Gomex Technologies Limited, a Jamaican Company duly registered under the Laws of Jamaica under the Companies Act of 2004, was founded in March 2009 to respond to the need for trained professionals in information security and computer forensics in the Caribbean. For their training schedule, go here
Gomex Technologies Limited, a Jamaican Company duly registered under the Laws of Jamaica under the Companies Act of 2004, was founded in March 2009 to respond to the need for trained professionals in information security and computer forensics in the Caribbean. For their training schedule, go here
A week-long workshop to assess and determine the cybersecurity needs of Dominica is expected to commence at the Fort Young Hotel in Roseau on Monday, April 28, 2014... The workshop dubbed National Needs Assessment and Legislative Review Workshop on Cybersecurity is being hosted by the Ministry of Information, Telecommunications and Constituency Empowerment in collaboration with […]
Gomex Technologies Limited, a Jamaican Company duly registered under the Laws of Jamaica under the Companies Act of 2004, was founded in March 2009 to respond to the need for trained professionals in information security and computer forensics in the Caribbean. For their training schedule and further details, go here
For this special event in Curacao, Mindshare Resources combined its Core Level and Advanced Level physical security risk analysis and vulnerability assessments seminar into a three-day concentrated seminar. This 3 day concentrated seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical security systems. Step 1: Explore […]
A Systematic and Measureable Approach to Physical Security. This One (1) day seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical security systems. Explore the various components of an integrated physical security system. Learn about protection techniques used against traditional and non-traditional threats. Learn step-by-step how […]
About the Advanced Level - Two day seminar: This ADVANCED-level "follow-on" course dives into the security risk analysis process in greater detail with emphasis on gathering and analyzing the information and developing the report for stakeholders. Students will learn how to prepare detailed reports that highlight top risks, vulnerabilities, and project roll-out upgrade costs. They […]
Cross-training equates to improved cost-control and productivity. A cross-trained organization is more cohesive, with different divisions pursuing similar goals. All personnel working together will reduce an organization’s overall risk profile and streamline some redundant security processes. A cross training plan that would help physical security professionals understand what information security threats are and how to […]
Cross-training equates to improved cost-control and productivity. A cross-trained organization is more cohesive, with different divisions pursuing similar goals. All personnel working together will reduce an organization’s overall risk profile and streamline some redundant security processes. A cross training plan that would help physical security professionals understand what information security threats are and how to […]
For this special event in Curacao, Mindshare Resources combined its Core Level and Advanced Level physical security risk analysis and vulnerability assessments seminar into a three-day concentrated seminar. This 3 day concentrated seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical security systems. Step 1: Explore […]
A Systematic and Measureable Approach to Physical Security. This One (1) day seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical security systems. Explore the various components of an integrated physical security system. Learn about protection techniques used against traditional and non-traditional threats. Learn step-by-step how […]
About the Advanced Level - Two day seminar: This ADVANCED-level "follow-on" course dives into the security risk analysis process in greater detail with emphasis on gathering and analyzing the information and developing the report for stakeholders. Students will learn how to prepare detailed reports that highlight top risks, vulnerabilities, and project roll-out upgrade costs. They […]
Cross-training equates to improved cost-control and productivity. A cross-trained organization is more cohesive, with different divisions pursuing similar goals. All personnel working together will reduce an organization’s overall risk profile and streamline some redundant security processes. A cross training plan that would help physical security professionals understand what information security threats are and how to […]
For this special event in Curacao, Mindshare Resources combined its Core Level and Advanced Level physical security risk analysis and vulnerability assessments seminar into a three-day concentrated seminar. This 3 day concentrated seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical security systems. Step 1: Explore […]
A Systematic and Measureable Approach to Physical Security. This One (1) day seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical security systems. Explore the various components of an integrated physical security system. Learn about protection techniques used against traditional and non-traditional threats. Learn step-by-step how […]
About the Advanced Level - Two day seminar: This ADVANCED-level "follow-on" course dives into the security risk analysis process in greater detail with emphasis on gathering and analyzing the information and developing the report for stakeholders. Students will learn how to prepare detailed reports that highlight top risks, vulnerabilities, and project roll-out upgrade costs. They […]