Secure identity systems built to support national infrastructure and enterprise authentication needs.
Organize, govern, and leverage critical information with tools designed for compliance and performance.
Protect digital ecosystems with advanced defense layers, threat monitoring, and expert-led risk mitigation.
Secure identity systems built to support national infrastructure and enterprise authentication needs.
Organize, govern, and leverage critical information with tools designed for compliance and performance.
Protect digital ecosystems with advanced defense layers, threat monitoring, and expert-led risk mitigation.
RaulWalter has worked on dozens of technically and organizationally demanding projects that have supported the development of national identity solutions, improved data quality, strengthened system security, and shaped digital ecosystems across different regions of the world.
RaulWalter specializes in identity solutions for both public and private sector applications.
The trainings are divided into dedicated modules tailored to specific audiences — employee awareness, technical skills for specialists, ISMS implementation, strategic understanding for management, and operational security practice.
Our instructors are active practitioners who support municipalities, hospitals, government agencies, and private-sector organisations daily, ensuring that the training is substantive, example-driven, and immediately applicable. RaulWalter’s training programs help raise overall organisational maturity, reduce human error, and establish a strong security culture.
The list of training modules is not exhaustive and expands as needed. We also deliver customised training sessions for individual organisations.
RaulWalter’s executive cybersecurity training provides decision-makers with a clear understanding of the strategic role of information security, the responsibilities involved, and the risks that affect an organisation’s daily operations.
The training focuses on management systems (ISO 27001, E-ITS), risk management, incident impact analysis, regulatory requirements, budgeting, and integrating information security into the organisation’s overall governance and quality framework.
It enables executives to make informed decisions, assess the return on security investments, understand actual weaknesses, and set realistic priorities. Our approach is practical and example driven, based on dozens of real audits, implementations, and critical incidents that we have helped organisations handle.
RaulWalter’s security awareness training focuses on the everyday security risks employees face and the practical behavioural guidelines that help prevent human error — the most common vulnerability in any organisation.
The training provides a clear overview of social engineering attacks, password management, email and web security, secure device use, data protection requirements, and incident reporting procedures.
The approach is simple, practical, and example-driven, ensuring that employees can immediately apply what they learn. The training is suitable for both new staff and regular refresher courses, helping strengthen the organisation’s security culture and significantly reduce human-factor–related risks.
RaulWalter’s technical cybersecurity training is designed for specialists responsible for the practical implementation, configuration, monitoring, and evidence of information security controls. The trainings cover technical security controls, log management, vulnerability identification, incident response, advanced ISMS processes, security architecture principles, and hands-on operational practices.
A dedicated focus is placed on implementing and using Cybsis — asset mapping, risk assessment, control documentation, task management, and audit readiness. The trainings are built on real project experience and include demonstrations and practical exercises, enabling specialists to achieve a systematic, evidence-based level of information security maturity
RaulWalter’s ISMS (Information Security Management System) and IMR (Information Security Measures Implementation Plan) trainings focus on how an organisation can systematically build, manage, and evidence its information security in accordance with ISO 27001 and E-ITS requirements. The training covers asset mapping, linking risk assessment results to specific controls, prioritising and scheduling measures, resource planning, monitoring, and reporting to management.
Special emphasis is placed on the practical development of the IMR and its alignment with the organisation’s real operational processes and areas of responsibility. We demonstrate how to use Cybsis to plan measures, track implementation, and ensure audit readiness. The training helps create a clear, actionable, and auditable control-based security framework that supports sustainable risk management.
RaulWalter’s incident management and handling trainings give organisations a systematic understanding of how to detect, escalate, investigate, and resolve information security incidents in accordance with ISO 27035, ISO 27001, and E-ITS requirements. The training covers incident classification, impact assessment, evidence collection, log analysis, communication management, service restoration, post-incident review, and the planning of corrective measures.
Our approach is practical and evidence-based, drawing on real experience in resolving critical incidents. We demonstrate how to use Cybsis to register, monitor, and document incidents, and how to ensure that the organisation maintains an incident management process that is both operationally effective and audit-ready at all times.
RaulWalter’s risk management trainings provide organisations with a comprehensive framework for identifying, assessing, and mitigating information security risks in accordance with ISO 27005, ISO 31000, and E-ITS requirements. The training covers asset identification, threat scenario development, vulnerability analysis, impact assessment, risk level calculation, control selection, and the creation and continuous maintenance of a risk register.
We place special focus on the practical use of Cybsis in risk management — including linking risks to security measures, responsible owners, and control mechanisms. The training enables organisations to adopt a structured risk management practice that supports decision-making, reduces uncertainty, and provides a solid foundation for the ISMS to function and for maintaining audit readiness.
RaulWalter’s audit training focuses on preparing for an information security audit, structuring evidence collection and control activities as an auditor, and ensuring organisational compliance with ISO 27001 and E-ITS requirements. The training covers audit types (internal audit, external audit, conformity audit), audit criteria, evidence collection, sampling, conducting interviews, documenting nonconformities, evaluating corrective actions, and preparing audit reports.
