Think your organisation has the security basics right? Get our free infosheet offering you five easy to implement tips to help protect your organisation.

Workshops

Security is complex, and sometimes it's easier to "learn by doing". Our security workshops allow you and your team to work in a lab environment, completely isolated from your real systems. We'll teach your teams useful techniques that will be relevant to your environment, with the goal of taking what's been learned "back to the office" to improve your security.

You can read about our existing scenarios below. Need something bespoke? Contact us and we can discuss building something specific to your requirements.

What to expect

The workshop starts with a presentation explaining key information and the scenario, tailored to the experience level of the scenario. After the presentation teams can enter the lab.

Each team will be given their own copy of the lab environment, ensuring that teams don't impact each other. Generally, teams of two work well.

Teams will work towards the scenario's stated goal using information provided in the briefing and in the environment. We'll be on hand to help and give hints where necessary. As the labs are isolated, teams have free rein.

If desired, there's also an element of friendly competition between teams. This is low pressure, but in our experience helps to make the workshop more enjoyable.

Target audiences

We can work with attendees who have varying levels of technical knowledge, and will easily adjust our approach during the session if needed. As a guide, we split our scenarios into three target categories:

Example scenarios

Lateral movement (semi-technical)

To begin with, we'll discuss attack lifecycles, Internet "background radiation", and the legal implications of penetration testing. Next we'll explain the scenario before showing delegates how to use some tools that they'll have available to them. After these introductions, teams will be given access to the lab to begin their explorations.

Teams take on the role of attackers that have infiltrated Blue Box Biscuits. Their goal is to deploy ransomware on a key server with ransomware, while also finding any sensitive information that could be used to extort the company.

This workshop is aimed at semi-technical delegates, and the lab has a mixture of operating systems and users.

Each finding in this scenario reflects something that's been found in the real world.