{"id":4093,"date":"2023-12-07T20:17:06","date_gmt":"2023-12-07T20:17:06","guid":{"rendered":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/?page_id=4093"},"modified":"2025-03-20T17:13:54","modified_gmt":"2025-03-20T21:13:54","slug":"cybersecurity-training","status":"publish","type":"page","link":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/","title":{"rendered":"Cybersecurity training and awareness"},"content":{"rendered":"\n<div class=\"tbk-hydrate-component\" data-cid=\"d2880e74-5f11-4efb-ac98-3f368b2743ea\" data-component=\"Hero\"><section class=\"calian-hero d-flex h-100 position-relative overflow-hidden nav-indent wp-block-calian-com-components-calian-hero media-position-wallpaper overlay-themed breadcrumbs-hidden\"><div class=\"container\"><div class=\"row\"><div class=\"calian-hero__content d-flex col-lg flex-column pb-3 justify-content-center mx-auto h-100 text-center\"><div class=\"calian-hero__copy-wrapper\"><h1 class=\"calian-hero__heading text-white\">Cybersecurity training and awareness<\/h1><div class=\"calian-hero__text text-white mt-2 mb-4\">Cyber threats are among the biggest risks organizations face today, and they are becoming more and more sophisticated. Take a proactive approach to cybersecurity awareness and training by ensuring all employees are empowered to recognize and respond to cyberattacks.<\/div><a href=\"#contact-form\" class=\"btn btn-light mb-4 mt-3\">Learn more<\/a><\/div><\/div><div class=\"calian-hero__media col-md w-100 h-100 media-style-wallpaper position-absolute opacity-25 top-0 start-0 p-0\"><div class=\"media-wrapper ml-auto mr-0 w-100 h-100\"><div class=\"advanced-image w-100 h-100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg\" alt=\"\" width=\"1024\" height=\"618\" class=\"calian-hero__image\" \/><\/div><\/div><\/div><\/div><\/div><div class=\"calian-hero__overlay overlay-themed position-absolute w-100 h-100 top-0 start-0 has-image\"><\/div><span><\/span><\/section><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"5a27e9fb-754a-4b11-a7bd-e33a2e7b047f\" data-component=\"Spacer\"><div id=\"intro\" class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"f7f0e22d-f2d0-412a-9384-df9c3749df3e\" data-component=\"LocationIntroContent\"><div class=\"calian-location-intro-content wp-block-calian-com-components-calian-location-intro-content\"><div class=\"calian-location-intro-content__container container-fluid\"><div class=\"row\"><div class=\"calian-location-intro-content__top col-12\"><h2 class=\"calian-location-intro-content__heading\">Protect your organization with comprehensive cybersecurity training and awareness<\/h2><\/div><\/div><div class=\"row\"><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"df9180e5-fbd8-4cc7-a712-901a062210e0\" data-component=\"AlternatingTextAndImages\"><div class=\"calian-alternating-text-and-images overflow-hidden wp-block-calian-com-components-calian-alternating-text-and-images\"><div class=\"calian-alternating-text-and-images__container container-fluid\"><div class=\"\"><div class=\"row gx-md-6 justify-content-lg-start justify-content-lg-start mb-3 mb-md-9\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/iStock-1332176260-1024x608.jpg\" alt=\"\" width=\"1024\" height=\"608\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\" \/><\/div><div class=\"col-12 col-md\"><h3>Prevent downtime<\/h3><div class=\"calian-alternating-text-and-images__text mb-3\">With training and awareness programs, employees will become more familiar with organizational policies, cybersecurity principles and business protection\/restoration models to bolster compliance efforts.<\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><\/div><\/div><\/div><div class=\"row gx-md-6 flex-row-reverse justify-content-lg-between justify-content-lg-start mb-3 mb-md-9\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/iStock-1481370371-1024x576.jpg\" alt=\"\" width=\"1024\" height=\"576\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\" \/><\/div><div class=\"col-12 col-md\"><h3>Conduct phishing tests<\/h3><div class=\"calian-alternating-text-and-images__text mb-3\">By conducting mock drills, Calian boosts employees&#8217; cybersecurity awareness in a controlled environment, applying the best security practices to combat security threats.