NIS2 Essential training for all management levels

Introduction to the NIS2 directive
Understand the scope and objectives of the NIS2 directive and explore its implications for managers. Compliance is no longer solely an IT concern; it's also your responsibility.

Which organisations are affected?
Understanding NIS2 reach
Discover which organistions fall under the NIS2 directive by exploring key terms and classifications, so you can clearly understand the directive's impact and what you’re up against.

What measures should you take?
Part 1 (Art. 21)
Understand the fundamental cybersecurity measures required by NIS2 and how to implement them. This module covers risk analysis, incident handling, business continuity, and supply chain security.

What measures should you take?
Part 2 (Art. 21)
Explore advanced cybersecurity measures such as secure system development, effectiveness assessments, cyber hygiene practices and cybersecurity training, cryptography and encryption.

What measures should you take?
Part 3 (Art. 21)
Complete your cybersecurity strategy with HR management, access control, asset tracking, authentication, secure communications and emergency communication systems.

How to report?
Your obligations explained (Art. 23)
This module focuses on how reporting cyber incidents and sharing information can help organisations and sectors collaborate to minimise the impact of cyber threats across the EU.

Governance, roles and responsibilities (Art. 31 to 37)
Learn how NIS2 holds top management accountable for cybersecurity. This module outlines the roles of the board of directors, executive management, CISO, and ISM in establishing and maintaining a robust cybersecurity framework.

Supervision, enforcement and penalties
Understand the severe repercussions of non-compliance with NIS2. This final module explains the responsibilities of national authorities and the financial and operational penalties organisations may face for failing to meet NIS2 standards.
Bronze

Why this Cyber
Resilience training?
Explore why Cyber Resilience is crucial for personal and professional security.
✔ IBP FO ✔ NIS2 ✔ ISO27001

How is your
Cyber Resilience?
Assess your own Cyber Resilience levels and identify areas for improvement.
✔ IBP FO ✔ NIS2

Security risks at
home and at work
Identify security risks present both in your home and workplace environments.
✔ NIS2 ✔ ISO27001

Deepfakes
& AI images
Explore the world of deepfakes and AI-generated images and their impacts.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Do you recognise these
phishing messages?
Learn to spot phishing messages through practical examples.
✔ IBP FO ✔ NIS2

How to create secure
and strong passwords
Guidance on creating passwords that are both secure and memorable.
✔ IBP FO ✔ NIS2 ✔ ISO27001 ✔ ISO27701

First aid
for phishing!
Immediate steps to take if you've fallen victim to a phishing scam.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2

Do you recognise these
Cyber Resilience terms?
Familiarise yourself with key Cyber Resilience terminology and concepts.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2

You and your colleagues
as the Human Firewall
Discover how you and your colleagues can act as a strong Human Firewall.
✔ NIS2 ✔ ISO27001 ✔ SOC2 ✔ IBP FO
Silver

Financial fraud 101: Safeguard
your bank accounts
Understand the common types of wire fraud and what you do best to protect yourself from these scams.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Hybrid work-arounds:
Securing your home office
Discover the perils of remote work and learn how to establish workflows that keep you as cyber secure at home as in the office.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Mobile security: Safeguarding your physical devices
Explore the essentials of mobile device configuration and safeguard both personal and corporate safety with a mobile device policy.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO

App safety 101: Making
informed choices
Master the art of secure app selection in this session. Learn 7 essential steps, from consulting IT to app testing, to ensure you're making safe choices.
✔ NIS2 ✔ ISO27001

How to handle cyber
security incidents: Part 1
Learn how to handle 5 cyber incidents based on previous sessions: ID fraud, oversharing, online ordering, bank fraud and parcel management.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Gold

Keep recruitment secure: HR cyber security essentials
Gain a behind-the-scenes understanding of why cyber security matters to everyone, not just HR professionals.
✔ SOC2 ✔ ISO27001 ✔ NIS2 ✔ IBP FO

