CyberEd Pro+
Subscription
Push your cybersecurity prowess to the next level with CyberEd Pro+—the ultimate immersive training experience. This tier includes all the benefits of CyberEd Essentials and CyberEd Pro, plus interactive, hands-on labs and simulated cyber ranges. Develop real-world attack and defense strategies through experiential exercises, reinforcing technical proficiency for both individuals and teams. Experience advanced learning that allows you to learn, test, and refine your skills in dynamic, realistic environments.
What’s Included:
- All CyberEd Essentials & Pro Features
Enjoy access to the same leading events, expert-led webinars, specialized training, professional community, and automated CPE tracking available in both Essentials and Pro. - Hands-On Labs & Cyber Ranges
Strengthen your skills with engaging, real-world simulations that mimic authentic cyber threats, enabling safe yet immersive practice. - Red Team & Blue Team Exercises
Dive into offense-focused and defense-focused scenarios, developing a comprehensive perspective on modern cybersecurity challenges. - Escape Rooms & Scenario-Based Challenges
Tackle interactive puzzles and complex threat simulations designed to enhance problem-solving skills in high-pressure environments. - Advanced Experiential Learning
Explore a wide range of cutting-edge techniques and strategies, solidifying your expertise through trial, error, and hands-on mastery.
Here is a list of the items in the subscription:
Hands-On Web App PentestingThis course is designed for those looking to gain skills related to penetration testing web applications.
Course
|
AI and ML in CybersecurityAI and ML in Cybersecurity explores the intersection of AI and cybersecurity in this comprehensive course designed for learners at all levels.
Course
|
Dark Web & Threat Intelligence: Understanding Your EnemyJoin Manoj Abraham in an exploration of the dark web.
Course
|
OT Attack!"OT Attack!" is a hands-on tabletop simulating cyber-attacks on OT systems.
Course
|
Practical Pentesting: featuring Brad StineIn this series, Daniel and Brad will take a look at what a pentesting engagement looks like through the lens of Brad's experience as a pentester.
Course
|
The Future of Ransomware & Evolving AttacksJoin Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Course
|
CompTIA IT Fundamentals+ (FC0-U61)CompTIA IT Fundamentals+ (ITF+) is an entry-level certification for beginners exploring IT
Course
|
Intro to OWASP & Security Logging FailuresDive into OWASP's logging or monitoring related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Mastering Microsoft Endpoint Manager and IntuneMaster Microsoft Endpoint Manager and Intune to streamline device management and enhance security.
Course
|
This Is How You FailJoin Chase Cunningham, the "Doctor of Zero Trust" in a conversation about why well-meaning enterprises fail.
Course
|
Demystifying Zero Trust with Greg TouhillGreg Touhill Director, CERT Division, Carnegie Mellon University Software Engineering Institute
Course
|
All Other Identities: Implications for Zero TrustThe world of identity and access management has spent the last 30 years or more focusing almost exclusively on the enterprise workforce.
Course
|
Amping Up Splunk with Advanced AdminLearn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.
Course
|
PowerShell SkillsThis course is for anyone wanting to learn how to write PowerShell scripts to automate tasks.
Course
|
Strategies Against Geopolitical Cyber ThreatsStrategies Against Geopolitical Cyber Threats outlines strategies to defend critical infrastructure from state-sponsored attacks.
Course
|
Taming ICS and OT Cyber ThreatsLearn about taming ICS and OT cyber threats to implement more secure cybersecurity risk management strategies today!
Course
|
Commanding the IT-OT ConvergenceCommanding the IT-OT Convergence is designed for leaders tasked with driving the secure convergence of IT and OT systems. Click continue to start!
Course
|
Combatting Social Engineering & Insider ThreatsTake practical, actionable steps to enhance the overall security posture of your financial service organization today!
Course
|
Developing Solutions for Microsoft Azure (AZ-204)AZ-204: Developing Solutions for Microsoft Azure certification validates expertise in designing, building, and maintaining cloud applications.
