2020 TRENDS, INTELLIGENCE AND LATEST TRAINING PROGRAMS - Cybertech 2020 Special Edition - CyberGym

Page created by Milton Washington
 
CONTINUE READING
2020 TRENDS, INTELLIGENCE AND LATEST TRAINING PROGRAMS - Cybertech 2020 Special Edition - CyberGym
Cybertech 2020
                                                               Special Edition

2020 TRENDS, INTELLIGENCE
AND LATEST TRAINING PROGRAMS
Bridging the mounting cybersecurity talent gap and training
your personnel in the skills they need to effectively defend
your organization from daily cyber threats

/ 1 /
Table Of Contents

        2020 Training Programs                                           Page 3

        The Changing Cybersecurity Landscape of 2020 and Beyond          Page 4

        2020 Complex Cyberattack Experience                              Page 5

        2020 Cybersecurity Awareness Essentials                          Page 6

        4G, 5G and IoT Environments - Security Tactics                   Page 7

        2020 Cyber Crisis Management for Executives                      Page 8

        Distribution of CYBERGYM'S live training facilities              Page 9

        Advanced Forensic Collection                                     Page 10

        Essential Incident Response Tactics                              Page 11

        Cyber Threats and Defense Essentials                             Page 12

        Advanced SOC-Intrusion Detection Tactics                         Page 13

        Cybersecurity for External Contractors                           Page 14

        Basic Incident Response for ICS                                  Page 15

        Cyber Guardian Certification Program                             Page 16-17

        CYBERGYM Value Added Services                                    Page 18-19

/ 2 /                                                             www.cybergym.com | info@cybergym.com
2020 TRAINING PROGRAMS
A Complete, Organization-Wide Qualification

                                     Cybersecurity Professionals
                                     2020 Complex Cyberattack Experience
                                     Advanced Forensic Collection
                                     Essential Incident Response Tactics
                                     4G, 5G and IoT Environments - Security Tactics
                                     Cyber Threats and Defense Essentials
                                     Advanced SOC-Intrusion Detection Tactics
                                     Basic Incident Response for ICS

                                     IT / OT Professionals
                                     2020 Complex Cyberattack Experience
                                     2020 Advanced Forensic Collection
                                     Cyber Threats and Defense Essentials
                                     Advanced SOC-Intrusion Detection Tactics

                                     Corporate Executives & Senior Management
                                     2020 Complex Cyberattack Experience
                                     2020 Cyber Crisis Management for Executives
                                     Cybersecurity for External Contractors

                                     General Employees & Executives
                                     2020 Complex Cyberattack Experience
                                     2020 Cybersecurity Awareness Essentials

/ 3 /
THE CHANGING CYBERSECURITY
LANDSCAPE OF 2020 AND BEYOND
Cyber threats are the number one existential concern of CEOs and executives,         CYBERGYM’s Proactive
and rightly so. Hackers are breaking into corporate networks every 30 seconds
on average, and in 2019 the number of well-planned, complex, multi-stage             Cyber Strategy for 2020
attacks grew by 40%.
                                                                                     Cybersecurity budgets have dramatically increased in recent years and are
Looking forward to 2020, CYBERGYM’s experts expect to see further                    expected to increase even faster in the face of the enormous corporate
sophistication and long-term planning in cyberattacks executed by larger             challenges that data security and privacy are about to present. Companies
groups of professional hackers, and smaller hacker groups targeting the billions     in the USA are currently spending between $1,300-3,000 per employee on
of mobile devices in daily use worldwide. Attacks will feature new types of          cybersecurity initiatives, a figure that is likely to increase in 2020. As the
human-targeted and engineered breaching methods, while AI and non-human              professional security workforce becomes pricier and scarcer by the day, these
algorithms will enable the automation and scaling of cyber terror, political         huge investments are well justified, but their impact must be maximized.
cybercrimes, and national-level attacks.
                                                                                     CYBERGYM sees these challenges in a holistic way, offering qualification
One element that will remain key for any cyberattack is the human factor as a        programs that are tailored to a detailed profile of each company and
door opener, enabler or even facilitator. This phenomenon is exacerbated by the      organization, to match the precise threats, technology and manpower structure
global shortage in cybersecurity professionals; industry leaders estimate that       involved, but most importantly, the skills and knowledge-level of its people.
in 2020, the demand for security professionals will exceed 4 million positions
globally, a massive 45% increase on the 2.8 million available today.                 As we launch into 2020, CYBERGYM has prepared a unique training portfolio that
                                                                                     answers the security trends we have prioritized as being the most crucial for
In the growing absence of the skilled, professional cyber manpower required,         our clients in the coming year. In this way, we help organizations to maximize
decision-makers are challenged to re-think the use of their security budgets         every dollar spent on security, ensuring that this investment achieves the
and must seek new and creative ways of optimizing the resources they                 best performance of your people - the most crucial, risky and costly security
have. Part of the answer to this challenge is to introduce progressive training      resource you have.
and qualification programs, not only for IT and cybersecurity staff, but for all
employees.

