Leadership Training
Executives bear personal responsibility for information security — under NIS2, they also face personal liability. With tailored security awareness training, we empower your board members, managing directors and C-level executives to strategically assess cyber risks, meet regulatory obligations, and champion a sustainable security culture across your organization.
- ✓Strategic embedding of information security within the organization
- ✓Strengthening the role model function for a positive security culture
- ✓Competent decision-making on security topics
- ✓Effective communication of security topics within the organization
Your strategic success starts here
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
For optimal preparation of your strategy session:
- Your strategic goals and objectives
- Desired business outcomes and ROI
- Steps already taken
Or contact us directly:
Certifications, Partners and more...










Executive Security Training: NIS2-Compliant Cybersecurity for Senior Management
Our Strengths
- Many years of experience in advising and training leaders and management teams
- Combination of technical expertise and management know-how
- Practice-oriented, business-focused training formats for different management levels
- Continuous adaptation to new threats and requirements
Expert Tip
Leadership training is most effective when it takes into account the specific challenges and requirements of the respective management level and establishes a clear connection to the business context. The focus should be on strategic aspects, role modeling, and practice-oriented recommendations for action.
ADVISORI in Numbers
11+
Years of Experience
120+
Employees
520+
Projects
Our approach to leadership training is comprehensive, practice-oriented, and individually tailored to your organization and management levels.
Our Approach:
Needs analysis and development of a specific training strategy
Design of tailored training formats for different management levels
Delivery of interactive workshops and practice-oriented simulations
Integration into leadership development and corporate culture
Continuous monitoring of results and accompanying coaching
"Leaders are decisive for the security culture of an organization. When they strategically embed information security and lead by example, they create the foundation for a resilient, future-ready organization."

