A person at a computer receives an alert about a potential SPAM e-mail.

Information and Cybersecurity Awareness Training

Register for and access the CISO cybersecurity online training module, as well as additional training resources.

Information and Cybersecurity Awareness Training

CISO Cybersecurity Training

This training was designed for New York State employees and is being made available to NYS local government to assist them in their efforts to increase the cybersecurity awareness among their workforce.

The course is approximately 25 minutes in duration. In addition to teaching employees about information security requirements, identifying vulnerabilities and threats, and educating them on methods of social engineering, the course includes interactive exercise modules to reinforce the employees' roles and responsibilities to protect information.

REGISTER for and Access training

The training is designed as an introduction to the topic and does not address every security practice or information security threat. Every workplace should make its employees aware of its specific security practices and legal obligations related to information security, which are set by statutes, regulations, and standards. 

The New York State Office of Information Technology Services ("ITS") is not liable for any loss resulting from your use or reliance on the training materials. The training is provided "as is" with no obligation to provide support or updates.

Additional Training and Resources

Check back here regularly for updated listings of available trainings and valuable resources.

Please Note: The NYS Office of Information Technology Services (ITS) is not responsible for the quality, merchantability and fitness for a particular purpose of products or services available on external sites and listed or described on our menu; nor is the NYS Office of Information Technology Services (ITS) - Cybersecurity Events/Training site responsible for the accuracy, reliability or currency of the information contained on the website and supplied by external sources.

Additional Cybersecurity Resources