Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

The Council for Information and Communication Technologies of the Plurinational State of Bolivia (CTIC-EPB) was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

The Security Working Group of CTIC-EPB focuses on security standards and protocols for the prevention and contingency of computer incidents that allow protecting and protecting the State's systems and information. and provide support to citizens.

Contact Information

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

CFC Underwriting

CFC Underwriting

CFC is the largest independent specialty MGA in the UK. Services offered nclude Cyber Risk insurance.

Ipswitch

Ipswitch

Ipswitch IT management software enabling secure control of business transactions, applications and infrastructure.

IS Decisions

IS Decisions

IS Decisions provide solutions to secure, control & audit user access to Microsoft Windows Server-based networks.

Giesecke & Devrient (G&D)

Giesecke & Devrient (G&D)

G&D develops, produces, and markets products and solutions for payment, secure communication, and identity management.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Cyber Armor

Cyber Armor

Cyber Armor closes the gap between development and security, giving development and DevSecOps the flexibility and ease to ensure high grade security and data protection no matter the environment.