Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Theresa Lanowitz reveals key findings from LevelBlue's 2024 research on healthcare cyber resilience, exploring barriers, priorities and strategic solutions for the evolving digital landscape.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Join Nitin Dhavate, Navaneethan, and Arvind Sivaramakrishnan in a conversation about how to juxtapose privacy and security to achieve total compliance.
Sachin Seth of BSE Ebix examines how AI is revolutionizing IT operations and enhancing system monitoring capabilities.
Don Gibson, CISO of Kinly, shares insights on preventing burnout in cybersecurity teams and maintaining balance during periods of rapid transformation.
Snyk's Shilpa Raghunathan explores effective ways to identify malicious code and secure first-party code in supply chains using security-by-design principles.
Join Andy Condliffe, Lead Sales Engineer, Orca Security, and learn how about how Orca offers a single integrated platform to detect security risks at every layer of the cloud estate.
Jim Mandelbaum, Field CTO at Gigamon, explores rising cyber threats in healthcare. Gain insights from analysts, cloud providers, and firsthand accounts on attacker tactics and learn strategies to safeguard your organization and prevent becoming the next breach headline.
Sergio Trindade of Águas do Tejo Atlântico shares water utility security program insights, focusing on internal strategies and management communication.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Join Rocco Grillo, Kevin Li, and Parthiv Shah as they discuss incident response plans that work... and those that fail!
In this series we expand on our Agile Foundation qualification and look at the specific role of the Scrum Master in Agile project management. We also prepare for the EXIN accredited Agile Scrum Master certification.
Learn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Prepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
Based on AXELOS M_o_R® material. Learn to identify, assess, and control risks. Build effective risk management frameworks. Access requires an exam voucher.
Learn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
SIAM: Manage multi-provider services. Learn the business case, benefits, processes, and challenges. Prepare for the EXIN SIAM Foundation exam.
Learn VeriSM™ to implement digital transformation. Adapt the Management Mesh and guide products through lifecycle stages. Prepare for the VeriSM™ certification exam.
Learn to implement VeriSM™ for digital transformation. Understand the impact on teams and stakeholders. Create and adapt the Management Mesh. Prepare for the VeriSM™ Professional certification.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Quest Software's Dilip George shares insights on treating AD as a critical application, risk assessment strategies, and best practices for maintaining compliance.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Dr. Ram Kumar, Sreeni Venugopal and Sridhar Sidhu debate AI's role in cybersecurity leadership and risk management, exploring accountability and innovation balance.
Industry leaders Erwin Eimers, Keon McEwen and Lorena Nunes explore the intersection of cybersecurity and operational safety in industrial systems.
Hugo Lai, Errol Weiss, Christopher Frenz and John Banghart explore comprehensive supply chain security strategies, from vendor assessments to medical device protection.
Jon Washburn of Stoel Rives, Erika Voss of DAT and Eric Sanchez of Kyowa Kirin share cross-industry perspectives on AI implementation challenges and solutions.
AI and ML in Cybersecurity explores the intersection of AI and cybersecurity in this comprehensive course designed for learners at all levels.
Cory Brennan and David Hoffman examine AI bias in healthcare, exploring ethical implications and strategies for ensuring fair, secure AI implementation.
Prof. D Janakiram from IIT Madras explores AI-powered defense mechanisms against deepfakes, covering threat patterns, detection techniques, and multi-layered security approaches.
Abhijit Chakravarty, Khushbu Jain, and Ritesh Bhatia discuss AI-powered cybersecurity, real-time threat detection, and future challenges. Learn how AI enhances security frameworks and mitigates cyber risks.
Join Sujith Immanuel Pellican in an exploration of AI maturity, cyber exercises, and identity protection strategies.
Join Julie Conroy as she shares insights from her latest research on fraud in the digital era. Explore emerging fraud trends, the increasing sophistication and speed of attacks, and the technologies and controls set to shape 2022's risk landscape.
From baby monitors to printers, tablets and automobiles, home offices are loaded with smart devices that share two common traits: They are internet connected, and they are hackable. In the remote work era, it is more important than ever that cybersecurity teams ensure that their networks and critical infrastructure are well-secured, even when endpoints have been compromised.
The world of identity and access management has spent the last 30 years or more focusing almost exclusively on the enterprise workforce.
Learn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.
Ganesh Narasimhadevara of Okta discusses implementing identity-first approaches in zero trust architectures.
As we evaluate emerging technologies like blockchain, 5G, artificial intelligence, IoT and more, what are the implications on our cybersecurity? How do we even identify the risks of these emerging technologies? What controls, frameworks and skills do we need to manage them?
PayPal's Phoram Mehta, Gojek's Aarthi Sureshkumar and Advance Intelligence Group's Shishir Kumar Singh discuss blockchain's role in securing cross-border payments and CBDC implementation.
Deval Mazmudar, Pawan Chawla, Abhishek Jha, and Sandesh Jadhav discuss API security challenges, breach prevention, and risk management. Learn how CISOs can balance API security with innovation in digital enterprises.
Dr. N Rajendran of MCX, Kiran Belsekar of Aegon, Rajat Sen of FS-ISAC and Apurva Dalal of Adani discuss API security challenges and risk management strategies.
Apple Certified Support Professional (ACSP) certification confirms the candidate's understanding of macOS's core functionality as well as having the ability to configure key services, perform basic troubleshooting, and support multiple users with essential macOS capabilities.
Pramod Dubey and Vikram Danda discuss CISO strategies for AI governance, data security, and compliance. Learn how to prevent data leaks, enforce AI policies, and adapt to evolving AI technologies.
Washington State Attorney General Bob Ferguson discusses the Congressional AI Task Force's mandate, bipartisan collaboration and efforts to maintain equity in AI advancement.
Chuck Brooks explores AI's dual role in cybersecurity as both a tool for attackers and defenders. Learn how AI enhances malware and disrupts models, while also enabling threat intelligence, endpoint detection, and predictive analytics. Gain insights into navigating the evolving intersection of AI and cybersecurity.
Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.
The AWS Certified Cloud Practitioner validates foundational, high-level understanding of AWS Cloud, services, and terminology. This is a good starting point on the AWS Certification journey for individuals with no prior IT or cloud experience switching to a cloud career or for line-of-business employees looking for foundational cloud literacy.
The AWS Certified Developer Exam is intended for individuals that are familiar with software development and are looking to utilize AWS services to create scalable, fault tolerant applications.
The AWS Certified DevOps Engineer professional certification is a course from Amazon Web Services (AWS) that tests a candidate's ability to deploy, manage, and maintain distributed applications on AWS.
1 2 3 4 5 6 7 8 9 10 11 Next