top of page
Our Trainings
Our Trainings
At itrainsec we select the most relevant topics in the field of IT Security.
In any of our courses, your team will learn techniques from top industry experts.
At itrainsec we select the most relevant topics in the field of IT Security.
In any of our courses, your team will learn techniques from top industry experts.


Cybersecurity Trends for 2024: Navigating an Increasingly Complex Landscape
The year 2024 promises a cybersecurity landscape marked by both persistent challenges and emerging trends.
Kirsten Doyle
Dec 8, 2023

Are Your Business Users Entering Confidential Business Data into ChatGPT?
While using ChatGPT has the potential for businesses to enhance efficiency and reduce costs, it also comes hand-in-hand with risks.
Kirsten Doyle
Oct 5, 2023


What It Means to Be a Cybersecurity Researcher: Insights from Industry Experts
In the cybersecurity industry, few skills are as critical as those that cybersecurity researchers possess.
Kirsten Doyle
Sep 18, 2023

Code Cracks and Cyber Hacks: Why Secure Web Development is Your Digital Armour
Developing secure web applications has become critical due to the handling of sensitive customer data.
Kirsten Doyle
Sep 12, 2023


The Crucial Role of Cybersecurity Educators in Safeguarding Today’s Digital World
Cybersecurity educators play a crucial role in training and nurturing the next generation of cybersecurity experts.
Kirsten Doyle
Jul 14, 2023

Businesses: Neglect Сybersecurity Audits at Your Peril
A cybersecurity audit entails a comprehensive analysis of all cybersecurity aspects that pertain to the company's IT infrastructure.
Kirsten Doyle
Jun 9, 2023

Hacktivism Is on the Rise in 2023 (and It’s Getting Worse)
New wave of hacktivism, which has a wide range of levels and resources, is expected to employ a variety of new tactics and approaches.
Kirsten Doyle
May 25, 2023

The Rise of the Cybersecurity Architect
The significance of a robust cybersecurity architecture has never been more acute.
Kirsten Doyle
May 16, 2023


Every Business Needs Cyber Threat Intelligence Specialists
Cyber threat intelligence should not be confused with cybersecurity, yet it does not replace it either.
Kirsten Doyle
Apr 13, 2023


Fighting Evolving Ransomware
The cyber threat landscape is a rapidly evolving one, and adversaries grow more cunning and determined each year.
Kirsten Doyle
Mar 30, 2023


Compliance with Privacy and Compliance Laws is Key in Today’s Digital Age
The number of data breaches has made individuals and companies more aware of data privacy regulations.
Kirsten Doyle
Mar 10, 2023


Incident Response Is Key to Any Cybersecurity Strategy
In the event of an attack, communication is the baseline for any mitigation strategy to reduce the cost of the incident.
Kirsten Doyle
Feb 13, 2023

itrainsec and Women4Cyber Foundation Help Women in Expanding Their Cybersecurity Knowledge
Both organisations joined forces within Women4Cyber Academy, an online platform providing access to women to top cybersecurity education.
itrainsec
Jan 25, 2023


Machine Learning: a Tool and a Danger
ML and AI help security teams separate the wheat from the chaff, and find the genuine threats in the company’s data
Kirsten Doyle
Jan 24, 2023


Combatting Digital Fatigue in a Time of Increased Cybersecurity Complexity
Over the past few years, the scope and scale of CISO role has shifted dramatically.
Kirsten Doyle
Jan 13, 2023


Prevent Threats Before They Happen with Threat Hunting
Threat hunting involves threat analysts trawling iteratively through networks to root out any indicators of compromise, anomalous behaviours
Kirsten Doyle
Dec 10, 2022


Cybersecurity Trends We Can Expect in 2023
2022 has been a tumultuous year, with ransomware, supply chain attacks, and plaguing entities in every sector. What can we expect in 2023?
Kirsten Doyle
Dec 8, 2022


How SECaaS Can Benefit Your Business
SECaaS has risen in popularity as a way to reduce the costs associated with maintenance and updates to on-premise alternatives.
Kirsten Doyle
Nov 24, 2022


Protecting Data and Workloads in the Cloud
When it comes to cloud security, too many organisations are making the same mistakes over and over, and are surprised when they are breached
Kirsten Doyle
Nov 5, 2022


Recognising and Avoiding Phishing Scams
Phishing attacks are becoming more common and more sophisticated all the time, and no one is safe.
Kirsten Doyle
Oct 26, 2022
bottom of page