Securing the
Supply Chain: basics
Understand the basics of supply chain security, focusing on risk assessment and initial protective measures.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Secure onboarding:
welcoming new employees safely
Explore best practices for onboarding new employees, ensuring they adhere to your company’s cyber security policies from day one.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Secure offboarding:
protecting your assets
Understand the importance of a secure offboarding process, including revoking access and protecting sensitive information when employees leave.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Securing the Supply Chain: advanced
Build on the foundational measures with advanced strategies to secure your supply chain against cyber threats.
✔ NIS2 ✔ ISO27001 ✔ SOC2 ✔ IBP FO

Mastering Encryption Techniques:
robust communication
Understand the fundamentals of encryption, cryptography and blockchain to secure your communication within your organisation.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ GDPR ✔ IBP FO
Platinum

Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Secure connectivity techniques:
explore advanced methods
Learn how to secure network connections, including best practices for Wi-Fi security, Virtual Private Networks (VPNs), and zero trust security models.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Hybrid working:
cybersecurity best practices
Learn how to maintain a cyber proof hybrid work environment, protecting both in-office and remote employees.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Cybersecure collaboration : working in team
Learn how to build a team risk inventory and how to mitigate those risks with best practices for your team’s security.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
GDPR Training for admins

What is GDPR? When and where does it apply?
Understand the basics of GDPR, its importance, and its impact on data subjects.

The 6 principles
of GDPR
Understand the core principles of GDPR that guide data processing.

The rights of data subjects
Learn about the rights individuals have under the GDPR and how to respect them.

Dealing with data subject requests
Understand the difference between data controllers and data processors and learn who’s responsible for answering questions from data subjects.

The role of a
Data Protection Officer
Learn what a Data Protection Officer does and whether your organisation is obliged to hire one.

What to do in case of
a data breach?
This module focuses on how reporting cyber incidents and sharing information can help organisations and sectors collaborate to minimise the impact of cyber threats across the EU.

International
data transfers
Learn the rules for transferring personal data outside the EU.
Bronze

What about
your online privacy?
Learn strategies to protect your online privacy from potential threats.
✔ GDPR ✔ ISO27701 ✔ SOC2 ✔ IBP FO

First aid
for phishing!
Immediate steps to take if you've fallen victim to a phishing scam.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2

Do you recognise these
Cyber Resilience terms?
Familiarise yourself with key Cyber Resilience terminology and concepts.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2
Silver

Prevent identity fraud:
Don't be a target
Discover the dangers of identity fraud and learn how to protect your personal information from misuse.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Oversharing risks:
From loose lips to loose clicks
In this session, you will learn that the internet forgets nothing and how you can safely manage your digital footprint.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Financial fraud 101: Safeguard
your bank accounts
Understand the common types of wire fraud and what you do best to protect yourself from these scams.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Online ordering risks:
How to stay safe
Find out how to assess the security of websites and choose wisely what personal data you share while ordering online.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Physical access control:
Cybersecure approach
Dive into the essentials of access control policies and grasp their crucial role ensuring only authorised access.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Protect your physical assets:
Keep resources secure
Learn how to keep your physical assets safe by understanding the link with digital assets, taking ownership and reporting incidents correctly.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO

Identifying, reporting and
handling cyber events
This session teaches you the difference between a cyber security event and a cyber security incident and explains how to react to cyber events.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO

Identifying, reporting and
handling cyber incidents
Explore the essentials of handling cyber security incidents in this session, focusing on recognition, reporting, and the importance of timely responses.
✔ GDPR ✔ ISO27001 ✔ IBP FO

How to handle cyber
security incidents: Part 1
Learn how to handle 5 cyber incidents based on previous sessions: ID fraud, oversharing, online ordering, bank fraud and parcel management.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
Gold

HR confidential:protecting sensitive data
Understand the importance of managing application data securely and the skills needed to protect sensitive information.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Mastering Encryption Techniques:
robust communication
Understand the fundamentals of encryption, cryptography and blockchain to secure your communication within your organisation.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ GDPR ✔ IBP FO
Platinum

Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Secure connectivity techniques:
explore advanced methods
Learn how to secure network connections, including best practices for Wi-Fi security, Virtual Private Networks (VPNs), and zero trust security models.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Hybrid working:
cybersecurity best practices
Learn how to maintain a cyber proof hybrid work environment, protecting both in-office and remote employees.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Cybersecure collaboration : working in team
Learn how to build a team risk inventory and how to mitigate those risks with best practices for your team’s security.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
ISO27001
Bronze

Why this Cyber
Resilience training?
Explore why Cyber Resilience is crucial for personal and professional security.
✔ IBP FO ✔ NIS2 ✔ ISO27001

Security risks at
home and at work
Identify security risks present both in your home and workplace environments.
✔ NIS2 ✔ ISO27001

Deepfakes
& AI images
Explore the world of deepfakes and AI-generated images and their impacts.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

How to create secure
and strong passwords
Guidance on creating passwords that are both secure and memorable.
✔ IBP FO ✔ NIS2 ✔ ISO27001 ✔ ISO27701
Silver

Financial fraud 101: Safeguard
your bank accounts
Understand the common types of wire fraud and what you do best to protect yourself from these scams.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Hacker-proof parcel
management: Do's & don'ts
Find out how to send and receive parcels safely. Considering the sensitive information on labels and possible manipulation.
✔ SOC2 ✔ ISO27001 ✔ IBP FO

Confidential data: Store,
classify and send securely
Gain a solid foundation in classifying, labeling, storing, sharing and securily disposing of confidential data.
✔ SOC2 ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Physical access control:
Cybersecure approach
Dive into the essentials of access control policies and grasp their crucial role ensuring only authorised access.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Hybrid work-arounds:
Securing your home office
Discover the perils of remote work and learn how to establish workflows that keep you as cyber secure at home as in the office.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

First aid
for phishing!
Immediate steps to take if you've fallen victim to a phishing scam.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2

Do you recognise these
Cyber Resilience terms?
Familiarise yourself with key Cyber Resilience terminology and concepts.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2

App safety 101: Making
informed choices
Master the art of secure app selection in this session. Learn 7 essential steps, from consulting IT to app testing, to ensure you're making safe choices.
✔ NIS2 ✔ ISO27001

Identifying, reporting and
handling cyber events
This session teaches you the difference between a cyber security event and a cyber security incident and explains how to react to cyber events.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO

Identifying, reporting and
handling cyber incidents
Explore the essentials of handling cyber security incidents in this session, focusing on recognition, reporting, and the importance of timely responses.
✔ GDPR ✔ ISO27001 ✔ IBP FO

How to handle cyber
security incidents: Part 1
Learn how to handle 5 cyber incidents based on previous sessions: ID fraud, oversharing, online ordering, bank fraud and parcel management.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

How to handle cyber
security incidents: Part 2
Dive into practical strategies for handling key cyber incidents: access control, asset management, mobile devices, apps, and hybrid working.
✔ GDPR ✔ ISO27001 ✔ IBP FO
Gold

Keep recruitment secure: HR cyber security essentials
Gain a behind-the-scenes understanding of why cyber security matters to everyone, not just HR professionals.
✔ SOC2 ✔ ISO27001 ✔ NIS2 ✔ IBP FO

Securing the
Supply Chain: basics
Understand the basics of supply chain security, focusing on risk assessment and initial protective measures.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Secure onboarding:
welcoming new employees safely
Explore best practices for onboarding new employees, ensuring they adhere to your company’s cyber security policies from day one.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Securing the Supply Chain: advanced
Build on the foundational measures with advanced strategies to secure your supply chain against cyber threats.
✔ NIS2 ✔ ISO27001 ✔ NIS2 ✔ IBP FO
Platinum

Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Secure connectivity techniques:
explore advanced methods
Learn how to secure network connections, including best practices for Wi-Fi security, Virtual Private Networks (VPNs), and zero trust security models.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Hybrid working:
cybersecurity best practices
Learn how to maintain a cyber proof hybrid work environment, protecting both in-office and remote employees.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Cybersecure collaboration : working in team
Learn how to build a team risk inventory and how to mitigate those risks with best practices for your team’s security.
✔ NIS2 ✔ ISO27001 ✔ IBP FO
ISO27701
Bronze

