CyberEd Essentials
Subscription
Elevate your cybersecurity expertise with CyberEd Essentials—your gateway to premier industry events, expert-led learning, and a thriving professional network. Stay informed about emerging threats, evolving best practices, and cutting-edge security trends. Earn and track CPE credits effortlessly, ensuring your certifications remain up to date. Join a growing community of professionals committed to continuous growth in the ever-changing cybersecurity landscape.
What’s Included
- Event Access
Gain on-demand entry to cybersecurity conferences and specialized events from around the globe. - Expert-Led Sessions
Participate in live and self-paced webinars featuring top security professionals across diverse disciplines and roles. - Community Engagement
Connect with peers and subject matter experts, sharing insights and experiences that foster professional development. - Earn CPE Credits
Simplify your certification maintenance with automated CPE tracking and reporting. - Continuous Learning
Stay ahead of the curve with fresh, relevant content added daily, covering the latest threats, tools, and strategies.
Here is a list of the items in the subscription:
Managing Risk From Generative AINicholas Farnsworth and Daniel Healow from Orrick, Herrington & Sutcliffe discuss risk management strategies for generative AI throughout its life cycle.
Course
|
Master Class in Generative AI DiscoverySam Curry, VP and CISO at Zscaler, explores the implications of AI for cybersecurity practitioners and emerging opportunities in the field.
Course
|
The Future of AI in SecurityRandeep Gill of Exabeam explores AI's role in security operations, addressing autonomous SOC capabilities and human-AI collaboration.
Course
|
ChatGPT: I, for One, Welcome Our New AI Overlords!Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.
Course
|
Control Cybersecurity Complexity by Knowing AssetsSean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.
Course
|
How to Prioritize, Measure and Convey It to the BoardVeracode CISO Sohail Iqbal provides guidance on prioritizing software security and effectively communicating metrics to board members.
Course
|
Mitigating Risk in Unmonitored Business ChannelsSafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.
Course
|
Mitigating the Evolving DDoS Threat LandscapeSiddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.
Course
|
Modernizing Data Security & ComplianceLuke Babarinde of Imperva shares strategies for securing critical data assets and maintaining regulatory compliance across diverse environments.
Course
|
Navigating Cyberthreats in Financial ServicesFred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.
Course
|
Reclaim Control Over Your SecretsStephen Johnson introduces Entro's Secrets Security Platform for managing secrets across vaults, source code and cloud environments.
Course
|
How Digital Forensics Will Enhance Your InvestigationGavin Hornsey explores how to simplify internal and external threat investigations, enabling timely action.
Course
|
Learn How to Combat AdversariesMikkel Planck will share the latest insights from the frontline and reveal how adversaries are targeting organizations.
Course
|
Managing Cybersecurity RisksTom John Fischer Jensen addresses the challenges of managing modern cybersecurity risks, focusing on how to measure, communicate and tackle them effectively.
Course
|
NIS2 - An Industry Insider PerspectiveMorten Kromann will discuss how the EU's NIS2 Directive will reshape cybersecurity in the Nordics and how to navigate its regulatory impact.
Course
|
One Company’s Gen AI Risk PolicyJonas Rendahl will share insights on crafting an effective gen AI policy, overcoming challenges and mitigating risks tailored to different industries.
Course
|
Secure Coding TrainingYogeshwaran Sivasubramanian highlights the growing frequency of security breaches due to inadequate secure coding practices among developers.
Course
|
Building a Seamless Path to Zero Trust NetworkingJoin Eric Anderson in an exploration of achieving the right balance between stringent security requirements and a seamless user experience.
Course
|
Insights From State CISOJoin Ralph Johnson in a discussion of how he tackled security on a state-wide scale.
Course
|
Enhancements to HICP GuideJoin David Holtzman in a discussion of healthcare and the the top 10 cybersecurity practices highlighted in the HICP.
Course
|
Key Considerations for HIPAA Compliance & Data ProtectionJoin Susan Rhodes in a talk about HIPAA security and privacy and breach notification rule-making.
Course
|
Medical Device CybersecurityJoin Phillip Englert and Suzanne Schwartz in a conversation about medical device security.
Course
|
Reducing Cyber Risk in HealthcareJoin John Fahey in a discussion of how to detect threats in healthcare networks early in the kill chain.
Course
|
Rise & Reinvention of Business Email CompromiseJoin Michael DeNicola in a conversation about social engineering tactics and what organizations can do to thwart them.
Course
|
Risk, Response and Recovery for Remote EndpointsJoin Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.
Course
|
The Healthcare Edge EcosystemJoin Theresa Lanowitz in a discussion of healthtech, edge computing, and cybersecurity on the edge.
Course
|
Unleashing Generative AI in Cyber HealthcareJoin John Frushour and Anahi Santiago in a lively discussion of healthtech, cybersecurity, and the consequences of generative AI.
Course
|
A Deep Dive Into AIOps & Its Impact on IT OperationsSachin Seth of BSE Ebix examines how AI is revolutionizing IT operations and enhancing system monitoring capabilities.
