YCSC

This Cyber Security Culture masterclass aims to:

  • Address key risks that increase business susceptibility to data breaches and cyber-attacks.
  • Examine the myths and perceptions surrounding cybersecurity and how they impact business security.
  • Detail how behavioural psychology is used to socially engineer victims.
  • Highlight how personal digital footprints impact the susceptibility of organisations to attack.
  • Explain open source intelligence (OSINT) and how it is used to create more effective cyber-attacks, such as spear-phishing emails.

 

This Cyber Security Culture masterclass will cover the following topics:

  • Perceptions of cybersecurity. We will address the myths and misconceptions that surround cybersecurity. Incorrect perceptions of cybersecurity lead to a weak security culture and increase the likelihood of a successful attack.
  • Human side of cybersecurity. We emphasise the importance of the human element in cybersecurity. Attackers often target people rather than technology through a process known as social engineering. As a result, it’s vital your staff understand their role in helping to protect your organisation.
  • Open-source intelligence. As more and more information about us becomes available online, it’s becoming easier for cybercriminals to launch sophisticated attacks against us. We will explain what open source intelligence (OSINT) is and how it is used by cybercriminals to devise incredibly convincing attacks.
  • Through a real-life case study, we will highlight where unexpected risks can be found in our lives and how they can be used against us.

 

This Cyber Security Culture masterclass will cover the following key behaviours:

  • Emerging threats.
  • We provide an understanding of the latest and most prevalent cybersecurity threats to your organisation.
  • Developing a security culture.
  • We detail the key steps towards not only individual behavioural change but widespread security culture change across the entire organisation.
  • Crossover between personal and professional.
  • We examine how the increasingly digital nature of our lives leads to increasing avenues of attack for cybercriminals to exploit.