Many talk about Cyber Resilience. 
Here, you’ll master the real thing.

The Cyber Resilience Academy equips beginners and experienced professionals with the critical skills to defend against advanced cyber threats and ensure business continuity. Tailored for individuals across diverse fields, our training sharpens your ability to design, deploy and test a complete cyber resilience program.

Business package available

Ask us about our enterprise plans (5 or 10 users), designed to accelerate the practical implementation of cyber resilience programs for enterprises or equip consulting firms with the Cyber Resilience Capability Maturity Model (CR-CMM) to create unique value for their clients.
Who is this program for

Leadership
 
  • Chief Information Security Officers (CISOs): Senior-level executives responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets are adequately protected. 

Defensible Enterprise Security Architecture 
  • Security Architects: Professionals who design secure network and information architectures based on organizational security policies and objectives. 
  • Systems Engineers: Engineers focused on integrating security into the planning and deployment of systems and networks. 
Business Continuity, Disaster Recovery, Backup and Storage, Crisis Management 
  • Business Continuity Planners: Individuals who develop strategies to ensure operational processes continue during and after a disaster. 
  • Backup and Storage Specialists: Professionals who manage and optimize data backup solutions to ensure secure, reliable data storage and recovery.
  • Disaster Recovery Specialists: Professionals who plan and implement recovery processes when disruptions occur. 
  • Crisis Managers: Experts in leading organizational response to crises in a way that minimizes damage and reduces recovery time and costs 
Cybersecurity Threat Management & Incident Response 
  • Security Analysts/Incident Responders: Individuals who monitor and respond to security threats, managing incidents from identification through resolution. 
  • Threat Intelligence Analysts: Professionals specializing in gathering and analyzing intelligence about existing and emerging threats. 
  • Digital Forensics Experts: Experts in investigating and analyzing breaches and other cyber incidents to determine the cause and impact. 
  • Offensive Security Professionals/Penetration Testers: Specialists who use an attacker-like approach to help improve system defenses. 

Cyber Resilience Teams
  • We provide as well tailored cyber resilience workshops for teams, hosted on-site: proven to be an excellent alternative for organizing offsite integration or strategy meetings laser-focused on actionable deliverables.
Security Frameworks, Controls, Risk & Compliance 
  • Compliance Officers/Auditors: Personnel responsible for ensuring policies and procedures comply with regulatory and ethical standards. 
  • Risk Managers/Analysts: Professionals who identify potential risks that could affect an organization's capital and earnings. 
  • Governance and Compliance Consultants: Advisors who help organizations align their IT and business practices with legal and regulatory requirements. 
  • Third Party Risk Managers: Specialists in managing risks associated with outsourcing to service providers and other third parties. 

"Very valuable workshop, showing different approaches practically. The presenter pointed out many examples and reference documents on the topic. The workshop caught my interest and inspired me to learn more at future trainings!"

— Information Security Compliance Manager, Freelancer Consultant

Learn from who's been there, done that

Join a class with Francesco Chiarini, an award-winning speaker and global leader in cyber resilience, 
as he shares nearly 20 years of expertise throughout the program.
Search