Cyber Education for Wide Audiences

Education for Wide Audiences

Benefits of Group-IB master classes:

In recent years, many organizations have made cybersecurity one of their priorities. As more than 90% of incidents occur due to human error, we have prepared interactive master classes for employees and top managers on how to minimise incident risks in today’s business environment.
Valeriy BaulinHead of Digital Forensics Lab
Relevance for all organizations
  • From the organizations with the most advanced infrastructures to those that are only beginning to build their security infrastructure.
Experts with extensive practical experience
  • Master classes on the most relevant and practical cybersecurity topics.

Master Classes for Wide Audiences

2-4 hoursDigital Hygiene

Understanding cybercrime techniques, targets, and tools. Setting up corporate and personal devices to ensure comprehensive cybersecurity. Participants of this master class will learn about key methods of preventing data leaks, credential compromise, and malware infections.

Learn more

Understanding cybercrime techniques, targets, and tools. Setting up corporate and personal devices to ensure comprehensive cybersecurity. Participants of this master class will learn about key methods of preventing data leaks, credential compromise, and malware infections..

Duration: 2-4 hours

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Rules for protecting personal and corporate digital devices against data leaks and malware infections;
  • Prevention of credential compromise;
  • Basic rules for protecting the company’s reputation and brand online.
Send request
2-4 hoursCyber Crime Trends

Overview of current cyber threats. The master class helps to adjust the strategy of information security.

Learn more

Overview of current cyber threats. The master class helps to adjust the strategy of information security.

Duration: 2-4 hours

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Understanding the modern criminal;
  • Evolution of hacker tools;
  • Features of cyber attacks on various targets: individuals, financial institutions, critical infrastructure, etc.
Send request
2 hoursSOC Building

Based on 10 years of Group-IB experience in building and developing SOC, at this master class we will consider the organization of internal processes, personnel related issues and technologies used.

Learn more

Based on 10 years of Group-IB experience in building and developing SOC, at this master class we will consider the organization of internal processes, personnel related issues and technologies used.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • Approaches to SOC building;
  • Practical recommendations on building internal processes and regulations;
  • Review and selection of modern technologies;
  • Examples of implementing selected technologies.
Send request
4 hoursInformation Security Management in Case of an Incident

Incident response management. The structure, roles, and competencies of response teams. Working with other departments involved in eliminating attack consequences. External communications with partners and the media.

Learn more

Incident response management. The structure, roles, and competencies of response teams. Working with other departments involved in eliminating attack consequences. External communications with partners and the media.

Duration: 4 hours

Delivery method: on-site

Key topics:

  • Understanding how modern cyber attacks on organizations are conducted;
  • Roles, teams, processes;
  • Practitioners’ advice on incident response management;
  • External communications with partners and media — before, during, and after the incident.
Send request

Original Workshop from the Founder of Group-IB

Workshop

Personal cybersecurity for top managers and business owners: How to protect your data, reputation, and money

Duration: 1.5 hoursDelivery method: OfflineTarget audience: Business owners, top managers, department heads
Ilya SachkovCEO, Founder of Group-IB
Key topics:
  • Who is behind hacker attacks? The profile and motivations of the modern cybercriminal.
  • The economics of cybercrime: What can be ordered on underground forums and how much your data costs.
  • Types of cyberthreats and hi-tech crime trends in 2019: new attack vectors and techniques.
  • Personal infrastructure: What resources can be accessed through comprised email accounts and why you cannot trust your smartphone.
  • Practical recommendations on how to increase the security of your smartphone, instant messengers, social media, and cloud storage services.
Send request
Contact us to learn more about
Group-IB’s corporate master classes
Request a consultation

Contact us for an individual consultation on Group-IB educational programs

Contact us for an individual consultation on Group-IB educational programs

Digital Hygiene

Understanding cybercrime techniques, targets, and tools. Setting up corporate and personal devices to ensure comprehensive cybersecurity. Participants of this master class will learn about key methods of preventing data leaks, credential compromise, and malware infections.

Duration: 2 days

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Rules for protecting personal and corporate digital devices against data leaks and malware infections;
  • Prevention of credential compromise;
  • Basic rules for protecting the company’s reputation and brand online.
Registration

Contact us for an individual consultation on Group-IB educational programs

Cyber Crime Trends

Overview of current cyber threats. The master class helps to adjust the strategy of information security.

Duration: 2-4 hours

Delivery method: on-site

Key topics:

  • Cyber crime trends. Techniques, targets and tools used by attackers;
  • Understanding the modern criminal;
  • Evolution of hacker tools;
  • Features of cyber attacks on various targets: individuals, financial institutions, critical infrastructure, etc
Registration

Contact us for an individual consultation on Group-IB educational programs

SOC Building

Based on 10 years of Group-IB experience in building and developing SOC, at this master class we will consider the organization of internal processes, personnel related issues and technologies used.

Duration: 2 hours

Delivery method: on-site

Key topics:

  • Approaches to SOC building;
  • Practical recommendations on building internal processes and regulations;
  • Review and selection of modern technologies;
  • Examples of implementing selected technologies.
Registration

Contact us for an individual consultation on Group-IB educational programs

Information Security Management
in case of an Incident

Incident response management. The structure, roles, and competencies of response teams. Working with other departments involved in eliminating attack consequences. External communications with partners and the media.

Duration: 4 hours

Delivery method: on-site

Key topics:

  • Understanding how modern cyber attacks on organizations are conducted;
  • Roles, teams, processes;
  • Practitioners’ advice on incident response management;
  • External communications with partners and media — before, during, and after the incident.
Registration

Contact us for an individual consultation on Group-IB educational programs

WorkshopPersonal cybersecurity for top managers and business owners: How to protect your data, reputation, and money

Top managers and business owners are well protected within the corporate perimeter, but their personal resources remain vulnerable. During this crash course, you will learn about current threats and how to protect your data, reputation, and money.

Duration: 1.5 hours

Delivery method: Offline

Target Audience: Business owners, top managers, department heads

Key topics:

  • Who is behind hacker attacks? The profile and motivations of the modern cybercriminal.
  • The economics of cybercrime: What can be ordered on underground forums and how much your data costs.
  • Types of cyberthreats and hi-tech crime trends in 2019: new attack vectors and techniques.
  • Personal infrastructure: What resources can be accessed through comprised email accounts and why you cannot trust your smartphone.
  • Practical recommendations on how to increase the security of your smartphone, instant messengers, social media, and cloud storage services.
Registration

Report an incident

24/7 Incident Response Assistance +65 3159-4398

Thank you for the inquiry! We will contact you soon.
Cookies

We use cookies on the website to make your browser experience more personal, convenient and secure. You may block or manage the use of cookies, however, in some cases they’re essential to make this site work properly. Learn more about cookies in Group-IB Privacy And Cookies Policy.