JOBS > Training


« Back to News

2025-04-11

Neurodiversity - The Untapped Talent Pool Solving Cybersecurity's Skills Gap 

Neurodiverse Talent: Embracing neurodiversity represents both an ethical imperative and a strategic opportunity. By Glen Williams

2025-04-04

Staying Secure, Skilled & Sustainable

The IT Balancing Act: Three key areas are shaping the IT industry - Cybersecurity, AI & Cloud adoption, and Sustainability. By Martin Hodgson

2025-03-16

Continuous Cybersecurity Learning Is Business-Critical

Security has shifted from IT mandate to executive imperative, this is why continuous learning is a business-critical function. By Alexia Pedersen

2025-02-25

The Evolution Of Cybersecurity Education: Bridging The Skills Gap In A Digital Era

Sophisticated Cyber Threats: Modern education is adapting to meet these challenges and what it means for the future of cybersecurity.

2025-02-14

Navigating The Latest Paths In Cybersecurity Certification

Organisations are looking for people with specialized cyber skills, and one of the best ways to validate your expertise is reputable certification.

2025-02-03

CISOs Increase Crisis Simulation Budgets

CISOs have growing concerns around rising attack volumes, lack of incident response planning and inadequate stress-testing of crisis scenarios.

2025-01-29

CYRIN's New Attack Scenario - On An HVAC Scada System

Find & Kill Hidden Malware: Every unsecured IoT device, every connected endpoint has become a potential target for cyber attacks.

2024-12-20

Cybersecurity Challenges In Managing Learning Centres

Rising Threats: Understanding cyber threats to education centers and how you can leverage secure management systems to counter them.

2024-12-16

Over Confidence In Cyber Security Training Reduces Security

Research among financial services workers shows a disconnect between employers' confidence in cyber security policies & their staff's understanding. 

2024-12-16

Turning The Weakest Link Into Cybersecurity’s Strongest Line Of Defence 

Organisations can significantly reduce the risk of breaches by creating an informed workforce that understands cybersecurity threats. By Qasim Bhatti

2024-11-12

Empowering Employees To Prevent Data Leaks

Process Over Top-Down Enforcement: Many workers are beginning to feel overwhelmed by complex security rules. By Anita Mavridis & Sue Musumeci

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

Astra Security

Astra Security

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Basis Technology

Basis Technology

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Fenix24

Fenix24

Fenix24 is an industry leader in the incident-response space. We ensure the fastest response, leading to the full restoration of critical infrastructure, data, and systems.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

Halcyon

Halcyon

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.