Information Security & Cyber Security Workshop
Information Security & Cyber Security Workshop
Introduction
In today’s increasingly connected world, safeguarding sensitive information and securing IT infrastructure from cyber threats is a top priority for organizations. This workshop provides participants with an in-depth understanding of how to protect organizations from the growing risks of cyber-attacks. Focusing on core information security techniques and controls, the session equips participants with practical tools and strategies to address current cyber threats and enhance organizational security. Participants will also learn about industry-standard security terminology, compliance requirements, and gain hands-on experience in mitigating vulnerabilities and securing systems.
By the end of the workshop, attendees will possess the knowledge and skills necessary to address the challenges of designing secure systems and protecting organizations from cyber threats effectively.
Workshop Objectives
Upon completion of this workshop, participants will be able to:
- Identify and understand the various cybersecurity threats and vulnerabilities faced by organizations.
- Apply key information security techniques and controls to safeguard organizational assets.
- Understand the principles of an Information Security Management System (ISMS) and its application in protecting organizational data.
- Implement data protection strategies and explore methods for securing sensitive information.
- Recognize and address social engineering attacks, understanding common tactics and preventive measures.
- Evaluate software vulnerabilities and implement security solutions to reduce exploitation risks.
- Understand physical security controls and how they integrate with IT security for a holistic defense approach.
Workshop Outline
Day 1: Fundamentals of Cybersecurity
- Overview of core security principles: confidentiality, integrity, and availability (CIA).
- Importance of establishing security baselines and addressing human-related vulnerabilities.
- Exploration of various cyber threats and their potential organizational impact.
- Introduction to hacking techniques, risk management practices, and the protection of data in transit and at rest.
- Techniques for network discovery, including scanning, footprinting, and identifying system vulnerabilities.
Day 2: Designing Secure Architectures
- Understanding the critical components of security architecture and their role in protecting networks.
- Exploration of network devices, segmentation strategies, and network address translation (NAT).
- The significance of network access control (NAC) in enhancing organizational security.
- Basics of cryptography, managing data permissions, and techniques such as steganography for securing information.
Day 3: Identity Management & Network Hardening
- Introduction to identity management systems and various authentication methods.
- Best practices for implementing password policies, using password managers, and managing federated identities.
- Network hardening techniques: limiting remote administrative access and securing devices.
- Key strategies for traffic filtering, optimizing network devices, and improving overall network security.
Day 4: Software & Physical Security
- Understanding common software vulnerabilities and implementing security guidelines within software engineering processes.
- The value of environmental monitoring, logging, and metrics for detecting and mitigating vulnerabilities.
- Principles of physical security: defense in depth, types of physical security controls, and tracking critical equipment.
- Review of policies to protect human resources and physical assets from security risks.
Day 5: Incident Response & Emerging Cybersecurity Trends
- Developing and implementing effective incident response strategies for cyber-attacks and other disasters.
- Understanding the fundamentals of business continuity and disaster recovery planning.
- Exploration of current trends in cybersecurity, industry standards, and emerging cyber threats.
- The importance of ongoing cybersecurity training and awareness to stay ahead of evolving threats.
Conclusion
This workshop offers participants a comprehensive exploration of information security and cybersecurity principles, equipping them with the essential skills and knowledge needed to protect organizational data and IT infrastructure. By combining theoretical insights with practical, hands-on exercises, participants will leave with a robust understanding of how to manage and respond to cyber threats. The skills gained will enable attendees to design more resilient, secure systems, implement effective information security programs, and contribute to a stronger cybersecurity posture within their organizations.
| starting date | ending date | duration | place |
|---|---|---|---|
| 26 July, 2026 | 30 July, 2026 | 5 days | İstanbul |

