For human rights defenders and advocacy groups, information security is not just a technical checkbox—it is the shield that protects vulnerable witnesses, sensitive data, and the integrity of the cause. While strategy is essential, the ability to physically build and maintain a secure environment is what ensures operational survival. This five-day intensive course provides the technical and managerial expertise needed to implement a world-class Information Security Management System (ISMS) tailored to the unique, high-pressure context of activist work.
For human rights defenders and advocacy groups, information security is not just a technical checkbox—it is the shield that protects vulnerable witnesses, sensitive data, and the integrity of the cause. While strategy is essential, the ability to physically build and maintain a secure environment is what ensures operational survival. This five-day intensive course provides the technical and managerial expertise needed to implement a world-class Information Security Management System (ISMS) tailored to the unique, high-pressure context of activist work.