{"id":788,"date":"2022-10-13T03:44:24","date_gmt":"2022-10-13T03:44:24","guid":{"rendered":"https:\/\/rwts.com.au\/cybersecurity\/?page_id=788"},"modified":"2022-10-13T03:44:24","modified_gmt":"2022-10-13T03:44:24","slug":"cyber-security-training-for-boards","status":"publish","type":"page","link":"https:\/\/rwts.com.au\/cybersecurity\/cyber-security-training-for-boards\/","title":{"rendered":"Cyber Security Training for Boards"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p>Cyber security is a primary business risk that demands a comprehensive Board and Executive focus.<\/p>\n\n\n\n<p>To ensure that businesses continue to grow sustainably, Boards and Directors must be able to understand and address cyber challenges, opportunities and risks.<\/p>\n\n\n\n<p>Our Board and executive training will educate your board and executive about your organisation&#8217;s real and immediate cyber security risks.<\/p>\n\n\n\n<p>The training sessions are interactive sessions using real-life case studies to help your board understand cyber risks in your environment, and explore how an organisation would respond to a cyber security attack.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/jason-goodman-Oalh2MojUuk-unsplash-1024x683.jpg\" alt=\"Training Room\" class=\"wp-image-790\" width=\"512\" height=\"342\" srcset=\"https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/jason-goodman-Oalh2MojUuk-unsplash-1024x683.jpg 1024w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/jason-goodman-Oalh2MojUuk-unsplash-300x200.jpg 300w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/jason-goodman-Oalh2MojUuk-unsplash-768x512.jpg 768w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/jason-goodman-Oalh2MojUuk-unsplash-1536x1024.jpg 1536w, https:\/\/rwts.com.au\/cybersecurity\/wp-content\/uploads\/2022\/10\/jason-goodman-Oalh2MojUuk-unsplash-2048x1365.jpg 2048w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><strong>Benefits<\/strong><\/h2>\n\n\n\n<p>A greater understanding of the organisational risks of a cyber attack<\/p>\n\n\n\n<p>Understanding of the board\u2019s readiness to respond to a cyber attack<\/p>\n\n\n\n<p>Action items for improving the organisation\u2019s cyber readiness<\/p>\n\n\n\n<p>Guidance on a board\u2019s responsibility regarding cyber security<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><strong>Delivery<\/strong><\/h2>\n\n\n\n<p>Board training session are 1 hour, 3 hour or 5 hours depending on the scope and content explored<\/p>\n\n\n\n<p>Training can be delivered in-person or via Zoom<\/p>\n\n\n\n<p>Slides, course-notes and resources are provided<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><strong>Costs<\/strong><\/h2>\n\n\n\n<p>Board Training sessions start at $1200.<\/p>\n\n\n\n<p>Contact our team to discuss how we can tailor a training session for your organisation.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is a primary business risk that demands a comprehensive Board and Executive focus. To ensure that businesses continue to grow sustainably, Boards and Directors must be able to understand and address cyber challenges, opportunities and risks. Our Board and executive training will educate your board and executive about your organisation&#8217;s real and immediate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":790,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-788","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/comments?post=788"}],"version-history":[{"count":7,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/788\/revisions"}],"predecessor-version":[{"id":796,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/pages\/788\/revisions\/796"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/media\/790"}],"wp:attachment":[{"href":"https:\/\/rwts.com.au\/cybersecurity\/wp-json\/wp\/v2\/media?parent=788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}