Sarah Richter
Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
Our Services
We offer you tailored solutions for your digital transformation
Executives & Management
Specific training for C-level executives, board members, and senior management on strategic security topics.
- Strategic security planning and governance
- Risk management and compliance responsibility
- Crisis management and decision-making
- Communication and stakeholder management
Team & Department Leads
Practice-oriented training for middle management on implementing security measures within the team.
- Practical security implementation within the team
- Leading by example on security matters
- Integration of security into work processes
- Motivating and coaching the team
Our Competencies in Security Awareness
Choose the area that fits your requirements
A strong security culture is the most effective defense against cyber threats. We help you measurably embed security awareness — from baseline assessment through culture development to continuous monitoring with KPIs and maturity models. Aligned with ISO 27001, DORA and NIS2.
Over 70% of all cyber attacks exploit the human factor. Our tailored security awareness training empowers your employees to recognize phishing, social engineering and ransomware — through realistic simulations, interactive modules and practical exercises that build lasting security habits.
Phishing remains the most common attack vector against organizations. With professional phishing simulations and hands-on training, we sustainably reduce your employees click rates, strengthen security awareness, and meet regulatory requirements under DORA, ISO 27001, and NIS2.
Frequently Asked Questions about Leadership Training
What makes effective leadership training in the area of information security?
Focus on the strategic role of leaders in shaping information security. Linking security topics to corporate objectives and business strategies. Conveying a comprehensive understanding of the risks and opportunities of information security. Developing security strategies and governance structures at the leadership level. Integrating security aspects into strategic decision-making processes. Leadership Competencies: Strengthening the role model function for a positive security culture within the organization. Developing a security-oriented leadership style with clear communication. Enabling effective delegation and oversight of security tasks. Promoting individual responsibility and security awareness within the team. Building change management competencies for security transformations. Crisis Management: Preparation for decision-making under pressure during security incidents. Development of crisis management and communication skills. Simulation of security incidents and crisis situations for leaders. Clarification of roles, responsibilities, and escalation paths. Training for communication with stakeholders in crisis situations. Business Relevance & Applicability: Direct relevance to the specific business context of the leader. Practice-oriented case studies and realistic scenarios from the relevant industry. Focus on concrete recommendations for action rather than theoretical concepts.
What role do leaders play in establishing a security culture?
Actively demonstrating security-conscious behavior in day-to-day work by leaders. Consistent adherence to and support of security policies and processes. Creating an open error culture and a climate of trust. Appreciation and recognition of security-conscious behavior within the team. Personal commitment to security topics at all management levels. Communication & Positioning: Effective communication of the importance of information security for business success. Regular discussion of security aspects in team meetings and communications. Clear positioning on security topics in strategic discussions. Creating a shared language and common understanding of security topics. Transparent communication of security incidents and lessons learned. Strategic Integration: Embedding security objectives in the corporate strategy and vision. Integrating security metrics into performance management and reporting. Considering security aspects in strategic decisions. Allocating adequate resources for security measures and initiatives. Developing a long-term security strategy and roadmap. Enablement & Empowerment: Promoting individual responsibility for security at all levels. Creating clear structures, roles, and responsibilities for security topics. Investing in training and development of security competencies within the team.
How is leadership training differentiated for different management levels?
Focus on the strategic embedding of information security and governance. Training on regulatory requirements, liability risks, and compliance responsibilities. Conveying methods for integrating security into corporate strategies. Training for crisis management and decision-making during serious security incidents. Preparation for communication with supervisory bodies, investors, and the public. Division & Department Heads: Focus on the operational implementation of security strategies within their area of responsibility. Training on integrating security requirements into work processes and projects. Conveying change management competencies for security transformations. Training for assessing and managing area-specific security risks. Development of leadership competencies to promote a security culture within the team. Team & Project Leads: Focus on the practical implementation of security measures in day-to-day team and project work. Training on security-oriented employee management and role modeling. Conveying methods for motivating and raising awareness within the team. Training for integrating security aspects into agile working methods. Development of coaching competencies for security-conscious behavior. Leaders in Specific Functions: IT leaders: In-depth coverage of technical security topics and standards.
How are leaders prepared for their role in crisis management during security incidents?
Conducting realistic tabletop exercises and simulations of security incidents. Training with various crisis scenarios such as cyberattacks, data breaches, or insider threats. Simulation of escalation levels and decision points under time pressure. Practice-oriented exercises involving external stakeholders such as authorities or customers. Regular execution and continuous further development of crisis exercises. Roles & Responsibilities: Clear definition of roles in crisis management and incident response processes. Training on decision-making authority and escalation paths in crisis situations. Training for collaboration within the crisis team and with external specialists. Preparation for role-specific tasks in different crisis phases. Regular review and adjustment of the crisis organization. Communication & Stakeholder Management: Training for effective internal and external crisis communication. Preparation for communication with employees, customers, partners, and authorities. Training on legal aspects of crisis communication (e.g., reporting obligations). Development of communication strategies for various crisis scenarios. Media training for leaders with a spokesperson role in crisis situations. Decision-Making & Crisis Management: Training for structured decision-making under uncertainty and time pressure. Conveying methods for prioritization and resource allocation during a crisis.
