JOBS > Training


« Back to News

2019-05-17

What's Your Data Strategy?

All businesses need a Data Strategy which encompasses audits, reviews their security, data protection & employee cyber awareness training.

2019-05-08

Engaging With Cybersecurity

Cyber attacks are an existential threat to business and companies face a challenge in getting employees on board with good security practice.

2019-03-18

How To Develop Secure Cybersecurity Practices

Business leaders know that something needs to be done to limit their corporate risks and individual exposure and time isn’t on their side. Here's how.

2019-03-12

Your Employees Are The Major Risk To Cyber Security

Employees are still the weak link in cybersecurity. A third of workers in Ireland used own email for work, and 24% shared files with friends.

2019-03-08

No Easy Button Solution To Cybersecurity’s Skills Shortage

The consensus is that there is a talent shortage problem in information security. What’s not certain is the extent of the problem. By Evan Francen.

2019-02-20

Take An Analytical Approach To Cybersecurity Training

There are many solutions designed to protect businesses from just about any security threat, yet an enterprise's biggest weakness is its people.

2019-02-13

Military Cyber Training Methods

It's war between criminal hackers and corporate IT defense systems and when it comes to wars military organisations know how to fight them best.

2019-01-24

GCHQ Introduces Women Only Cybersecurity Training

GCHQ thinks the lack of women in cybersecurity is part of the bigger picture of a gender imbalance in science, technology, engineering and maths.

2019-01-11

UK Launches Long-Awaited Cyber Skills Strategy

A new UK cybersecurity skills strategy designed to reduce industry shortages and a new independent body to help shape the future of the profession.

2018-11-01

School Training On Child Abuse And Cyber Security

An innovative awareness campaign for school students in India making them aware of child abuse and cybersecurity issues.

2018-10-17

Build A Young Cyber Security Team

Tapping into upcoming talent is the key to Melanie Oldham’s approach to building a cyber security workforce.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

dWallet Labs

dWallet Labs

dWallet Labs is a cybersecurity company specializing in blockchain technology. We believe that the future of Web3 relies on cutting edge cryptography and unabated security.

Vambrace Cybersecurity

Vambrace Cybersecurity

Vambrace is an experienced cybersecurity consultancy and operations outsourcer helping you to secure your business in an increasingly-hostile cyber environment.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.

Staris

Staris

Human based defense is dead. Staris is reinventing application security for an increasingly AI driven world.