Home
IT Infrastructure
IT Infrastructure Consultancy
Cloud Services
Data Center
Microsoft Services
Azure
Azure Information Protection plans
Azure Active Directory Plans
Dynamics 365
Dynamics 365 for Field Service
Microsoft Dynamics 365 for Sales
Microsoft Dynamics 365 for Finance and Operations
Dynamics 365 for Retail
Dynamics 365 Business Central
Microsoft Dynamics 365 for Project Service Automation
Microsoft Dynamics 365 for Customer Service
Microsoft Dynamics 365 for Marketing
Microsoft 365
Microsoft 365 Education
Microsoft 365 Enterprise
Microsoft 365 Business
Microsoft 365 Plan Compare
Microsoft Exchange
Microsoft Exchange
Microsoft Exchange Server 2016
Office 365
Skype for Business
Network Functions Virtualization
IT Optimization
Cybersecurity
GRC Consultation & Implementation
NCA Cybersecurity Frameworks
ECC-1
CCC
NCS
SDLC
CSCC
SAMA Frameworks (Cybersecurity & BCM Frameworks)
Saudi Aramco Cybersecurity Standard (SACS-002) Implementation and Audit
Cybersecurity Risk Management
Cybersecurity Audits and Compliance against national/international Cybersecurity Standards
ISO Implementation
ISO Implementation 27001
ISO Implementation 22301
ISO Implementation 31000
ISO Implementation 20000
PCI DSS 3.2.1v Implementation
CS Strategy & Roadmap Development
Cybersecurity Frameworks & Standards Development
COBIT 2019 Implementation
Cybersecurity Solutions & Technologies
Network Security
NGFW (Next Generation Firewall)
Network Admission Control (NAC)
Web Proxy
Email Security
Network detection & Response (NDR)
Data Leakage Prevention (DLP)
DDoS Mitigation
Threat Deception
Sandboxing
DNS Security
Micro-Segmentation
Endpoint Security
Anti-Malware
Endpoint Detection & Response (EDR)
PAM (Privileged Access Management)
Multi-Factor Authentication
Enterprise Mobility Management (EMM)
Data Protection & Governance
Data Discovery & Classification
DLP (Data Leakage Prevention)
Digital Rights Management
Data Access Governance
Data Encryption
Cloud Security
Cloud Access Security Broker (CASB)
Multi-Factor Authentication
Enterprise Mobility Management (EMM)
Secure Remote Access / ZTNA
Orchestration & Automation
SIEM
UEBA
SOAR (Security Orchestration Automation and Response)
Threat Intelligence
Threat Intelligence Platform
Brand and Reputation Protection
Dark and Deep Web Intelligence
Threat Hunting
Application Security
Web Application Firewall
Database Security
Application Code Scanning
Multi-Factor Authentication
PAM (Privileged Access Management)
OT Security
OT Security Services
OT Security Solutions
Technical Consultancy Services
SOC Consultation
Technical Processes & Procedures Development
Technologies Advisory & Implementation Roadmap
Technical Assessment Services
Vulnerability Assessment & Pen-Testing
Cyber Range & Red Teaming
Applications Threat Modeling
Applications Code Review
Technologies Configuration Review
Incident Response and Forensics Services
Cyber Forensics
Computer Forensics Solution
Mobile Forensics Solution
Network Forensics Solution
Multi-Media Forensics Solution
Building Digital Forensics Lab
Incident Response & Management
Incident Management Retainer Service
Forensics Service
Incident Playbooks Development and Dry Runs
Managed Security Services
SOC AS A Service
Security Monitoring Service
Incident Management
Threat Intelligence and Hunting
Vulnerability Assessment & Pen-Testing
Training and Awareness
Training
Technologies Awareness Training
ISO 27001 LI/LA
CISSP
SSCP
CISM
Awareness
LMS (Learning Management System)
Developing Awareness Program
Digital Transformation
Digital Led Strategic Transformation
Strategy Development
Business Transformation
Operation Optimization
Talent Development
Innovative Digital Services
Blockchain
AI and Cognitive Decision Making
Data Intelligence and Analytics
Analytics and BI (Business Intelligence)
Big Data
Legacy System Modernization
Robotic Process Automation
NextGen ERP
NextGen GRP
Digital Customer Experience
UI/UX
Mobility
Chat Bots
Augmented Reality (AR) And Virtual Reality (VR)
IoT
About
About Us
Our Clients
Our Partners
Events
Blog
Careers
Contact Us
Infratech Online Seminars
Keywords
Location
Any dates
Category
Cyber Security
Event Type
Conference
Online Seminar
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
Events
Load more events