Course
|
AZ-140: Microsoft Azure Virtual DesktopAZ-140: Microsoft Azure Virtual Desktop certification focuses on planning, delivering, and managing virtual desktop experiences using Azure.
Course
|
AZ-500: Microsoft Azure Security TechnologiesAZ-500: Microsoft Azure Security Technologies certification focuses on managing security for Azure environments.
Course
|
Nefarious Use of Modern MoneyJoin Karen Boyer, Claire Le Gal and David Pollino in a discussion of the criminal use of newer forms of money movement to hide criminal proceeds and cash out.
Course
|
CompTIA CySA+ (CS0-003)The CompTIA CySA+ is an industry-recognized certification that aims to validate the skills and knowledge of cybersecurity analysts.
Course
|
CompTIA Cloud Essentials+CompTIA Cloud Essentials+ is for both IT and non-technical professionals who require the essential business acumen needed to make informed cloud service decisions.
Course
|
CompTIA A+ Core 2Learn and master the material needed to pass the CompTIA A+ Core 2 exam!
Course
|
CompTIA A+ Core 1Learn and master the material for CompTIA's A+ Core 1 Exam
Course
|
CompTIA Server+ (SK0-005)CompTIA Server+ (SK0-005) certification validates the skills needed to manage and troubleshoot servers in data centers and cloud environments.
Course
|
Absolute Musts in Your Incident Response PlanJoin Rocco Grillo, Kevin Li, and Parthiv Shah as they discuss incident response plans that work... and those that fail!
Course
|
Microsoft Power BI SkillsEnhance your Microsoft Power BI skills to create impactful data visualizations and business intelligence solutions.
Course
|
Microsoft Sentinel SkillsMicrosoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.
Course
|
Networking FundamentalsLearn network fundamentals: components, topologies, IPv4/IPv6 addressing, and more.
Course
|
Accredited DevOps FoundationLearn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Course
|
Accredited DevOps ProfessionalPrepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
Course
|
Accredited Management of Risk® PractitionerLearn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
Course
|
Accredited SIAM FoundationSIAM: Manage multi-provider services. Learn the business case, benefits, processes, and challenges. Prepare for the EXIN SIAM Foundation exam.
Course
|
SOC 2 ComplianceSOC 2, developed by the American Institute of CPAs, outlines how organizations manage customer data. Comply with SOC 2 today!
Course
|
The Impact of HRM on Breach PreventionSecurity awareness training has done little to decrease the percentage of cyber incidents involving human error.
Course
|
OWASP with Hannah McCartneyJoin Hannah McCartney your trusted AI guide and explore the top 10 categories of application security risk.
Course
|
NCUA Cybersecurity Compliance Practical ApplicationEnhance your credit union's overall security posture with NCUA Cybersecurity Compliance training today!
Course
|
Becoming a Linux Power UserBecoming a Linux Power User is a technical skills course designed to elevate viewers to "Power User" status.
Course
|
ZTNA-Evolving Beyond Antiquated VPNsJoin Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.
Course
|
Becoming a Linux Server AdminThe Becoming a Linux Server Administrator covers managing Linux servers in a business environment.
Course
|
Zero Trust, The DoD & YouZero trust, supply chain security and DevSecOps.
Course
|
Zero Trust Case Study: Inwood BankJoin Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.
Course
|
Windows Terminal SkillsThis course will acquaint learners with the new Windows Terminal Application.
Course
|
Windows Admin CenterMaster Windows Admin Center to simplify server and infrastructure management. Enroll today!
Course
|
Zero Trust: The Key to Securing Higher EducationJoin George Finney, the CISO at Southern Methodist University and explore higher education specific cybersecurity challenges.
Course
|
SC-200: Microsoft Security Operations AnalystSC-200: Microsoft Security Operations Analyst certification focuses on managing and mitigating security threats using Microsoft tools.
