Who it's for

Designed for practitioners

Journalists & Reporters

Especially those covering sensitive topics, corruption, or working in high-risk environments where digital threats are a daily reality.

Human Rights Defenders

Activists, advocates, and civil society actors who are frequent targets of online harassment, surveillance, and deanonymisation attempts.

🏛

NGOs & Support Organisations

Organisations that protect or support journalists and HRDs, building internal capacity and delivering consistent training to their networks.

🔬

Researchers & Academics

Independent and institutional researchers working on disinformation, extremism, or digital threats who need operational security frameworks.

What I offer

Topics & Sessions

Each topic can be delivered as a standalone session, a half-day workshop, a full-day training, or combined with others into a multi-day programme. Every session is built from scratch around the participants: their context, their threat landscape, and their experience level. Nothing is off-the-shelf.

Always adapted to your group

Before any training, we do a context assessment together. That means understanding who the participants are, what environment they work in, what threats are relevant to them, and what they already know. The session content, examples, and scenarios are all adjusted accordingly. A training for a newsroom in Guatemala City is not the same as one for a research team in Berlin.

01

Digital Security Foundations for Journalists

A comprehensive introduction to the digital threat landscape for journalists and media workers. Covers device security, account protection, secure communications, and building a personal threat model adapted to your specific risk profile and context.

Threat modelling Device security Secure comms OPSEC
Half-day · Full day Online · In person
02

OSINT for Investigative Journalists

Practical open-source intelligence gathering for journalists. Tools, techniques, and workflows for digital investigations: verifying identities, and tracking disinformation networks to analysing social media data and documenting evidence. Hands-on with real tools.

Open source intelligence Verification Social media analysis Evidence documentation
Full day · 2 days Online · In person
03

Investigating Trolling & Online Harassment Campaigns

How to identify, document, and report on coordinated online harassment targeting journalists, activists, and public figures. Covers campaign anatomy, actor mapping, attribution methodology, and how to safely gather evidence without exposing yourself.

Campaign analysis Actor mapping Attribution Safe evidence gathering
Full day Online · In person
04

Hostile Environments & Risk Assessment

Grounded in emergency management methodology, this module teaches journalists and HRDs to systematically assess risk before, during and after field work, covering both physical and digital dimensions. Includes scenario planning, contingency protocols, and decision-making under pressure. Adapted from public safety training frameworks.

Risk assessment Scenario planning Field protocols Crisis decision-making
Full day · 2 days Online · In person
05

Disinformation & Influence Operations: Detection and Reporting

Understanding how coordinated disinformation campaigns are built, amplified, and sustained. You will learn how to investigate and report on them responsibly. Covers influence operation anatomy, platform dynamics, narrative tracking, and the journalist's role in avoiding amplification.

Influence operations Narrative tracking Platform dynamics Responsible reporting
Half-day · Full day Online · In person
06

Security Protocol Design for Newsrooms

Working with editorial leadership and security officers to build institutional digital security protocols adapted to the newsroom's specific threat model. Includes policy templates, training cascades, and incident response frameworks. Based on active collaboration with RSF, HPC, and ECPMF.

Institutional protocols Policy design Incident response Newsroom-specific
Bespoke In person preferred

Methodology

How the training works

Every session is built around one core principle: participants should leave able to make better decisions independently, without depending on a trainer or a checklist. That means the learning has to stick, which means it has to feel real.

The framework comes directly from public safety and emergency management practice, where you train for the worst case, not the average case. You plan for failure. You rehearse under conditions that simulate real pressure. And you build the mental models that let you improvise when the scenario does not match the plan. It never does.

Content is always adapted to the group's context, experience level, and threat landscape. A training for a newsroom in Central America looks different from one for researchers in Europe, even if the topic title is the same.

The four stages

01

Awareness

Who the threat actors are, what their tools and motivations look like, and why you are a potential target.

02

Threat modelling

Building a personal or institutional threat model. Which risks apply to this specific person, in this specific context.

03

Adversarial scenarios

Working through real scenarios from the attacker's perspective. Think like the threat to anticipate and counter it.

04

Strategy & autonomy

Leaving with a realistic, actionable plan grounded in your own context. Not a checklist. Not dependence on a trainer.

Track record

Training delivered with

Training delivered in collaboration with leading press freedom, human rights, and investigative journalism organisations across Europe, Latin America, and the Middle East.

45–50

Trainings per year

Across organisations and contexts globally

10+

Countries reached

Europe, Latin America, Middle East and beyond

1–25

Participants per session

Individual, small group (5–8) and cohort (20–25) formats

Where I have trained

Training delivered
Upcoming
MOOC · 2025

Knight Center for Journalism in the Americas

Online course on digital security and OSINT for journalists, delivered in English and Spanish through the Knight Center's MOOC platform at the University of Texas at Austin. The largest single training event by reach.

5,000+

Participants

Practical information

What to expect

Duration

Half-day to multi-day

From 3-hour focused workshops to 2–3 day intensive programmes. Duration is adapted to module complexity and group needs.

Group size

Small cohorts preferred

Works best with groups of 8–25 participants. Smaller groups allow deeper scenario work. Larger groups can be accommodated for conference-style delivery.

Languages

English & Spanish

All modules available in both languages. Mixed groups can be accommodated. Materials provided in the delivery language.

Format

Online or in person

Both formats fully supported. In-person preferred for scenario-based and institutional protocol modules. Online works well for awareness and OSINT sessions.

Customisation

Always adapted

No session is delivered off-the-shelf. Every training begins with a context assessment covering threat landscape, participant profiles, and organisational needs before content is finalised.

Materials

Provided

Participants receive session materials and reference resources. For institutional trainings, a tailored protocol document or training cascade guide can be produced.

Request training

Ready to build your
team's resilience?

Send a message with a brief description of your organisation, the training you're looking for, your target audience, and preferred format and timeline. I'll get back to you to discuss whether it's a good fit.

Request a training

Workshops for teams and organisations

Looking for a speaker instead?

Conferences, panels, and keynotes

Browse tools & resources

OSINT and security tools I use and recommend