What about
your online privacy?
Learn strategies to protect your online privacy from potential threats.
✔ GDPR ✔ ISO27701 ✔ SOC2 ✔ IBP FO

How to create secure
and strong passwords
Guidance on creating passwords that are both secure and memorable.
✔ IBP FO ✔ NIS2 ✔ ISO27001 ✔ ISO27701
Silver

Prevent identity fraud:
Don't be a target
Discover the dangers of identity fraud and learn how to protect your personal information from misuse.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Oversharing risks:
From loose lips to loose clicks
In this session, you will learn that the internet forgets nothing and how you can safely manage your digital footprint.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Online ordering risks:
How to stay safe
Find out how to assess the security of websites and choose wisely what personal data you share while ordering online.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Confidential data: Store,
classify and send securely
Gain a solid foundation in classifying, labeling, storing, sharing and securily disposing of confidential data.
✔ SOC2 ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Physical access control:
Cybersecure approach
Dive into the essentials of access control policies and grasp their crucial role ensuring only authorised access.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO
Gold

HR confidential: protecting sensitive data
Understand the importance of managing application data securely and the skills needed to protect sensitive information.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO
SOC2
Bronze

What about
your online privacy?
Learn strategies to protect your online privacy from potential threats.
✔ GDPR ✔ ISO27701 ✔ SOC2 ✔ IBP FO

You and your colleagues
as the Human Firewall
Discover how you and your colleagues can act as a strong Human Firewall.
✔ NIS2 ✔ ISO27001 ✔ SOC2 ✔ IBP FO
Silver

Prevent identity fraud:
Don't be a target
Discover the dangers of identity fraud and learn how to protect your personal information from misuse.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Oversharing risks:
From loose lips to loose clicks
In this session, you will learn that the internet forgets nothing and how you can safely manage your digital footprint.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Online ordering risks:
How to stay safe
Find out how to assess the security of websites and choose wisely what personal data you share while ordering online.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Hacker-proof parcel
management: Do's & don'ts
Find out how to send and receive parcels safely. Considering the sensitive information on labels and possible manipulation.
✔ SOC2 ✔ ISO27001 ✔ IBP FO

Confidential data: Store,
classify and send securely
Gain a solid foundation in classifying, labeling, storing, sharing and securily disposing of confidential data.
✔ SOC2 ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Physical access control:
Cybersecure approach
Dive into the essentials of access control policies and grasp their crucial role ensuring only authorised access.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Protect your physical assets:
Keep resources secure
Learn how to keep your physical assets safe by understanding the link with digital assets, taking ownership and reporting incidents correctly.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO

Mobile security: Safeguarding your physical devices
Explore the essentials of mobile device configuration and safeguard both personal and corporate safety with a mobile device policy.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Identifying, reporting and
handling cyber events
This session teaches you the difference between a cyber security event and a cyber security incident and explains how to react to cyber events.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO
Gold

Keep recruitment secure: HR cyber security essentials
Gain a behind-the-scenes understanding of why cyber security matters to everyone, not just HR professionals.
✔ SOC2 ✔ ISO27001 ✔ NIS2 ✔ IBP FO

HR confidential:protecting sensitive data
Understand the importance of managing application data securely and the skills needed to protect sensitive information.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Mastering Encryption Techniques:
robust communication
Understand the fundamentals of encryption, cryptography and blockchain to secure your communication within your organisation.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ GDPR ✔ IBP FO
Platinum

Authentication techniques:
explore cutting-edge methods
Dive deep into advanced authentication strategies, including authentication keys, hardware hacking, behavioural biometrics, EIDAS 2.0 and MFA for top-notch security.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO
ICDL
Gold

Smartphone skills: improve your
focus while boosting cyber safety
Master your smartphone use to sharpen your focus and productivity, as well as your cyber security defences.
✔ ICDL ✔ DigComp

Email, meeting, and calendar skills:
supercharge your security
Implement smarter digital habits to sharpen focus, streamline your workflow, and boost your productivity.
✔ ICDL ✔ DigComp

Home cyber defence:
securing your digital environment
Build a secure digital foundation at home to protect your family’s online activities.
✔ ICDL ✔ DigComp

