Spend one on one time with our Cybersecurity experts who can communicate without cryptic jargon and unexplained acronyms.
Sessions are available on-site or online
"The [Cyber Conversations Workshop] was the first time I understood what my investments in Cybersecurity are buying."
- John F, Retail CEO
Eastern Time
*** SOLD OUT ***
If you’re concerned about spending a fortune on Information Security (Infosec) without any idea what your organization is pa...
Eastern Time
Eastern Time
*** SOLD OUT ***
Learn how to have a productive conversation with your Cybersecurity leaders. Speak in their terms and understand how they ar...
Eastern Time
Eastern Time
If you’re concerned about spending a fortune on Information Security (Infosec) without any idea what your organization is paying for, this w...
Eastern Time
This course provides a complete overview of Cybersecurity -- simplified
Course outline:
- Introduction to Cybersecurity
- The 3 Core Cyber Disciplines
Prevention Detection Response
- Protecting IT Assets
Identity Workstations Network Servers
- Solutions Primer
- Conversations with Cybersecurity Leaders
Cyber Defense Review
Breach Post-Mortem
This course provides an overview of Cybersecurity -- simplified
Course outline:
- The 3 Core Cyber Disciplines
Prevention Detection Response
- Protecting IT Assets
Identity Workstations Network Servers
- Solutions Primer- Conversations with Cybersecurity Leaders
Cyber Defense Review Breach Post-Mortem
Learn simple talking points and questions to make your next conversation with an Infosec leader productive and informative
Course outline:
- The 3 Core Cyber Disciplines
Prevention Detection Response
- Protecting IT Assets (Summarized)
Identity Workstations Network Servers
- Conversations with Cybersecurity Leaders
Cyber Defense Review Breach Post-Mortem
Copyright © 2021 FieldStar Group - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.