CYBERGYM Live Training Solutions
CYBERGYM builds training solutions for all levels of the organization, at the core
of which is live-training - the most effective, rememberable way for people to
gain first-hand experience of the potential risk and damage associated with a
multi-staged cyberattack.

Our training programs are conducted at our network of training facilities, which
we call Cyberwarfare Arenas, around the world, offering skillful cyber training
and live training sessions for your teams of security professionals, executives
and managers, and general employees.

/ 4 /                                                                                                       www.cybergym.com | info@cybergym.com
2020 Complex Cyberattack Experience
The primary goal of a cyber-readiness program is to instill in every employee, manager or           Suggested Target Personnel
team member a high level of awareness of the security risks and threats to the organization in
question.                                                                                           All employees and managers of all levels, roles
                                                                                                    and departments; security professionals (as an
CYBERGYM’s 2020 Complex Cyberattack Experience program is designed as a unique, entry-              introductory level program).
level program that creates awareness and commitment in all employees, at all levels of your
organization. The program begins with an introduction to the major threats and data and privacy
security trends expected to characterize 2020. A complementary workshop touches on the              Duration
various strategies of human-engineering hacking and the risks to corporate data assets, while
additional topics include seeing the organization from a client-privacy viewpoint.                  One full day
                                                                                                    - Morning session - lectures and workshops
The highlight of the program is the opportunity it gives participants to experience first hand a    - Afternoon session - live cyberattack
live, multi-stage cyberattack, beginning with the use of human-engineering methods to breach          experience.
personal mobile devices, and continuing on to the compromise of major corporate networks
and data assets. The day ends with an open ‘meet the-hacker’ session, where participants get to
understand the hacker’s strategy, the attack scenario logic and stages, and how offensive hackers
both think and act.

This highly impactful and rememberable training is a once-in-a-lifetime experience for most
participants.

Training Outcomes
    ■ Acquire a deep understanding of the most relevant and current risks and trends
      in cybersecurity

    ■ Develop an awareness of the daily risk of human-engineering hacking

    ■ Gain an understanding of recent privacy-driven regulations and their implications
      on businesses

          Undergo a unique, highly-effective experience for a cyberattack on corporate assets

/ 5 /
2020 Cybersecurity Awareness Essentials
Generally, cybersecurity isn’t one of a general employee’s daily concerns. But, just one mistake          Suggested Target Personnel
can be very costly; if an employee opens a malicious email attachment, the whole organization
could be exposed to a serious malware attack.                                                             General employees
Participants in CYBERGYM’s 2020 Cybersecurity Awareness Essentials training program gain                  Duration
an understanding of the cyber-threat landscape, including different types of attack and the
impact they can have. They’ll experience an actual cyberattack, enabling them to understand               One full day
their responsibilities, as well as the tools and procedures they’ll need during the event. This
training radically improves your employees’ ability to detect and avoid cyber events.

Training Outcomes
    ■ Increase awareness of cyberattacks

    ■ Understand responsibilities and available interfaces

    ■ Enhance security-threat detection skills

    ■ Acquire insights into the hacker’s perspective and mindset

    ■ Undergo a unique, highly-effective experience of a cyberattack on corporate assets

/ 6 /                                                                                              www.cybergym.com | info@cybergym.com
4G, 5G and IoT Environments - Security Tactics
As the global rollout of 5G mobile networks approaches, the world is about to experience an      Suggested Target Personnel
eruption of billions of new mobile-connected devices of various types, including not only
personal smartphones but also surveillance sensors, industrial controllers, robotics devices,    Security professionals; incident response
appliances and more. The sheer number of devices will present a new, unprecedented level of      teams; SOC professionals; security and IT
security and privacy challenges for businesses.                                                  executives

CYBERGYM’s 4G, 5G and IoT Environments - Security Tactics program is designed for
security teams and executives who wish to be educated in the risks for corporate networks, new   Duration
cybersecurity trends and updated offensive strategies that are the direct outcome of this new
reality.                                                                                         One full day

The program includes lectures, workshops, hands-on exercises and a live-training cyberattack
which follows a complex scenario of human-engineered breaches into mobile and IoT devices,
compromising the organization’s networks.