Course
|
An Identity-First Approach to Your Zero Trust JourneyGanesh Narasimhadevara of Okta discusses implementing identity-first approaches in zero trust architectures.
Course
|
Balancing Protection & Productivity: The UEM ApproachJoin Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.
Course
|
Cyber Insurance and Risk: What to ExpectAmol Deshpande of RPG Group and Bharat Panchal of Discover Financial Services analyze cyber insurance trends, coverage scenarios and future landscape.
Course
|
Cyber Risk QuantificationSreeji Gopinathan and Sammit Potdar of Lupin explore approaches to quantifying cyber risk beyond technology and automation.
Course
|
Data Localization vs. Cross-Border Data MovementShiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.
Course
|
Digital India: A Cybersecurity PerspectiveDr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
Course
|
Establishing Secure & Frictionless BankingProf. D Janakiram of IDRBT explores how technological innovations are reshaping banking security and the path to frictionless operations.
Course
|
Predictive SecuritySatheesh Kalyanasundaram of CrowdStrike explores building predictive security frameworks and leveraging threat intelligence for enhanced threat detection.
Course
|
Shifting to Proactive CybersecurityKunal Dixit and Shitanshu Kumar of ETEK discuss transitioning from reactive to proactive security approaches in the era of digital transformation.
Course
|
The C-Suite Debate on Tackling Cyber ExtortionShailendra Kothavale, Steve D'Souza, Vijay Verma and Pradipta Patro debate the complexities of ransomware response and payment decisions.
Course
|
The New-Age BoardroomsDr. Bhimaraya Metri of IIM Nagpur shares strategies for effective cybersecurity communication with boards and establishing resilient security cultures.
Course
|
Ways to Simplify Your CybersecurityVishal Salvi of Quick Heal Technologies shares practical strategies for simplifying cybersecurity operations while maintaining robust protection.
Course
|
Windows Threat HuntingRohit Shrivastava of Barclays shares expertise on conducting threat hunting in Windows environments and building proactive defense strategies.
Course
|
Balancing Security and Customer ExperienceCisco's Samir Mishra explains strategies to reduce security complexity, enhance security posture, and implement AI-enabled solutions with zero trust.
Course
|
Strategies for CISOs Post-SolarWindsSean Mack, Walker Newell, Paul Kurtz and David Anderson examine SEC cybersecurity enforcement post-SolarWinds and strategies for CISOs.
Course
|
The Crossroads of AI & Application SecurityChris Wysopal of Veracode explores AI's role in application security, including flaw detection, code fixes and managing associated risks.
Course
|
Mitigating Modern Cyberthreats From Third PartiesTai Alad of CyberGRX presents new approaches to third-party risk management using data-rich insights and modern monitoring capabilities.
Course
|
Navigating Executive LiabilityJonathan Armstrong of Cordery, Andrew Robson of Bentley and Quentyn Taylor of Canon analyze TSB CIO case and implications for security leaders' liability.
Course
|
Future of Security: Threats and OpportunitiesJoin Suraj Jayaraman explores the cybersecurity disaster recovery process.
Course
|
Implementing Zero Trust & Gaining Buy-InJoin Sudip Banerjee for a discussion about zero-trust strategy and implementation.
Course
|
Payments Fraud: How to Stop Cyber PerpetratorsJoin Dr. Lopa Mudraa Basuu and Anuj Bhansali in an exploration of payment fraud and defense.
Course
|
SaaS for Cyber Core Services: Are CISOs Tuned In?Join Shobha Jagatpal in a discussion of the cloud, security, network operations, threat detection and response.
Course
|
Setting Realistic Cybersecurity GoalsJoin Ankit Wasnik in a discussion about going back to the basics of building a successful cybersecurity program.
Course
|
Cybersecurity on a Budget: Healthcare PerspectiveJoin Anne Coulombe, Rick Doten, and Jigar Kadakia in a lively discussion about managing cybersecurity in healthcare on a budget.
Course
|
3 Tactics to Maximize Cyber Improvement in 2024SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Course
|
Boosting Digital Transformation for CI CompaniesSSH Communications' Eduardo Giancristofaro discusses secure access control solutions enabling digital transformation in OT environments.
Course
|
Building Risk Management from SOC to BoardroomAvangrid's Brian Harrell shares insights on translating cyber risks to board-level discussions and integrating security into business decisions.
Course
|
Driving IT Security Transformation in Fortune 500sRoyal Caribbean's Jason Stockinger shares leadership strategies for aligning cybersecurity with business priorities in Fortune 500 companies.
Course
|
Efficiently Reducing Risk in Sustained Cyber ConflictMITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Course
|
Implementing a Zero Trust Network ArchitectureLCRA's Ravindra Varma Lakamraju shares practical insights on implementing ZTNA framework for hybrid workforce security.
Course
|
Reducing Risk in ICS EnvironmentsTenable's Dwayne Edwards explores ICS vulnerabilities and provides four key steps to enhance security posture beyond traditional patching.
Course
|
Stop Guessing Your Cyber RiskSqualify's Asdrúbal Pichardo discusses cyber risk quantification and methods to communicate potential financial losses to C-suite executives.
