We're excited to announce our new partnership with Arrow ECS. Through our partnership with Arrow ECS, one of IBM’s select Global Training Providers, Cyber Retaliator Solutions (CRS) now delivers authorized training for the design, installation, maintenance, and troubleshooting of IBM technology, hardware, and storage. This partnership allows CRS to leverage the award-winning IBM technical training content that is exclusive to IBM’s Global Training Providers.

Train your employees today on the powerful IBM products and solutions your company relies on every day! Optimize your IBM technology investment with training and certifications on IBM products and solutions.

IBM Training and Skills Blog

  • by India R. Miles
    IBM SkillsBuild for Students is hosting its first summer camp this June. Learners will have the opportunity to complete badge courses for cybersecurity and chatbot building. Besides that, IBMers will lead live webinars where subject matter experts will facilitate a design thinking workshop and offer a career vignette for cyber and cloud. Students will experience […]
  • by Diane Chalmers
    Join us for the Summer WUG Roadshow in June (  Pick from three different dates to join us for this virtual event.  We’ll provide the environment for you to use, so all you have to do is come to learn. The lab provides a fundamental hands-on experience of the evaluation process of enterprise Java applications […]
  • by Wendy Harnar
    Learn about the concepts and tasks for setting up the developer toolkit for Order Management on Cloud (OMoC) including what the toolkit is, how to download and extract the toolkit, configuring the toolkit and handling upgrades. Sterling OMoC Setting up the Developer Toolkit on Next Generation Platform Click here to access the course information and […]
  • by Natalie Brooks Powell
    It’s graduation season. Time to celebrate achievements. Time to thank everyone that has made the day possible. And time to consider what comes next. For me, the most enduring plan is to be a lifelong learner. Be curious. Seek to understand. Listen. Because it’s important to grow both personally and professionally. Learn the way you […]
  • by Alexander Ziegler
    This blog focuses on an upwards trend we are experiencing in IT Certification. I already blogged about the number of badges going up. I received positive feedback and people agree. Badges are a new and interesting approach in our industry. Given the positive momentum for badges, some have questions whether certifications are still relevant.  We […]

In other news

(ISC)² Gauteng Chapter invites you to this informative virtual session that will benefit organisations concerned about cybersecurity and compliance.

Three Keys To Fast-Track Your Cybersecurity Posture For Compliance


About the Keynote Speaker

Brenda Kali is the founder of Conscious Companies

Brenda is an advocate of conscious ethical leadership who has over the years set into motion a stream of consciousness that is organically changing the landscape of how business is done and the ethos of leadership. Her twenty-five-year tenure as an executive saw the reputational turnaround of major companies including Sasol and Telkom. A former member of the Board of the South African Chamber of Commerce and Industries (SACCI), she currently serves on the Board of Primeserv and Project Literacy, a 45-year-old NGO. Ethics, social impact, strategic transformation and conscious awareness has always been the quality of her leadership that advocates a values-driven socio-economic system.

About the Speaker

Dylan Nel is Head Of Vendor Engagement at CRS

Dylan has a wealth of experience focused on Sales, Logistics and Vendor Engagement in the Cyber Security Space. Having spent over a decade working in cybersecurity, Dylan who is an analytical, detailed orientated problem solver will share some valuable insights.

Three Keys To Fast-Track Your Cybersecurity Posture For Compliance

Cyber Awareness – Understanding which areas within your organisation requires strengthening, such as skills and knowledge, will help you to determine where improvement is required to reach your goals. The aim should be to equip your organisation to reach these predefined goals and objectives, by providing your workforce with the skills required to get the job done with data safety and excellence in mind. Targeted attacks are delivered via malicious links, file attachments, and login forms. A user should be able to identify the warning signs and understand what to do in the event of a spear-phishing attack. Humans are our most valuable asset, however also our weakest link.Data Protection – What protection should there be when data lands in the wrong hands. Again, employees are the weakest link in an organisation and taking the responsibility to safeguard data “out” of employee’s hands is both beneficial to the employee and the company. This is where encryption and mobile device management play a huge role.

Vulnerability assessments, Penetration Testing and Web Application scanning – Are these required and if so, how often are they required? What should be covered when these assessments are done.


October 19 @ 5:00 pm – 6:30 pm

Event Agenda

17h00 – 17h10: Welcome and AGM Update (Sunisha Ramessur – Marketing Manager)

17h10 – 17h15: Keynote – Sustainability and Cybersecurity (Brenda Kali – Founder – Conscious Companies)

17h15 – 18h10: Three Keys To Fast-Track Your Cybersecurity Posture For Compliance (Dylan Nel – Cyber Retaliator Solutions)

18h10 – 18h25: Q&A Session

18h25 – 18h30: Closing (Sunisha Ramessur )

Call Now +27 72 266 2599