Cyber talks for parents:
engaging your children in online security
Learn how to discuss online safety with your children, ensuring they understand the critical importance of cyber safety and follow best practices.
✔ ICDL ✔ DigComp
Platinum

Keeping apps & devices safe: how to protect your family
List your family's devices and apps, then apply essential security steps to ensure online safety.
✔ ICDL ✔ DigComp

Advanced family protection: key measures to implement
Boost your family’s digital safety by enhancing privacy settings, regularly updating software, and creating backups.
✔ ICDL ✔ DigComp ✔ GDPR
DIGCOMP
Gold

Smartphone skills: improve your
focus while boosting cyber safety
Master your smartphone use to sharpen your focus and productivity, as well as your cyber security defences.
✔ ICDL ✔ DigComp

Email, meeting, and calendar skills:
supercharge your security
Implement smarter digital habits to sharpen focus, streamline your workflow, and boost your productivity.
✔ ICDL ✔ DigComp

Home cyber defence:
securing your digital environment
Build a secure digital foundation at home to protect your family’s online activities.
✔ ICDL ✔ DigComp

Cyber talks for parents:
engaging your children in online security
Learn how to discuss online safety with your children, ensuring they understand the critical importance of cyber safety and follow best practices.
✔ ICDL ✔ DigComp
Platinum

Keeping apps & devices safe: how to protect your family
List your family's devices and apps, then apply essential security steps to ensure online safety.
✔ ICDL ✔ DigComp

Advanced family protection: key measures to implement
Boost your family’s digital safety by enhancing privacy settings, regularly updating software, and creating backups.
✔ ICDL ✔ DigComp ✔ GDPR
PCI DSS
Platinum

Financial fraud:
deep dive
Dive deep into the sophisticated methods cybercriminals use to commit financial fraud and learn advanced strategies to protect your online presence.
✔ PCI DSS
IBP FO
Bronze

Why this Cyber
Resilience training?
Explore why Cyber Resilience is crucial for personal and professional security.
✔ IBP FO ✔ NIS2 ✔ ISO27001

How is your
Cyber Resilience?
Assess your own Cyber Resilience levels and identify areas for improvement.
✔ IBP FO ✔ NIS2

Social engineering:
The art of deception
Uncover the techniques of social engineering and how to defend against them.
✔ IBP FO

What about
your online privacy?
Learn strategies to protect your online privacy from potential threats.
✔ GDPR ✔ ISO27701 ✔ SOC2 ✔ IBP FO

Deepfakes
& AI images
Explore the world of deepfakes and AI-generated images and their impacts.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Do you recognise these
phishing messages?
Learn to spot phishing messages through practical examples.
✔ IBP FO ✔ NIS2

How to create secure
and strong passwords
Guidance on creating passwords that are both secure and memorable.
✔ IBP FO ✔ NIS2 ✔ ISO27001 ✔ ISO27701

First aid
for phishing!
Immediate steps to take if you've fallen victim to a phishing scam.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2

Do you recognise these
Cyber Resilience terms?
Familiarise yourself with key Cyber Resilience terminology and concepts.
✔ GDPR ✔ ISO27001 ✔ IBP FO ✔ NIS2

You and your colleagues
as the Human Firewall
Discover how you and your colleagues can act as a strong Human Firewall.
✔ NIS2 ✔ ISO27001 ✔ SOC2 ✔ IBP FO
Silver

Prevent identity fraud:
Don't be a target
Discover the dangers of identity fraud and learn how to protect your personal information from misuse.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Oversharing risks:
From loose lips to loose clicks
In this session, you will learn that the internet forgets nothing and how you can safely manage your digital footprint.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Financial fraud 101: Safeguard
your bank accounts
Understand the common types of wire fraud and what you do best to protect yourself from these scams.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Online ordering risks:
How to stay safe
Find out how to assess the security of websites and choose wisely what personal data you share while ordering online.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Hacker-proof parcel
management: Do's & don'ts
Find out how to send and receive parcels safely. Considering the sensitive information on labels and possible manipulation.
✔ SOC2 ✔ ISO27001 ✔ IBP FO

