Cybersecurity

Cyber Risk Insights Sundowner

Cyber Risk Meetup is coming to Adelaide! After the successful event in Perth back in September 2021, we’re bringing Cyber Risk Insights Sundowner to Adelaide! With the ever-changing landscape of our digital world, it is important to continually equip our community with the various challenges of the cyber world. Cybersecurity and its associated risks will

Cyber Risk Insights Sundowner Read More »

Navigating Cyber 2022

This is a thematic summary of the FS-ISAC Global Intelligence Office’s in-depth report of cyber trends in 2021 and predictions for 2022. The full report is only available to member financial institutions via the FS-ISAC Intelligence Exchange. FS-ISAC membership is exclusive to financial institutions headquartered in eligible countries. FS-ISAC’s full suite of intelligence products is

Navigating Cyber 2022 Read More »

(ISC)² Certified Information Systems Security Professional (CISSP) Training

Leadership and Operations This course is designed for information security professionals with deep technical and managerial knowledge and experience to effectively design, engineer and manage the overall security posture of an organization. This training course provides a comprehensive review of information systems security concepts and industry best practices, covering the following eight domains of the

(ISC)² Certified Information Systems Security Professional (CISSP) Training Read More »

(ISC)² Certified Cloud Security Professional (CCSP) Training

Cloud Security This course provides a comprehensive review of the knowledge required for understanding cloud computing and its information security risks and mitigation strategies. This training course will help students review and refresh their knowledge and identify areas they need to study for the CCSP exam. Course Objectives At the end of this course, learners

(ISC)² Certified Cloud Security Professional (CCSP) Training Read More »

(ISC)² Systems Security Certified Practitioner (SSCP) Training

Security Administration and Operations This course provides a comprehensive review of the knowledge required to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability. This training course will help students review and refresh their knowledge and identify areas they need to study for

(ISC)² Systems Security Certified Practitioner (SSCP) Training Read More »

(ISC)² Certified Secure Software Lifecycle Professional (CSSLP) Training

Software Security This course is designed for software professionals that have the expertise to incorporate security practices – authentication, authorization and auditing – into each phase of the software development lifecycle (SDLC), from software design and implementation to testing and deployment. Led by an (ISC)² authorized instructor, this training seminar provides a comprehensive review of

(ISC)² Certified Secure Software Lifecycle Professional (CSSLP) Training Read More »

2022 State of the Phish

Last year, we titled our introduction “A Year Like No Other.” We could easily have repeated that heading to describe 2021. The year has left many organizations contemplating what “normal” will mean for their workforces going forward. Along with hybrid and remote work options, organizations are mulling the best ways to keep employees connected and

2022 State of the Phish Read More »

2022 Data Protection Trends Report

Between October and December 2021, an independent research company surveyed over 3,000 IT decision makers and IT professionals about their IT and data protection strategies, challenges and drivers. Almost all the respondents were from organizations with more than 1,000 employees – from 28 different countries. On average, respondents expected their organization’s budget for data protection,

2022 Data Protection Trends Report Read More »