Annual Partner Appreciation/Awards

Annual Partner Appreciation/Awards

  Venue: The Civic Centre, Ozumba Mbadiwe Road, Victoria Island Date: 16th December 2022 Time: 7pm Dress Code: Denim and white Agenda 6.00pm: Guests Arrival 7.00pm: Welcome and Introduction by MC Ushbebe and Nduka Ijegbulem 7.30pm: Appreciation of Guest Speech by...
A Vault Is Not Enough – Webinar

A Vault Is Not Enough – Webinar

Date & Time: 4 November | 10am Venue: Online Webinar There are two sides to the PAM coin. Password vaulting is one. Privilege elevation is the other. A vault is a first step in protecting your company from identity-related data breached. In this session, we will...
Curbing Shadow IT in your organisation

Curbing Shadow IT in your organisation

“Shadow IT refers to (the use of) IT devices, software and services outside the ownership (approval) or control of IT organisations.” – Gartner The above definition gives the idea that Shadow IT can only be carried out by malicious actors when it is actually more...
Understanding the mechanics of a data breach

Understanding the mechanics of a data breach

Definition: A data breach is a cyber-attack in which sensitive or confidential data has been accessed or disclosed to an unauthorised individual or software system. Data breaches normally come in the form of exposed customer credit card numbers, corporate data, source...