Mastering Cyber Threat Identification
and Defense Strategies

September 12th & 19th, 2023 | 10:00 AM – 2:30 PM EST | Online

Training Overview

Mastering Tactics, Techniques, and Procedures (TTP’s) 

In today’s digital landscape, cyber risks have become a top concern for the public sector, with increased potential for sabotage. It is of utmost importance to develop a comprehensive understanding of the tactics, techniques, and procedures (TTPs) employed to effectively defend against these evolving threats

Mastering Cyber Threat Identification in the Public Sector has been designed to give public sector cyber professionals the practical advice and tools necessary to recognize and effectively neutralize cyber risks. This curriculum is comprised of six highly-intensive modules designed specifically for public sector employees to help them identify and mitigate cyber threats.  

Who Should Attend

This training course is designed for employees of public sector organizations, including government agencies and critical infrastructure providers, who are responsible for cybersecurity and risk management including:  

Cybersecurity Analysts, Operations and Risk Leaders

IT and Data Team Leads

Policy and Compliance Officers

Learning Outcomes

Gain knowledge and skills to identify and mitigate cyber threats in your organization 

Learn about the latest tactics, techniques, and procedures used by cyber attackers 

Better equipped to handle incident response planning for cyber attacks  

Safeguard critical infrastructure and sensitive data  

Engage in hands-on exercises and case studies to reinforce learning  

Meet Your Facilitator


TOM BIGOS, CISSP
Certified Information
Systems Security Professional

Tom is a seasoned Cyber Security veteran with over 13 years of experience in the field and more than 20 years of experience in Information Technology. Throughout his career, Tom has worked with a diverse range of clients, including law enforcement, water and power utilities, local government, manufacturing, law firms, and other businesses in both Canada and the USA. His extensive knowledge stems from hands-on, in-the-field penetration engagements and testing, giving him a unique view into the world of Cyber Security from both an attacker and defender perspective.

In addition to his professional work, Tom is passionate about education and enjoys sharing his expertise with others. He has taught students, clients, and organizations how to detect, defend, and self-attack their infrastructure to better understand the methods used by threat actors in exploiting vulnerabilities. Most recently, Tom served as the primary instructor for a 13-week college-level course, where he trained the next generation of penetration testers and ethical hackers. With his unique educational approach and experience, Tom is sure to captivate and enlighten audiences at any speaking engagement.

Session Overview

Module 1 and 2Module 3 and 4Module 5 and 6

Introduction to Cyber Threats and TTPs

  • Overview of common cyber threats faced by the public sector
  • Introduction to TTPs and their importance in identifying and mitigating cyber threats
  • Examples of recent cyber attacks on public sector organizations

Understanding Attack Vectors and Techniques

  • Overview of common attack vectors used by cybercriminals  
  • Analysis of common attack techniques such as phishing, social engineering, and malware attacks  
  • Case studies of successful cyber attacks on public sector organizations 

Mastering Threat Intelligence Analysis for Cybersecurity  

  • Understanding the importance of threat intelligence in identifying and mitigating cyber threats  
  • Gathering and analyzing threat intelligence data  
  • Techniques for monitoring threat intelligence sources and identifying potential threats

Effective Incident Response Planning

  • Importance of having an incident response plan in place  
  • Developing an incident response plan specific to the public sector organization  
  • Conducting regular incident response training and testing 

Mastering Cybersecurity Best Practices  

  • Overview of cybersecurity best practices for the public sector  
  • Developing strong passwords and implementing multi-factor authentication  
  • Recognizing and reporting phishing attempts  
  • Protecting sensitive data and maintaining data privacy

Anticipating Emerging Threats and Future Trends in Cybersecurity

  • Analysis of emerging cyber threats facing the public sector  
  • Understanding of the future trends in cyber threats and TTPs  
  • Strategies for staying up-to-date and continuously improving cybersecurity measures.  

Pricing

Extra Early Bird
Register by June 30th

$595 USD
(Save $300)

per person + tax

Early Bird
Register by July 31st

$750 USD
(Save $145)

per person + tax

Regular Price Bird
Opens August 1st

$895 USD

per person + tax

Additional discounts are available for group registrations of 10 or more.
For group discount inquiries, payment inquiries or custom training solutions please contact [email protected]

* Registration for this training is exclusively for professionals currently working within the Public Sector.

Customized in-house options available for teams

Interested in any of our online trainings?

You can also choose to have them delivered in house. We will work closely with our inspiring session facilitators to tailor the content around the key development areas your team are prioritising, shape the learning outcomes around your core departmental challenges and make the most of your L&D and upskilling budget.

Enquire Here for More Information!

Interested In Learning More?

The Corporate and Shared Services Community provides a hub for public sector professionals from around the globe to learn, network, collaborate, benchmark, and share best practices with their peers. Become a member today for free and gain access to:

  • Live chats and digital forums
  • Global content library
  • Priority event registration
  • Networking opportunities with peers
  • Complimentary access to exclusive events and insights
Become A Member Today!