<\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><\/div><\/div><\/div><div class=\"row gx-md-6 justify-content-lg-start justify-content-lg-start\"><div class=\"col-12 col-md mb-3\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/iStock-1363276415-1024x576.jpg\" alt=\"\" width=\"1024\" height=\"576\" class=\"rounded-5 img-fluid w-100 h-250px h-md-373px object-fit-cover\" \/><\/div><div class=\"col-12 col-md\"><h3>Purple team exercises<\/h3><div class=\"calian-alternating-text-and-images__text mb-3\">Purple team exercises blend traditional red and blue team skill sets to test an organization&#8217;s cybersecurity strength. In these exercises, the blue team is exposed to an attack as it occurs. Both blue and red teams work together on:&nbsp;<\/p>\n<ul>\n  <li>Cyberthreat Intelligence&nbsp;<\/li>\n  <li>Emulating adversaries&nbsp;<\/li>\n  <li>Managed security services<\/li>\n<\/ul>\n<p>These exercises include:<\/p>\n<ul>\n  <li>Executing local endpoint security checks on a client\u2019s laptop.&nbsp;<\/li>\n  <li>Using the VPN to connect to the client\u2019s internal network to attempt lateral propagation.&nbsp;<\/li>\n  <li>Executing local endpoint security checks on the client\u2019s internal server.<\/li>\n<\/ul><\/div><div class=\"calian-alternating-text-and-images__ctas mb-3 d-flex flex-wrap gap-3\"><a href=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/www\/itcs\/brochures\/purple-team-exercise\/\" class=\"btn btn-primary\">Download the brochure<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"a82a98cc-fbd6-4205-849f-c208e7afea9e\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"babb098f-2ca4-4c80-b198-cc7244bbbf18\" data-component=\"LocationIntroContent\"><div class=\"calian-location-intro-content wp-block-calian-com-components-calian-location-intro-content\"><div class=\"calian-location-intro-content__container container-fluid\"><div class=\"row\"><div class=\"calian-location-intro-content__top col-12\"><h2 class=\"calian-location-intro-content__heading\">Steps<\/h2><p class=\"calian-location-intro-content__intro-text\">Purple team exercises encourage open discussion of attack techniques and defense expectations, improving people, processes and technology.<\/p><\/div><\/div><div class=\"row\"><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"607b6c1a-28dc-4ed9-b809-c524fb7abab0\" data-component=\"Process\"><div class=\"calian-process theme-light wp-block-calian-com-components-calian-process\"><div class=\"calian-process__container container-fluid mw-1440px py-3 py-lg-5\"><div class=\"calian-process__item-listing pb-lg-4\"><div class=\"glide carousel carousel--items-0 bg-transparent\" id=\"performance-component-f3421f62-971c-43fa-a9ad-53a404c2f7f6\"><div class=\"glide__track\" data-glide-el=\"track\"><ul class=\"glide__slides\"><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">The exercise coordinator oversees cyber threat intelligence. The red team presents the adversary, tactics, techniques and procedures (TTP), and technical details based on the outcome.<\/p><\/div><\/li><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">The participants discuss security controls and expectations for TTP during a kickoff meeting.<\/p><\/div><\/li><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">The red team emulates the attackers by launching multi-layered attacks and exploiting privileged access penetration testing simultaneously.<\/p><\/div><\/li><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\"> Analysts on the blue team (SOC, hunt team, and digital forensics and incident response) are trained on detecting and responding to TTP acts.<\/p><\/div><\/li><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">Once the TTP has been identified, a log has been received, or any forensic evidence has been obtained, results are documented and shared.<\/p><\/div><\/li><li class=\"glide__slide\"><div class=\"calian-process__item p-4 pt-lg-6 pb-lg-0 ps-lg-0 pe-lg-10\"><h2><\/h2><p class=\"mb-0 mb-lg-5\">Security controls are adjusted or tuned to increase visibility and repeat the TTP.<\/p><\/div><\/li><\/ul><\/div><div class=\"glide__arrows\" data-glide-el=\"controls\"><button class=&quot;btn btn-default glide__arrow glide__arrow--left&quot; data-glide-dir=&quot;<i class=\"icon icon-chevron-left\"><\/i><\/button><button class=\"btn btn-default glide__arrow glide__arrow--right\">&#8221; aria-label=&#8221;Next&#8221;><i class=\"icon icon-chevron-right\"><\/i><\/button><\/div><div class=\"glide__bullets\" data-glide-el=\"controls[nav]\"><\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"be72b880-b2e8-43a0-9d54-5b3f5dee1885\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"412b0e4d-aa78-4486-ae47-a8113171f10c\" data-component=\"CTABar\"><div class=\"calian-cta-bar theme-dark wp-block-calian-com-components-calian-cta-bar\"><div class=\"calian-cta-bar__container container-fluid\"><div class=\"calian-cta-bar__vertical container-fluid position-relative\"><div class=\"row\"><div class=\"calian-cta-bar__vertical--content col-12\"><h2 class=\"calian-cta-bar__vertical--heading\">Practice makes perfect with Cyber Range<\/h2><div class=\"calian-cta-bar__vertical--description\">Cyber Range is an experiential cybersecurity training platform that provides access to rich virtual environments and courses based on real-world attacks. Cybersecurity professionals and trainees can simulate, test and run cyberattack scenarios in a controlled setting. This virtual battleground enables them to practice defensive strategies, understand attacker tactics and stay ahead of the latest threats without risking real systems.