Why Information Security Training?

Information Security is one of the most sought after training that ensures the safety of sensitive and critical information within your organization by bringing behavioral change and spreading awareness within your staff.

  • The nature of sensitive material and physical assets they may come in contact with, such as trade secrets, privacy concerns and government classified information
  • Employee and contractor responsibilities in handling sensitive information, including review of employee nondisclosure agreements
  • Requirements for proper handling of sensitive material in physical form, including marking, transmission, storage and destruction
  • Proper methods for protecting sensitive information on computer systems, including password policy and use of two-factor authentication
  • Other computer security concerns, including malware, phishing, social engineering, etc.
  • Workplace security, including building access, wearing of security badges, reporting of incidents, forbidden articles, etc.
  • Consequences of failure to properly protect information, including potential loss of employment, economic consequences to the firm, damage to individuals whose private records are divulged, and possible civil and criminal penalties

Training Highlights

  • Part A: Vulnerabilities, threats and the risks associated with the information you handle. Malware, Spyware, Scams, Account Security, Information Theft / Identity Theft, Physical Security
  • Part B: Information Security Management System, International standard and the mechanism to secure the organization
  • Part C: Policies, Procedures, and Work Practices in your organization

What this training means to you?

Being security aware means you understand that there is the potential for some people to deliberately or accidentally steal, damage, or misuse the data that is stored within a company's computer systems and throughout its organization. Therefore, it would be prudent to support the assets of the institution (information, physical, and personal) by trying to stop that from happening.

What this training means to your organization?

  • Communicate policy to the staff and encourage compliance
  • Mitigate the Security versus Usability equation
  • Defend against social engineering threat components
  • User awareness enhances the overall security profile and increases the productivity
  • Inform users about how to recognize and react to potential threats

Awareness Collateral

Businesses are vulnerable to security breaches occurring in our daily activities knowingly or unknowingly. It is the responsibility of any organisation to ensure the staff is well trained and equipped in order to meet the security expectations at the work place. It is very challenging especially for big organisations to ensure that every employee works in accordance with business expectations to meet security requirements.

Suraksha supports in providing visibility of your security program in your organisation with awareness and promotional products.

  • Standards/Policies/Procedures/Guidelines – template based documents to help customise organisations requirements
  • Posters – Malware, Spyware, Security Architecture, Password Protection, Identity theft, Credit Card fraud, ISO 270001 Framework
  • Flash cards – set of 3 packs
  • Information Kits – Customised branded folders, inserts and marketing materials (like pens, mugs, clocks etc.) to promote your security branding
  • Customised Security Portal/Intranet site/Publications

Information Security For Managers

Managers hold a key responsible position in any organisation and are held accountable for the delivery of big picture or projects ensuring the team reporting him works in an organised and required manner. Hence it is critical to warrant that a manager understands all business needs and requirements. Surakssha has developed a special training course modules entailing managers position in any business units in an organisation. This course can be extended to

  • Senior Managers and Executives
  • Information Security Managers
  • Risk & Audit Managers and staff
  • Data Owners
  • Individual engaged in managing organisational information, security and risk

The module based training includes –
  • Part A : Information Security Program Development and Management
  • Part B : Information Security Governance and Risk Management
  • Part C : Incident Management and Reponse

Key Delivery Features
  • Web-based interactive security training package
  • Concepts delivered through audio, video, simulations and industry case studies with real examples
  • Ease of access from any computer, mobile devices and tablets such as iPad {{application must support flash}}
  • Easy deployment such as Cloud-based access or in-house installation
  • Short quiz and exam to revise the course and training
  • Tailor made trainings to accommodate any HR and regulatory requirements
  • Options to select training for an individual (per seat) or for groups in organisation

Information Management

Information management and technology strategy development is an absolute necessity. The development of an effective strategy will yield good savings and a positive return on investment (ROI). It delivers growth and higher efficiencies to the organisation.

The participant will walk away with a draft strategy and plan and useful tool kits to develop it further. This workshop/course is a highly interactive course to engage senior managers, executives and key personnel to develop your organisation’s IM&T strategy. You will not only learn to develop effective strategies but also develop a draft version for your organisation during the workshop.

