Information Security Essentials for Corporate
|: 2 Day
Instructor Led Workshop F2F and Online
workshop is delivered in two days, two units
each day between 9:30 am to 1 pm and 2 pm to
upon request (Write to us at email@example.com)
Customer Onsite and Online
Comprehensive Student Guide and Workshop
workshop can also be conducted for customers in
Lahore, and Islamabad
In the era of digital transformation,
the importance of information security and
cybersecurity have been emerged as an essential
education/training and is recommended to take by
users from all LOB’s as a part of an
organizational internal security policy helping
them to understand and combat against latest types
of threats, risk and vulnerabilities and how to
effectively safeguard their endpoint
Attacks on cloud accounts up 630% during
COVID-19 pandemic during January and April 2020
time-frame. As per McAfee survey, it is found that
overall enterprise use of cloud services increased
by 50%, and use of collaboration services such as
Cisco WebEx, Microsoft Team, Slack and Zoom
increased up to 600%. In a nut shell, security
vendors attributed much of those increases to the
COVID-19 pandemic. Also, 48% of employees
according to Gartner's Board of Directors 2021
survey, 48% of employees are working remotely now,
versus 30% before the pandemic. 82% of
organizations are planning to allow their
employees to continue working from home at some
level. 40% of companies that suffer a massive data
loss will never reopen - Gartner Group.
end users are the first line of defense against
cyber-attacks that target your endpoints, such as
phishing, malware, ransomware, or data breaches. If
they are not aware of the signs and symptoms of
these attacks, or how to respond to them, they can
compromise your network, your data, and your
reputation. Educating and training your end users on
endpoint security awareness and best practices can
help you reduce the likelihood and impact of these
attacks, as well as improve your compliance and
The core reason is to bring all users on
one page helping them to explore the reason behind
why the protection of information is important.
Protection of information is considered as one of
the critical function for all enterprises.
Cybersecurity is a growing and rapidly changing
field and it is vital that the principal concepts
that frame and define this increasingly pervasive
field are clearly understood by technology
professionals who are involved and concerned with
the security implications of information
Technologies. This workshop is designed for this
purpose, as well as to provide the insight into
the importance of cybersecurity, and the integral
role of cybersecurity professionals.
The training course flow will be a mix
of lectures & classroom discussions so that
participants can have a detailed understanding of
various components of cybersecurity technologies.
completing this workshop, you will be able to:
- Understand basic information and
cybersecurity concepts and classifications.
- Recognize malware analysis concepts
and methodology used by hackers.
- Distinguish system and application
security threats and vulnerabilities.
- Classify different types of malwares.
- Understand security event correction
- Be aware of the basic concepts,
practices, tools, tactics, techniques and
procedure used today by cyber-criminals.
- Elaborate basic security principles,
guidelines and procedures to safeguard data.
- Understanding Data Encryption and
types of encryption.
- Describe why data encryption is
- Understand Identity Theft Protection
and how Multi-factor Authentication can help in
reducing the overall implications with typical
- Exploiting “Users” role in Information
This workshop shall
be delivered by TOGAF 9 Certified/IBM Certified
Infrastructure System Architect and an experienced
trainer with 25+ years of career experience imparting
education and training services both locally and
internationally and have worked for international
enterprise technology vendors including IBM, Fujitsu,
and ICL. Our instructor holds various industry
professional certifications in the space of enterprise
servers and storage technologies, Information
Security, Enterprise Architecture, ITIL, Cloud,
Virtualization, Green IT, and a co-author of 10 IBM
This workshop is intended for resources
PRICING MODEL FOR CORPORATE:
- Different LOB's including business,
finance, procurement, digital application,
audit, risk, compliance, information security,
IT operations, project management, software
development, legal and HR professionals with a
familiarity of basic IT/IS concepts who want to;
- Who want to learn new basic trends in
Information Security and cybersecurity.
- Want to explore the new trends of
cyber threats, risks and overall vulnerabilities
attached with emerging technologies.
