
TRAININGS AND AUDITS
ANTI - THEFT TRAINING FOR USERS
​

"Hackers don't break in, they enter." [ Microsoft: Cyber Security Trends in Central and Eastern Europe 2020]
Manipulative interpersonal influence (social engineering) detection and prevention. Development of on-line and off-line security approach (mindset), non-obsolete training.



SECURITY AUDIT AND RISK MANAGEMENT
"Security measures are always said to be too many of them, until the day they prove to be few."
WH Webster was an FBI and CIA director
Identify the risks to the organization and their potential consequences. Develop a risk mitigation action plan, interactively, involving staff at risk and involved in its implementation.
We will explore and make more effective the relationship between informal and official power-responsibility structures.
Who has a real impact on which decisions in your organization? Why does it take forever to make certain decisions? How are unintended decisions made? Who are the gray eminences and how do they support - or not - the success of the organization? Could decision-making and implementation be made more efficient and how?