Getzem Secure

Etudes de cas

Open Spaces in Business A large French company was robbed of millions of euros through a simple but devilishly effective scam. This module will teach you to recognize and counteract CEO fraud. This training aims to raise participants’ awareness of the importance of security and confidentiality in open spaces in companies. The educational objectives include …

Open Spaces in Business Lire la suite »

Digital Devices and Clean Desks We are late in the evening, in the offices of a large French company. An employee surprises one of his colleagues working at a workstation that is not hers. What could possibly be going on? This training is designed to raise participants’ awareness of espionage risks and the importance of …

Digital Devices and Clean Desks Lire la suite »

Navigation and Usage in the Workplace At the end of this training, you will have a better understanding of cybercrime. You will exercise more vigilance when browsing the Internet. You will have acquired the right reflexes to protect your data and that of your company. The educational objectives include understanding common computer risks, learning best …

 Navigation and Usage in the Workplace Lire la suite »

Email This case study will tell you how a simple email was able to knock out an entire television network. It will make you aware of the risks that phishing poses to your company and yourself. This training aims to educate participants on the secure use of messaging in a professional context. The educational objectives …

Email Lire la suite »

Social Network Did you know that you can lose your job because of a blunder on the Internet? This case study will explain how, so that it doesn’t happen to you. The educational objectives include understanding the risks associated with the use of social networks, learning best practices to protect personal and professional information online, …

Social Network Lire la suite »

Discretion On the Move Walls have ears, but so do bars, airports, trains, and passersby. This case study will explain how a lawyer almost ended up in jail for insider trading, without even knowing why. This training aims to educate participants about the importance of discretion during their business travels. The educational objectives include understanding …

Discretion On the Move Lire la suite »

Devices and Networks This training aims to educate participants on the protection of sensitive tools and documents. The educational objectives include understanding the issues related to information security, learning adequate practices to secure important tools and documents, as well as identifying potential risks. Participants will acquire essential skills to maintain the confidentiality, integrity, and availability …

Devices and Networks Lire la suite »

Protecting sensitive documents and devices This training aims to educate participants on the protection of sensitive tools and documents. The educational objectives include understanding the issues related to information security, learning adequate practices to secure important tools and documents, as well as identifying potential risks. Participants will acquire essential skills to maintain the confidentiality, integrity, …

Protecting sensitive documents and devices Lire la suite »

Computer Intrusion Prevention   The intrusion prevention training is designed to help participants understand and counter the various intrusion techniques used by cybercriminals. Participants will learn how intrusion and intrusion prevention systems work, how they are deployed and used to detect and prevent potential threats. This training is focused on learning by action, with real-time …

Computer Intrusion Prevention  Lire la suite »

Formation à la Prévention des Intrusions La formation en prévention des intrusions est conçue pour aider les participants à comprendre et à contrer les diverses techniques d’intrusion utilisées par les cybercriminels.  Les participants apprendront comment les systèmes d’intrusion et de prévention des intrusions fonctionnent, comment ils sont déployés et utilisés pour détecter et prévenir les menaces …

Prévention des intrusions Lire la suite »