Watchcom approved as PECB Gold Authorized Partner
With a long history of delivering high quality PECB training courses, Watchcom Security Group has been approved by PECB as a Gold Authorized Partner.
With digitalisation affecting all areas of work, and cybersecurity becoming more and more important, also on a strategic level, the need for the right competence and skills is increasing. As security professionals take on the challenge of beating cybercriminals at their game, fundamentals need to be in place.
With a long history of knowledge-sharing, we at Watchcom see the benefits of maintaining and renewing cybersecurity skills, and have for a number of years delivered PECB training courses. It was therefore with great pride we received the news of our status as Gold Authorized Partner of PECB.
Sharing knowledge and exchanging experiences is key to a stronger and more resilient society. At Watchcom, we take great pride in delivering high quality training courses, and are very honored to affirm our status as PECB Gold Partner. [Geir Mork, Head of Consulting]
It is with great pleasure to inform you that Watchcom has officially reached and been approved as a Gold Authorized Partner of PECB. We highly appreciate your effort and commitment to being a reliable PECB partner in our venture of pursuing impeccable business excellence and wish you a greater performance on 2023. [Fjolla Kosumi, Senior Business Development Manager, PECB]
PECB is a certification body that provides education, certification, and certificate programs for individuals. Helping professionals and organizations show commitment and competence by providing them with valuable education, evaluation, certiﬁcation, and certificate programs against rigorous internationally recognized standards, PECB's mission is to provide clients with comprehensive services that inspire trust, continual improvement, demonstrate recognition, and benefit the society as a whole.
By gaining skills through PECB-courses, participants get a deeper understanding of the practical approaches involved in the implementation of an Information Security Management System, to better preserve the confidentiality, integrity, and availability of information by applying a risk management process.