Understanding the most common risks and practical tools for managing them.
Content:
The most common threats facing businesses (e.g., system hijacking, invoice fraud)
Information security policy fundamentals and creation, access rights management
IT device security settings, integrating regulatory requirements (e.g., GDPR) into daily operations
Duration example: 2 × 3-hour webinars with interim assignments
Target audience: Management, IT leads, office employees
Understanding the most common risks and practical tools for managing them.
Content:
The most common threats facing businesses (e.g., system hijacking, invoice fraud)
Information security policy fundamentals and creation, access rights management
IT device security settings, integrating regulatory requirements (e.g., GDPR) into daily operations
Duration example: 2 × 3-hour webinars with interim assignments
Target audience: Management, IT leads, office employees