For more information on accessibility, access procedures and deadlines, see our Training page.
Introduction to cybersecurity – #270
Catégories :
Context
- In an increasingly connected environment, companies across all sectors are facing a surge in cyber threats. The interconnection of IT and OT systems, the digitalisation of processes, dependence on supply chains and the human element at the heart of operations make organisations particularly vulnerable to attacks.
- This introductory training course aims to provide employees with the essential knowledge to understand the risks, adopt the right reflexes, and actively contribute to the protection of industrial systems. It provides a common foundation of vocabulary, key concepts, and best practices, while raising awareness of the decisive role of the human factor in cyber security.
Objectives
At the end of the training, participants will be able to:
- Understand cybersecurity issues in an industrial and organisational context
- Acquire key cybersecurity vocabulary and concepts (IT and OT)
- Identify the main threats and types of cyber attacks
- Understand and apply cybersecurity best practices
- Understand the importance of the human factor, cognitive biases and social engineering
- Adopt the right reflexes when faced with risky situations
Recommanded for
- This training course is aimed at employees, managers, engineers, technicians, support staff and decision-makers who wish to introduce their teams to the fundamentals of cybersecurity.
Specific operating conditions for remote sessions
- Have a PC equipped with a microphone, a webcam and, if possible, a headset for greater comfort. Note: wallpapers are available on Zoom or Teams to hide the background.
- Have a good Internet connection, which should be tested before the session.
- Settle down in a quiet, isolated place; set yourself to “unavailable” status on Teams; close your email access, and mute your phone, so as not to be disturbed during the session.
- Participants from the same organisation should not be grouped together in the same room, but each at their own desk.
- This Quiz must be taken with the webcam and microphone open. We may need to check that you are alone in the room.
- Please sign in 5 minutes before the start of the session.
Prerequisites
- No technical prerequisites are required.
- A general knowledge of the industrial environment, systems or company organisation is recommended.
Pedagogy
- Theoretical presentations, interactive discussions, case studies and practical exercises.
- Alternating between theory and practice.
Evaluation mode
- Knowledge test (multiple-choice questions).
Course materials
-
Participant’s file containing the presentations delivered during the training and the exercise materials.
To go further
Consulting Services: EURO-SYMBIOSE can assist you with the practical implementation of this system in your company. Contact us for more information.
1. Introduction to cybersecurity
- What is cybersecurity?
- Differences between IT and OT
- Why cybersecurity is critical
- Examples of real incidents
2. Challenges and scope of cybersecurity in businesses
- Critical assets and business continuity
- Economic, human, regulatory and security impacts
- Individual and collective responsibilities
3. Key vocabulary and concepts
- Threat, vulnerability, risk
- Malware, ransomware, phishing, DDoS, social engineering
- Authentication, encryption, backup, update
4. Main cyber attacks
- Traditional attacks (phishing, ransomware, weak passwords, booby-trapped USB sticks)
- Attacks targeting industrial systems
- Typical chain of events in a cyber attack
5. Good cybersecurity practices
- Individual digital hygiene
- Password management
- Email, web browsing, remote working
- Expected behaviour in the event of an incident
6. The human factor in cybersecurity
- Social engineering
- Cognitive biases (urgency, authority, overconfidence, habit)
- Humans: the primary target and first line of defence
7. Summary and key messages
- Essential reflexes to remember
- Everyone’s role in corporate cyber security
Further reading: what ISO 27001 has to offer
Votre référent :
Aline FÜRSTENBERGER
Partner Consultant and Trainer – Cybersecurity Expert
Bulletin d'inscription aux formations
* Champs requis
Responsable de l'inscription
Société
Informations sur les participants
Participant 1
Liste des participants inscrits
1 participant(s) inscrit(s)
Modifier
Supprimer
Des champs en rouge sont vides
Durée
1 day (+ 0.5 days of preparation for an IN-HOUSE training course)
Type de formation
Open / In-house training session
Modalité de réalisation
Onsite (Open: lunch included) or remote sessions
Validation
Examination of training achievements and delivery of a training certificate
Nombre de participants
Minimum : 4
Maximum : 12
Réductions
Inscrivez plusieurs stagiaires à nos formations INTER et bénéficiez de nos offres spéciales
-20%
de remise pour le 2ème participant
-50%
pour le 3ème participant et pour chaque participant supplémentaire
Pour des inscriptions à la même session de formation.
Inscription formation
INTER
INTRA
Pour obtenir un devis pour une formation en INTRA :