Course
|
Intro to OWASP & Insecure DesignLearn about OWASP's design related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & InjectionLearn about OWASP's injection related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Auth FailuresDive into OWASP's identification or authentication related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Cryptographic FailuresLearn about OWASP's encryption related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
CISA: Certified Information Systems AuditorThis course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
Course
|
Cisco CCNA (200-301)This comprehensive CCNA 200-301 Certification Course is designed to prepare students for the Cisco Certified Network Associate (CCNA) exam
Course
|
Cisco CCNP Data Center DCCOR (350-601)The DCCOR course helps you prepare for the CCNP Data Center and CCIE Data Center certifications for advanced-level data center roles.
Course
|
Preparing for Industry 5.0 and 6.0Preparing for Industry 5.0 and 6.0 highlights security challenges and benefits introduced by Industry 5.0 and 6.0.
Course
|
Linux Security TechniquesThe Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.
Course
|
Linux in the CloudThe Linux in the Cloud series focuses on implementing the Linux operating system in a virtualized environment.
Course
|
Customer IAM & the Path to Making Identity BetterJoin Jeremy Grant in an examination of the critical role of digital identity as infrastructure.
Course
|
Linux for BeginnersLinux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.
Course
|
Linux EssentialsThe Linux Essentials certification from the Linux Professional Institute is designed to showcase your foundation skills in working with the Linux operating system.
Course
|
Leading NCUA Cybersecurity ComplianceLead teams that safeguard member information, maintain the integrity of financial operations, and remain NCUA compliant.
Course
|
Leading Financial Supply Chain Cybersecurity TeamsExpand your third party vendor and supply chain cybersecurity leadership skills and drive better business impact, for your business today!
Course
|
Jr Penetration Test - TheoreticalJoin CyberSage for your hacker initiation and kick off your Penetration Testing journey today!
Course
|
ISO/IEC 27001Join our AI guide in this course about ISO/IEC 27001 the international standard that provides a framework for Information Security Management Systems (ISMS).
Course
|
Intro to OWASP & Security MisconfigurationLearn about OWASP's misconfiguration related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Server-Side Request ForgeryDive into OWASP's server-side request forgery cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Data Integrity FailuresLearn about OWASP's integrity related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASP & Outdated ComponentsDive into OWASP's component related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to PCI DSSEveryone in finance should know the basics of payment card data security compliance. Learn about payment card industry data security standard compliance today!
Course
|
Intro to Ransomware in FinServEvery financial sector business professional should have a basic understanding of ransomware threats. Kick off your ransomware journey today!
Course
|
Intro to the Gramm-Leach-Bliley ActLearn how the Gramm-Leach-Bliley Act requires financial institutions to explain information-sharing practices and safeguard sensitive data.
Course
|
Intro to the NCUA's Cybersecurity RequirementsEvery financial sector business professional should know the basics of data protection and NCUA compliance. Start your NCUA journey today!
Course
|
CyberPatriotCyberPatriot is an amazing free program. It is a National Youth Cyber Education Program with emphasis on the national competition. Get Started Today!
Course
|
Introduction to a Security Operations CenterLearn about strategic importance of SOCs and consider potential career paths within this essential domain.
Course
|
Intro to OWASP & Broken Access ControlLearn about OWASP's broken access control related cybersecurity concerns, risk mitigation strategies and pro tips!
Course
|
Intro to OWASPThe OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!
Course
|
Intro to Malware Analysis, Part 1Explore the principles of malware analysis and set up your own malware analysis lab!
Course
|
Intro to ICS & OT CybersecurityLearn the basics of Industrial Control Systems (ICS) and Operational Technology (OT) to protect your organization from cybersecurity related threats!
Course
|
ICS SCADA and IIoT VulnerabilitiesICS SCADA and IIoT Vulnerabilities discusses the components of ICS, SCADA, and IIoT systems their vulnerabilities and threats.
Course
|
Human Risk ManagementTackle the human aspect of cybersecurity in this course about human risk management.
Course
|
How Hybrid Work Enabled Security Service Edge in UKIJoin Christopher Hines and Tom Field as they discuss how hybrid work paved the way for the security service edge in UKI.
Course
|
HIPAAJoin our AI guide in this course about The Health Insurance Portability and Accountability Act of 1996 (HIPAA).
Course
|
Fundamentals of Cybersecurity - Part 4Fundamentals of Cybersecurity Part 4 is an introduction to Cloud and Web Security.
Course
|
Fundamentals of Cybersecurity - Part 5Fundamentals of Cybersecurity Part 5 is an introduction to compliance and human risk management.
Course
|
Fundamentals of Cybersecurity - Part 3Fundamentals of Cybersecurity, Part 3 covers overarching concepts of endpoint and data security.
Course
|
Fundamentals of Cybersecurity - Part 2Fundamentals of Cybersecurity, Part 2 is an introduction to Access Control and Network Security.
Course
|
Fundamentals of Cybersecurity - Part 1Fundamentals of Cybersecurity, Part 1 is an introduction to cybersecurity and risk management.
Course
|
FinCEN and the Digital Identity MissionJoin Tom Field and Kay Turner, U.S. Department of the Treasury as they discuss FinCEN, the Digital Identity Mission, and compliance.
Course
|
Financial Supply Chain CybersecurityImplement stronger third party vendor and supply chain cybersecurity risk mitigation tactics today!
Course
|
FDIC Cybersecurity Laws and RegulationsMake sure your institution stays compliant. Brush up on FDIC Laws and Regulations today!
Course
|
Exposure Management for Modern Attack SurfaceJoin Kartik Shahani in an exploration of the cloud, ever expanding attack surfaces, and endpoint security.
Course
|
DNSThis series explores the practical application of DNS, the Domain Naming System. We demonstrate using DNS records to support websites, mail servers, and other services.
Course
|
MinIO CVE-2023-28432Dive into the world of MinIO security as we uncover and exploit an information disclosure vulnerability, gaining access to sensitive data.
Course
|
3 Tactics to Maximize Cyber Improvement in 2024SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Course
|
A Deep Dive Into AIOps & Its Impact on IT OperationsSachin Seth of BSE Ebix examines how AI is revolutionizing IT operations and enhancing system monitoring capabilities.
Course
|
AI Adoption Across IndustriesJon Washburn of Stoel Rives, Erika Voss of DAT and Eric Sanchez of Kyowa Kirin share cross-industry perspectives on AI implementation challenges and solutions.
Course
|
AI in HealthcareCory Brennan and David Hoffman examine AI bias in healthcare, exploring ethical implications and strategies for ensuring fair, secure AI implementation.
Course
|
AI-Driven Threat IntelligenceJoin Sujith Immanuel Pellican in an exploration of AI maturity, cyber exercises, and identity protection strategies.
Course
|
An Identity-First Approach to Your Zero Trust JourneyGanesh Narasimhadevara of Okta discusses implementing identity-first approaches in zero trust architectures.
Course
|
Balancing Protection & Productivity: The UEM ApproachJoin Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.
Course
|
Balancing Security and Customer ExperienceCisco's Samir Mishra explains strategies to reduce security complexity, enhance security posture, and implement AI-enabled solutions with zero trust.
Course
|
Boosting Digital Transformation for CI CompaniesSSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Course
|
Building a Seamless Path to Zero Trust NetworkingJoin Eric Anderson in an exploration of achieving the right balance between stringent security requirements and a seamless user experience.
Course
|
Building Next-Gen SIEMDr. Durga Prasad Dube of Reliance Industries explores behavior-based threat detection approaches and SIEM modernization strategies.
Course
|
Building Risk Management from SOC to BoardroomAvangrid's Brian Harrell shares insights on translating cyber risks to board-level discussions and integrating security into business decisions.
Course
|
ChatGPT: Going Beyond AI for Threat DetectionJoin Rajeev Batra and Sumit Gupta in an exploration of ChatGPT’s potential, limitations and business use cases.
Course
|
ChatGPT: I, for One, Welcome Our New AI Overlords!Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.
Course
|
Cloud Security Lessons LearnedJoin Rajesh Hemrajani, Dilip Panjwani, Dharmesh Rathod, and Nandkumar Saravade in a lively discussion of cloud security.
