Description
Learn in a classroom environment with your peers, virtually, with a BEVA® instructor online.
Course Length: 1 day
Target Audience: General
Cyberattacks are increasing at an alarming rate. Radware reported that there were 2.3 billion data breaches in 2018 – almost three times more than the year before – which cost companies about $600 billion. Most companies have installed firewalls and other cyber defenses to stop cyberattacks, but they are not foolproof. In fact, one of the key risk factors in cyberattacks is human error. A recent Intel Security survey found that 97 per cent of people could not identify all the phishing emails in a sample of 10 emails.
The need for training of non-IT staff is critically important. This one-day course will ensure that staff gain an appreciation of company-wide measures to protect against cyberattacks and their own role in the success of these defense measures. Most importantly, it will help staff recognize phishing attacks, and when a cyberattack has been successful, understand what steps to take to mitigate the effect. The importance of practicing safe social media behavior to prevent cyber criminals from mining sensitive personal and company data will also be discussed. In the capstone activity each participant will create a personal cybersecurity plan.
Learning Objectives:
This workshop will help participants how to:
- Understand the history and the current state of cyberattacks in terms of quantity and cost to business.
- Name and explain the method used in various types of cyberattacks.
- Outline the risk of human error in inadvertently contributing to the success of cyberattacks.
- Have an appreciation of company-wide measures to protect against cyberattacks and their role in the success of these defense measures.
- Explain the importance of a company culture that focuses on cybersecurity to successfully defend against attacks.
- Realize the social media mining activities of cyber criminals and be better able to practice safe social media behavior.
- Outline the information needed in a social media security policy.
- Understand and practice good security behaviors when working remotely or travelling.
- Recognize phishing attacks by identifying the subtle clues that are present in all phishing attacks.
- When a cyberattack has been successful, understand what steps to take to mitigate the effect.
- Create a personal cybersecurity plan.
Course Overview
You will spend the first part of the day getting to know participants and discussing what will take place during the workshop. Students will also have an opportunity to identify their personal learning objectives.
The State of Cybercrime
In this session, we explore the past and current state of cybercrime, and take a look at the huge financial cost of cybercrime for companies.
Types of Cyberattacks
Next, we look at the various types of cyberattacks.
Role of Human Error
Next, we learn about the role human error plays in the success of cyberattacks.
What Can a Company Do?
Then, we look at the defenses that companies have set up to protect them from cyberattacks.
Best Practices for Remote or Travelling Employees
Next, we looked at the defenses that companies have set up to protect remote workers from cyberattacks.
Scenarios
Then, we discuss some cybersecurity scenarios and what would be the necessary next step to mitigate the damage.
Cyberattacks on Individuals
Next, we focus on cyberattacks perpetrated on individuals and the importance of information gleaned from social media for those attacks.
Recognizing Phishing Attacks
Next, we practice recognizing phishing attacks using the subtle clues left by cybercriminals.
What Can a Person Do?
Next, we explore ways we can reduce the chances of a successful cyberattack.
Creating a Personal Cybersecurity Plan
Lastly, everyone creates a personal cybersecurity plan.
Workshop Wrap-Up
At the end of the course, students will have an opportunity to ask questions and fill out an action plan.
Supplement Material
A student manual is available for the learner to follow during the instructor’s presentation.
Benefits to the participants
The participants will learn the importance to better be prepared to avoid cyberattacks and the issues they may cause to the individual and/or organization.
Course Evaluation
A course evaluation will be completed by the learners once the course is finished.
Certificate
A BEVA® certificate of attendance will be provided once the participant completes the course.
Note: The course outline may be subject to change.