Rich with workbooks and handouts this workshop/course has valuable take always that you will use through out the year and your career. This is a must for anyone who is involved in planning and executing IM & T projects and delivering IM & T services. You will learn to leverage existing investments in IM & T and elicit the maximum value for your efforts.

Suraksha Information Security’s can deliver this program at your premise or you can send your staff for next available training session. This half day work shop is hands on and takes the participant through following stages:

  • Stage 1: Plan the plan
  • Stage 2: Document your business strategy
  • Stage 3: Assess the current IM & T landscape
  • Stage 4: Propose a Business IT Alignment and the new road map
  • Stage 5: Perform a gap analysis
  • Stage 6: Propose a new vision, strategy and governance model
  • Stage 7: Build a strategic decision making framework
  • Stage 8: Publish, Promote and Maintain the strategy

This workshop is intended for
  • IT Managers,
  • CIO, CFO, CEO
  • Data Governance Staff
  • Web Management Staff
  • Program/Project officers
  • Senior and Divisional Managers and Executives

Computer Hacking And Forensic Investigation

Whether you are looking for absolute proof to win a civil action, launch criminal proceedings or just wish to satisfy yourself about what’s happening, Suraksha Information Security’s specialist team uses the latest forensic discovery tools, cutting edge technology and investigative know-how, to provide the satisfactory evidences with the desired outcomes

  • Recovery of deleted files, emails, documents and database
  • Identification of downloaded, copied or forwarded files to a USB, external drive or third part email, whom they have been emailed to
  • Uncover an activity on computer, application and internet websites by employee, associate or unknown party
  • Uncover encrypted files & passwords to get behind the hidden evidence
  • Analyse mobile phones to identify call history, past text messages, emails, images and recordings
  • To determine the level of activity with social networking sites such as Facebook, Twitter, blogging etc
  • To determine the position/representations an individual is making in social networking sites
  • To analyse complex transactions and to present them in the simplest way
  • To discover real identity of those behind threatening or anonymous emails
  • To uncover mounting malicious, undermining campaigns and to identify those behind online scams, data stealing, virus or denial of service attacks
  • To locate key loggers or spyware monitoring programs
  • To prove fraud, misconduct or improper activity

Our Information Security Confidential Services For Computer Forensics Tests:

  • Incidence response and investigations
  • Internet tracking and Data recovery
  • Internal investigations and Forensic audits
  • Employee computer misuse
  • Intellectual property theft
  • Email harassment matters
  • Due Diligence (Mergers & Acquisitions)
  • Audits and Compliance
  • Contract Disputes in regards to computer data and assets
  • Virus removal
  • Identity theft & Password recovery

Computer Based Security Training

General Information Security Awareness

Security awareness in a business is a critical element and is inseparable to any organisation. This training is designed in a simple manner and can be useful to any of the following at the workplace –

  • Managers and Executives
  • Individuals, Professionals and contractors
  • Information Technology officers
  • HR and Privacy

Generic staff responsible in dealing with organisations data and information, aiming to provide required security awareness at a workplace, Surakssha has entailed all the information in different modules.

  • Part A : Information Security Threats and Vulnerabilities
  • Part B : Information Security Management Systems
  • Part C : Organisation’s Policies, Procedures and Guidelines

Information Security Awareness For Managers

Options to select training for an individual (per seat) or for groups in organisation

  • Web-based interactive security training package
  • Concepts delivered through audio, video, simulations and industry case studies with real examples
  • Ease of access from any computer, mobile devices and tablets such as iPad {{application must support flash}}
  • Easy deployment such as Cloud-based access or in-house installation
  • Short quiz and exam to revise the course and training
  • Tailor made trainings to accommodate any HR and regulatory requirements
  • Options to select training for an individual (per seat) or for groups in organisation
  • Senior Managers and Executives
  • Information Security Managers
  • Risk & Audit Managers and staff
  • Data Owners
  • Individual engaged in managing organisational information, security and risk