Confidential data: Store,
classify and send securely
Gain a solid foundation in classifying, labeling, storing, sharing and securily disposing of confidential data.
✔ SOC2 ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Physical access control:
Cybersecure approach
Dive into the essentials of access control policies and grasp their crucial role ensuring only authorised access.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ ISO27701 ✔ IBP FO

Hybrid work-arounds:
Securing your home office
Discover the perils of remote work and learn how to establish workflows that keep you as cyber secure at home as in the office.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Protect your physical assets:
Keep resources secure
Learn how to keep your physical assets safe by understanding the link with digital assets, taking ownership and reporting incidents correctly.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO

Mobile security: Safeguarding your physical devices
Explore the essentials of mobile device configuration and safeguard both personal and corporate safety with a mobile device policy.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Identifying, reporting and
handling cyber events
This session teaches you the difference between a cyber security event and a cyber security incident and explains how to react to cyber events.
✔ SOC2 ✔ GDPR ✔ ISO27001 ✔ IBP FO

Identifying, reporting and
handling cyber incidents
Explore the essentials of handling cyber security incidents in this session, focusing on recognition, reporting, and the importance of timely responses.
✔ GDPR ✔ ISO27001 ✔ IBP FO

How to handle cyber
security incidents: Part 1
Learn how to handle 5 cyber incidents based on previous sessions: ID fraud, oversharing, online ordering, bank fraud and parcel management.
✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

How to handle cyber
security incidents: Part 2
Dive into practical strategies for handling key cyber incidents: access control, asset management, mobile devices, apps, and hybrid working.
✔ GDPR ✔ ISO27001 ✔ IBP FO
Gold

Keep recruitment secure: HR cyber security essentials
Gain a behind-the-scenes understanding of why cyber security matters to everyone, not just HR professionals.
✔ SOC2 ✔ ISO27001 ✔ NIS2 ✔ IBP FO

HR confidential: protecting sensitive data
Understand the importance of managing application data securely and the skills needed to protect sensitive information.
✔ SOC2 ✔ GDPR ✔ ISO27701 ✔ IBP FO

Securing the
Supply Chain: basics
Understand the basics of supply chain security, focusing on risk assessment and initial protective measures.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Secure onboarding:
welcoming new employees safely
Explore best practices for onboarding new employees, ensuring they adhere to your company’s cyber security policies from day one.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Secure offboarding:
protecting your assets
Understand the importance of a secure offboarding process, including revoking access and protecting sensitive information when employees leave.
✔ NIS2 ✔ IBP FO

Securing the Supply Chain: advanced
Build on the foundational measures with advanced strategies to secure your supply chain against cyber threats.
✔ NIS2 ✔ ISO27001 ✔ SOC2 ✔ IBP FO

Mastering Encryption Techniques:
robust communication
Understand the fundamentals of encryption, cryptography and blockchain to secure your communication within your organisation.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ GDPR ✔ IBP FO
Platinum

Authentication techniques:
explore cutting-edge methods
Dive deep into advanced authentication strategies, including authentication keys, hardware hacking, behavioural biometrics, EIDAS 2.0 and MFA for top-notch security.
✔ SOC2 ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Data management and
protection: the next level
Master the essentials of safe data disposal, retention, classification, back-up management, and cloud storage.
✔ SOC2 ✔ GDPR ✔ NIS2 ✔ ISO27001 ✔ IBP FO

Secure connectivity techniques:
explore advanced methods
Learn how to secure network connections, including best practices for Wi-Fi security, Virtual Private Networks (VPNs), and zero trust security models.
✔ NIS2 ✔ NIST ✔ ISO27001 ✔ IBP FO

Hybrid working:
cybersecurity best practices
Learn how to maintain a cyber proof hybrid work environment, protecting both in-office and remote employees.
✔ NIS2 ✔ ISO27001 ✔ IBP FO

Cybersecure collaboration : working in team
Learn how to build a team risk inventory and how to mitigate those risks with best practices for your team’s security.
✔ NIS2 ✔ ISO27001 ✔ IBP FO