Capabilities Compliance Services

Capabilities Compliance Services

Security Training

TDI has recognized cyber security experts who have published articles and delivered seminars and lectures to a worldwide cyber security audience. TDI offers these seasoned instructors to train you.

An employee’s understanding of and compliance with an organization's security policies and processes is critical to an effective security program. Even the most sophisticated technical security solution can be compromised if employees/system-users are not enforcing and complying with security policies and procedures. TDI has trained instructors that are ready to provide cyber security training to ensure individuals at every level of your organization thoroughly comprehend program objectives, processes, and benefits. TDI personnel are often called upon to share our expertise on emergent security issues via speeches, seminars, and trainings. TDI will leverage this experience to assist you in actively engaging, informing, and challenging your training participants. We are not only extremely versed in all areas of cyber security but bring to bear extensive past performance in training on those same topics. We have provided cyber security training in one form or another in London, Amsterdam, Costa Rica, Oslo, Vienna, El Salvador, Jamaica, and across the United States. TDI has recognized cyber security experts who have published articles and delivered seminars and lectures to a worldwide cyber security audience including: SecurityFocus; Secure Computing Magazine; ComputerWeekly; Montpelier Magazine; Washington Business Journal; European American Computer Audit, Control, and Security Conference; WTOP Interview Federal News; ISACA International Network Security Conference; MIS Training Institute WEBSEC 2006 Conference; ISACA Information Security Management Conference 2005; InternetWorld UK 2005; ISACA International Conference 2005; Contingency Planning & Management West Conference 2005; The North American Computer Audit, Control, and Security Conference; Annual Computer Security Applications Conference (ACSAC); Information Systems Security Association (ISSA) National Capital Chapter; and George Mason University.