Information Safety Training

Office Security Assessment

  • Timed Security Challenge: You have limited time to identify and address all information security violations within a realistic office environment.
  • Security Violations: The office contains multiple security risks that must be identified:
    • Unattended computers with unlocked screens
    • Unsecured devices and exposed credentials
    • Social engineering attempts and data exposure
    • Physical security breaches and unauthorized access
    • And other critical information security violations

Assessment Method

  • Detection and Response: Systematically identify and address security violations:
    • Visual Inspection: Scan the environment to identify security violations.
    • Direct Action: Take immediate action to secure devices and address security breaches.

Performance Results

  • Critical Assessment: Your performance is evaluated on a pass/fail basis:
    • Successfully Addressed: Security risks that were properly identified and resolved.
    • Missed Violations: Any unaddressed security violations result in training failure.

Contact Us