consult

Our Consultancy Services : Beyond Compliance

In Sri Lanka, most of the top corporates don’t take proactive measures in cyber security assuming that attackers will not target the corporate IT infrastructure; some corporates and organizations have been hacked but they don’t disclose it due to various reasons.

Read more…

ACCESS CONTROL

Access control protects companies against “internal attackers” by controlling which persons within the company need access to which data.

Read more…

Risk: Data losses

Any company, independent of its size and industry, is exposed to data losses through intentional theft or the negligent handling of data and risks know-how losses, competitive disadvantages,

Read more…

Control

Defines which user is authorized to use which data paths. Only those employees who need sensitive data for their work have access to these data.

Read more…

Ethical Hackers Forum Gallery

4EH-13EH-32EH-21EH-1

register-now for training courses at CICRA

december

16decAll DayExecutive MSc in Information Security17th Intake

january

10jan - 14jan 101:00 amjan 14Certified Ethical Hacker28th Intake
17jan - 21jan 171:00 amjan 21Computer Hacking Forensic InvestigatorCH|FI

february

15feb1:00 amProffessional Diploma in Network & Systems AdministrationPDNSA

march

5marAll DayBachelor of Cyber SecurityDegree Programme