Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
In this insightful session, Brendan Clace of The Mosaic Company will explore a practical framework to modernize OT vulnerability management by aligning risk scoring with operational realities and building consensus across teams.
Theresa Lanowitz reveals key findings from LevelBlue's 2024 research on healthcare cyber resilience, exploring barriers, priorities and strategic solutions for the evolving digital landscape.
Colin Bell, CTO at AppScan, HCLSoftware, examines 2025's app security landscape, focusing on AI's impact on vulnerability detection, API security best practices,and DevOps integration.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Pierre Noel and Xandra Uth will explore the top cybercrime trends of the year, including AI-driven attacks, the impact of emerging technologies, the rise of hacktivism, and the growing complexity of phishing threats.
Join Nitin Dhavate, Navaneethan, and Arvind Sivaramakrishnan in a conversation about how to juxtapose privacy and security to achieve total compliance.
Sachin Seth of BSE Ebix examines how AI is revolutionizing IT operations and enhancing system monitoring capabilities.
Don Gibson, CISO of Kinly, shares insights on preventing burnout in cybersecurity teams and maintaining balance during periods of rapid transformation.
Snyk's Shilpa Raghunathan explores effective ways to identify malicious code and secure first-party code in supply chains using security-by-design principles.
Shivani Arni of Mahindra Group, Rupesh Nirgude of Prism Johnson, and Santosh Dsouza of Tata Realty share strategies for modern third-party risk assessment using AI, zero trust and real-time monitoring.
Join Andy Condliffe, Lead Sales Engineer, Orca Security, and learn how about how Orca offers a single integrated platform to detect security risks at every layer of the cloud estate.
Greg Tatum, Jessica Bolton, Sudhakar Vishnubhotla and Asif Effendi discuss TDPSA compliance, implementing user-friendly privacy systems and cross-functional collaboration strategies.
Jim Mandelbaum, Field CTO at Gigamon, explores rising cyber threats in healthcare. Gain insights from analysts, cloud providers, and firsthand accounts on attacker tactics and learn strategies to safeguard your organization and prevent becoming the next breach headline.
Sergio Trindade of Águas do Tejo Atlântico shares water utility security program insights, focusing on internal strategies and management communication.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Hossam Elshenraki presents a framework to counter increasing ransomware attacks in the Middle East, sharing key lessons from Dubai Police on early detection, active defense and prevention strategies.
Join Rocco Grillo, Kevin Li, and Parthiv Shah as they discuss incident response plans that work... and those that fail!
Marco Rottigni of SentinelOne discusses creating integrated security ecosystems where multi-source data becomes actionable intelligence through platform consolidation and generative AI automation workflows.
Mel Migriño discusses the impact of deepfakes on information credibility, examining detection methods and defense strategies against AI weaponization. Learn to develop proactive crisis responses and use AI to assess deepfake risks.
In this series we expand on our Agile Foundation qualification and look at the specific role of the Scrum Master in Agile project management. We also prepare for the EXIN accredited Agile Scrum Master certification.
Learn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Prepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
Based on AXELOS M_o_R® material. Learn to identify, assess, and control risks. Build effective risk management frameworks. Access requires an exam voucher.
Learn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
SIAM: Manage multi-provider services. Learn the business case, benefits, processes, and challenges. Prepare for the EXIN SIAM Foundation exam.
Learn VeriSM™ to implement digital transformation. Adapt the Management Mesh and guide products through lifecycle stages. Prepare for the VeriSM™ certification exam.
Learn to implement VeriSM™ for digital transformation. Understand the impact on teams and stakeholders. Create and adapt the Management Mesh. Prepare for the VeriSM™ Professional certification.
Francisco Javier Farfán Contreras shares RBE's journey building cybersecurity from scratch across over 1,100 restaurants, highlighting relationship-building, implementing core security controls, and balancing quick wins with strategic goals.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Quest Software's Dilip George shares insights on treating AD as a critical application, risk assessment strategies, and best practices for maintaining compliance.
Oliver Keizers, area vice president EMEA Central at Semperis, will discuss why securing AD is essential and share insights from a real-world breach recovery.
Francesco Puccioni of Credem Banca, Pasquale De Rinaldis of Iccrea Banca and Giovanni Lamberti of Mooney share practical DORA implementation experiences across different financial institution sizes.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Paolo Tagliaferri of Cloudflare and Lorenzo Eusepi of Groupama Assicurazioni demonstrate how to overcome traditional WAF limitations through adaptive defense mechanisms against evolving AI-driven attack vectors.
Susanna Cecchetti of OneTrust and Nunzio Bucello of Sara Assicurazioni explore strategic cybersecurity approaches, NIS2/DORA compliance and evidence-based risk management in digital transformation.
Andrade, Valero, Sánchez, Ortiz and Salas discuss proactive strategies to address the 80% of security incidents involving human interaction through education, empathy and appropriate AI governance.
Dr. Ram Kumar, Sreeni Venugopal and Sridhar Sidhu debate AI's role in cybersecurity leadership and risk management, exploring accountability and innovation balance.
Industry leaders Erwin Eimers, Keon McEwen and Lorena Nunes explore the intersection of cybersecurity and operational safety in industrial systems.
Hugo Lai, Errol Weiss, Christopher Frenz and John Banghart explore comprehensive supply chain security strategies, from vendor assessments to medical device protection.
Ravikumar Mukkamala, Bryce Carter and Chris Bunton examine autonomous AI systems, secure integration strategies and emerging vulnerabilities in the third wave of AI.
Giulio Puri of Sysdig explores how AI multiplies security team effectiveness, bridging skills gaps and improving decision-making in cloud-native architectures through intelligent incident response automation.
Carlos Payés of SentinelOne explores how AI and hyperautomation transform cybersecurity by automating complex processes, reducing operational burden, and maximizing efficiency in incident detection and response.
Sergio Gago and Eric Harris explore how supercomputing empowers AI development, accelerating scientific research and real-time analytics across industries while examining emerging technologies shaping this computational partnership.
Jon Washburn of Stoel Rives, Erika Voss of DAT and Eric Sanchez of Kyowa Kirin share cross-industry perspectives on AI implementation challenges and solutions.
AI and ML in Cybersecurity explores the intersection of AI and cybersecurity in this comprehensive course designed for learners at all levels.
Elevate your AI security expertise! Earn your certificate in AI Guardrails, RAG Security, and Input Validation today! Fortify your AI-powered infrastructure!
Cory Brennan and David Hoffman examine AI bias in healthcare, exploring ethical implications and strategies for ensuring fair, secure AI implementation.
Felix Mohan of CISO Cybersecurity, Mrudul Uchil of Visa and Parag Deodhar of Accenture discuss AI-powered incident triage, behavioral analytics for threat detection and transforming traditional SOC workflows.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Next