Training Outcomes
    ■ Acquire a deep understanding of the most relevant and updated risks and trends
      in mobile networks, new IoT devices, and networking strategies of ultra-high-speed
      connected devices

    ■ Gain experience and expertise of a mobile-oriented cyberattack on corporate assets

    ■ Understand the offensive strategy and hacker point-of-view of human-engineered
      mobile network cyberattacks

    ■ Undergo a unique, highly-effective experience of a cyberattack on corporate assets

/ 7 /
2020 Cyber Crisis Management for Executives
In 2020, executives will be expected to make decisions that will have a crucial impact on their              Suggested Target Personnel
organizations, shareholders, employees, customers and partners. During a cyber event, they must
be able to make the right calls, and fast, such as whether to pay the ransom demanded, how to                CEOs and senior executives; board members
draft a crisis-management plan, and when to release public statements and share information
with the relevant authorities. This requires constant awareness, knowledge and skills that are               Duration
touched upon in an impactful way during this authentic and realistic training.
                                                                                                             One half day
In CYBERGYM’s 2020 Cyber Crisis Management for Executives program, trainees manage
a live, complex, multi-stage cyberattack on their organization’s most valuable assets. Tailored
to your organization’s specific profile in terms of global distribution, IT and/or OT technologies,
and security policies, the training simulates an actual attack and the most up-to-date threats,
with particular emphasis on risk management and the specific skills required to deal with a
cyberattack.

Training Outcomes
    ■ Understand cybersecurity threats and their short and long-term consequences

    ■ Recognize the range and complexity of cyberattacks, and their impact on the entire
      organization

    ■ Gain experience of managing a realistic cyber event, in a highly stressful environment

    ■ Acquire insights into the hacker’s perspective and mindset

    ■ Use the required tools to make critical decisions during a cyberattack

    ■ Learn policies required for effective cyber-event management

          Undergo a unique, highly-effective experience of a cyberattack on corporate assets

/ 8 /                                                                                                 www.cybergym.com | info@cybergym.com
DISTRIBUTION OF CYBERGYM'S
           LIVE TRAINING FACILITIES
        WCWA - Worldwide Cyber Warfare Arenas

                                   VILNIUS
                              AMSTERDAM

              NEW YORK   LISBON
                                                    SHINJUKU
                                       TEL AVIV
                                                    AKASAKA

                                     JOHANNESBURG

                                                    MELBOURNE

/ 9 /
Advanced Forensic Collection
Cyber incidents that involve hacking of desktop and laptop operating systems are rare, but they                 Suggested Target Personnel
are sometimes a precursor to a much larger cyberattack. Hackers tend to cover their tracks and
build complex fabricated fingerprints for their actions, so it’s critical that relevant personnel have          Tier-2/3 security analysts;
the necessary forensic skills, such as exploitation, vulnerabilities, and information-gathering, at             incident response teams
their fingertips, ready to deploy them quickly and wisely as required.
                                                                                                                Duration
CYBERGYM’s Advanced Forensic Collection program gives participants training in incidents
of hacking of MS-Windows, enabling your team to gain practical hands-on experience of the                       Two full-day sessions
internal mechanisms of a complex malware scenario.

Sitting through a series of lectures at one of CYBERGYM’s secure training arenas, and working
together to solve exercises, your team will develop the understanding of essential tools and skills
they need to perform at their peak when duty calls.

Training Outcomes
    ■ Achieve a deep familiarity with the internal mechanisms of a cyber malware attack

          Understand the theory and practical skills required to perform cyber forensics
          in a complex OT/IT environment

    ■ Work in a unique team format, and test your team’s capabilities and collaboration levels

/ 10 /                                                                                                   www.cybergym.com | info@cybergym.com
Essential Incident Response Tactics
CISO and SOC managers play a pivotal role in detecting and defending against cyberattacks; in       Suggested Target Personnel
the event of such an incident, the entire management of the response and actions taken are
overseen directly by the CISO or SOC manager. Since they are ultimately responsible for securing    CISO and SOC managers; IT and OT personnel
the organization, they must be included in your organization’s cybersecurity decision and policy-
making. Defining, implementing and maintaining the entire protection-defense-response system        Duration
requires careful communication, running routine testing and aligning business policies.
                                                                                                    Three full-day sessions
In CYBERGYM’s Essential Incident Response Tactics program, participants face various
complex attack scenarios and learn how to mitigate them. The training covers the full spectrum
of breach identification: endpoint and network levels, SIEM and security standpoints.

