Finding a provider for a complex training program

Research shows that over 90% of all security incidents are due to human error, which is why security training is growing enormously in importance. Training programs are designed to help employees understand their role in combating any data breaches, property rights violations or brand reputation damage. Effective training teaches employees what constitutes good cyber hygiene and makes it clear to them to identify the risks associated with their actions, as well as to recognize potential IT attacks as such.

How CyberCompare helped an automation manufacturer to find a qualified provider for a complex training program

What we were faced with

Our customer from the mechanical engineering industry was looking for a qualified provider for a complex training program

Learn more

How our team helped

The CyberCompare team focused on the most important requirements of our customer: Experience of the provider, methodologies of the course content, degree of specialization in relevant programming languages, price and references

Learn more

What we achieved

Through a look-up in our CyberCompare database we identified a qualified training provider that met the customer’s specific requirements

Learn more

Perspective from one of our experts:

“Employees should no longer be seen as the weakest link in information security – but as an opportunity for another strong security barrier, the human firewall.”

Read the whole interview

Dr. Niklas Hellemann

Co-Founder and CEO of SoSafe

Challenge

Security training to identify cyber risks and prevent IT attacks

At a global leader in the engineering industry, the product and web development teams were working without security requirements. They focused on microservices in different programming languages (C, Go, Java, C#). In addition, the employees were insufficiently trained for product development. Thus, the customer had very specific requirements for cybersecurity training.

Find out how you can benefit from our experience and avoid safety incidents through employee training

Learn more

Approach

Identification of requirements and creation of a training process

The CyberCompare team created a concrete training process based on customer-specific requirements. To find the right cybersecurity provider, we established five criteria: experience of the provider, methodology of the course content, degree of specialization in relevant programming languages, price and references. This search yielded three potential providers. After an anonymous RFP process and bid presentations, our client could select the most suitable offer.

The CyberCompare method:

Formulation of the Special Requirements
Selection of Suitable Providers
Anonymous Tender
Selection of the Appropriate Offer

Effect

Increased IT security awareness through training of developers

Through a look-up in our CyberCompare database we identified a qualified provider that not only demonstrated expertise in secure development, but also met the demanding criteria. Two main points have led to success: 1. a pilot of the course before a rollout across the entire team of over 200 developers. 2. the guarantee of confidentiality through a completely anonymous call for tenders.

Make an appointment to get a free training provider comparison specifically for your case

Make an appointment now

Simeon Mussler

COO Bosch CyberCompare

+49 (0)711 811-19893

Simeon.Mussler@bosch.com