Welcome to

Cyber

Cloud Services

A community of practice for
CyberSecurity professionals

Expert Practices

We provide an ongoing expert article series sharing insights on Cybersecurity adoption.

Cloud Security

Cloud security posture management is crucial for organizations to maintain a secure environment in the cloud.

Enterprise Workforce

The full suite of services needed to protect enterprise networks, applications and remote workers

Cyber AI

Embrace AI as a key component of cybersecurity strategy.

Enterprise Skills Community

Cyber Security Centre of Excellence

From sophisticated hackers to insidious malware the scale of potential threats in today’s modern world is very challenging.
Addressing this wide scope requires a program of expertise from across multiple vendors and industry specialists, spanning topics including Identity, Ai, Cloud and many more.

World Class Curriculum

Our site provides a community knowledge base for the full life-cycle of designing, implementing and managing cybersecurity systems to ensure your organization is holistically protected.

Scale and Manage Training

Manage large-scale training requirements through automated learning paths and processes to set training reminders, re-enrollment dates and recertification timelines.

Community

Join our learning and networking community

Maturity Model

The CyberCloud Maturity Model provides a framework for assessing your complete organizational security posture, and move forward with a practical, actionable Roadmap plan.

National Capacity

The Cyber Government program has a dual focus: How national scale capacity can be developed to protect a country, and simultaneously, explore and define the economic opportunity this presents.

David Smith

Cloud Firewall Guru

Virtual

Academy

Expert webinars providing a full curriculum of Cyber Security skills and solutions learning.

Events also feature social networking tools, so you can then also join virtual lounges, meet and connect with tutors and other attendees.

Expert insights and tutorials

Video Articles

EDR vs. MDR vs. XDR – A Comparison

While they differ by just one letter and may have overlapping features, each solution offers unique benefits.

The Difference between Penetration Testing and Vulnerability Assessments

They serve distinct purposes and have different methodologies.

Zero Day Threats: Understanding and Protecting Against Them

Jeff Crume walks through the timeline of a zero day attack and how to best protect yourself.

Get Started with Phishing Resistant Multifactor Authentication

Delve into the concept of phishing resistant multifactor authentication, its significance, and how it enhances security in the digital landscape.

Guides

ENTERPRISE CAPABILITIES

Implementing a Security Operations Centre

A security operations center (SOC) is an in-house or outsourced team of IT security professionals that monitors an organization’s entire IT infrastructure, 24/7, to detect cybersecurity events in real time and address them as quickly and effectively as possible.

TOOLS AND PRACTICES

The full suite of services needed to protect enterprise networks, applications and remote workers, enabling staff to work productively while also protecting them from cyber threats and malware.

THREAT PREVENTION

Identifying the common patterns of cyber security risk your organization may be exposed to, and how to protect against them.

Back to top button