We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Cybersecurity Summit: Africa 2023

Search

Clear Expand Collapse

Cybersecurity Resilience & Risk Management in Finance

Join Dr. David Isiavwe and Kenneth Palliam in a conversation about the the importance of cybersecurity resilience in the financial sector.

Price
Course duration Duration: 30 minutes

Establishing a Cyber-Secure Cloud

While the shift to cloud was the need of the hour during the pandemic, two years later, it has become a financial burden for many businesses. But how should businesses navigate their financial considerations in the cloud, and what are some common mistakes they might be making?

Price
Course duration Duration: 30 minutes

How to Save Yourself From Different Types of Phishing

According to INTERPOL’s 2022 Africa Cyberthreat Assessment report, South Africa leads the continent in the number of cybersecurity threats identified. Register today to gain firsthand insight from Nomaphelo Baloyi, Regional Security Lead - Africa, Mastercard.

Price
Course duration Duration: 35 minutes

Mastering Third-Party Risk Management

Attackers often target the weakest link in the supply chain. A third-party risk program requires a holistic view of third parties and a way to automate the entire life cycle of supplier engagement. Sign up today to learn more from industry experts!

Price
Course duration Duration: 30 minutes

Harnessing AI for Advanced Cybersecurity Prediction

The cybersecurity industry is increasingly turning toward artificial intelligence to not only defend against threats but also predict them in advance. Intelligent threat detection, automated incident response, and strengthening user authentication are some of the game-changers in the realm of cybersecurity. Sign up to learn more!

Price
Course duration Duration: 30 minutes

Navigating Data Privacy in the Age of AI

As the volume of data generated and shared online grows exponentially, privacy concerns have become more pressing than ever before. Sign up today to learn from Babatunde Bambigboye, Head - Legal Enforcement Regulations, Nigeria Data Protection Commission!

Price
Course duration Duration: 25 minutes

Refining Incident Response for Malicious Attack Patterns

Learn from Nastassja van den Heever, CISO of FNB South Africa, about crafting effective incident response strategies. Discover the importance of assessments, key components of a cyber resilience playbook, and how to build and execute a robust incident response plan.

Price
Course duration Duration: 15 minutes

Search

Clear

Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement