Workshop: Cybersecurity in one Day

This is one of our most popular workshops for companies of all sizes and industries: Cybersecurity in one day provides fundamental knowledge and insights on how to build, extend and operate a modern Zero Trust infrastructure which is resilient to attacks experienced by many organizations today. This workshop explains not only the most important principles of up-to-date IT security but gives a clear picture of the components and services involved. At the end of this training, your organization will have applicable guidance on how to improve their cybersecurity posture efficiently and quickly. This is a workshop where we look at demo environments more than presentation slides to get the touch and feel of cybersecurity applied in practice.

The schedule of the workshop includes topics like:

  • The clean source principle and its application in real world sceanrios. We discuss how to secure privileged access to workloads and data to both on-premises and cloud assets. We learn why it is important to keep administrative and other privileged accounts safe beyond what is done in most organizations today.
  • Zero Trust principles and application. This again is a demo-driven learning module based on real world experiences and applications. We discuss what Zero Trust really means (and what it does not), and we look at existing frameworks and services which help companies to become Zero Trust environments rapidly. We investigate both proactive and reactive measures available to raise the bars for attackers and to isolate attacks at the edge of our infrastructure (hint: a firewall is by far not enough to defend against modern attacks).
  • Cybersecurity architectures. We look at reference architectures helping you to understand how the different services and products fall into place, how they connect and interact with each other. This is your hollistic view on cybersecurity. Together, we create a prioritized plan on how to move forward to a well-defined target state for cybersecurity capabilities in your cloud or hybrid environment.
  • Monitoring and Security Operations Center (SOC). A SOC is a centralized function or team responsible for improving an organization’s cybersecurity posture and preventing, detecting, and responding to threats. The SOC team monitors identities, endpoints, servers, databases, network applications, websites, and other systems to uncover potential cyberattacks in real time. We look at cloud-based tools and services available to build and operate a modern SOC and discuss organizational changes which might be required for success.

 

Are you interested in this workshop? Just send a note to info@bitline.ch, and we will reach out to you.