Christian Martorella, Vicente Diaz
Christian Martorella has been working in the field of information security for the last 17 years. He is currently working as Head of Product Security for Skyscanner. He has also worked as Principal Program Manager in the Skype Product Security team at Microsoft, and Practice Lead of Threat and Vulnerability for Verizon Business, where he led a team of consultants delivering security testing services in EMEA for a wide range of industries, including financial services, telecommunications, utilities and government. Christian has been exposed to a wide array of technologies and industries, giving him the opportunity to work in most areas of IT security and gain experience from both sides of the fence. All this provides him with a unique set of cybersecurity skills and insights.
About the training
The world is changing. The line between the physical and digital worlds has blurred, with most activities by companies and individuals occurring online. Technology is progressing, but users are not adapting to a new world in which cyberthreats and risks grow exponentially.
A lack of understanding of operational security (OPSEC) and proper practice is exploited by attackers of all kinds on a daily basis, allowing them to abuse companies and individuals in a variety of different ways. C-level executives are particularly vulnerable as their roles make them one of the most common targets. This is not only a problem for their employers – it also affects their personal life.
Awareness is the first step to mitigation, and should be followed up by a clear set of measures from both the company and the individual. However, OPSEC goes beyond the professional environment and the implementation of healthy practices to mitigate any potential problems.
This training course provides the necessary awareness based on real-life examples with a realistic action plan to minimize exposure to current and future attacks by advanced adversaries.
• Learn the relevance of OPSEC
• Implement practical measures based on your needs
• Technical tools and mitigations
• Real-world scenarios: what to do
• Physical security and course of action
Duration: 2 days