We're excited to announce our new partnership with Arrow ECS. Through our partnership with Arrow ECS, one of IBM’s select Global Training Providers, Cyber Retaliator Solutions (CRS) now delivers authorized training for the design, installation, maintenance, and troubleshooting of IBM technology, hardware, and storage. This partnership allows CRS to leverage the award-winning IBM technical training content that is exclusive to IBM’s Global Training Providers.

Train your employees today on the powerful IBM products and solutions your company relies on every day! Optimize your IBM technology investment with training and certifications on IBM products and solutions.

IBM Training and Skills Blog

  • by Rav Ahuja
    If you want to enter the exciting world of software development, IBM Software Engineering Basics for Everyone on edX is for you. No prior degrees or knowledge of programming or application development are necessary. Software Developers are in great demand earning a median salary of US$110,140 per year according to the US Bureau of Labor […]
  • by Daiane Camila Bizari
    Hi, the RPA Education team has just released the Orchestration with IBM Robotic Process Automation collection This new collection has three courses and support materials that give to you a complete IBM RPA orchestrator learning. Starting to the theme with an introduction of what orchestrator in IBM RPA is and how it works, moving on […]
  • by Diane Chalmers
    The next WebSphere User Group (WUG) Roadshow is coming to you in November (  We’ll share a short presentation about WebSphere Automation before turning things over to you, so you can experience WebSphere Automation for yourself through our hands-on lab.  This is a great opportunity to learn more about WebSphere Automation and to ask the […]
  • by Teyssier Tonya
    IBM Automation is pleased to announce a new instructor-led course designed for experienced integration specialists and senior-level developers with experience in application development and messaging middleware applications who are interested in becoming IBM App Connect Enterprise developers. The course teaches you how to construct message flow applications to transport and transform data. You learn how […]
  • by Alexander Ziegler
    What learners expect I blogged earlier this year already about expectations from learners around eLearning. At that time I presented a preview of a larger research. I still think it is impressive to see that learners want to spend something around one-hour learning. This blog is now adding more details about the research. What learners […]

In other news

(ISC)² Gauteng Chapter invites you to this informative virtual session that will benefit organisations concerned about cybersecurity and compliance.

Three Keys To Fast-Track Your Cybersecurity Posture For Compliance


About the Keynote Speaker

Brenda Kali is the founder of Conscious Companies

Brenda is an advocate of conscious ethical leadership who has over the years set into motion a stream of consciousness that is organically changing the landscape of how business is done and the ethos of leadership. Her twenty-five-year tenure as an executive saw the reputational turnaround of major companies including Sasol and Telkom. A former member of the Board of the South African Chamber of Commerce and Industries (SACCI), she currently serves on the Board of Primeserv and Project Literacy, a 45-year-old NGO. Ethics, social impact, strategic transformation and conscious awareness has always been the quality of her leadership that advocates a values-driven socio-economic system.

About the Speaker

Dylan Nel is Head Of Vendor Engagement at CRS

Dylan has a wealth of experience focused on Sales, Logistics and Vendor Engagement in the Cyber Security Space. Having spent over a decade working in cybersecurity, Dylan who is an analytical, detailed orientated problem solver will share some valuable insights.

Three Keys To Fast-Track Your Cybersecurity Posture For Compliance

Cyber Awareness – Understanding which areas within your organisation requires strengthening, such as skills and knowledge, will help you to determine where improvement is required to reach your goals. The aim should be to equip your organisation to reach these predefined goals and objectives, by providing your workforce with the skills required to get the job done with data safety and excellence in mind. Targeted attacks are delivered via malicious links, file attachments, and login forms. A user should be able to identify the warning signs and understand what to do in the event of a spear-phishing attack. Humans are our most valuable asset, however also our weakest link.Data Protection – What protection should there be when data lands in the wrong hands. Again, employees are the weakest link in an organisation and taking the responsibility to safeguard data “out” of employee’s hands is both beneficial to the employee and the company. This is where encryption and mobile device management play a huge role.

Vulnerability assessments, Penetration Testing and Web Application scanning – Are these required and if so, how often are they required? What should be covered when these assessments are done.


October 19 @ 5:00 pm – 6:30 pm

Event Agenda

17h00 – 17h10: Welcome and AGM Update (Sunisha Ramessur – Marketing Manager)

17h10 – 17h15: Keynote – Sustainability and Cybersecurity (Brenda Kali – Founder – Conscious Companies)

17h15 – 18h10: Three Keys To Fast-Track Your Cybersecurity Posture For Compliance (Dylan Nel – Cyber Retaliator Solutions)

18h10 – 18h25: Q&A Session

18h25 – 18h30: Closing (Sunisha Ramessur )

Call Now +27 72 266 2599