Hostile Surveillance Detection Training
Situational Awareness and Detecting Pre-Attack Indicator(s)
New Legal Requirements on Data Privacy and Cybersecurity
Social Engineering and Technical Exploitation
An Integrated Approach to Threat Assessment and Management