How we work
Generic awareness training drives almost no behavioural change. We run role-based programmes: secure-coding labs for engineers (using your stack and your real CI/CD pipeline), threat-modelling workshops for product teams, IR tabletop exercises for security and operations, and board-level sessions that translate the regulatory landscape into board-friendly language and decisions. Every session is tied to one or more controls in NIS2, ISO 27001 or PCI-DSS so the training counts as audit evidence.
Outcomes
- Measurable improvement in role-specific behaviours (PR review quality, IR response time, threat-model coverage)
- Audit-ready evidence of training completion mapped to specific controls
- A repeatable internal capability — by the end of the engagement, your senior staff can run the next round
Deliverables
- Curriculum tailored to your stack and sector
- Hands-on lab environment
- Per-participant assessment and certificate
- Audit-evidence mapping
Engagement Workspace · 90 days free
Included with this engagement: a Centraleyezer SaaS deployment for 90 days where you generate reports on demand. At day 90 it either closes (your DOCX/PDF reports and attestation letter stay with you) or extends as a paid SaaS subscription if you want to keep using it.
Frequently asked
Why role-based instead of generic awareness?
Generic awareness training drives almost no behaviour change. The data is consistent across studies — engineers ignore content that is not about code, and finance staff ignore content that is not about wire fraud. Role-based training matches the work; the engagement transcripts in the LMS show much higher completion rates and the post-engagement phishing tests show much larger drops in click-through.
Do you train on our actual stack?
Yes. Secure-coding labs use your language, your framework, your CI/CD pipeline. We do not run "Java security in the abstract" — we run "fixing a real authn bypass in your Spring app, in a branch of your repo".
Does the training count as audit evidence?
Yes. Each session ties to specific controls in NIS2 (Article 21(2)(g)), ISO 27001 (A.6.3), PCI-DSS (12.6) or GDPR (Article 39). Per-participant completion certificates and assessments are exportable.
