| Event Profile | |
| Class/ Online | Classroom |
| Date | 14 August 2026 |
| Time | 9am to 5pm |
| Venue | Holiday Inn Atrium Singapore (Halal Certified) 317 Outram Road Singapore 169075 |
| Fee | 9% GST will apply SGD 540.003 & above: SGD520.00 each For Member SGD 513 3 & above: SGD494 each |
| Note | Two tea breaks and buffet lunch will be served. Limited complimentary car parking coupons are available upon request. |
| Other Date(s) | 1) 15 May 2026 2) 6 Nov 2026 |
| Trainer | |
| Activity | |
| You may reach us via T: 6204 6214 E: info@ccisg.com Alternatively, you may send below details to register Contact Person Company (optional), Name, Job Title, Mailing Address, Tel, Email Participant(s) Name, Job Title, Email | |
A One-Day Behaviour-Change Programme for Every Employee
In today's world, your people are not your weakest link. With the right habits, the right mindset, and a reason to care, they become your first and last line of defence.
This one-day programme is not a standard cyber awareness course. It does not just tell people what threats exist. It changes how they think about security and builds habits that hold up long after they leave the room.
Delivered by a practitioner with over three decades of experience securing organisations across Asia-Pacific, this session is practical, interactive, and deliberately designed for non-technical audiences.
In today's world, your people are not your weakest link. With the right habits, the right mindset, and a reason to care, they become your first and last line of defence.
This one-day programme is not a standard cyber awareness course. It does not just tell people what threats exist. It changes how they think about security and builds habits that hold up long after they leave the room.
Delivered by a practitioner with over three decades of experience securing organisations across Asia-Pacific, this session is practical, interactive, and deliberately designed for non-technical audiences.
Objective
By the end of this session, participants will be able to:
- Identify the most common cyber threats targeting individuals and organisations today, including phishing, deepfakes, ransomware, and social engineering
- Recognise which of the Seven Cybersecurity Personality Types they are, and understand how that shapes their vulnerability
- Apply four mindset shifts that move people from passive awareness to active protection
- Build practical daily habits around passwords, devices, email, browsing, and data safety
- Recognise their role as a cyber defender and why security is everyone's responsibility. Connect that responsibility to something personal, their family, their finances, their digital life, so that conviction becomes the foundation for lasting ownership and behaviour change
Outline
| Module | What Participants Cover |
|---|---|
| Module 1: Where Do You Stand? | • Self-assessment: rate your own security posture from 1 to 10 • Why most people overestimate how protected they are • What cybercriminals look for when choosing a target • The real cost of a breach - financial, reputational, and personal |
| Module 2: The Threats Are Real | • Common attacks ranked by how often they succeed • Phishing, spear phishing, and display name spoofing - live examples • Ransomware, malware, and social engineering tactics • Deepfakes and AI-driven scams - what they look and sound like today • Real case studies, including local Singapore breaches |
| Morning Break | |
| Module 3: Know Your Type | • Introduction to the Seven Cybersecurity Personality Types • How each type is specifically targeted by attackers • Participants identify their own type and explore their blind spots |
| Lunch | |
| Module 4: The 4 Mindsets That Change Everything | • Why awareness alone is never enough • Four mindset shifts that move people from knowing to doing, and build the conviction to act, not just comply |
| Module 5: Habits That Actually Protect You | • Passwords and password managers - live demonstration • Two-factor authentication: why it matters and how to use it • Phishing: spotting the signs before you click • Lookalike domains and QR code risks - hands-on exercise • Device hygiene, software updates, and the backup rule • Home Wi-Fi, public Wi-Fi, hotspots, and VPN guidance • Safe browsing tools |
| Afternoon Break | |
| Module 6: You Are the Last Line of Defence | • Why every employee matters - regardless of role or seniority • Your sphere of influence: what you control, and what you cannot • Building habits that hold up beyond this session • Your personal cyber security action plan • Quiz, recap, and key takeaways |
| Close | • Q&A and open discussion • Next steps and free resources |
Who should attend
This workshop is designed for any employee who uses a device, sends an email, or accesses company systems. No technical background required.
It is especially valuable for:
• Business owners and senior managers who want their teams to take security seriously
• HR, finance, and operations professionals who handle sensitive data
• Customer-facing staff whose accounts and credentials are high-value targets for attackers
• Anyone who has ever thought: I would never fall for that
It is especially valuable for:
• Business owners and senior managers who want their teams to take security seriously
• HR, finance, and operations professionals who handle sensitive data
• Customer-facing staff whose accounts and credentials are high-value targets for attackers
• Anyone who has ever thought: I would never fall for that
Methodology
This is not a lecture. Every module includes at least one interactive element - a live demonstration, a self-assessment, a group exercise, or a hands-on activity.
