_

Cybersecurity Training
Your Team Actually Needs

Practical, no-nonsense security training tailored for your organization. From emerging threat awareness to hands-on CTF competitions — protect your company from the inside out.

0+ People Trained
0+ Years in Cybersecurity
0 Industries Served

// Threat Landscape 2025–2026

Real attack vectors targeting organizations right now. This is what your team needs to recognize and defend against.

Quishing (QR Code Phishing)

HIGH

Malicious URLs hidden in QR codes — in emails, PDF invoices, and physical signage. These bypass email security filters and redirect victims to credential-harvesting sites on unmanaged mobile devices, outside your EDR monitoring reach. Used by nation-state actors including North Korea's Kimsuky group.

AI Agent Hijacking

CRITICAL

Prompt injection attacks on LLM-powered business tools. Attackers poison documents, websites, and knowledge bases to manipulate AI assistants into leaking sensitive data or performing unauthorized actions — a zero-click attack on your AI infrastructure that traditional security tools cannot detect.

MFA Fatigue Attacks

HIGH

Bombardment of push authentication requests at 3 AM until an exhausted employee approves one. Combined with credentials from info-stealer malware, this technique reliably bypasses multi-factor authentication even in well-protected environments.

Initial Access Brokers

HIGH

A criminal marketplace where specialized hackers sell network access to ransomware gangs, data thieves, or nation-state actors. Your compromised VPN credentials could be on sale right now — prices range from $500 for small businesses to $100,000+ for enterprise networks.

Supply Chain Infiltration

CRITICAL

Attackers compromise your trusted third-party providers, then pivot into your network through established trust relationships. In 2025, the Scattered Spider group used this technique to breach multiple major UK retailers simultaneously via a single service provider.

Autonomous AI Reconnaissance

EMERGING

AI agents that automatically scrape social media, company websites, and public databases to build detailed employee profiles, map organizational hierarchies, and craft hyper-personalized spear-phishing campaigns — all without human intervention and at unprecedented scale.

// Training Programs

Each program is adapted to your company's risk profile, industry, and technical maturity.

DORA Compliance Training

Prepare your financial institution for the Digital Operational Resilience Act. Covers ICT risk management, incident reporting, and third-party oversight requirements.

  • Financial Sector
  • Regulatory
  • Risk Management

End-User Awareness

Phishing recognition, password hygiene, social engineering defense, and safe data handling. Engaging sessions that change real behavior, not just check a box.

  • All Employees
  • Phishing
  • Social Engineering

Board & Executive Briefings

Strategic cybersecurity oversight for decision-makers. Understand cyber risk in business terms, regulatory obligations, and what questions to ask your CISO.

  • C-Suite
  • Governance
  • Strategy

Cybersecurity Trends

What's new in the threat landscape and how to defend against it. Covers the latest attack vectors, emerging risks, and practical protection strategies. The program is tailored to the participant level — from general awareness for end users to technical deep-dives for IT specialists.

  • All Levels
  • Threat Intel
  • Defense Strategies

// Where to Learn

My cybersecurity courses are available through trusted education partners or as a custom program tailored to your needs.

Baltijas Datoru Akadēmija

Cybersecurity fundamentals course at one of the Baltic region's leading IT education providers. Structured curriculum for professionals looking to build a solid security foundation.

View Course →

Possible Security

IT security training programs available through Possible Security. Browse the full catalog of courses — from foundational security awareness to advanced topics — several of which I deliver as instructor.

View Programs →

Individual Programs

Need something specific? I design custom cybersecurity training programs tailored to your organization's industry, tech stack, threat model, and compliance requirements.

Get in Touch →
[CTF]

// Cybersecurity Competitions

Turn cybersecurity training into an engaging team event. I organize internal Capture The Flag (CTF) competitions — a fun, gamified challenge where participants solve security puzzles, crack codes, and compete for the top of the leaderboard.

Tasks can be designed for complete beginners as well as experienced IT specialists, and tailored to your company's specific industry, tech stack, and security priorities. Organized in partnership with Mārtiņa-CTF, it's one of the most memorable ways to build security awareness and discover hidden talent in your team.

// About Me

I'm Daniels Heincis, a cybersecurity professional with 5+ years of hands-on experience in the field. I've trained more than 800 people across companies of various sizes and industries.

My approach is practical — I focus on real threats your organization faces, not theoretical scenarios. Whether it's preparing your team for DORA compliance, running a CTF competition, or making sure your board understands cyber risk, I deliver training that sticks.

Practical Focus Real-world scenarios and exercises
Tailored Content Adapted to your industry and team
Current Threats Always updated with the latest attack vectors

// Let's Talk

Reach out and I'll get back to you within one business day.