top of page
Metis defense vision.jpg

AWARENESS & THREAT TRAINING

CRUCIAL. REQUIRED. EFFECTIVE.

An awareness and training program is crucial in that it is the vehicle for disseminating information that users, including managers, need in order to do their jobs. In the case of an IT security program, it is the vehicle to be used to communicate security requirements across the enterprise. An effective IT security awareness and training program explains proper rules of behavior for the use of agency IT systems and information.

With cybercrime continuing to increase every year Security Awareness and Threat Training is a critical component of an organization’s cybersecurity strategy. Encompassing various tools and techniques used to inform and equip employees with the knowledge of security risks and how to avoid them. Educating employees allows an understanding of the cyber-risks your business faces every day, the impact they have on your business and their roles and responsibilities in protecting the safety and security of digital assets. Well-educated and trained employees can quickly identify social engineering threats and potential digital vulnerabilities, which can significantly reduce the risk of cybersecurity incidents and help prevent data breaches. Security awareness and threat training not only helps stop threat actors, but also promotes an organizational culture that is focused on data security and cyber-risk mitigation.

security awarness training metis defense.jpg

SECURITY AWARENESS TRAINING PROGRAMS

SECURITY AWARENESS

PROGRAM

The program communicates IT security policies and procedures that need to be followed. This must precede and lay the basis for any sanctions imposed due to noncompliance. Users first should be informed of the expectations. Accountability must be derived from a fully informed, well-trained, and aware workforce.  With Metis Defense, we develop industry leading awareness & threat training programs for organizations all throughout North America.

INSIDER THREAT

PROGRAMS

Years have passed since Executive Order (E.O.) 13587 required executive branch departments and agencies (D/As) with access to classified information to implement an insider threat detection and prevention program. Since then, the executive branch has made considerable progress in meeting that goal. The White House Memorandum on National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs (hereinafter “Policy & Standards”) laid out the twenty-six minimum standards that D/As are required to meet. With Metis Defense, we develop industry leading insider threat programs for organizations all throughout North America.

WORKFORCE DEVELOPMENT PROGRAMS

Workforce development is the overall method of increasing employees’ skills to benefit employees, businesses, the community, and their own career paths.  Individuals participating in workforce development can set themselves up for career success by finding areas where they can grow. Workforce development looks different at every company, but the program should tailor to individuals’ needs and interests.

DEVELOPER TRAINING PROGRAMS

In today’s ever-growing world of information technology, software is being developed and pushed out at a record pace.  From the billions of Internet of Things (IoT) devices to internally developed software systems - and so much more - the need for high-quality, well-educated software developers has never been great. With Metis Defense, we offer customized developer training solutions for helping organizations ensure their internal - and external, contracted - developers are up to the challenge in producing the very best code.

TABLE TOP EXERCISES

Supply Chain Risk Management is a systematic process for managing supply chain risk by identifying susceptibilities, vulnerabilities, and threats throughout the supply chain and developing mitigation strategies to combat those threats whether presented by the supplier, the supplies product and its subcomponents, or the supply chain (e.g., initial production, packaging, handling, storage, transport, mission operation, and disposal).

TECHNICAL SURVEILLANCE COUNTERMEASURES PROGRAMS

Technical Surveillance Countermeasures (TSCM) are the techniques to detect, neutralize, and exploit technical surveillance technologies and hazards that permit the unauthorized access to or removal of information.

SOFTWARE DEVELOPER TRAINING PROGRAMS

Training developers on critical software development measures is a must in today’s world of growing cybersecurity threats.  Metis Defense has years of experience developing highly customized software developer training programs for organizations of all sizes.

digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-d

TRUSTED

Trusted Advisors to both Federal Agencies and Federal Contractors

closeup-macro-shot-circuit-cyberspace-board-with-computer-motherboard-component-microchip-

RESPECTED

Well-known and Respected Throughout the Federal Agency Apparatus

digital-cyberspace-with-particles-digital-data-network-connections-high-speed-connection-d

UNIQUE

A Unique Combination of Knowledge, Expertise, and Capable Manpower

Jumping Off the Plane

CONTACT METIS DEFENSE TODAY FOR A CONSULTATION

bottom of page