We're excited to announce our new partnership with Arrow ECS. Through our partnership with Arrow ECS, one of IBM’s select Global Training Providers, Cyber Retaliator Solutions (CRS) now delivers authorized training for the design, installation, maintenance, and troubleshooting of IBM technology, hardware, and storage. This partnership allows CRS to leverage the award-winning IBM technical training content that is exclusive to IBM’s Global Training Providers.

Train your employees today on the powerful IBM products and solutions your company relies on every day! Optimize your IBM technology investment with training and certifications on IBM products and solutions.

IBM Training and Skills Blog

  • by Iris Osper
    Whether you need to gain new skills, earn credentials, or change careers, building skills is an investment in your future. IBM Training has launched a new page that includes curated free courses to start your learning journey.   To learn more about IBM´s free digital learning click the following link: The post Free Digital […]
  • by James Daniels
    Listen to a panel of industry experts from IBM, Credly, and edX discuss how leading organizations are leveraging badges, certifications and other digital credentials to develop the workforce of tomorrow. Click here to learn more The post Webinar: Building blocks of workforce preparedness and employability appeared first on IBM Training and Skills Blog.
  • by Natalie Brooks
    For a rapidly growing number of companies and computing professionals, the cloud is the place to be. And IBM can help you get there. The award-winning IBM Center for Cloud Training (ICCT) provides hands-on lab learning experiences as well as industry-recognized, role-based professional certifications to deliver the essential skills you need to thrive in the […]
  • by sonia.malik
    In 2020, the global workforce lost an equivalent of 255 million full-time jobs, an estimated $3.7 trillion in wages, and 4.4% of global GDP, a staggering toll on lives and livelihoods. While vaccine rollout has begun and the growth outlook is predicted to improve, socio-economic recovery is far from certain. Organizations and individuals which had […]
  • by Darren Surch
    IBM Business Partner and IBM Digital Badge Program member Interskill Learning has received a second 2021 award from Training Industry, the leading research and information resource for corporate learning. Interskill is now on both the prestigious Training Industry ‘2021 Top IT Training Companies‘ Watch List, and on the Training Industry ‘2021 Top Online Learning Library […]

In other news

(ISC)² Gauteng Chapter invites you to this informative virtual session that will benefit organisations concerned about cybersecurity and compliance.

Three Keys To Fast-Track Your Cybersecurity Posture For Compliance


About the Keynote Speaker

Brenda Kali is the founder of Conscious Companies

Brenda is an advocate of conscious ethical leadership who has over the years set into motion a stream of consciousness that is organically changing the landscape of how business is done and the ethos of leadership. Her twenty-five-year tenure as an executive saw the reputational turnaround of major companies including Sasol and Telkom. A former member of the Board of the South African Chamber of Commerce and Industries (SACCI), she currently serves on the Board of Primeserv and Project Literacy, a 45-year-old NGO. Ethics, social impact, strategic transformation and conscious awareness has always been the quality of her leadership that advocates a values-driven socio-economic system.

About the Speaker

Dylan Nel is Head Of Vendor Engagement at CRS

Dylan has a wealth of experience focused on Sales, Logistics and Vendor Engagement in the Cyber Security Space. Having spent over a decade working in cybersecurity, Dylan who is an analytical, detailed orientated problem solver will share some valuable insights.

Three Keys To Fast-Track Your Cybersecurity Posture For Compliance

Cyber Awareness – Understanding which areas within your organisation requires strengthening, such as skills and knowledge, will help you to determine where improvement is required to reach your goals. The aim should be to equip your organisation to reach these predefined goals and objectives, by providing your workforce with the skills required to get the job done with data safety and excellence in mind. Targeted attacks are delivered via malicious links, file attachments, and login forms. A user should be able to identify the warning signs and understand what to do in the event of a spear-phishing attack. Humans are our most valuable asset, however also our weakest link.Data Protection – What protection should there be when data lands in the wrong hands. Again, employees are the weakest link in an organisation and taking the responsibility to safeguard data “out” of employee’s hands is both beneficial to the employee and the company. This is where encryption and mobile device management play a huge role.

Vulnerability assessments, Penetration Testing and Web Application scanning – Are these required and if so, how often are they required? What should be covered when these assessments are done.


October 19 @ 5:00 pm – 6:30 pm

Event Agenda

17h00 – 17h10: Welcome and AGM Update (Sunisha Ramessur – Marketing Manager)

17h10 – 17h15: Keynote – Sustainability and Cybersecurity (Brenda Kali – Founder – Conscious Companies)

17h15 – 18h10: Three Keys To Fast-Track Your Cybersecurity Posture For Compliance (Dylan Nel – Cyber Retaliator Solutions)

18h10 – 18h25: Q&A Session

18h25 – 18h30: Closing (Sunisha Ramessur )

Call Now +27 72 266 2599