Skip to content
Home
About Us
Meet The Team
Certifications & Partners
Overview
Services
Governance Risk and Compliance
Information & Cyber Security Frameworks
Virtual Ciso And Security Managers
Training and Awareness
Penetration Testing
Business Continuity and Incident Management
Defence Industry
Blogs
Multimedia
Contact
Home
About Us
Meet The Team
Certifications & Partners
Overview
Services
Governance Risk and Compliance
Information & Cyber Security Frameworks
Virtual Ciso And Security Managers
Training and Awareness
Penetration Testing
Business Continuity and Incident Management
Defence Industry
Blogs
Multimedia
Contact
Search
Home
About Us
Meet The Team
Certifications & Partners
Overview
Services
Governance Risk and Compliance
Information & Cyber Security Frameworks
Virtual Ciso And Security Managers
Training and Awareness
Penetration Testing
Business Continuity and Incident Management
Defence Industry
Blogs
Multimedia
Contact
Home
About Us
Meet The Team
Certifications & Partners
Overview
Services
Governance Risk and Compliance
Information & Cyber Security Frameworks
Virtual Ciso And Security Managers
Training and Awareness
Penetration Testing
Business Continuity and Incident Management
Defence Industry
Blogs
Multimedia
Contact
Search
Multimedia
Playlist
10 Videos
How to make Security relatable to Business? Making Security Relatable to Business | Gareth Shaw
4:06
Reducing the cost of Information Systems and Certifications | Pera Prometheus | Gareth Shaw
2:57
DEFSTAN 05-138 Issue 4 | Pera Prometheus | Cyber Security | Defence Industry UK
6:04
Cyber Security Certification | Defence Industry | Assurance | Pera Prometheus
1:56
Dangers of Perceived Security | Pera Prometheus | Over Confidence in Security | Defence Industry
2:02
How Pera Prometheus got started as a business?
1:52
Information Security - Demystifying the term | Cyber Security | IT Security | Pera Prometheus
4:58
Security Awareness | Why do Businesses need Security?
4:27
What is Cyber Crime?
0:52
🔐 Security aligned to Business Our Managing Director, Gareth Shaw, CISM, CISSP, shares key insigh
0:26