One of the unique advantages of this program is the involvement of CYBERGYM’s Red Team;
in-house, expert hackers who are deployed during the identification and investigation stages of
the training.

Optional OT-environment sessions benefit from CYBERGYM’s strategic partnership with the Israel
Electric Company, which provides functioning SCADA equipment. Participants are exposed to
scenarios involving specialist industrial equipment and prevalent attacks, such as ransomware,
DDoS and data leaks.

Training Outcomes
    ■ Identify cyberattacks while optimizing SIEM and security systems

    ■ Develop adaptive response strategies to complex cyberattacks

    ■ Detect and rectify network anomalies

    ■ Enhance security-threat detection skills

    ■ Detect, limit, remediate and stop cyber incidents, intrusions and data breaches

    ■ Acquire insights into the hacker’s perspective and mindset

/ 11 /
Cyber Threats and Defense Essentials
As the people behind the SOC team, the IT department is fundamental to the safety of your                   Suggested Target Personnel
organization; they ensure that appropriate detection and response processes are implemented as
designed, to secure the whole organization. As such, the IT department is central prior to, during          IT and OT professionals
and after a cyber event; they are often the first to encounter and perform a rapid analysis on
potential threats. One of the IT department’s challenges is communicating and coordinating with             Duration
the SOC and general workforce. Miscommunication can lead to critical issues going unreported.
                                                                                                            Two full-day sessions
CYBERGYM’s Cyber Threats and Defense Essentials training program enhances your IT
department’s response to cyber threats and cross-team communication and cooperation.
Participants learn how to identify network vulnerabilities, analyze infrastructure in a systematic
manner, and identify security gaps and real-life cyberattacks.

Training Outcomes
    ■ Identify cyberattacks while optimizing SIEM and security systems

    ■ Enhance security-threat detection skills

          Defend system infrastructure from various attack vectors

    ■ Detect, limit and stop intrusions and data breaches

    ■ Contain and repel cyberattacks

    ■ Acquire insights into the hacker’s perspective and mindset

/ 12 /                                                                                               www.cybergym.com | info@cybergym.com
Advanced SOC-Intrusion Detection Tactics
Tier-2 and tier-3 analysts are required to sort through every escalation received from their tier-1   Suggested Target Personnel
colleagues (for example, about potential malware intrusions). As experts, they use complex
security tools and conduct advanced analyses, including deep incident and root cause analyses,        Tier-2 and tier-3 security analysts; incident
potentially affected data sets, and reverse and forensic engineering.                                 response teams

In CYBERGYM’s Advanced SOC-Intrusion Detection Tactics training program, participants                 Duration
face various complicated attack scenarios, covering all areas of security breach identification:
endpoint and network levels, SIEM and security standpoints.                                           Three full-day sessions

Participants create a well-designed, executable plan for managing and responding to
cyberattacks, including steps for preventing data breaches, loss of information and loss of public
confidence. They also acquire crucial digital forensic expertise and learn how to perform a
comprehensive attack analysis.

Training Outcomes
    ■ Identify cyberattacks while optimizing SIEM and security systems

    ■ Strengthen anomaly-detection capabilities
    ■ Detect when and how a cyber breach occurred

    ■ Develop an adaptive response to complex cyberattacks

    ■ Enhance security-threat detection skills

    ■ Detect, limit, remediate and stop cyber incidents, intrusions and data breaches

    ■ Acquire insights into the hacker's perspective and mindset

          Experience APT containment and remediation live and in real time!

/ 13 /
Cybersecurity for External Contractors
Contractors are often unaware of potential cyber threats and security procedures. Additionally,              Suggested Target Personnel
third-party vendors are not necessarily bound by your company’s security policies; indeed,
sometimes, they are not even aware of them.                                                                  External contractors

In addition to explaining the company's security policies, CYBERGYM’s Cybersecurity for                      Duration
External Contractors training program demonstrates a real-time cyberattack, instructing
participants how to detect and react to threats. Training includes exposure to real-life scenarios,          One half-day session
such as email phishing attempts, ransomware attacks, and concealed GSM attacks.

