News
We're excited to announce our new partnership with Arrow ECS. Through our partnership with Arrow ECS, one of IBM’s select Global Training Providers, Cyber Retaliator Solutions (CRS) now delivers authorized training for the design, installation, maintenance, and troubleshooting of IBM technology, hardware, and storage. This partnership allows CRS to leverage the award-winning IBM technical training content that is exclusive to IBM’s Global Training Providers.
Train your employees today on the powerful IBM products and solutions your company relies on every day! Optimize your IBM technology investment with training and certifications on IBM products and solutions.
IBM Training and Skills Blog
In other news

(ISC)² Gauteng Chapter invites you to this informative virtual session that will benefit organisations concerned about cybersecurity and compliance.
Three Keys To Fast-Track Your Cybersecurity Posture For Compliance
REGISTER
About the Keynote Speaker
Brenda Kali is the founder of Conscious Companies
Brenda is an advocate of conscious ethical leadership who has over the years set into motion a stream of consciousness that is organically changing the landscape of how business is done and the ethos of leadership. Her twenty-five-year tenure as an executive saw the reputational turnaround of major companies including Sasol and Telkom. A former member of the Board of the South African Chamber of Commerce and Industries (SACCI), she currently serves on the Board of Primeserv and Project Literacy, a 45-year-old NGO. Ethics, social impact, strategic transformation and conscious awareness has always been the quality of her leadership that advocates a values-driven socio-economic system.
About the Speaker
Dylan Nel is Head Of Vendor Engagement at CRS
Dylan has a wealth of experience focused on Sales, Logistics and Vendor Engagement in the Cyber Security Space. Having spent over a decade working in cybersecurity, Dylan who is an analytical, detailed orientated problem solver will share some valuable insights.
Three Keys To Fast-Track Your Cybersecurity Posture For Compliance
Cyber Awareness – Understanding which areas within your organisation requires strengthening, such as skills and knowledge, will help you to determine where improvement is required to reach your goals. The aim should be to equip your organisation to reach these predefined goals and objectives, by providing your workforce with the skills required to get the job done with data safety and excellence in mind. Targeted attacks are delivered via malicious links, file attachments, and login forms. A user should be able to identify the warning signs and understand what to do in the event of a spear-phishing attack. Humans are our most valuable asset, however also our weakest link.Data Protection – What protection should there be when data lands in the wrong hands. Again, employees are the weakest link in an organisation and taking the responsibility to safeguard data “out” of employee’s hands is both beneficial to the employee and the company. This is where encryption and mobile device management play a huge role.
Vulnerability assessments, Penetration Testing and Web Application scanning – Are these required and if so, how often are they required? What should be covered when these assessments are done.
REGISTER
October 19 @ 5:00 pm – 6:30 pm
Event Agenda
17h00 – 17h10: Welcome and AGM Update (Sunisha Ramessur – Marketing Manager)
17h10 – 17h15: Keynote – Sustainability and Cybersecurity (Brenda Kali – Founder – Conscious Companies)
17h15 – 18h10: Three Keys To Fast-Track Your Cybersecurity Posture For Compliance (Dylan Nel – Cyber Retaliator Solutions)
18h10 – 18h25: Q&A Session
18h25 – 18h30: Closing (Sunisha Ramessur )