04  /  Training & Education

Security Awareness
That Changes Behaviour.

Most security incidents trace back to human decisions, not technical failures. BHCS builds training programs that address the behaviours that actually put organizations at risk – not just what satisfies an annual compliance checkbox.

Four Capabilities.
One Coherent Program.

A security awareness program is only effective when training, testing, measurement, and leadership alignment work together. We build all four so the program produces lasting behaviour change – not just completion certificates.

01

Security Awareness Program Design

A structured, year-round program built around your threat profile, compliance requirements, and current security culture. Designed using the SANS Security Awareness Maturity Model – moving your organization from basic compliance toward active security culture at a pace it can sustain.

02

Phishing Simulation

Controlled phishing tests that measure where your staff are vulnerable and track improvement over time. Results drive targeted training decisions – not just “you failed” notifications. Includes repeat-clicker identification and tailored intervention planning for highest-risk individuals.

03

Topic-Specific Workshops

Focused training sessions on high-risk behaviours: password management, mobile device security, data handling, physical security, and social engineering recognition. Each workshop is built around defined learning objectives tied to measurable outcomes – not a generic video your staff clicks through to get a completion badge.

04

Leadership & Board Briefings

Executive presentations that translate cyber risk into business impact. Built for board directors and senior leadership who need to understand exposure and make informed decisions – not memorize frameworks. Includes a security culture baseline so leadership can see where the organization stands and what will move the needle.

Wherever Your Organization
Is Starting From.

Security awareness programs work at three distinct starting points – organizations with no training in place, those with compliance obligations requiring documented programs, and those rebuilding after a phishing incident.

No Program in Place

Building From Scratch

No awareness training yet – or just an annual compliance video that nobody retains. We establish a baseline, assess your current culture, and build a structured program that actually changes behaviour over time.

Compliance Requirements

Regulated & Defence Contractors

CMMC, NIST 800-171, and Canadian government supply chain requirements all include documented security awareness obligations. We build the program and produce the evidence that demonstrates compliance – not just intent.

After an Incident

Post-Phishing Reset

A successful phishing attack or data breach creates obligations – to insurers, clients, and sometimes regulators. We help you close the human-factor gaps that were exploited and build a program that demonstrates the problem is actually fixed.

Assess. Design. Deliver.
Measure. Repeat.

Effective awareness programs are not one-time events. They are structured, measurable, and built to improve year over year. The engagement starts with an honest baseline and ends with metrics that show real behaviour change.

Weeks 1-2
Maturity Assessment & Baseline Security awareness maturity questionnaire, culture survey, current threat profile review, and phishing susceptibility baseline test. Establishes exactly where your organization is before any training begins – so progress is measurable.
Weeks 2-4
Program Design Annual training schedule, learning objectives by topic, phishing simulation calendar, and metrics framework. Compliance requirements (CMMC, NIST 800-171, PIPEDA) mapped to program components so documentation is built in from the start.
Weeks 4-8
Training Delivery Topic-specific workshops delivered to staff, phishing simulations run against the baseline, board or leadership briefing delivered, and targeted follow-up for highest-risk individuals identified in simulation results.
Ongoing
Measurement & Program Refresh Behaviour metrics tracked against baseline, culture indicators monitored over time, annual program review and update, and phishing simulation cycles continued to sustain improvement. A program that isn’t measured drifts back to zero.

A Program You Own.
Metrics You Can Report On.

Everything is documented and written so your team can maintain it – not locked in a format that requires ongoing consultant involvement to interpret.

Program Package

Your Awareness Program

A complete, documented awareness program built for your organization. You own it. Your team runs it. We write it so that’s actually possible without a full-time security team.

  • Maturity assessment results and culture baseline
  • Annual program schedule with topics and delivery format
  • Learning objectives per topic with measurable outcomes
  • Phishing simulation baseline report and simulation schedule
  • Compliance evidence package where required (CMMC, NIST, PIPEDA)
Training Materials

Content Your Staff Will Retain

Workshop content, board briefings, and metrics tools built for your organization’s context – not repackaged generic content from a training vendor library.

  • Topic-specific workshop materials (passwords, phishing, mobile, physical, data)
  • Leadership and board briefing presentation
  • Metrics tracking matrix – compliance, behaviour, and culture indicators
  • Repeat-clicker intervention plan for highest-risk staff
  • Annual program review template for self-assessment in subsequent years

Training Built on
How Attackers Think.

Approach
Awareness training that teaches staff to recognize yesterday’s phishing templates while attackers have moved on is not training – it’s a liability. We build programs around current adversary behaviour and measure whether staff are actually changing how they act, not just whether they clicked through a module.
Nick Holyome – CISSP, CMMC RP – Principal, BHCS
Metrics That Matter
Compliance metrics tell you whether training happened. Behaviour metrics tell you whether it worked. Culture metrics tell you whether it’s going to stick. A mature awareness program tracks all three – and the SANS Security Awareness Maturity Model gives us a validated framework to do exactly that.
Bolt Hold Cyber Security – Comox Valley, BC
Intelligence Background
Military intelligence work is built on understanding how adversaries operate before they act. That discipline directly informs how security awareness training is designed here. We teach your staff to recognize the actual methods attackers use – social engineering, pretexting, physical access – not just how to spot a misspelled email domain.
Military Intelligence & HUMINT – Nick Holyome, Principal

Ready to Build Your Awareness Program?

Book a discovery call. We’ll assess where your organization stands today and give you a clear picture of what a realistic program looks like before any work begins.