Skip to content

Training

We build cybersecurity capabilities within your organization

We deliver training tailored to participants' roles and experience - from a 3-day industrial cybersecurity course (ICS architecture, risk analysis, OT cyberattacks, incident management) through employee security awareness to board-level NIS2 accountability training. Our programmes are led by practitioners with hands-on project experience - not academic lecturers.

Last updated:April 2026

Book a consultation

30 minutes with an expert. We'll discuss your challenge, scope the engagement, and provide a preliminary estimate.

Cybersecurity Trainingis a SEQRED service coveringcybersecurity training: ot security, security awareness, tabletop exercises, phishing simulations.

Training

Technology addresses part of the threat landscape, but according to the Verizon DBIR (2025), nearly 60% of breaches involve a human element - clicking a phishing link, sharing credentials over the phone, ignoring an alert. NIS2 Article 20 requires management bodies of essential and important entities to undergo regular cybersecurity training - personal accountability at the board level. Training that ends with slides does not change behaviour. KnowBe4's 2025 report shows that before training, 33% of employees click on simulated phishing - after 12 months of a systematic programme (simulations plus immediate feedback), the click rate drops by 86%, to 4.1%. You need a programme that combines knowledge with practice, fits your organization, and delivers measurable results.

Want to know if this service fits your needs? Tell us about your challenge - we'll tailor the scope.

Let's talk →

Scope

01

Industrial Cybersecurity - 3-day course covering: ICS/SCADA architecture, OT risk analysis, cyberattacks on industrial systems (case studies), incident management in OT environments, network segmentation (zones and conduits per IEC 62443), national cybersecurity law requirements

02

Employee Security Awareness - workshops and e-learning: phishing recognition, secure remote work, data protection, incident reporting

03

Board-level Cyber Risk Training - NIS2 accountability (Art. 20), cyber risk management, incident reporting, security programme oversight. Regulatory requirement for management bodies of essential and important entities

04

Tabletop Exercises - incident simulation with management and technical teams, testing decision-making procedures and crisis communication

05

Phishing Simulations - controlled campaigns with reporting, immediate post-click feedback, and training follow-up

06

OT Thursdays - recurring educational series dedicated to industrial system security, building security culture within OT teams

Process

01

Needs assessment

We discuss target groups, previous training, awareness levels, and business objectives with the client. We identify capability gaps. For boards, we verify NIS2 Art. 20 requirements.

02

Curriculum design

We prepare a programme tailored to the organization - content based on real scenarios from our projects, materials, practical exercises, and effectiveness metrics. We do not use off-the-shelf courses - every programme is built from scratch.

03

Delivery

We conduct training on-site or online. Our trainers are practitioners with experience in penetration testing, OT audits, and incident response - not lecturers working from a textbook.

04

Testing

We measure effectiveness: knowledge tests, phishing simulation results (click rate before and after), tabletop exercise evaluation. We report progress in monthly or quarterly cycles.

05

Follow-up

We deliver a report with recommendations for the next cycle. We help build a multi-year training programme with progressively increasing difficulty and regular simulations.

Why SEQRED

IT + OT in one team

Most firms do either IT or OT. Our team combines both - from Active Directory pentesting to PLC firmware analysis. That's rare in the market.

We demonstrate, not just report

We deliver proof-of-concept exploits, not scanner output. Your engineering team gets actionable fixes. Your board gets a risk briefing they understand.

Compliance + security together

Our reports satisfy auditors (NIS2, DORA, IEC 62443) AND give engineers real data to improve defenses. One engagement, two outcomes.

We stand with you

We present findings to your board or supervisory board side by side with the responsible person. Or we prepare them for a solo presentation.

Who we serve

We've worked with national energy grid operators, systemically important banks, industrial automation manufacturers, renewable energy operators, and US DoD contractors. Projects anonymized at client request.

400+projects
9industries
12official CVEs
8+years

Team certifications

OffSec (OSCP, OSWE, OSEP)ISC2 (CISSP)ISACA (CISA, CISM)SANS (GICSP, GRID, GPEN)ISA/IEC 62443

Technology partnerships

Nozomi NetworksMicrosoftHoneywell

FAQ

Who are the training programmes designed for?+

We deliver training for different groups: OT engineers (3-day industrial cybersecurity course), IT teams (security operations, incident response), non-technical staff (security awareness, phishing recognition), and board members (NIS2 Art. 20 accountability, cyber risk management, incident reporting).

Does the OT training require cybersecurity experience?+

No - the 3-day course is designed for automation and maintenance engineers who know industrial systems (SCADA, DCS, PLC) but lack security experience. The programme covers ICS architecture, risk analysis, real-world cyberattacks on industrial systems, incident management, and national cybersecurity law requirements.

How do you differ from SANS or EC-Council training?+

Our training is grounded in real project experience - penetration tests, OT audits, incident response engagements. Scenarios come from our practice, not textbooks. Sessions are led by practitioners who test and secure systems daily. Additionally, we tailor content to the client's specific context - industry, infrastructure, and regulatory landscape.

Does NIS2 require board-level training?+

Yes. NIS2 Article 20 states that management bodies of essential and important entities must undergo regular cybersecurity training to acquire knowledge and skills enabling them to identify risks and assess risk management practices. This is personal accountability for board members.

What do phishing simulations look like?+

We prepare controlled phishing campaigns tailored to the organization - realistic scenarios mimicking actual threats (e.g. fake invoices, HR notifications, internal system login pages). We measure click rates, report results, and provide immediate training feedback after each click. Monthly simulations deliver the strongest results.

Can you deliver training online?+

Yes - we deliver training both on-site and online. We match the format to the organization's preferences and capabilities. For the 3-day OT course, on-site delivery with hands-on exercises is recommended.

How does SEQRED price its services?+

Pricing is based on an individual estimate of our consultants' time, considering the project scope and complexity. We present the offer broken down by phases - so you see exactly what you are paying for and can make decisions at each stage.

Can I speak with an expert before making a decision?+

Yes - an initial consultation is always welcome and free of charge. We help define the actual scope of your needs, which allows us to prepare a rational offer tailored to your organization.

We'll discuss scope, methodology, and timeline.

Book a consultation

Free consultation, no strings attached.

+48 22 292 32 23 Talk to an expert