JOBS > Training


« Back to News

2022-09-19

How to Manage Cybersecurity Staff Shortages

Lateral Thinking & Empathy: It still takes an experienced human to interpret critical data and identify the most volatile threats. By Chris Peregrine

2022-09-09

(ISC)² Makes Cyber Security Careers More Widely Accessible

Achieving Career Goals: (ISC)² Candidates is an innovative new professional development path for individuals seeking a career in cyber security.

2022-08-03

How to Prepare Your Security Team For The Future Of Vulnerability Management

Vulnerabilities Are Not Equal: Security teams should use a risk-based vulnerability prioritization, automated tools & effective controls. By Lisa Xu

2022-08-03

Flunking Cyber Education

Layer Cake: Decision makers, middle managers and the IT experts who actually do the job need to communicate much better. By Ronald Marks.

2022-07-27

A Major Skills Training Initiative From (ISC)2

(ISC)2 promise to put one million people through its foundational Certified in Cybersecurity entry-level exam, free of charge. 

2022-07-12

Creating A Security Awareness Training Program

Are you responsible for the information assets of your organization? Then you need an effective security awareness training program. By Stacie Orlandi

2022-07-20

How Do You Solve A Problem Like The Cyber Security Skills Gap?

The Human Element: It may come as a surprise to some people, but cyber security is not about technology - it's about people. By Rob Demain

2022-07-05

Solving The Skills Gap

Companies need to focus on developing and investing in skilled cybersecurity professionals to meet demand. By Dominik Samociuk & Tomasz Wojciechowski

2022-07-14

Cyber Security Training For Employees & Employers

Go Cyber: A different training approach that has a lasting, very positive impact and can significantly improve your organisation’s cyber security.

2022-06-16

Fixing The Cyber Security Workforce Gap

Recruiting entry level & junior staff and investing in their professional development results in more resilient, sustainable cyber security teams.

2022-06-09

Data Breaches & Identity Theft: Is Your Online Classroom Secure?

Bugs, Viruses & Identity: Three common security problems in the online classroom and the remedial measures to deal with them. By Diane Wong

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

Infigo IS

Infigo IS

INFIGO IS specializes in information security consulting services. Our employees are leading information security experts in Croatia.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

UMBRA

UMBRA

UMBRA is solely concerned with protecting governments against Nation State attacks. We are not a consumer or enterprise company.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.