Course
|
Cloud: A Digital Immune System to Establish Cyber ResilienceJoin Ben Caisley as he explores how to establish cyber resilience in the cloud.
Course
|
Control Cybersecurity Complexity by Knowing AssetsSean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.
Course
|
Cyber Insurance and Risk: What to ExpectAmol Deshpande of RPG Group and Bharat Panchal of Discover Financial Services analyze cyber insurance trends, coverage scenarios and future landscape.
Course
|
Cyber Insurance: The Best Defense Against Cyberattacks?Join Deepika Mathur in an exploration of the extent to which cyber insurance fuels ransomware attacks.
Course
|
Cyber Risk QuantificationSreeji Gopinathan and Sammit Potdar of Lupin explore approaches to quantifying cyber risk beyond technology and automation.
Course
|
Cybersecurity Mesh ArchitectureLearn how to do more with less! Join Vishak Raman in a discussion of cybersecurity mesh architecture, designed to make security more composable and scalable.
Course
|
Cybersecurity on a Budget: Healthcare PerspectiveJoin Anne Coulombe, Rick Doten, and Jigar Kadakia in a lively discussion about managing cybersecurity in healthcare on a budget.
Course
|
Cybersecurity Resilience & Risk Management in FinanceJoin Dr. David Isiavwe and Kenneth Palliam in a conversation about the the importance of cybersecurity resilience in the financial sector.
Course
|
Data Localization vs. Cross-Border Data MovementShiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.
Course
|
Data Protection Bill: What CISOs Can Expect?Join Vasanth Pai, Srinivas Poosarla, Poorav Sheth and Justice B.N. Srikrishna in a discussion of India's fourth bill on data protection.
Course
|
Dealing With Evolving Attack Surface: Defender's AdvantageJoin Sharda Tickoo in a discussion of the defender's advantage in dealings with evolving attack surfaces.
Course
|
Digital India: A Cybersecurity PerspectiveDr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
Course
|
Driving IT Security Transformation in Fortune 500sRoyal Caribbean's Jason Stockinger shares leadership strategies for aligning cybersecurity with business priorities in Fortune 500 companies.
Course
|
Efficiently Reducing Risk in Sustained Cyber ConflictMITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Course
|
Empowering a Cyber-Resilient EnterpriseJoin Navin Mehra in an exploration of how the right strategy, platform and incident response plan can empower a cyber-resilient enterprise.
Course
|
Enhancements to HICP GuideJoin David Holtzman in a discussion of healthcare and the the top 10 cybersecurity practices highlighted in the HICP.
Course
|
Enterprise Application SecuritySynopsys's Girish Nanappa explores application security posture management for securing enterprise applications at scale in AI-fueled environments.
Course
|
Establishing Secure & Frictionless BankingProf. D Janakiram of IDRBT explores how technological innovations are reshaping banking security and the path to frictionless operations.
Course
|
Evolving a Third-Party Risk Management ProgramJoin Anbu David, Mathan Babu Kasilingam, and Deval Mazmudar in an exploration of third party risk management.
Course
|
Fighting Ransomware in the TrenchesOPSWAT's Nandakumar Seshadri demonstrates ransomware attack scenarios and protection strategies using content disarm and reconstruction technology.
Course
|
Fortinet Security FabricJoin Prem Nithin R in an exploration of Fortinet and mesh architecture.
Course
|
Future of Cybersecurity: Threats and OpportunitiesJoin Terence Gomes in an exploration of cyber resilience, disaster recovery and business goals.
Course
|
Future of Security: Threats and OpportunitiesJoin Suraj Jayaraman explores the cybersecurity disaster recovery process.
Course
|
Global Security Challenges & Opportunities in 2023Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
Course
|
How AI Is Shaping CybersecurityJoin Kayzad Vanskuiwalla and Harshil Doshi in a discussion of how AI is shaping cybersecurity.
Course
|
How Digital Forensics Will Enhance Your InvestigationGavin Hornsey explores how to simplify internal and external threat investigations, enabling timely action.
