepare step by step for audit readiness: define your scope, understand maturity levels, complete the VDA ISA, and choose the right provider. Save time and avoid costly mistakes.
The audit process explained
See what happens during a TISAX audit — from kick-off to evidence checks and final assessment. Understand what auditors look for and how to maximise your chances of success.
DORA (coming soon)
Strengthen your digital resilience under DORA
The Digital Operational Resilience Act (DORA) introduces binding cyber security requirements for financial entities and their ICT providers across the EU. It’s designed to ensure that critical players in the financial system can withstand, respond to and recover from digital disruptions. In this level, you’ll learn who DORA applies to, what’s expected under the regulation, and how to manage ICT risks more systematically. We’ll cover the key areas: risk management, continuous monitoring, incident response, testing, and third-party oversight.