GCHQ Certified Social Engineering Training

Train your staff to recognise and defend your organisation against the largest cyber threat.

Cyber Crisis Exercises

An immersive and evolving cyber attack exercise to test your strategic and tactical response to an incident.

Insider Threat Training

High impact, interactive face to face training to raise awareness of insider threat risks to your organisation.

Experts in Social Engineering, Insider Threats and Cyber Crisis Simulations. Red Goat was founded to mimic malicious tactics and help organisations improve their defences against the current threat landscape.

Red Goat Cyber Security

Effective Social Engineering Training

Train your staff to be your greatest defence with GCHQ certified interactive training. This face to face course equips your staff with the skills to identify & combat social engineering attacks including spearphishing and vishing as well as an understanding of OSINT techniques.

Immersive and Challenging Cyber Crisis Exercises

Put your plans to the test with a bespoke and immersive cyber crisis exercise. Red Goat have conducted high quality and challenging exercises for critical national infrastructure, hospitals and financial services companies.

Red Goat Cyber Security Cyber Crisis Exercise
Red Goat Cyber Security Insider Threat Training

Insider Threat Training

Stopping the insider threat is as much about deterrence as it is detection. Our informative and engaging training helps equip staff with the skills to identify potential threats and reinforces your organisation’s commitment to challenging this complex threat.


Businesses We’ve Helped

Bristol Airport

“Red Goat were very helpful and provided an excellent training course that was really engaging and helpful to a wide range of our staff”.


“I was hugely impressed by the Social Engineering Awareness Course run by Red Goat Cyber Security. It is one of the first courses I’ve encountered where those who attended it have continued to talk about it long afterwards; a sure sign that the key messages imparted by the trainer have stuck. “

John Stanley MBCI, Risk & Resilience Manager
Salisbury National Health Service Trust

“I was delighted with how Red Goat Cyber Security delivered the cyber security table top exercise.  We have learnt valuable lessons to further improve our plans, processes and check lists and would highly recommend them to other organisations”

Bath hospital

“Excellent course and great scenarios. We would recommend this course to anyone, really informative and relaxed. Rarely is there a course that is both informative and enjoyable. Really good.”

Futures Housing Group

“Red Goat were really helpful in tailoring a course to our needs. The trainer was really engaging.”


Lisa Forte on Random But Memorable Podcast

Comically Bad Ultrasonic Berry with Lisa Forte   Description Do we need more positivity in cybersecurity? And are bananas a type of berry? 🍌Join us, as we ask (and attempt to answer) some of life's big questions on the show this week. We also roll into WatchTower...
Why Run a cyber Crisis Exercise

Why run a cyber crisis exercise?

Why run a cyber crisis exercise? Regulators around the world now have an expectation that organisations will test cyber resilience through exercising. Organisations such as NIST and the CPNI recommend regular exercises to prepare for a cyber attack and it has become...

Insider Threats: £4.6m in self-signed invoices

Of the three categories of insider threat; theft, fraud and sabotage, fraud is often the most complex,  inventive and difficult to detect. This case however, has a certain simplicity to it. The case concerns a Mr Kabbaj who worked for an “unnamed global internet...
Scot-Secure 2020


LISA FORTE INTERVIEW WITH DIGIT MAGAZINE Lisa Forte, partner and cyber threat specialist at Red Goat Cyber, shares her insights about the ‘insider threat’ and how to protect against it.  How has the insider threat evolved in recent years? Firstly, we now live in a...

Amazon Ring Insider Threat

What happened? Ring, the Amazon owned home-security company, has admitted firing four employees who accessed users’ videos. The employees had access to the video feeds but exceeded their authorised access by viewing them. This has undoubtedly caused embarrassment for...

The Facebook Insider

Friday the 13th  is a day that has been long associated with bad omens. This became a reality for almost 30,000 Facebook staff though on Friday the 13th of  December. Almost 30,000 employee payroll records were stolen. The theft left information security professionals...

Trend Micro Insider Breach

The Tokyo based cyber security company Trend Micro has revealed it has been the victim of a sophisticated insider threat attack. Customer records were accessed and exfiltrated by an employee then used by attackers in a vishing attack on Trend Micro customers....

Insider threat: former SEC investigator charged

The SEC investigator was charged with several crimes including unauthorized computer access and disclosure of confidential information. The defendant, Mr. Cohn, was the MD and Chief Compliance Officer at GBP Capital Holdings. Cohn allegedly accessed compromising...

How voice assistants can be used to phish passwords

We have seen a wealth of articles on the security and privacy issues around voice assistants. This week I came across and new and far more concerning article on this by Ars Technica: “Amazon- and Google-approved apps turned both voice-controlled devices into "smart...

BBC Tech Tent: Insider Threat Reporting

https://www.bbc.co.uk/sounds/play/w3csymss listen from 17:10

Reach Us

+44 117 325 9190



By submitting your message and your phone number and/or email address, you are permitting us to contact you by these means in response to your enquiry or feedback. You also acknowledge that you have read our privacy terms and that you consent to our processing data in accordance with them.Read our privacy policy here

Contact Us