How do leaders communicate effectively about information security?
🎯 Target-Group-Appropriate Communication:
🔄 Continuity & Consistency:
📊 Storytelling & Visualization:
👂 Dialogue & Feedback:
💡 Expert Tip:Effective security communication by leaders creates a connection between abstract security concepts and the daily work of employees. Rather than focusing excessively on risks and threats, leaders should convey a positive message that positions security as an enabler for innovation and business success.
What risk management competencies do leaders need in the area of information security?
Developing a strategic understanding of security risks in the business context. Ability to identify and prioritize critical information assets. Competency to assess threats and vulnerabilities within one's own area of responsibility. Understanding of the interdependencies between different risk areas. Developing a sense for emerging risks and changes in the risk landscape. Risk Strategy & Decision-Making: Developing a balanced risk strategy between security and business requirements. Ability to integrate security aspects into strategic decisions. Competency to make well-founded risk decisions based on cost-benefit analyses. Understanding of the organization's risk tolerance and risk appetite. Ability to develop and prioritize measures for risk mitigation. Risk Communication & Governance: Effective communication of risks to various stakeholders. Understanding of regulatory requirements and compliance obligations. Ability to report to management and supervisory bodies. Competency to develop and enforce policies and standards. Establishing a clear governance structure for risk management. Operational Risk Management: Ability to integrate risk management into operational processes and projects. Competency to monitor and control risk mitigation measures. Understanding of incident response processes and crisis management.
How do leaders guide their organizations safely through digital transformation processes?
Integrating security requirements from the outset into transformation projects. Establishing a structured security governance process for new technologies. Considering security aspects when selecting technologies and partners. Developing security architectures that enable flexibility and innovation. Embedding security gates into project methodologies and development processes. Balancing Innovation and Security: Creating an environment for secure innovation without excessive restrictions. Establishing agile security processes that keep pace with the speed of transformation. Promoting a culture that views security as an enabler rather than a blocker. Developing risk models for dealing with new technologies. Balancing time-to-market with appropriate security measures. Change Management & Competency Development: Guiding the team through change with a clear security orientation. Identifying and closing competency gaps in the area of security. Promoting exchange between business, IT, and security teams. Building security champions across various business areas. Developing a shared understanding of secure digital transformation. Continuous Adaptability: Establishing iterative security processes in a rapidly changing environment. Regular reassessment of security risks during the transformation process. Building early warning systems for new threats and vulnerabilities.
How is the success of leadership training in the area of information security measured?
Developing meaningful KPIs to measure training success at the leadership level. Linking training metrics with the organization's security metrics. Measuring changes in leadership behavior and communication on security topics. Capturing the integration of security aspects into decision-making processes. Analyzing correlations between leadership training and security incidents. Qualitative Evaluation Methods: Conducting structured interviews and feedback sessions with leaders. Observing behavioral changes in leadership situations and decision-making processes. Capturing case examples and success stories from leadership practice. Collecting feedback from employees on their perception of the leadership role. Conducting self-assessments and peer evaluations of security competency. Practical Tests & Simulations: Conducting crisis exercises and simulations to test competency in action. Using red team exercises and social engineering tests for leaders. Analyzing responses and decisions in simulated security incidents. Evaluating communication and collaboration in crisis situations. Measuring improvement across repeated exercises and simulations. Long-Term Success Measurement: Establishing a baseline before the start of the training program for comparison purposes. Regular repetition of assessments to measure competency development. Capturing long-term changes in security culture and performance.
Which leadership competencies are particularly relevant for promoting a security culture?
Consistent adherence to security policies in one's own leadership practice. Authentic commitment to security topics in word and deed. Open handling of one's own mistakes and learning experiences in the security domain. Consistent security-conscious behavior even under pressure and time constraints. Active participation in security initiatives and training as a leader. Transformational Leadership: Developing and communicating an inspiring vision for information security. Promoting individual responsibility and self-leadership in the area of security. Intellectual stimulation by questioning security routines and assumptions. Individual promotion and development of security competencies within the team. Creating meaning and significance of security measures in everyday work. Coaching & Development: Continuous feedback on security-conscious behavior within the team. Identifying and promoting security talents and security champions. Supporting the development of security competencies through coaching. Creating learning opportunities and experiential spaces for security topics. Balancing the promotion and expectation of security awareness. Situational Leadership & Adaptability: Adapting the leadership style to various security situations and challenges. Situation-appropriate balance between directive and participative approaches on security topics.
How can leaders integrate security topics into decision-making processes?
Embedding security criteria into decision templates and processes. Developing checklists for security aspects across different decision types. Integrating security gates into project and investment decisions. Establishing security as a standing agenda item in management meetings. Considering security aspects in strategy and planning processes. Stakeholder Integration: Early involvement of security experts in decision-making processes. Creating interdisciplinary decision-making bodies for complex security topics. Clear definition of roles and responsibilities in security decisions. Promoting exchange between business, IT, and security teams. Establishing a security advisory board for strategic decisions. Risk-Oriented Decision-Making: Using structured risk assessment methods for security decisions. Developing a balanced risk strategy for different business areas. Considering risk thresholds and tolerances in decision-making processes. Establishing a risk-based prioritization approach for security measures. Regular review and adjustment of the risk profile and decision criteria. Transparency & Accountability: Creating transparency around security decisions and their rationale. Clear documentation of security considerations in decision-making processes. Tracking and reporting on the implementation of security decisions. Regular reviews and lessons learned from past decisions.
