Skip to content
Cyber Leadership Institute
  • Home
  • Courses
    • Courses
    • Scholarships
  • Resources
    • Resource Library
    • Cyber Leadership Hub
    • Blog
    • Cyber Leadership Imperative Book
    • Cybersecurity Leadership Survey
  • Services
    • Coaching Programs
    • Cyber Talent Connect
  • Memberships
    • Free Membership
    • Premium Membership
    • Enterprise Membership
  • About
    • Mission and Purpose
    • Why Us?
    • Our Team
    • Our Members
    • Partners
    • Sponsors
    • News
    • Contact Us
    • FAQ
  • Login
    Login

Terminator EDR Killer (Spyboy) | Detecting and Preventing a Windows BYOVD Attack

SentinelOne / April 16, 2024

A Russian-speaking hacker has been making headlines recently after promoting a tool that the threat actor claims can bypass EDR […]

Terminator EDR Killer (Spyboy) | Detecting and Preventing a Windows BYOVD Attack Read More »

Are You Making One of These 8 Cloud Security Mistakes?

SentinelOne / March 19, 2024

Though mass adoption has driven an increased awareness and need for cloud security, many businesses continue to make common cloud-related

Are You Making One of These 8 Cloud Security Mistakes? Read More »

Looking Within | Strategies for Detecting and Mitigating Insider Threats

SentinelOne / February 22, 2024

Over the past decade, the digital landscape has undergone a rapid transformation, reshaping the way businesses operate and interact with

Looking Within | Strategies for Detecting and Mitigating Insider Threats Read More »

Analyzing Attack Opportunities Against Information Security Practitioners

SentinelOne / January 29, 2024

In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity

Analyzing Attack Opportunities Against Information Security Practitioners Read More »

Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation

SentinelOne / January 16, 2024

Threat actors are constantly evolving, consistently developing the tools, tactics, and procedures (TTPs) they use in attacks. In today’s threat

Cybersecurity In The Fast Lane | Why Speed Is Key In Incident Response & Mitigation Read More »

1 2 Next →

Recent Posts

  • How to Build a High-Value vCISO Business – Lessons from the Frontlines
  • Forrester Total Economic Impact™ of Mimecast Study
  • Threat Intelligence Has Never Been More Crucial
  • Securing Microsoft 365 Collaboration Tools: Beyond Basic Protection
  • The 6-Step Roadmap to Seamless PCI DSS v4.0 Compliance

Latest News

  • CLI Announces New Partnership with MyCISO
  • CLI Announces New Partnership with SentinelOne
  • Cyber Leaders on the Move: Vandana Verma — Global Chair of OWASP and Security Relations Leader APJ, ANZ region at Snyk
  • Cyber Leaders On The Move: Natasha Passley, Technology, Risk and Cyber Partner at KPMG.
  • Senior Business and Risk Executives Graduate from the Cyber Leadership Institute

Cyber Leadership Institute

Angel Place
Level 17, 123 Pitt Street
Sydney NSW 2000
[email protected]
Phone numbers:
Australia: 1300 492 360
+61 2 8001 6185 (from outside Australia)
UK:  +44 84 5004 1261
US: +1 888 491 5970
WhatsApp: +61 430 026 534

Useful Links

Home
Partners
Blog
News
About
FAQs
Scholarships
Contact us

What We Do

Courses
Resources
Membership

Download the Cyber Leadership Hub App

Join us

Join the waitlist of the Cyber Leadership Institute and get access to free resources and tools to help you in your career

© 2026 Cyber Resilience Pty Ltd | Privacy Policy Terms of Service