Training Outcomes
    ■ Increase awareness of cyberattacks

    ■ Understand responsibilities and available interfaces

    ■ Understand damage limitation

    ■ Enhance security- threat detection skills

    ■ Acquire insights into the hacker’s perspective and mindset

/ 14 /                                                                                                www.cybergym.com | info@cybergym.com
Basic Incident Response for ICS
CYBERGYM’s comprehensive Basic Incident Response for ICS training program includes the             Suggested Target Personnel
theoretical principles and practical exercises required to manage and lead organizational cyber
incident response processes. Participants gain in-depth knowledge of critical concepts and tools   OT professionals
in the field of ICS incident response.

The content, case studies, tools, hands-on experiences and methods used in the program are         Duration
focused explicitly on the management, investigation and analysis of ICS and OT cybersecurity
incidents.                                                                                         Three full-day sessions

Training Outcomes
    ■ Acquire the necessary expertise, methodology and practical experience required to
      become a skilled first responder or incident response team member, in organizations
      that utilize ICS or OT systems

    ■ Manage corporate security policies and ensure compliance with standards and
      regulations

    ■ Develop and update organizational policies and procedures

    ■ Evaluate the extent of damage and assign responsibilities

         Detect and mitigate real-life APTs

/ 15 /
CYBER GUARDIAN
                             CERTIFICATION PROGRAM
                             Transform your in-house security specialists into
                             multidisciplinary security professionals

         Cybersecurity Awareness - Essentials Workshop
         Introduction to the key architectural and technological
         concepts of cybersecurity. Implementations and
                                                                     1
         applications in: networking and communications,
         computer architecture, software development &
         execution.                                                          Security Monitoring & Management
                                                                     2       Tools, concepts and methods used to monitor and
                                                                             manage the network security infrastructure. Gain an
                                                                          Security Monitoring
                                                                             essential        & Management
                                                                                       understanding   of the big security picture
                                                                             as well as the cybersecurity incident flow unfolding
         Network Security Concepts & Methodologies                           within the organization's network.
         cybersecurity key threats, attack patterns and risks in
         the cyber world; methods and concepts in protecting
                                                                     3
         and attacking the organizations critical data assets.

                                                                             Essential Tools for Cyber Investigation
                                                                     4       Professional tools to investigate an incident, collect
                                                                             initial evidence, and extract the required information
                                                                             for use by the incident response team.
         Incident Response - Principal Tactics
         Tools, skills and work methods utilized by an incident
         response team, within the organizational context, and       5
         during a live cyberattack in one of our Cyberwarfare
         Arena environments.
                                                                             Cyber Crisis Management
                                                                             Skills and concepts required for successful
                                                                     6       management of a major cyber incident and its
                                                                          Graduation
                                                                             damageBoot   Camp
                                                                                      to the organization, based on best practices
                                                                             and actual case studies.
         Ethical Hacking & Penetration Testing Principles
         Principles, methodologies and tools for ethical hacking
         and penetration testing, covering key concepts such         7
         as exploitation, vulnerability, information gathering and
         more.                                                               Secure Software Development - A Basic
                                                                             Introduction
                                                                     8       Principles for designing secure software architecture
                                                                             and developing secure code, utilizing known
                                                                             practices and techniques, such as input validation,
         Overview of Cyber Basics                                            authentication strategies, memory access protection
         Internal processes, mechanisms and stages of                        and more.
         malware execution. Gaining hands-on experience              9
         in collecting evidence and performing a forensic
         investigation during an actual-live cyberattack, at the
         Cyberwarfare Arena.
                                                                             Graduation Boot Camp
                                                                     10      An intensive experience, summarizing all skills,
                                                                             tools, concepts and techniques covered during
                                                                             the program. The participants will be challenged
                                                                             with a series of live incidents, during which they
                                                                             will demonstrate their skills.

/ 16 /                                                                            www.cybergym.com | info@cybergym.com
Cyber Guardian Certification Program
Cyber Guardian Certification program will take your IT professionals to the next level, giving them the skills
and knowledge they need to manage and operate the entire incident lifecycle from first response, through
mitigation and forensics.
Once certified, your cybersecurity teams, external service providers, and decision-making executives will be
able to rely entirely on your ‘Cyber Guardians’ who will have a full understanding of the event,
and how to manage it.
This program includes a comprehensive body of knowledge, hands-on
exercises and a live-training experience, covering the details required to manage a real-life cyber event.