Course
|
How to Prioritize, Measure and Convey It to the BoardVeracode CISO Sohail Iqbal provides guidance on prioritizing software security and effectively communicating metrics to board members.
Course
|
Implementing a Zero Trust Network ArchitectureLCRA's Ravindra Varma Lakamraju shares practical insights on implementing ZTNA framework for hybrid workforce security.
Course
|
Implementing Zero Trust & Gaining Buy-InJoin Sudip Banerjee for a discussion about zero-trust strategy and implementation.
Course
|
Insights From State CISOJoin Ralph Johnson in a discussion of how he tackled security on a state-wide scale.
Course
|
Key Considerations for HIPAA Compliance & Data ProtectionJoin Susan Rhodes in a talk about HIPAA security and privacy and breach notification rule-making.
Course
|
Learn How to Combat AdversariesMikkel Planck will share the latest insights from the frontline and reveal how adversaries are targeting organizations.
Course
|
Managing Cybersecurity RisksTom John Fischer Jensen addresses the challenges of managing modern cybersecurity risks, focusing on how to measure, communicate and tackle them effectively.
Course
|
Managing Risk From Generative AINicholas Farnsworth and Daniel Healow from Orrick, Herrington & Sutcliffe discuss risk management strategies for generative AI throughout its life cycle.
Course
|
Master Class in Generative AI DiscoverySam Curry, VP and CISO at Zscaler, explores the implications of AI for cybersecurity practitioners and emerging opportunities in the field.
Course
|
Medical Device CybersecurityJoin Phillip Englert and Suzanne Schwartz in a conversation about medical device security.
Course
|
Mitigating Modern Cyberthreats From Third PartiesTai Alad of CyberGRX presents new approaches to third-party risk management using data-rich insights and modern monitoring capabilities.
Course
|
Mitigating Risk in Unmonitored Business ChannelsSafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.
Course
|
Mitigating the Evolving DDoS Threat LandscapeSiddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.
Course
|
Modernizing Data Security & ComplianceLuke Babarinde of Imperva shares strategies for securing critical data assets and maintaining regulatory compliance across diverse environments.
Course
|
Navigating Cyberthreats in Financial ServicesFred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.
Course
|
Navigating Executive LiabilityJonathan Armstrong of Cordery, Andrew Robson of Bentley and Quentyn Taylor of Canon analyze TSB CIO case and implications for security leaders' liability.
Course
|
Next-Gen CISO: The Custodian of Digital TrustJoin Debashish Jyotiprakash in a discussion of the CISOs role establishing business and cyber resilience across functions.
Course
|
NIS2 - An Industry Insider PerspectiveMorten Kromann will discuss how the EU's NIS2 Directive will reshape cybersecurity in the Nordics and how to navigate its regulatory impact.
Course
|
One Company’s Gen AI Risk PolicyJonas Rendahl will share insights on crafting an effective gen AI policy, overcoming challenges and mitigating risks tailored to different industries.
Course
|
Payments Fraud: How to Stop Cyber PerpetratorsJoin Dr. Lopa Mudraa Basuu and Anuj Bhansali in an exploration of payment fraud and defense.
Course
|
Predictive SecuritySatheesh Kalyanasundaram of CrowdStrike explores building predictive security frameworks and leveraging threat intelligence for enhanced threat detection.
Course
|
Privacy & Compliance in the Age of AIOjas Rege, Ginger Armbruster and Jerry Cochran explore balancing AI-powered threat prevention with privacy protection and compliance requirements.
Course
|
Protecting the Healthcare IVRSumant Mauskar of Pindrop shares insights on protecting healthcare IVR systems while balancing compliance, patient experience and operational efficiency.
Course
|
Real-Time OT Network Protection for Data & MediaSteve Broadwell of OPSWAT examines strategies for protecting OT networks from APT threats through advanced file and removable media security.
Course
|
Reclaim Control Over Your SecretsStephen Johnson introduces Entro's Secrets Security Platform for managing secrets across vaults, source code and cloud environments.
Course
|
Reducing Cyber Risk in HealthcareJoin John Fahey in a discussion of how to detect threats in healthcare networks early in the kill chain.
