Skip to content
All Career Paths
About Us
Partners
Become an instructor
Become a partner
Log In
Sign up
Contact
Menu
All Career Paths
About Us
Partners
Become an instructor
Become a partner
Log In
Sign up
Contact
Purple Hackademy
Acting CISO Registration Success
Welcome to Purple Hackademy!
Start learning
CISOs: prevent risks by applying Quick Wins
"
*
" indicates required fields
Step
1
of
3
33%
What are the top 3 risks your company expects to mitigate ?
*
Service disruptions
Denial of service (DDoS), top 10 OWASP attacks that can make the service unavailable
Data and Data privacy breaches
Suspicious network activity, files and assets exfiltration
Data integrity
Malicious modification of data prevented by monitoring and continuous auditing
Identity theft and spoofing
Phishing targeting employees or customers
Ransomware
Malicious encryption of data with ransom demand
Misconfiguration
Accidental exposures due to insecure databases or cloud open storage buckets
Security flaws in the code
Vulnerabilities not detected during development or deployment
Privileged access
Abuse or misuse of access rights by employees or third parties
Third-party risks
Security breaches by suppliers or partners
Regulatory non-compliance
Fines for non-compliance with data protection regulations (GDPR, SEC, HIPAA...)
Company Reputation
Loss of customer confidence following a security incident
Unexpected costs
Cloud computing resource stolen by hackers, Costs associated with remediation after a cyber attack
Economic espionage
Theft of source code or commercial data
Telecommuting risks
Unsecured access to company resources from remote locations
Other
Most important Quick Wins your team needs to learn
*
Security Deployments
Free solutions for detecting phishing, professional email leakages, hardening databases, backup & restore...
Risk Management
Audit the company, Detect cloud misconfigurations, Handle with incident scenario, Categorize threats and measure impact
Compliance and Governance
Identify duties from regulations, Prepare an Incident response plan
Awareness and Training
Prevent the employees dangerous behavior impacting IT
Cyber Vendor Management
Best practices to outsource an infosec vendor
Quick Wins - Security deployments
Deploy a free internal phishing campaign solution
Detect secrets in your code before they reach production
Develop a Robust Data Backup and Recovery Plan
Reinforce Database Security
Scan your application to detect source code vulnerabilities
Search exposed collaborators email addresses publicly
Quick Wins - Risk management
Harden access control on Cloud infrastructure
Identify threats in security logs
Prepare a malware or ransomware incident playbook
Self-auditing your company
Quick Wins - Compliance & Governance
Be aware of the local regulations requirements
Prepare a cyber incident response plan
Quick Wins - Awareness and Training
Prevent the employees dangerous behavior impacting IT
Enhance decision-making in the aftermath of an incident
Quick Wins - Cyber Vendor Management
Best practices to outsource an infosec vendor
Drive cybersecurity vendors
Hidden
Most important Quick Wins your team needs to learn 2
*
Self-auditing your company
Deploy a free internal phishing campaign solution
Search exposed collaborators email adresses publicly
Reinforce Database Security
Prepare a malware or ransomware incident playbook
Harden access control on Cloud infrastructure
Be aware of the local regulations requirements
Prepare and conduct an Incident response plan
Identify threats in security logs
Drive cyber security vendors
Other
Provide your details to receive your customized cyber training program
Name
First Name
Last Name
Email
*
Position
CEO, CIO, CFO ...
SVP, VP, Director, Department Head
Non Tech Manager
Infosec Generalist
Architect
Analyst
Engineer
Developer
IT Admin
Non Tech Professional
Company size
0 - 50
50 - 250
250 - 1000
above 1000
Any comment you would like to add
×