Course
|
The Advent of the OT SOCWSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Course
|
Cybersecurity Resilience & Risk Management in FinanceJoin Dr. David Isiavwe and Kenneth Palliam in a conversation about the the importance of cybersecurity resilience in the financial sector.
Course
|
AI-Driven Threat IntelligenceJoin Sujith Immanuel Pellican in an exploration of AI maturity, cyber exercises, and identity protection strategies.
Course
|
AI Adoption Across IndustriesJon Washburn of Stoel Rives, Erika Voss of DAT and Eric Sanchez of Kyowa Kirin share cross-industry perspectives on AI implementation challenges and solutions.
Course
|
Privacy & Compliance in the Age of AIOjas Rege, Ginger Armbruster and Jerry Cochran explore balancing AI-powered threat prevention with privacy protection and compliance requirements.
Course
|
Real-Time OT Network Protection for Data & MediaSteve Broadwell of OPSWAT examines strategies for protecting OT networks from APT threats through advanced file and removable media security.
Course
|
Taking Cover With Self-Learning AIIan Bramson, VP of global industrial cybersecurity at Black & Veatch, reveals how self-learning AI is reshaping cloud security defense.
Course
|
Turning IT/OT Cyber Strategies into Business ROAdam Paturej of ICCSS explores transforming cybersecurity investments into business value while maintaining critical infrastructure protection.
Course
|
Enterprise Application SecuritySynopsys's Girish Nanappa explores application security posture management for securing enterprise applications at scale in AI-fueled environments.
Course
|
Fighting Ransomware in the TrenchesOPSWAT's Nandakumar Seshadri demonstrates ransomware attack scenarios and protection strategies using content disarm and reconstruction technology.
Course
|
Fortinet Security FabricJoin Prem Nithin R in an exploration of Fortinet and mesh architecture.
Course
|
Quantum Threat to SecurityStandard Chartered's Anish Koshy discusses quantum computing threats to classical cryptography and strategies for quantum-safe security migration.
Course
|
AI in HealthcareCory Brennan and David Hoffman examine AI bias in healthcare, exploring ethical implications and strategies for ensuring fair, secure AI implementation.
Course
|
Protecting the Healthcare IVRSumant Mauskar of Pindrop shares insights on protecting healthcare IVR systems while balancing compliance, patient experience and operational efficiency.
Course
|
ChatGPT: Going Beyond AI for Threat DetectionJoin Rajeev Batra and Sumit Gupta in an exploration of ChatGPT’s potential, limitations and business use cases.
Course
|
Cloud Security Lessons LearnedJoin Rajesh Hemrajani, Dilip Panjwani, Dharmesh Rathod, and Nandkumar Saravade in a lively discussion of cloud security.
Course
|
Cloud: A Digital Immune System to Establish Cyber ResilienceJoin Ben Caisley as he explores how to establish cyber resilience in the cloud.
Course
|
Cyber Insurance: The Best Defense Against Cyberattacks?Join Deepika Mathur in an exploration of the extent to which cyber insurance fuels ransomware attacks.
Course
|
Cybersecurity Mesh ArchitectureLearn how to do more with less! Join Vishak Raman in a discussion of cybersecurity mesh architecture, designed to make security more composable and scalable.
Course
|
Data Protection Bill: What CISOs Can Expect?Join Vasanth Pai, Srinivas Poosarla, Poorav Sheth and Justice B.N. Srikrishna in a discussion of India's fourth bill on data protection.
Course
|
Empowering a Cyber-Resilient EnterpriseJoin Navin Mehra in an exploration of how the right strategy, platform and incident response plan can empower a cyber-resilient enterprise.
Course
|
Evolving a Third-Party Risk Management ProgramJoin Anbu David, Mathan Babu Kasilingam, and Deval Mazmudar in an exploration of third party risk management.
Course
|
Future of Cybersecurity: Threats and OpportunitiesJoin Terence Gomes in an exploration of cyber resilience, disaster recovery and business goals.
Course
|
Global Security Challenges & Opportunities in 2023Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
Course
|
How AI Is Shaping CybersecurityJoin Kayzad Vanskuiwalla and Harshil Doshi in a discussion of how AI is shaping cybersecurity.
Course
|
Next-Gen CISO: The Custodian of Digital TrustJoin Debashish Jyotiprakash in a discussion of the CISOs role establishing business and cyber resilience across functions.
Course
|
Secure Banking in 2023: The Next Big InnovationJoin Agnelo D'Souza, Anagha Mujumdar, Pradeep Kumar Rangi, and K M Reddy in an exploration of fintech, emergent tech and cybersecurity.
Course
|
Securing the Digital Transactional EcosystemJoin Prof. D Janakiram in a discussion of securing the digital transactional ecosystem.
Course
|
Skill Gap in CybersecurityJoin Urvish Acharya and Rohit Rane in this exploration of new ways to recruit and retain cybersecurity talent.
Course
|
Updating Your Cybersecurity Strategy in the New WorldJoin Sumnesh Joshi in a discussion of cybersecurity strategy to fight today’s hybrid warfare.
Course
|