Course
|
Reducing Risk in ICS EnvironmentsTenable's Dwayne Edwards explores ICS vulnerabilities and provides four key steps to enhance security posture beyond traditional patching.
Course
|
Rise & Reinvention of Business Email CompromiseJoin Michael DeNicola in a conversation about social engineering tactics and what organizations can do to thwart them.
Course
|
Risk, Response and Recovery for Remote EndpointsJoin Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.
Course
|
SaaS for Cyber Core Services: Are CISOs Tuned In?Join Shobha Jagatpal in a discussion of the cloud, security, network operations, threat detection and response.
Course
|
Secure Banking in 2023: The Next Big InnovationJoin Agnelo D'Souza, Anagha Mujumdar, Pradeep Kumar Rangi, and K M Reddy in an exploration of fintech, emergent tech and cybersecurity.
Course
|
Secure Coding TrainingYogeshwaran Sivasubramanian highlights the growing frequency of security breaches due to inadequate secure coding practices among developers.
Course
|
Securing the Digital Transactional EcosystemJoin Prof. D Janakiram in a discussion of securing the digital transactional ecosystem.
Course
|
Setting Realistic Cybersecurity GoalsJoin Ankit Wasnik in a discussion about going back to the basics of building a successful cybersecurity program.
Course
|
Shifting to Proactive CybersecurityKunal Dixit and Shitanshu Kumar of ETEK discuss transitioning from reactive to proactive security approaches in the era of digital transformation.
Course
|
Skill Gap in CybersecurityJoin Urvish Acharya and Rohit Rane in this exploration of new ways to recruit and retain cybersecurity talent.
Course
|
Stop Guessing Your Cyber RiskSqualify's Asdrúbal Pichardo discusses cyber risk quantification and methods to communicate potential financial losses to C-suite executives.
Course
|
Strategies for CISOs Post-SolarWindsSean Mack, Walker Newell, Paul Kurtz and David Anderson examine SEC cybersecurity enforcement post-SolarWinds and strategies for CISOs.
Course
|
Taking Cover With Self-Learning AIIan Bramson, VP of global industrial cybersecurity at Black & Veatch, reveals how self-learning AI is reshaping cloud security defense.
Course
|
The Advent of the OT SOCWSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Course
|
The C-Suite Debate on Tackling Cyber ExtortionShailendra Kothavale, Steve D'Souza, Vijay Verma and Pradipta Patro debate the complexities of ransomware response and payment decisions.
Course
|
The Crossroads of AI & Application SecurityChris Wysopal of Veracode explores AI's role in application security, including flaw detection, code fixes and managing associated risks.
Course
|
The Future of AI in SecurityRandeep Gill of Exabeam explores AI's role in security operations, addressing autonomous SOC capabilities and human-AI collaboration.
Course
|
The Healthcare Edge EcosystemJoin Theresa Lanowitz in a discussion of healthtech, edge computing, and cybersecurity on the edge.
Course
|
The New-Age BoardroomsDr. Bhimaraya Metri of IIM Nagpur shares strategies for effective cybersecurity communication with boards and establishing resilient security cultures.
Course
|
Turning IT/OT Cyber Strategies into Business ROAdam Paturej of ICCSS explores transforming cybersecurity investments into business value while maintaining critical infrastructure protection.
Course
|
Unleashing Generative AI in Cyber HealthcareJoin John Frushour and Anahi Santiago in a lively discussion of healthtech, cybersecurity, and the consequences of generative AI.
Course
|
Updating Your Cybersecurity Strategy in the New WorldJoin Sumnesh Joshi in a discussion of cybersecurity strategy to fight today’s hybrid warfare.
Course
|
Ways to Simplify Your CybersecurityVishal Salvi of Quick Heal Technologies shares practical strategies for simplifying cybersecurity operations while maintaining robust protection.
Course
|
Windows Threat HuntingRohit Shrivastava of Barclays shares expertise on conducting threat hunting in Windows environments and building proactive defense strategies.
Course
|