<\/div><div class=\"calian-cta-bar__vertical--buttons\"><a href=\"#contact-form\" class=\"btn btn-light\">Book a demo<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"f7b55727-ae66-4d16-b15f-72f57dd920a1\" data-component=\"LogoBar\"><div><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Loading&#8230;<\/span><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"1f87c5e9-d881-4c21-b6ea-faa0009133c7\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"50b947ce-ff2c-4345-aeeb-6eaf564571b0\" data-component=\"ContactCTAHubSpot\"><div id=\"contact-form\" class=\"calian-contact-cta overflow-hidden position-relative default wp-block-calian-com-components-calian-contact-cta-hub-spot\"><div class=\"calian-contact-cta__overlay position-absolute z-2\"><\/div><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/iStock-1350722246-1024x576.jpeg\" alt=\"\" width=\"1024\" height=\"576\" class=\"calian-contact-cta__background-image position-absolute z-1\"\/><div class=\"calian-contact-cta__container mx-auto py-5 py-md-10 position-relative z-3\"><div class=\"d-flex\"><div class=\"calian-contact-cta__form mx-auto px-3\"><h2>Modernize and secure your IT infrastructure <\/h2><p>Speak to an expert to empower your organization&#8217;s success in the digital realm.<\/p><div class=\"hs-form__container\"><div class=\"hs-form__container-inner\"><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Loading&#8230;<\/span><\/div><\/div><div class=\"hs-form__target\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"855f714e-9b14-4e11-88c5-8a77442c6c40\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"ae73ab33-bc97-49e8-8cd7-38690b522221\" data-component=\"LogoBar\"><div><div class=\"d-flex justify-content-center p-1\"><div class=\"spinner-border text-primary \" role=\"status\" style=\"width:3rem;height:3rem\"><span class=\"visually-hidden\">Loading&#8230;<\/span><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"tbk-hydrate-component\" data-cid=\"11780b88-678d-4db3-acd1-fb8ac1659d6c\" data-component=\"Spacer\"><div class=\"calian-spacer wp-block-calian-com-components-calian-spacer\"><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity training and awareness Cyber threats are among the biggest risks organizations face today, and they are becoming more and more sophisticated. Take a proactive approach to cybersecurity awareness and training by ensuring all employees are empowered to recognize and respond to cyberattacks. <a href=\"#contact-form\" class=\"btn btn-light mb-4 mt-3\"> Learn more <\/a> Protect your organization with comprehensive cybersecurity training and &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":6057,"menu_order":90,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"solution":[67],"industry":[76,77,79,80,81,82,84],"type_classification":[90],"class_list":["post-4093","page","type-page","status-publish","hentry","solution-cybersecurity","industry-communications-media","industry-defence-military","industry-energy-resources-environment","industry-government-public-service","industry-health","industry-manufacturing","industry-public-safety-security","type_classification-solution"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Training and Awareness - ITCS | Calian<\/title>\n<meta name=\"description\" content=\"Build a cyber-savvy workforce with Calian&#039;s Cybersecurity Training and Awareness programs. Foster a culture of security awareness &amp; vigilance.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Training and Awareness - ITCS | Calian\" \/>\n<meta property=\"og:description\" content=\"Build a cyber-savvy workforce with Calian&#039;s Cybersecurity Training and Awareness programs. Foster a culture of security awareness &amp; vigilance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/\" \/>\n<meta property=\"og:site_name\" content=\"IT and Cyber Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-20T21:13:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/\",\"url\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/\",\"name\":\"Cybersecurity Training and Awareness - ITCS | Calian\",\"isPartOf\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg\",\"datePublished\":\"2023-12-07T20:17:06+00:00\",\"dateModified\":\"2025-03-20T21:13:54+00:00\",\"description\":\"Build a cyber-savvy workforce with Calian's Cybersecurity Training and Awareness programs. Foster a culture of security awareness & vigilance.