← Back to Security Awareness Training
About this sample: This document represents the output of the thinking. The value is in the conversations that produced it — the site walk, the stakeholder interviews, the engineering judgements made along the way. What you are reading is the record. The work that matters happened before the first page was written.
Engagement Parameters
Client
[REDACTED]
Site
[REDACTED]
Participants
[N] staff across [N] shifts
Delivery Date
[REDACTED]
Trainer
[REDACTED]
Format
On-Site — Full Day
Module Delivery Plan
ModuleTopicDurationAudience
M01OT Threat Landscape — real incidents, real consequences45 minAll staff
M02Safe Media Handling — USB, laptops, portable devices30 minOperators & maintenance
M03Vendor & Remote Access — what to check and what to escalate30 minAll staff
M04Social Engineering for OT — site visits, phone calls, pretexting30 minAll staff
M05Incident Recognition & Reporting — what to report and to whom30 minAll staff
M06Leadership & Management Module — decision responsibilities45 minSupervisors & managers
Note: All modules are calibrated to your sector and site context. Scenarios are drawn from real OT/ICS incidents. No generic IT examples.
Participant Knowledge Assessment

Pre and post-training assessments were conducted to measure knowledge uplift. Results below are aggregated across all participants. Individual results are provided in the confidential annex.

Pre vs Post Training Score
OT Threat Landscape
+34%
Safe Media Handling
+28%
Vendor & Remote Access
+41%
Social Engineering
+22%
Incident Recognition
+36%
MetricPre-TrainingPost-TrainingUplift
Avg Knowledge Score34%67%+33%
Removable Media Policy Awareness38%91%+53%
Incident Reporting Path Known21%88%+67%
Vendor Access Procedure Known29%79%+50%
What this enables: The full programme report includes individual and team assessment results, module-level analysis, recommendations for follow-up training, and a 12-month refresher programme proposal.