• Live demonstrations: see how real attacks work in real time, including lookalike domains, QR code risks, and password strength testing
• Self-assessments: participants rate their own security posture and identify their personality type
• Case studies: real breaches and local examples that connect the content to everyday decisions
• Interactive quiz: reinforces key messages and keeps energy high throughout the day
• Personal action plan: every participant leaves with specific steps they can take immediately
Participants consistently describe this as the first cybersecurity training that made them want to act, not just comply.
• Live demonstrations: see how real attacks work in real time, including lookalike domains, QR code risks, and password strength testing
• Self-assessments: participants rate their own security posture and identify their personality type
• Case studies: real breaches and local examples that connect the content to everyday decisions
• Interactive quiz: reinforces key messages and keeps energy high throughout the day
• Personal action plan: every participant leaves with specific steps they can take immediately
Participants consistently describe this as the first cybersecurity training that made them want to act, not just comply.
Testimonial
“I genuinely found it both fun and incredibly valuable, especially the practical tips you shared that I can apply both at home and at work. It really opened my eyes to how vulnerable we can be online without even realising it. Because of the session I went ahead and purchased a VPN and feel much better equipped to protect myself moving forward.”
- Workshop Participant
Non-profit, Singapore
“Alvin's presentation offered a practical guide to online safety. His friendly, chat-style delivery and interactive quizzes kept participants engaged, while the useful links and tools he provided encouraged immediate action - reviewing privacy settings, updating passwords, and limiting personal details on social media.”
- Stella
Group Division Director, Real Estate industry
“Alvin has a rare ability to articulate the business impact of cybersecurity, bridging the gap between deep technical knowledge and strategic business value. Our audience was completely engaged.”
- Isaiah
Field Marketing and Communications Specialist, training industry
- Workshop Participant
Non-profit, Singapore
“Alvin's presentation offered a practical guide to online safety. His friendly, chat-style delivery and interactive quizzes kept participants engaged, while the useful links and tools he provided encouraged immediate action - reviewing privacy settings, updating passwords, and limiting personal details on social media.”
- Stella
Group Division Director, Real Estate industry
“Alvin has a rare ability to articulate the business impact of cybersecurity, bridging the gap between deep technical knowledge and strategic business value. Our audience was completely engaged.”
- Isaiah
Field Marketing and Communications Specialist, training industry
Alvin Rodrigues's Profile
Most organisations conduct cybersecurity training every year—yet many still experience breaches. Not because the training is incorrect, but because awareness alone does not change behaviour. Recognising a phishing email is one thing; having the instinct to pause before clicking is another.
Alvin Rodrigues has spent over three decades understanding and closing this gap. As the Founder and Human Firewall Builder of a Singapore-based company, he partners with HR leaders, L&D teams, and senior executives across the Asia-Pacific to design programmes that drive real behavioural change—not just knowledge acquisition.
He is also an adjunct faculty member teaching cybersecurity at ESSEC Business School’s Master’s programmes. Alvin has held senior leadership roles at global organisations such as Fortinet, Forcepoint, and Infoblox, bringing deep industry experience into his training approach.
An established thought leader, Alvin is the author of You Are Being Watched and has an upcoming publication with Penguin. His insights have been featured in media across 15 countries, and he is recognised as a LinkedIn Top Voice in Cybersecurity.
His core belief challenges conventional thinking: people are not the weakest link. With the right training, conviction, and habits, they become the organisation’s strongest line of defence.
Areas of Expertise
• Cybersecurity Awareness Training
• Human Firewall Development
• Behavioural Change Programmes
• Keynote Speaking
• Executive Facilitation
Alvin Rodrigues has spent over three decades understanding and closing this gap. As the Founder and Human Firewall Builder of a Singapore-based company, he partners with HR leaders, L&D teams, and senior executives across the Asia-Pacific to design programmes that drive real behavioural change—not just knowledge acquisition.
He is also an adjunct faculty member teaching cybersecurity at ESSEC Business School’s Master’s programmes. Alvin has held senior leadership roles at global organisations such as Fortinet, Forcepoint, and Infoblox, bringing deep industry experience into his training approach.
An established thought leader, Alvin is the author of You Are Being Watched and has an upcoming publication with Penguin. His insights have been featured in media across 15 countries, and he is recognised as a LinkedIn Top Voice in Cybersecurity.
His core belief challenges conventional thinking: people are not the weakest link. With the right training, conviction, and habits, they become the organisation’s strongest line of defence.
Areas of Expertise
• Cybersecurity Awareness Training
• Human Firewall Development
• Behavioural Change Programmes
• Keynote Speaking
• Executive Facilitation