\",\"breadcrumb\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/#primaryimage\",\"url\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg\",\"contentUrl\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk Management &#038; Compliance\",\"item\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity training and awareness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#website\",\"url\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/\",\"name\":\"IT and Cyber Solutions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#organization\",\"name\":\"Calian Group Ltd.\",\"url\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2024\/03\/logo-colour.svg\",\"contentUrl\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2024\/03\/logo-colour.svg\",\"width\":180,\"height\":65,\"caption\":\"Calian Group Ltd.\"},\"image\":{\"@id\":\"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Training and Awareness - ITCS | Calian","description":"Build a cyber-savvy workforce with Calian's Cybersecurity Training and Awareness programs. Foster a culture of security awareness & vigilance.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Training and Awareness - ITCS | Calian","og_description":"Build a cyber-savvy workforce with Calian's Cybersecurity Training and Awareness programs. Foster a culture of security awareness & vigilance.","og_url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/","og_site_name":"IT and Cyber Solutions","article_modified_time":"2025-03-20T21:13:54+00:00","og_image":[{"url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/","url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/","name":"Cybersecurity Training and Awareness - ITCS | Calian","isPartOf":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/#primaryimage"},"image":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/#primaryimage"},"thumbnailUrl":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg","datePublished":"2023-12-07T20:17:06+00:00","dateModified":"2025-03-20T21:13:54+00:00","description":"Build a cyber-savvy workforce with Calian's Cybersecurity Training and Awareness programs. Foster a culture of security awareness & vigilance.","breadcrumb":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/#primaryimage","url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg","contentUrl":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2023\/12\/AdobeStock_335134742-1024x618.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/cybersecurity-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Risk Management &#038; Compliance","item":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/cybersecurity\/risk-management-compliance\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity training and awareness"}]},{"@type":"WebSite","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#website","url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/","name":"IT and Cyber Solutions","description":"","publisher":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#organization","name":"Calian Group Ltd.","url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#\/schema\/logo\/image\/","url":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2024\/03\/logo-colour.svg","contentUrl":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/app\/uploads\/sites\/10\/2024\/03\/logo-colour.svg","width":180,"height":65,"caption":"Calian Group Ltd."},"image":{"@id":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/pages\/4093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/comments?post=4093"}],"version-history":[{"count":29,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/pages\/4093\/revisions"}],"predecessor-version":[{"id":16727,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/pages\/4093\/revisions\/16727"}],"up":[{"embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/pages\/6057"}],"wp:attachment":[{"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/media?parent=4093"}],"wp:term":[{"taxonomy":"solution","embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/solution?post=4093"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/industry?post=4093"},{"taxonomy":"type_classification","embeddable":true,"href":"https:\/\/calian.stage.tbkdev.com\/dev\/calian.com\/src\/itcs\/wp-json\/wp\/v2\/type_classification?post=4093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}