- Students and fresh graduates.
- CXO's, Managers, Senior IT and
Business Leaders who want to refresh their
present knowledge in the field of information
This workshop can
also be delivered for an organization at their
premises with up to 30% reduction is the cost subject
to 10 -30 corporate users taking this session from
In a nut shell,
this workshop shall increase the focus on
information and cybersecurity to protect sensitive
data and systems. No organization, regardless of
size or industry, is immune to cyberattacks, and
just one breach could cause significant financial,
reputational or regulatory consequences. However, an
effective control environment can reduce the
likelihood of a breach, enhance incident detection
and response, and accelerate recovery efforts to
criteria can help determine the effectiveness of a
data security methodology. First, the cost of
implementing the system should be a small fraction
of the value of the protected data. Second, it
should cost a potential hacker more, in terms of
money and/or time, to compromise the system than the
protected data is worth.
attending this workshop should be familiar with
basic Information Technology (IT) and Security
concepts, business challenges and the role of
general system wide infrastructure technologies and
– Understanding the Role of Information
Security and Cybersecurity
-Essential Security Principles and
little backdrop on recent cyber attacks
is getting instrumented, interconnected
Data Growth – Some key facts and
evolution of storage technology and
a world without a security.
Frequently Targeted Industries in 2019.
a security is becoming a board room
Security Concerns for the Executive
Vs. Safety in a view.
to avoid Social Engineering &
tricks to avoid – Recommendations.
Cybersecurity and Cyberspace.
between Information Security and
layers of protection offered by Security
securing your environment is important?
devices than Humans – One of the serious
is Information Security.
Security and Dependability.
you need to make security a priority.
of cybersecurity threats.
is Cyber Resilience needed.
11 ways poor security issues that can
– Defense in depth.
Awareness – The 6 Layered Model.
for Cybersecurity Success.
are the objectives of Cyber Security?
of Cybersecurity best practices.
Awareness – Summary.
you should ask your Services Provider.
in information and cybersecurity.
roles security specialist in the
Data Protection is important for
are best practices, guidelines,
frameworks, and security controls?
of cybersecurity controls and their
guidelines for setting up a user
security guidelines and principles.
guidelines for setting up a user
for keeping your password secure.
seven key Cybersecurity Principles.
Data Encryption and types of encryption.
Symmetric and Asymmetric Encryption.
8 Principles of Cybersecurity Laws.
and Principles of Cybersecurity –The
National Response Center for Cyber Crime
of Internet Security Guidelines: Top 20
Identity Theft Protection.
Multi-factor Authentication and typical
– Dealing with Risks, Threats and
Unit 4 –
Corporate Users Role in Information
the Cost of a Data Breach.
address security threats, leaders must
avoid following common myths.
Incidents, Breaches, Risk &
five fundamental security principles to
help guide you.
Motives and Methods.
Jacking explained and its consequences.
and security challenges faced today.
threat levels and risks.
security threats and their channels.
Security Elements –The larger picture.
Progression Mode used by
Management: Know your risks.
role of Risk Management.
Planning –Risk Analysis and Assessments.
Management Approach, key objectives and
small backdrop on ISO 27001.
Risk Assessment –Simple and Detailed
risks and solutions in the digital
vulnerabilities that one cannot ignore.
of Comprehensive Vulnerability
Risk and Vulnerability –A High Level
do your device know about you?
and manage vulnerabilities in mobile
security issues caused by users.
breach vectors - Statistics that you
Role of Authentication and
“Users” role in Information Security.
between the role of Data Steward and
role in Information Security.
Electronic Data, Safeguard your
Passwords, Secure Your Computer,
Protecting Physical Data, Disposing of
Data (Data Sanitization).
Risky Behavior Online.
or allow pop-ups in your Web Browsers –
An important step.
and remove malware from your computer –
to help you stay more secure online – A
any Suspected Security Breach.
to the Computing Policy.
cybersecurity roles in the industry.