Section outline

  • Target Audience

    • Small & Medium Enterprises (SMEs)
    • Solopreneurs & Freelancers
    • Non-technical founders & managers
    • Ops, Finance, HR, IT generalists

    Outcome
    By the end of this course, learners will:

    • Understand real cyber risks in plain language
    • Know how global frameworks apply to their business
    • See where they stand via the Cyber Health Index
    • Know exactly what to fix next and why CHI matters
  • Purpose: Remove anxiety, set mindset, introduce CHI

    Key Topics

    • Why cyber security is now a business survival issue
    • Common myths: “I’m too small to be hacked”
    • Real-world SME breach stories (non-technical)
    • What good security actually looks like (not perfection)

    Framework Touchpoint

    • Why frameworks exist (NIST, ISO, CIS) — without details yet

    Product Link (Soft)

    • Introduce Cyber Health Index as:

    “A simple way to measure how healthy your business is—before you get sick”

    CTA

    • Take the Free CHI Snapshot Assessment
    Activities: 0
  • Mapped to: NIST CSF – Identify

    Key Topics

    • What are digital assets? (Email, files, cloud apps, devices)
    • Threats vs vulnerabilities vs impact (plain English)
    • Business risks: money, reputation, downtime, legal exposure
    • Why freelancers & solopreneurs are high-value targets

    Framework Mapping

    • NIST CSF: Identify
    • ISO 27001: Context of the Organization
    • CIS Control 1: Inventory of Assets

    Product Link

    • CHI Risk Discovery Score
    • How CHI identifies blind spots most businesses miss

    Practical Exercise

    • “List your top 10 digital assets”
    • Compare with CHI auto-discovery output
    Activities: 0
  • Purpose: Awareness, not technical mastery

    Key Topics

    • How attacks actually happen (step-by-step)
    • Phishing, credential theft, ransomware, insider misuse
    • Why most attacks succeed due to human and process gaps

    Framework Mapping

    • MITRE ATT&CK: Tactics overview
      • Initial Access
      • Credential Access
      • Lateral Movement
      • Impact

    Product Link

    • CHI Threat Exposure Mapping
    • Showing how CHI aligns attack paths with your controls

    Practical Exercise

    • “Could this attack work on my business?”
    • CHI scenario-based risk scoring
    Activities: 0
  • Mapped to: CIS Critical Security Controls

    Key Topics

    • Passwords, MFA, backups, patching
    • Endpoint & cloud security basics
    • Why tools alone don’t work without visibility

    Framework Mapping

    • CIS Controls 1–6 (Foundational)
    • NIST CSF: Protect

    Product Link

    • CHI Protection Readiness Score
    • Control coverage vs real-world protection gaps

    Quick Wins Checklist

    • 10 actions that reduce 80% of SME risk
    • “What CHI checks automatically vs manually”
    Activities: 0
  • Mapped to: NIST CSF – Detect

    Key Topics

    • What “early warning” looks like for small businesses
    • Signs of compromise most teams ignore
    • Why detection is not just for big enterprises

    Framework Mapping

    • NIST CSF: Detect
    • ISO 27001: Monitoring & Logging
    • CIS Control 8: Audit Log Management

    Product Link

    • CHI Continuous Monitoring View
    • Risk trend tracking over time

    Practical Exercise

    • “What would I notice first if I was breached?”
    • CHI detection maturity comparison
    Activities: 0
  • Mapped to: NIST CSF – Respond

    Key Topics

    • What to do in the first 24 hours of an incident
    • Who to call, what to document, what NOT to do
    • Why speed matters more than perfection

    Framework Mapping

    • NIST CSF: Respond
    • ISO 27001: Incident Management

    Product Link

    • CHI Incident Readiness Score
    • Pre-built response checklists inside CHI

    Scenario Exercise

    • Ransomware / Email takeover simulation
    • “With vs without CHI” comparison
    Activities: 0
  • Mapped to: NIST CSF – Recover

    Key Topics

    • Backups that actually work
    • Restoring operations & customer trust
    • Cyber security as a trust signal for clients

    Framework Mapping

    • NIST CSF: Recover
    • ISO 27001: Business Continuity

    Product Link

    • CHI Recovery & Resilience Score
    • Business continuity readiness dashboard
    Activities: 0
  • Purpose: Demystify compliance

    Key Topics

    • What ISO 27001 really means (and what it doesn’t)
    • Who needs certification vs alignment
    • Common mistakes SMEs make with compliance

    Framework Mapping

    • ISO 27001 clauses simplified
    • Risk-based approach explained

    Product Link

    • CHI ISO Alignment View
    • Evidence-ready reporting for audits
    Activities: 0
  • Purpose: Legal awareness without legal jargon

    Coverage (Configurable by Region)

    • GDPR / PDPA (APAC)
    • Bangladesh / Malaysia / ASEAN cyber laws
    • Data protection vs cyber security

    Key Topics

    • What regulators actually expect from SMEs
    • Penalties, breach notification basics
    • How frameworks support legal compliance

    Product Link

    • CHI Compliance Readiness Score
    • Policy-gap mapping
    Activities: 0
  • Purpose: Make everything tangible

    Key Topics

    • Understanding your CHI overall score
    • Interpreting sub-scores (Risk, Protect, Detect, Respond)
    • Prioritizing improvements without overwhelm

    Product-Centric Module

    • How CHI replaces spreadsheets & guesswork
    • Roadmap planning using CHI insights

    Outcome

    • Personalized 90-day cyber improvement plan
    Activities: 0
  • Purpose: Conversion without pressure

    Key Topics

    • Why cyber security is an ongoing process
    • When DIY stops working
    • How CHI evolves as your business grows

    Product Link (Direct)

    • CHI plans & use cases
    • Who should use which tier
    • Case studies & ROI examples

    Final CTA

    • Upgrade to Cyber Health Index Pro
    • Optional: 1-on-1 cyber health review
    Activities: 0