Build the fortress
€0.00

For human rights defenders and advocacy groups, information security is not just a technical checkbox—it is the shield that protects vulnerable witnesses, sensitive data, and the integrity of the cause. While strategy is essential, the ability to physically build and maintain a secure environment is what ensures operational survival. This five-day intensive course provides the technical and managerial expertise needed to implement a world-class Information Security Management System (ISMS) tailored to the unique, high-pressure context of activist work.

Course Overview

This program is a professional fusion of technical implementation and protective project management. Participants will move beyond theory to master the practical execution of the ISO/IEC 27001 standard. You will learn how to design and deploy a security framework that is robust enough to withstand surveillance and digital attacks, yet flexible enough to support the dynamic needs of field operations and global advocacy.

Key Learning Modules

  • Initiating the Defense System: Learning how to define the scope of protection and align the implementation with the organization’s mission and humanitarian values.

  • Planning the Security Framework: Mastering the creation of a "Risk Treatment Plan" that specifically addresses the threats faced by activists, such as unauthorized access and data intercepts.

  • Implementing Operational Controls: Designing and deploying the physical and technical safeguards—from encrypted communications to secure data storage—required for daily operations.

  • Performance Monitoring & Review: Establishing internal audit mechanisms to ensure that security measures are functioning effectively and protecting the intended assets.

  • Continual Improvement & Certification: Learning how to refine the system based on evolving threats and preparing the organization for formal recognition of its security excellence.

Target Audience: Managers, consultants, and human rights advocates responsible for the creation and protection of value within their organizations, as well as technical leads seeking to implement formal security standards.

Course Schedule - Weekends Online Course

Training will run from 09:00 to 13:00 on Saturdays and Sundays, covering four days of training in total.

  • Establishing the Foundation and Scope

  • Strategic Planning and Risk Mitigation

  • Deploying the Security Infrastructure

  • Monitoring, Auditing, and Refinement

Frequently Asked Questions

Still have questions? Take a look at the FAQ or reach out anytime. If you’re feeling ready, go ahead and apply.

Register
  • We offer a range of solutions designed to meet your needs—whether you're just getting started or scaling something bigger. Everything is tailored to help you move forward with clarity and confidence.

  • Getting started is simple. Reach out through our contact form or schedule a call—we’ll walk you through the next steps and answer any questions along the way.

  • We combine a thoughtful, human-centered approach with clear communication and reliable results. It’s not just what we do—it’s how we do it that sets us apart.

  • You can reach us anytime via our contact page or email. We aim to respond quickly—usually within one business day.

  • We offer flexible pricing based on project type and complexity. After an initial conversation, we’ll provide a transparent quote with no hidden costs.