Think your organisation has the security basics right? Get our free infosheet offering you five easy to implement tips to help protect your organisation.
Workshops
Security is complex, and sometimes it's easier to "learn by doing". Our security workshops allow you and your team to work in a lab environment, completely isolated from your real systems. We'll teach your teams useful techniques that will be relevant to your environment, with the goal of taking what's been learned "back to the office" to improve your security.
You can read about our existing scenarios below. Need something bespoke? Contact us and we can discuss building something specific to your requirements.
What to expect
The workshop starts with a presentation explaining key information and the scenario, tailored to the experience level of the scenario. After the presentation teams can enter the lab.
Each team will be given their own copy of the lab environment, ensuring that teams don't impact each other. Generally, teams of two work well.
Teams will work towards the scenario's stated goal using information provided in the briefing and in the environment. We'll be on hand to help and give hints where necessary. As the labs are isolated, teams have free rein.
If desired, there's also an element of friendly competition between teams. This is low pressure, but in our experience helps to make the workshop more enjoyable.
Target audiences
We can work with attendees who have varying levels of technical knowledge, and will easily adjust our approach during the session if needed. As a guide, we split our scenarios into three target categories:
- Not technical
Workshops aimed at non-technical users introduce the basics before providing a lab environment where delegates can test their newly learned skills. - Semi-technical
Aimed at people with some technical experience, our semi-technical workshops are ideal. We skip the basics (but are still on hand if people get stuck) and head into the more technical aspects of the scenario. - Technical
More tricky scenarios can be built for those that live and breathe cyber security and are of a technical nature. We can vary the level of challenge based on requirements.
Example scenarios
Lateral movement (semi-technical)
To begin with, we'll discuss attack lifecycles, Internet "background radiation", and the legal implications of penetration testing. Next we'll explain the scenario before showing delegates how to use some tools that they'll have available to them. After these introductions, teams will be given access to the lab to begin their explorations.
Teams take on the role of attackers that have infiltrated Blue Box Biscuits. Their goal is to deploy ransomware on a key server with ransomware, while also finding any sensitive information that could be used to extort the company.
This workshop is aimed at semi-technical delegates, and the lab has a mixture of operating systems and users.
Each finding in this scenario reflects something that's been found in the real world.