


Microsoft Incentive Program
Unlock the full potential of Microsoft's subsidised security workshops with Swiss Post Cybersecurity to strengthen your resilience.
Secure your future with fully funded Microsoft security workshops
Microsoft supports companies by providing valuable insights, concrete recommendations for action and individual security strategies through subsidised security workshops, at minimal or no cost.
As a certified Microsoft Security Solutions Partner specialising in threat protection and cloud security, Swiss Post Cybersecurity supports these workshops. Thanks to the expertise and experience of our specialists, we ensure that organisations improve their long-term security situation and reap the full benefits of the workshops.


We are currently implementing the following subsidised Microsoft workshops.
Threat Protection Envisioning Workshop
How secure is your cloud environment? Companies face a variety of risks on a daily basis, including phishing, identity theft and vulnerabilities in devices or servers. The Threat Protection Envisioning Workshop provides clarity on your current security situation and offers concrete, long-term improvement measures.
What you can expect
Your added value
Modern SecOps Envisioning Workshop
Cyber threats are evolving faster than ever before. Traditional security systems are no longer sufficient. Microsoft Sentinel is a modern, cloud-native SIEM solution that can help you stay one step ahead of attackers.
During the Modern SecOps Envisioning Workshop, we will demonstrate how to detect threats early, automatically defend against them, and strengthen your security processes in the long term.
What you can expect
Your added value
The Data Security Envisioning Workshop
In the digital age, data is a company's most valuable asset and, at the same time, one of its greatest risks. The Data Security Envisioning Workshop helps you to identify data security risks at an early stage, optimize your compliance strategy, and make the best possible use of modern Microsoft technologies.
What you can expect
Your added value
Cyber Blog
On the Cyber Blog you will find the current insights, expert articles, and practical tips on the latest cyber threats and security solutions to enhance your company's digital security.

Assume that you will be hacked at some point

The ClickFix Deception: How a Fake CAPTCHA Deploys an Evasive Infostealer

The invisible attack

Understanding Physical Intrusion in Pentesting: The Unseen Force in Cybersecurity - Part 1

Swiss Post Cybersecurity at the 37th Annual FIRST Conference in Copenhagen

Press Release

Attack as defense

Vulnerabilities discovered in REDCap
