Managed Services

Security Awareness Training

SY Consulting Round

We believe that your data and assets’ safety should not be an afterthought, which is why we have the best “hacker for hire” in the business—Jayson E. Street.

Jayson is a globally recognized cybersecurity expert. He has received numerous accolades, such as being named one of Time Magazine’s “Persons of the Year” in 2006, and earned various monikers from media outlets, including “Notorious Hacker” and “World Class Hacker.” As Secure Yeti’s Chief Adversarial Officer, Jayson is available to conduct training classes or test your current security protocols.

Cybersecurity Awareness Training Courses

In-Depth Employee Cybersecurity Training Services

Duration: 2 Days

Audience: Pentesters and Security Teams

Delivery: In-Person or Virtually

Discover a new approach to cybersecurity training with Jayson’s innovative methodology that places the human factor at the forefront of defense.

Key Features:

  • Real-World Threat Simulations: Unlike traditional penetration testing, our training methodology focuses on simulating real-world threats without compromising your security. We employ non-intrusive demonstrations to educate your staff effectively.
  • Human Factor Emphasis: Our program goes beyond standard hacking techniques to recognize the most significant threat—human behavior. 
  • Hands-On Simulations: Our courses offer practical learning experiences, including hands-on simulations of Social Engineering and Physical Compromise attacks, empowering your team with valuable skills.

Why Choose This Training?

  • Proactive Defense: Equip your employees with the knowledge and skills to proactively defend against everyday threats.
  • Unique Approach: Our methodology stands out from typical cybersecurity courses, providing a distinct and effective learning experience.
  • Real-World Preparedness: Prepare your team for the ever-evolving threat landscape by focusing on the human element of security.

Duration: 2 Days

Audience: Everyone

Delivery: In-Person or Virtually

Empower your employees to become the first line of defense against social engineering threats with our comprehensive training program.

Key Features:

  • “Think Like an Attacker” Approach: Equip your team with the mindset to anticipate and thwart social engineering threats, enhancing your organization’s security posture.
  • Operational Security (OPSEC): Learn the strategies and tactics necessary for robust defense against a wide range of attacks.
  • Fresh Perspective on Defense: Through hands-on activities like profiling online presences and simulated attacks, gain a deeper understanding of how to detect and prevent social engineering events.
  • Emphasizing Education and Awareness: Recognize the importance of educating others and raising awareness about potential dangers within your organization.
  • Practical Tools: Receive a take-home Hak5 Field Kit and leverage current Red Team strategies, providing you with practical tools and skills to defend against malicious social engineering attacks.

Why Choose This Training?

  • Empower Your Workforce: Your employees are your biggest asset; empower them to protect your organization effectively.
  • Proactive Threat Mitigation: Stay ahead of evolving threats with a proactive approach to social engineering defense.
  • Hands-On Learning: Gain practical skills and a fresh perspective on security through interactive activities.
  • Comprehensive Awareness: Educate your team about the critical role they play in safeguarding your organization.

Duration: 2 Days

Audience: Everyone

Delivery: In-Person or Virtually

Enhance your organization’s incident response program by addressing the often-neglected aspect of social engineering incidents with our specialized training.

Key Features:

  • Human-Centric Approach: Emphasizing the importance of special care, situational awareness, and understanding human nature, we equip your employees to respond effectively to social engineering attacks, including suspicious calls and physical intrusions.
  • Conflict Avoidance and De-Escalation: Employees will learn to avoid dangerous confrontations, employ de-escalation techniques during encounters with possible intruders, and prevent further intrusions.
  • Comprehensive SE Incident Guidance: Our course provides a step-by-step roadmap for incident responders, covering validation, protection, detection, response, and recovery from social engineering (SE) events, bolstering your incident response plan to encompass both network and human-focused threats.

Why Choose This Training?

  • Filling the Gap: Most incident response programs excel at handling network attacks but often overlook social engineering incidents. Our training bridges this gap.
  • Holistic Defense: Prepare your organization to respond comprehensively to social engineering threats, enhancing your overall incident response plan.
  • Human-Centric Security: Recognize the importance of addressing human vulnerabilities in your incident response strategy.
  • Conflict Resolution Skills: Equip your team with the tools to manage potential conflicts during security incidents.
  • Prevent Future Intrusions: Learn proactive measures to reduce the risk of future social engineering attacks.

Personalized Internal Security Awareness Courses

Duration: 1–4 Hours (Depending on Customized Needs)

Audience: Everyone

Delivery: In-Person 

Jayson is available for speaking opportunities for groups, organizations, and company events to create teachable moments that lead to better security awareness. 

Security Awareness training engagements are uniquely tailored to each client and available for any size corporation or enterprise. Through an engaging, entertaining, and educational presentation, employees will—

  • Learn the dangers of social media and how innocent posts on a personal account could lead to the compromise of their employers. 
  • Learn the mindset of an attacker as they plan, execute, and succeed at compromising their targeted company. 
  • Understand the dangers posed by online activities. 
  • Receive tools and information on how to make themselves and their employers more secure.
  • Understand the importance of good security awareness and the means of achieving that in their enterprise.

Workforce Security Assessment

Duration: Multiple Days

Audience: Everyone

Delivery: In-Person 

Jayson will discover security vulnerabilities within your company from the inside out. View this video to see how he does it.

What to Expect:

  • Scoping Meeting: He begins with a scoping meeting to understand your organization's security needs and goals to tailor the engagement to your specific environment.
  • On-Site Intrusion Simulation: Jayson leverages social engineering techniques and specialized devices to simulate a real-world intrusion attempt, bypassing established procedures. This immersive experience provides valuable insights into your security measures.
  • Teaching Moment, Not an Audit: Rather than an audit, this engagement serves as a positive teaching moment, emphasizing practical improvements to enhance your organization's security posture.

Why Choose This Assessment?

  • Uncover Hidden Vulnerabilities: Identify weaknesses that rarely (if ever!) surface through traditional security audits.
  • Real-World Insights: Gain eye-opening insights into your security measures through simulated, real-world scenarios.
  • Empower Your Team: Equip your staff with knowledge and practical skills to proactively address security challenges.

Turn your security vulnerabilities into opportunities for growth.

Contact us to schedule your training or Workforce Security Assessment today.