Expert Practices
Cloud Security
Cloud security posture management is crucial for organizations to maintain a secure environment in the cloud.
Enterprise Workforce
The full suite of services needed to protect enterprise networks, applications and remote workers
Enterprise Skills Community
Cyber Security Centre of Excellence
World Class Curriculum
Our site provides a community knowledge base for the full life-cycle of designing, implementing and managing cybersecurity systems to ensure your organization is holistically protected.
Scale and Manage Training
Manage large-scale training requirements through automated learning paths and processes to set training reminders, re-enrollment dates and recertification timelines.
Community
Join our learning and networking community
Maturity Model
The CyberCloud Maturity Model provides a framework for assessing your complete organizational security posture, and move forward with a practical, actionable Roadmap plan.
National Capacity
The Cyber Government program has a dual focus: How national scale capacity can be developed to protect a country, and simultaneously, explore and define the economic opportunity this presents.
David Smith
Cloud Firewall Guru
Virtual
Academy
Expert webinars providing a full curriculum of Cyber Security skills and solutions learning.
Events also feature social networking tools, so you can then also join virtual lounges, meet and connect with tutors and other attendees.
Expert insights and tutorials
Video Articles
EDR vs. MDR vs. XDR – A Comparison
While they differ by just one letter and may have overlapping features, each solution offers unique benefits.
The Difference between Penetration Testing and Vulnerability Assessments
They serve distinct purposes and have different methodologies.
Zero Day Threats: Understanding and Protecting Against Them
Jeff Crume walks through the timeline of a zero day attack and how to best protect yourself.
Get Started with Phishing Resistant Multifactor Authentication
Delve into the concept of phishing resistant multifactor authentication, its significance, and how it enhances security in the digital landscape.
Guides
ENTERPRISE CAPABILITIES
Implementing a Security Operations Centre
TOOLS AND PRACTICES
THREAT PREVENTION
Identifying the common patterns of cyber security risk your organization may be exposed to, and how to protect against them.