For human rights defenders and advocacy groups, information security is not just a technical checkbox—it is the shield that protects vulnerable witnesses, sensitive data, and the integrity of the cause. While strategy is essential, the ability to physically build and maintain a secure environment is what ensures operational survival. This five-day intensive course provides the technical and managerial expertise needed to implement a world-class Information Security Management System (ISMS) tailored to the unique, high-pressure context of activist work.
Course Overview
This program is a professional fusion of technical implementation and protective project management. Participants will move beyond theory to master the practical execution of the ISO/IEC 27001 standard. You will learn how to design and deploy a security framework that is robust enough to withstand surveillance and digital attacks, yet flexible enough to support the dynamic needs of field operations and global advocacy.
Key Learning Modules
Initiating the Defense System: Learning how to define the scope of protection and align the implementation with the organization’s mission and humanitarian values.
Planning the Security Framework: Mastering the creation of a "Risk Treatment Plan" that specifically addresses the threats faced by activists, such as unauthorized access and data intercepts.
Implementing Operational Controls: Designing and deploying the physical and technical safeguards—from encrypted communications to secure data storage—required for daily operations.
Performance Monitoring & Review: Establishing internal audit mechanisms to ensure that security measures are functioning effectively and protecting the intended assets.
Continual Improvement & Certification: Learning how to refine the system based on evolving threats and preparing the organization for formal recognition of its security excellence.
Target Audience: Managers, consultants, and human rights advocates responsible for the creation and protection of value within their organizations, as well as technical leads seeking to implement formal security standards.
Course Schedule - Weekends Online Course
Training will run from 09:00 to 13:00 on Saturdays and Sundays, covering four days of training in total.
-
Establishing the Foundation and Scope
-
Strategic Planning and Risk Mitigation
-
Deploying the Security Infrastructure
-
Monitoring, Auditing, and Refinement
Frequently Asked Questions
Still have questions? Take a look at the FAQ or reach out anytime. If you’re feeling ready, go ahead and apply.
-
We offer a range of solutions designed to meet your needs—whether you're just getting started or scaling something bigger. Everything is tailored to help you move forward with clarity and confidence.
-
Getting started is simple. Reach out through our contact form or schedule a call—we’ll walk you through the next steps and answer any questions along the way.
-
We combine a thoughtful, human-centered approach with clear communication and reliable results. It’s not just what we do—it’s how we do it that sets us apart.
-
You can reach us anytime via our contact page or email. We aim to respond quickly—usually within one business day.
-
We offer flexible pricing based on project type and complexity. After an initial conversation, we’ll provide a transparent quote with no hidden costs.