How do leaders motivate their team toward security-conscious behavior?
Conveying the personal and business relevance of information security. Establishing connections between security measures and concrete workflows. Highlighting the consequences of security incidents for customers, colleagues, and the organization. Clarifying each individual's contribution to the overall security of the organization. Embedding security topics in broader corporate and societal contexts. Recognition & Feedback: Regular recognition and appreciation of security-conscious behavior. Establishing incentive systems and reward mechanisms for security initiatives. Integrating security aspects into performance evaluations and development discussions. Immediate and constructive feedback on security-relevant behavior. Creating visibility for positive security contributions within the team and organization. Empowerment & Participation: Involving the team in the development and improvement of security measures. Delegating security responsibility and decision-making scope. Promoting bottom-up initiatives and innovations in the security domain. Creating channels for feedback and improvement suggestions on security topics. Establishing security champions and multipliers within the team. Development & Competency Building: Investing in continuous training and development of security competencies. Creating learning opportunities and experiential spaces for security topics.
How do leaders handle resistance to security measures within the team?
Actively listening to and understanding the causes of resistance and concerns. Acknowledging legitimate objections to impractical or effective security measures. Considering different perspectives and working realities within the team. Empathy for frustration caused by additional complexity or workload. Openness to constructive criticism of existing security measures. Participation & Co-Creation: Involving the team in the development and adaptation of security measures. Jointly seeking practical solutions to security challenges. Creating feedback channels for continuous improvements. Piloting and gradually introducing changes with team involvement. Establishing a participative approach to security policies and processes. Focus on Value & Balance: Clarifying the concrete benefit and relevance of security measures. Establishing a balance between security and usability. Prioritizing measures with high security gain and low disruption. Reducing unnecessary complexity and bureaucracy in security processes. Developing solutions that combine security and efficiency. Communication & Transparency: Clear communication of the background and objectives of security measures. Transparency about concrete threats and risks to the organization. Open handling of conflicts between security and other requirements.
How do leaders support their team in dealing with specific security threats?
Building a foundational understanding of current threat scenarios within the team. Regular information on new attack vectors and vulnerabilities. Conveying knowledge about attack patterns such as phishing, social engineering, or ransomware. Contextualizing threats for the team's specific working environment. Conducting awareness measures and simulations to raise awareness. Competency to Act & Tools: Developing concrete competencies for dealing with threats. Providing tools and resources for secure working. Training response procedures for suspected cases and security incidents. Creating clear escalation paths and points of contact for security questions. Enabling the team to independently identify threats. Error Culture & Continuous Learning: Establishing a positive error culture without blame in the event of security incidents. Promoting open exchange about security incidents and near-misses. Joint analysis and lessons learned from security events. Regular feedback loops and improvement processes. Using incidents as learning opportunities for the entire team. Support & Resources: Providing adequate time and resources for security tasks. Creating space for security training and exercises. Supporting the integration of security measures into work processes. Removing obstacles to security-conscious behavior.
How do leaders integrate security aspects into project management and development?
Integrating security requirements at the beginning of project planning. Conducting security risk analyses during the project initiation phase. Defining security objectives and criteria as part of the project requirements. Early involvement of security experts in project planning. Considering security requirements in budget and resource planning. Security by Design Approach: Embedding the security by design principle in all development phases. Integrating security requirements into architectural decisions. Preferring inherently secure design options during conception. Conducting threat modeling and attack surface analysis. Considering security aspects when selecting technologies and components. Agile & Iterative Development: Integrating security tasks into sprints and iterations. Including security user stories and acceptance criteria in the backlog. Addressing security debt and technical debt. Continuous integration of security tests into the development process. Regular security reviews and retrospectives. Quality Assurance & Governance: Establishing security gates and approval processes for security-relevant aspects. Integrating security tests into CI/CD pipelines and test strategies. Conducting code reviews with a focus on security aspects. Regular security reporting as part of project reporting. Verifying compliance with regulatory requirements during development.
How do leaders ensure the sustainability of security measures within the organization?
Establishing a cyclical process for the continuous improvement of security. Regular review and adjustment of security policies and measures. Systematic evaluation and integration of learnings from security incidents. Using benchmarks and best practices to further develop security measures. Regular gap analyses and maturity assessments of security measures. Structural Embedding: Integrating security aspects into organizational structures and processes. Clear definition of roles, responsibilities, and reporting lines for security topics. Establishing a formal governance framework for information security. Embedding security tasks in job descriptions and target agreements. Creating appropriate organizational structures for information security. Key Figures & Measurement: Developing meaningful KPIs for measuring and managing information security. Regular reporting and monitoring of security metrics. Integrating security metrics into management dashboards and reports. Using trend analyses for the early detection of security risks. Linking security metrics with business metrics and objectives. Cultural Embedding: Promoting a sustainable security culture throughout the entire organization. Embedding security awareness in corporate values and mission statements. Continuous communication to strengthen security awareness.