Certification Outcomes
     ■ Develop the ability to carry out the organization’s initial and ongoing risk analysis

     ■ Acquire the skills to perform an initial analysis of suspicious activity, identify false
       alarms, react to ongoing cyber incidents, minimize damage and optimize the
       mitigation process

     ■ Gain the knowledge, experience and technical ability to perform the initial
       evidence collection and forensic investigation of a cyber incident, and provide the
       required findings

     ■ Act as a single point of contact, and liaise between the organization’s technical
       teams, workforce, management and external experts and suppliers

     ■ Correlate the organization’s cyber-incident management and attack-mitigation
       processes with the organization’s procedures and policies

     ■ Act as the organization’s leading cyber-defense authority, responsible for
       maintaining cybersecurity awareness among all employees

        Suggested Target Personnel
        IT professionals; newly recruited security professionals

        Duration
        18 days

/ 17 /
CYBERGYM Value Added
         Services
         A complete and comprehensive response to
         your cybersecurity needs

/ 18 /                               www.cybergym.com | info@cybergym.com
CYBERGYM Value Added Services
A complete and comprehensive response to your cybersecurity needs

Leveraging a unique combination of top-of-the-line infrastructure, extensive cybersecurity
expertise, and key insights gained from training your personnel, we’ll test, analyze and
evaluate your organization’s cyber strategies and technologies, identify gaps, and support
you through the process of closing them.

     Our main services

                    Penetration Test
                    Test the effectiveness of your security technologies, policies and human skills in the safest, most realistic environment. Scalable

                    and customizable to any organization size, distribution model, environment and workforce, our penetration testing will enable

                    you to discover and map the weakest points in your defenses.

                    Vulnerability Assessment
                    Get an in-depth view of the state of your security and how to improve it. Powered by our Red Team of professional White-Hat

                    hackers, we’ll launch a series of complex cyberattacks on your security systems, testing them against external and internal

                    threats, including private applications, infrastructure and cloud services.

                    IT Incident Response Services
                    Certified by CYBERGYM, our highly-qualified team delivers the ultimate incident response performance, identifying and

                    containing threats in order to prevent damage to your organization.

                    SOC as a Service
                    Our ex-intelligence cyber experts around the world are available to take care of your SOC needs; identifying, mitigating and

                    collecting forensics for any cyber incident, to optimize your cybersecurity posture.

/ 19 /
About CYBERGYM
CYBERGYM provides tailored cyber-training solutions to organizations around the world.
With the most relevant threat model and a technological environment configured to your
technological setup, we make sure your people gain the experience they need, as individuals
and as a team. CYBERGYM further qualifies your general workforce and executives, delivering
an all-inclusive, organization-wide solution.

Founded in 2013 by experienced veterans of Israel’s prestigious intelligence organizations,
CYBERGYM gives you the peace of mind of knowing that your teams are always ready, and
cyber investments are maximized.

      CYBERGYM Israel (HQ)                          CYBERGYM USA                              CYBERGYM Japan
      1 Mivtza Yonatan St                           224 West 30th St.,                        101 Homat Royal, 1-14-11,
      Hadera 3852024                                Suite 502 New York, NY 10001              Akasaka, Minato-ku
                                                                                              Tokyo, 107-0052
      Tel: +972-4-667-9701                          Tel:+1-877-292-3749
      Sales@cybergym.com                            info@cybergymny.com                       Tel: +81-3-6807-4312
                                                                                              info_jp@cybergym.com

                                                    CYBERGYM Australia                        CYBERGYM Lithuania
                                                    370 Docklands Dr.                         Kareiviu 11B
                                                    Docklands, VIC 3008                       Vilnius LT-09109

                                                    Tel: +61-3-91318300                       Tel: +972-4-667-9701
                                                    Sales@cybergym.com.au                     Vilnius@cybergym.lt

                                                    CYBERGYM Netherlands                      CYBERGYM South Africa
                                                    The Base, Evert van de Beekstraat 1,      Building 1 Pendoring Office Park,
                                                    1118 CL Schiphol                          299 Pendoring Rd,
                                                                                              Blackheath, Randburg, 2195
                                                    nl@cybergym.com
                                                                                              SA@cybergym.com

                                                                                     www.cybergym.com | info@cybergym.com
/ 20 /                                                                                          www.cybergym.com | info@cybergym.com
You can also read