JOBS > Training


« Back to News

2018-06-08

US Needs To Cultivate Its Cyber Workforce

US efforts to grow its cybersecurity workforce need "immediate and sustained improvements," according to the US Dept. of Homeland Security.

2018-06-01

Florida Universities Launch A Joint Cyber Training Platform

The Florida Center for Cybersecurity will bring its virtual learning lab, called the CyberHub, to more public universities across the state this fall.

2018-06-03

Security University CyberSecurity Registered Apprenticeship Program

Security University Announces US Department of Labor Approval of Qualified/CyberSecurity Registered Apprenticeship Program

2018-06-02

InfoWatch Launches M. East Cyberecurity Training Centre

A new Middle East-based centre will provide education and advanced training in cyber security, IoT, big data, artificial intelligence and blockchain.

2018-06-05

Ridge Global Cybersecurity Institute launched

Ex - US Homeland Security Chief launches of the Ridge Global Cybersecurity Institute, a go-to source for all cybersecurity related services.

2018-04-13

How to Improve Cyber Security Awareness In Your Organisation

CIOs can help combat the ever-evolving threats occurring in the workplace by highlighting security issues and raising overall awareness.

2018-04-13

UK Police Cybercrime Training

British police have spent a measly £1.3m on cybercrime training for officers in the last three years, yet cyber skills are vital for modern policing.

2018-01-26

Employees Are Key To Cybersecurity

Insiders are the largest source of corporate data breaches, inadvertent or malicious, yet 55% do not get any training.

2017-12-20

Digital Risks Are Changing And CSOs Must Adapt

CSOs must expand their reach to not only monitor tangible risks, but also address the uninsured risks that live in the digital world.

2017-12-05

Staff Training Is Important But Does Not Reduce Cyber Risk

The human is the weakest link in cybersecurity and the answer is not more training. It is not to trust humans in the first place.

2017-11-23

In Demand: Cybersecurity Specialists

Cybersecurity is a high paying career yet many job positions are still unfilled and companies are desperate to hire qualified professionals.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

InterVision

InterVision

InterVision is a leading Strategic Services Provider, assisting businesses in driving value and gaining a competitive edge by helping IT Leaders solve the most crucial challenges they face.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

Omnipotech

Omnipotech

Omnipotech is a complete managed service provider. From desktop to datacenter, all the technology support you need, under one umbrella.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

FastNetMon

FastNetMon

FastNetMon is a very high performance DDoS detection and mitigation tool which could detect malicious traffic in your network and immediately block it.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

Arakyta

Arakyta

Arakÿta specializes in business strategy, work flow process and IT systems for organizations.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.