Throughout the training, we present real examples of common issues and best practices encountered in the field. We also demonstrate how Cybsis supports evidence management, traceability, and audit readiness. The training is suitable for both auditors and organisations wishing to ensure a smooth and compliant audit process.
RaulWalter’s Cybsis training programs provide organisations with a comprehensive understanding of how to use Cybsis in the daily management of the Information Security Management System and risk management processes. The training covers asset mapping, risk assessment, documentation of security measures, creation and monitoring of the IMR, assignment of tasks and roles, evidence collection, reporting, and maintaining audit readiness.
We also address the processes that maximise Cybsis’ effectiveness — version control, periodic reviews, change management, and workflow optimisation. The trainings are practical, example driven, and based on real implementation projects, helping organisations transition from fragmented documentation to a unified, comprehensive, and evidence-based information security management framework.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
RaulWalter – Trusted Digital Infrastructure
We firmly believe that the internet should be available and accessible to anyone, and are committed to providing a website that is accessible to the widest possible audience, regardless of circumstance and ability.
To fulfill this, we aim to adhere as strictly as possible to the World Wide Web Consortium’s (W3C) Web Content Accessibility Guidelines 2.1 (WCAG 2.1) at the AA level. These guidelines explain how to make web content accessible to people with a wide array of disabilities. Complying with those guidelines helps us ensure that the website is accessible to all people: blind people, people with motor impairments, visual impairment, cognitive disabilities, and more.
This website utilizes various technologies that are meant to make it as accessible as possible at all times. We utilize an accessibility interface that allows persons with specific disabilities to adjust the website’s UI (user interface) and design it to their personal needs.
Additionally, the website utilizes an AI-based application that runs in the background and optimizes its accessibility level constantly. This application remediates the website’s HTML, adapts Its functionality and behavior for screen-readers used by the blind users, and for keyboard functions used by individuals with motor impairments.
If you’ve found a malfunction or have ideas for improvement, we’ll be happy to hear from you. You can reach out to the website’s operators by using the following email
Our website implements the ARIA attributes (Accessible Rich Internet Applications) technique, alongside various different behavioral changes, to ensure blind users visiting with screen-readers are able to read, comprehend, and enjoy the website’s functions. As soon as a user with a screen-reader enters your site, they immediately receive a prompt to enter the Screen-Reader Profile so they can browse and operate your site effectively. Here’s how our website covers some of the most important screen-reader requirements, alongside console screenshots of code examples:
Screen-reader optimization: we run a background process that learns the website’s components from top to bottom, to ensure ongoing compliance even when updating the website. In this process, we provide screen-readers with meaningful data using the ARIA set of attributes. For example, we provide accurate form labels; descriptions for actionable icons (social media icons, search icons, cart icons, etc.); validation guidance for form inputs; element roles such as buttons, menus, modal dialogues (popups), and others. Additionally, the background process scans all the website’s images and provides an accurate and meaningful image-object-recognition-based description as an ALT (alternate text) tag for images that are not described. It will also extract texts that are embedded within the image, using an OCR (optical character recognition) technology. To turn on screen-reader adjustments at any time, users need only to press the Alt+1 keyboard combination. Screen-reader users also get automatic announcements to turn the Screen-reader mode on as soon as they enter the website.
These adjustments are compatible with all popular screen readers, including JAWS and NVDA.
Keyboard navigation optimization: The background process also adjusts the website’s HTML, and adds various behaviors using JavaScript code to make the website operable by the keyboard. This includes the ability to navigate the website using the Tab and Shift+Tab keys, operate dropdowns with the arrow keys, close them with Esc, trigger buttons and links using the Enter key, navigate between radio and checkbox elements using the arrow keys, and fill them in with the Spacebar or Enter key.Additionally, keyboard users will find quick-navigation and content-skip menus, available at any time by clicking Alt+1, or as the first elements of the site while navigating with the keyboard. The background process also handles triggered popups by moving the keyboard focus towards them as soon as they appear, and not allow the focus drift outside it.
Users can also use shortcuts such as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.
We aim to support the widest array of browsers and assistive technologies as possible, so our users can choose the best fitting tools for them, with as few limitations as possible. Therefore, we have worked very hard to be able to support all major systems that comprise over 95% of the user market share including Google Chrome, Mozilla Firefox, Apple Safari, Opera and Microsoft Edge, JAWS and NVDA (screen readers).
Despite our very best efforts to allow anybody to adjust the website to their needs. There may still be pages or sections that are not fully accessible, are in the process of becoming accessible, or are lacking an adequate technological solution to make them accessible. Still, we are continually improving our accessibility, adding, updating and improving its options and features, and developing and adopting new technologies. All this is meant to reach the optimal level of accessibility, following technological advancements. For any assistance, please reach out to