26 Fev 2020
Cybersecurity Training Cycle

CannX Lisbon

Cyber ​​attacks are in the top 10 of global risks.

The computer attacks are the cause of damage such as data loss, password and identity theft, exposure of confidential information, data manipulation, among many other problems, which can sometimes be irreversible.

Often, employees are the major gateway to this type of computer attacks and compromised cybersecurity. For this reason, it is essential to create a safety culture to protect businesses and customers.

In order to support the protection of your data against threats to the security of your business, we invite you to attend Sage training courses focusing on the topic of cybersecurity.

Find out the good practices you should follow in your daily life to protect yourself against these advanced threats.

Cybersecurity from the perspective of the decision-maker

Online Training | 2 March 9:30 am | Language: Portuguese
 

SCHEDULE:
1. Cybersecurity framework
2. Cybersecurity - A new business risk
3. Cyber-risks & Cybercime: the new threats to business continuity
4. Cybersecurity vectors: analyzing my organization's maturity
5. The weakest link
6. Cybersecurity responses: from risk to corporate protection measures
7. Conclusion: protect a response system

Format: This action consists of an online session, lasting three hours.

Methodology:
- Introductory online course, through the expository and interrogative method, focusing on cybersecurity in the business plan.
- Each chapter will have a Knowledge Consolidation Quiz.
- A cybersecurity maturity analysis survey will be available.

Directed to: Business leaders, company managers, first line managers, responsible for risk management and / or auditing.

Sage Trainer: Bruno Marques


Register Now!
 

 

Cybersecurity from the user's perspective

Online Training | 30 March 9:30 am | Language: Portuguese


SCHEDULE:
1. Cybersecurity framework
2. Cyber-risks & cybercime: the new threats to business continuity
3. Top 10 Attacks on People
4. Social engineering: people as the weakest link
5. Phishing: how to identify and what should I do
6. Good practices from the user's perspective
7. Conclusion: daily rules of use “cyber hygiene”

Format: This action consists of an online session, lasting three hours.

Methodology:
- Introductory online course, through the expository and interrogative method, focusing on cybersecurity in the business plan.
- Each chapter will have a Knowledge Consolidation Quiz.
- In the end, a “checklist” of “cyber-hygiene” rules will be made available, as well as additional documentation

Directed to: Business managers, responsible for 1st line of companies, users of computer systems, responsible for risk management and / or auditing.

Sage Trainer: Bruno Marques


Register Now!

 

 

Cybersecurity: Implement based on best practices

Online Training | 11 May 9:30 am | Language: Portuguese


SCHEDULE:
1. Cybersecurity framework
2. Cyber-risks & cybercime: the new threats to business continuity
3. Fundamentals of cybersecurity
4. Domains of cybersecurity and relationship with good technical practices
5. Design a cybersecurity program
6. Internal mobilization plan
7. Conclusion: develop a practical action plan based on good practices

Format: This action consists of an online session, lasting three hours.

Methodology:
Introductory online course, through the expository and interrogative method, focusing on cybersecurity in the business plan.
- Each chapter will have a Knowledge Consolidation Quiz.

Directed to: Business managers, Responsible for 1st line of companies, Responsible for computer systems, Responsible for risk management and / or auditing.
 

Register Now!