How do leaders balance security requirements with usability and efficiency?
Risk-oriented assessment and prioritization of security measures. Focusing on measures with high security gain and low usage burden. Differentiating security measures according to the criticality of systems and data. Considering the threat context and the probability of risks materializing. Establishing a risk-based approach to security decisions. Iterative Optimization Process: Continuous optimization of the balance between security and usability. Regular review and adjustment of security measures based on feedback. Pilot systems and A/B tests for new security measures before broad rollout. Systematic monitoring of efficiency losses caused by security measures. Using user feedback to improve security processes. User-Oriented Security Solutions: Designing user-friendly security processes and tools. Considering UX principles when designing security measures. Developing context-sensitive security measures that adapt to the work situation. Automating security processes to minimize user friction. Integrating security functions into existing workflows and tools. Communication & Transparency: Clear communication of the necessity and benefit of security measures. Transparency about security risks and their potential impact. Gathering and considering user feedback on security measures. Explaining the background and objectives of security decisions.
How do leaders prepare their team for new threats and security trends?
Establishing systematic monitoring of current threats and trends. Using threat intelligence and expert sources for early detection. Regular evaluation of security incidents within the relevant industry. Building a network for professional exchange on new threats. Using early warning indicators and thresholds for emerging risks. Continuous Communication: Regular updates on current threats and security trends. Integration of security topics into team and department meetings. Using various communication channels for security information. Adapted communication for different target groups within the team. Creating a shared understanding of current risks. Adaptive Learning: Developing flexible training formats for rapid response to new threats. Using microlearning for just-in-time updates on current risks. Integrating case studies and real incidents into training. Promoting continuous learning and independent information gathering. Creating learning spaces for exchange on new security topics. Resilience & Agility: Developing fundamental resilience against new threats. Promoting adaptability and flexibility in dealing with security risks. Creating a learning organization that grows from experience. Establishing agile processes for rapid adaptation to new risks. Building a healthy skepticism and critical mindset within the team.
Which tools and technologies support leaders in managing security topics?
Using security dashboards for the visualization of security metrics. Deploying Governance, Risk & Compliance (GRC) tools for managing security topics. Implementing management cockpits for an overview of security risks. Using trend and forecasting tools for forward-looking management. Integrating security metrics into business intelligence systems. Monitoring & Analytics: Deploying Security Information and Event Management (SIEM) for real-time monitoring. Using User and Entity Behavior Analytics (UEBA) for anomaly detection. Implementing vulnerability management tools for vulnerability monitoring. Deploying threat intelligence platforms for information on current threats. Using security scoring and rating tools for risk assessment. Collaboration & Communication: Implementing incident management systems for managing security incidents. Using collaboration platforms for cross-team cooperation. Deploying knowledge management systems for documenting security knowledge. Implementing chatbots and virtual assistants for security information. Using communication tools for rapid alerts and notifications. Automation & Orchestration: Deploying Security Orchestration, Automation and Response (SOAR) tools. Implementing policy-as-code for the automated enforcement of security policies. Using workflow automation for standard processes and routine tasks. Deploying AI and machine learning for intelligent security decisions.
How do leaders develop a long-term security strategy for their organization?
Developing a clear vision for information security within the organization. Defining measurable, strategic security objectives with a clear business reference. Aligning security objectives with the corporate strategy and mission. Considering long-term business developments and market trends. Establishing a balance between protection, enablement, and innovation. Comprehensive Approach: Developing a comprehensive security concept that goes beyond purely technical measures. Integrating people, processes, technologies, and governance aspects. Considering the entire digital value chain and ecosystem. Coordinating with other corporate functions such as IT, HR, Legal, and Compliance. Establishing a security by design approach for all business processes. Risk Orientation & Prioritization: Developing a risk-based approach for prioritizing security measures. Differentiated consideration of various protection areas and criticality levels. Defining risk acceptance levels and decision criteria. Regular review and adjustment of the risk profile. Considering emerging risks and future threat scenarios. Evolution & Adaptability: Designing an adaptive security strategy that can respond to changes. Establishing mechanisms for continuous improvement and adaptation. Developing capabilities for rapid response to new threats and requirements. Using scenarios and future analyses for strategic planning.
How do leaders design successful knowledge transfer on security topics?
Building a structured knowledge base for security topics within the organization. Systematic documentation of best practices, lessons learned, and expert knowledge. Using various formats for different types of knowledge and learning preferences. Regular updating and quality assurance of knowledge content. Creating a central, easily accessible platform for security knowledge. Collaborative Learning & Knowledge Sharing: Promoting knowledge sharing through communities of practice and expert groups. Establishing mentoring and coaching programs for security topics. Organizing lunch & learn sessions, hackathons, and workshops. Using peer learning and mutual feedback within the team. Creating space for informal knowledge exchange and discussion. Individualized Learning Paths & Development: Developing individual learning paths based on prior knowledge and roles. Combining various learning formats for different learning types and preferences. Creating opportunities to apply newly acquired knowledge in practice. Considering different competency levels from foundational to expert knowledge. Promoting continuous, self-directed learning within the team. Technological Support: Using digital learning platforms and knowledge management systems. Deploying microlearning, video tutorials, and interactive learning modules. Integrating gamification elements for higher engagement.
Latest Insights on Leadership Training
Discover our latest articles, expert knowledge and practical guides about Leadership Training

