top of page
Ein Referat halten

Education & Coaching

The expertise within your company requires a new, ever-evolving skill: the awareness of the traps set by criminals—traps into which these criminals will push your employees and colleagues whenever the opportunity arises.

One of the key challenges is that disciplinary action is not the solution. While you could take that route, doing so would ultimately open the door to a successful hacker attack. Instead, we take a scientific approach to mapping the behavior of your teams. Based on these insights, we strategically evolve your corporate culture into a true security culture.

Assessment of Security Awareness and the 12 Error Clusters

High-risk industries like aerospace and nuclear power structure their safety processes around the Dirty Dozen: measurable risk factors such as stress, poor communication, and overconfidence. By assessing these risks, organizations can target specific vulnerabilities instead of relying solely on generic training that provides only a foundational layer. The ultimate goal: to build a true security culture—one where employees become a human firewall against cyber threats.

2

Development and Implementation of Awareness Programs

With a deep understanding of team behavior and knowledge, awareness training can now be tailored accordingly. This is further complemented by new processes and work instructions designed to buy time for technical measures to address identified vulnerabilities. The result is an awareness program aligned with ISO/IEC 27001 standards.

3

training for leaders

Leadership sets the tone—or, to put it more positively, culture starts at the top. When company leadership consistently models the right behavior, the organization will follow. It is likely that NIS2 has introduced this specific training requirement to foster a stronger security culture. This program provides the practical knowledge needed: How do hackers operate? How does a business model that seeks to steal from yours actually work—and why does it need to mimic your business to do so?

4

Lecture Series and Workshops

Common scams like the grandparent trick, phone fraud, or “Hi Dad, this is my new number” are just the tip of the iceberg—simple and crude deceptions. Through engaging lecture series and workshops, participants will gain eye-opening insights into the threats that surround us every day. A compelling example: Even a basic conference call spider can be hacked to record conversations and send transcripts as PDFs to attackers—no AI required.

bottom of page