Expecting an employee to know exactly what you want from them without telling them is foolish, so why should cybersecurity training be any different? Making sure your users know how to identify malicious behavior on their workstations is a key goal to achieving a successful cybersecurity program. Below I have developed training courses that anyone can use and modify to target specific needs within your organization.Cybersecurity Tabletop Exercise
: This presentation is designed to lead you through a scenario of a malicious infection. It requires your to answer tough question and rethink your security posture.
Phish Training: This presentation is designed to help users discern the difference between innocuous emails and suspicious emails.
MMA Training: This presentation was given at the 2019 MMA Conference.