Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 6 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Cyber training facility opens for the private sector

by The Gurus
September 22, 2014
in Editor's News
Share on FacebookShare on Twitter

UK risk management and security firm Protection Group International has launched the world’s most sophisticated cyber training facility open to the private sector.
 
The academy will offer cutting-edge cyber security courses in the group’s immersive environment, which is designed to equip both businesses and public sector institutions with the knowledge and skills to identify and offset cyber threats to their networks, data and other assets.
 
In addition to training for cyber security specialists, Protection Group International has developed tailored courses and programmes for board members and senior management, mainstream IT specialists and entire workforces.
 
Each course provides immersive tuition and rapid skills and knowledge development, delivered in a language and form suitable for the audience to ensure that all levels of an organisation are equipped to respond effectively to cyber threats.
 
Barry Roche, Protection Group International’s chief executive, said: “The need for organisations to protect themselves against cyber crime has never been greater. Regulators, customers and employees all expect their data to be kept secure and the burden of accountability rests squarely with those responsible for maintaining that security. Whether you’re a board member, IT manager or IT professional, ensuring that you’re not the weak link when it comes to cyber security is a business critical issue.
 
“PGI’s Cyber Academy has been designed and developed to equip management and IT professionals with the real world knowlegde and skills they require to address this challenge and become an effective first line of defence against cyber threats. We are immensely proud of the people and technology we have brought together to deliver it.”
 
Brian Lord, managing director for cyber at PGI, a former deputy director for Intelligence and Cyber Operations at GCHQ, said: “The cyber security agenda is broader than just ‘IT’. People commit crimes and other hostile acts, machines do not. Attackers exploit human vulnerabilities and the weaknesses inherent in IT systems and infrastructure due to human errors in coding, design, maintenance or procurement. Consequently, a strong cyber security programme should also consider human factors from the vulnerability of the systems’ users to the motivations guiding attackers.
 
“An organisation’s real strength, efficiency, profitability and return on investment in countering the threat lies not in how much money is spent on IT security technology, but in the knowledge, awareness and behaviours of all its people. Without the latter, the former is a waste of money.
 
“PGI’s Cyber Academy will be a multi-disciplinary institution that combines high levels of technical knowledge with insights gained from psychology, anthropology and criminology. Our objective is to bring together experts from these different fields to better understand and develop methods to counter new and emerging threats.”

FacebookTweetLinkedIn
ShareTweet
Previous Post

US ruling improves IP protection

Next Post

Employees rate mobile privacy highly, as less than half prefer to keep work and personal lives separate

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information