CRA Applicability Check: Does Your Product Fall Under the Cyber Resilience Act?
Not sure whether the EU Cyber Resilience Act applies to your product? This step-by-step guide walks you through the four-question applicability assessment — from product definition through risk classification to specific compliance obligations, with concrete examples for every product type.

What Is the Cyber Resilience Act? The Complete Guide for Businesses 2026
The EU Cyber Resilience Act (CRA) establishes mandatory cybersecurity requirements for all products with digital elements. This comprehensive guide covers product classification, essential security requirements, the compliance timeline, how the CRA relates to NIS2 and DORA, and a practical implementation roadmap for manufacturers.

EU AI Act Enforcement: How Brussels Will Audit and Penalize AI Providers — and What This Means for Your Company
On March 12, 2026, the EU Commission published a draft implementing regulation that describes for the first time in concrete detail how GPAI model providers will be audited and penalized. What this means for companies using ChatGPT, Gemini, or other AI models.

NIS2 and DORA Are Now in Force: What SOC Teams Must Change Immediately
NIS2 and DORA apply without grace period. 3 SOC areas that must change immediately: Architecture, Workflows, Metrics. 5-point checklist for SOC teams.

Control Shadow AI Instead of Banning It: How an AI Governance Framework Really Protects
Shadow AI is the biggest blind spot in IT governance in 2026. This article explains why bans don't work, which three risks are really dangerous, and how an AI Governance Framework actually protects you — without disempowering your employees.

EU AI Act in the Financial Sector: Anchoring AI in the Existing ICS – Instead of Building a Parallel World
The EU AI Act is less of a radical break for banks than an AI-specific extension of the existing internal control system (ICS). Instead of building new parallel structures, the focus is on cleanly integrating high-risk AI applications into governance, risk management, controls, and documentation.
Success Stories
Discover how we support companies in their digital transformation
Digitalization in Steel Trading
Klöckner & Co
Digital Transformation in Steel Trading

Results
AI-Powered Manufacturing Optimization
Siemens
Smart Manufacturing Solutions for Maximum Value Creation

Results
AI Automation in Production
Festo
Intelligent Networking for Future-Proof Production Systems

Results
Generative AI in Manufacturing
Bosch
AI Process Optimization for Improved Production Efficiency

Results
Let's
Work Together!
Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Your strategic success starts here
Our clients trust our expertise in digital transformation, compliance, and risk management
Ready for the next step?
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
For optimal preparation of your strategy session:
Prefer direct contact?
Direct hotline for decision-makers
Strategic inquiries via email
Detailed Project Inquiry
For complex inquiries or if you want to provide specific information in advance