Cybersecurity: You are the weakest link

Security awareness training is incredibly important to ensure everyone in the company knows what attacks look like, what to do, and what processes to follow. Every person is in charge of their own cybersecurity, both personally and at work.

SDAP Security Awareness Training (SAT)

SDAP has hands-on experiences in handling many complicated incident response cases and our certified trainer has over 15 years experiences on information security and is a frequent speaker in many cybersecurity seminars and events.

Information Technology (IT) has evolved from something nice to have to part of our daily life in every organization. Business processes are heavily relied on IT systems and applications to keep up to the speed of today’s demand.

Organizations of all sizes are invested heavily in new hardware and software including technical security measures such as firewall, anti-virus and intrusion prevention system to protect data generated, stored and transferred. Unfortunately, data leakage and security incidents are still prevalent and its impact is always underestimated by senior management.

With over 70% of security breaches come from inside the organization. The answer is obvious that human is the weakest link in the process. Securing people is an important step in providing a holistic security process to greatly enhance the overall protection level.


SMART is a risk-based, customized information security awareness and evaluation program for organization that would give your employees an interactive session to develop their security mindsets and behaviors. It is a process, not just an event.​


A pre-training assessment survey would be able to evaluate the current security awareness of your employees.

Risk-based Analysis

Analysis based on the employee information security awareness would then be prioritized based on user behavior, business process and risks associated​.

Training Session

A customized training session would be conducted to increase employee’s security awareness based on common risks with emphasis in risks identified in the analysis. The followings are topics highlighted:​

  • Data Security
  • Network Security
  • Password Security 
  • Web Browsing Security
  • Email and Instant Messaging Security
  • Mobile Devices and BYOD Security
  • Wi-Fi Security
  • Security when working remotely
  • Social Engineering
  • Physical Security
  • Advanced Persistent Threat

Our experiences trainer has more than 15 years of information security experience and is a frequent speaker in information security seminars and events. Our trainer is also a certified security professional with CISSP, CISA and CISM.

Management Review

A training session dedicated to the management team which would include current employee security awareness​.


When technical remediation is required o secure your critical business process, recommendation would be provided so that security protection can be enhanced based on return on investment. Recommendation would also be provided in how employees can improve based on risks identified.​




  1. Brand Protection
  2. Legal / Regulatory Compliance
  3. Accountability