We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Masterclasses

Search

Clear Expand Collapse

A New Approach to Public Cloud Security

Join Andy Condliffe, Lead Sales Engineer, Orca Security, and learn how about how Orca offers a single integrated platform to detect security risks at every layer of the cloud estate.

Course duration Duration: 15 minutes

Artificial Intelligence: A Double Agent in Cybersecurity

Chuck Brooks explores AI's dual role in cybersecurity as both a tool for attackers and defenders. Learn how AI enhances malware and disrupts models, while also enabling threat intelligence, endpoint detection, and predictive analytics. Gain insights into navigating the evolving intersection of AI and cybersecurity.

Course duration Duration: 30 minutes

ChatGPT: The Future of AI

Explore the impact of GPT-4, -5, and beyond on cybersecurity. Sam Curry examines the dangers of generative AI in creating phishing emails and malware, while also highlighting its potential for threat hunting, hygiene automation, and compliance. Gain insights through real-world use cases and strengthen your defensive strategies.

Course duration Duration: 38 minutes

CIAM's Unique Challenges to CISOs & Cybersecurity

Join Tom Field and John Horn, Director, Cybersecurity Practice, Aite-Novarica Group in an exploration of customer identity and access management.

Course duration Duration: 25 minutes

CMMC With Kelly Hood

Join Kelly Hood, EVP & Cybersecurity Engineer @ Optic Cyber Solutions as she explains the Cybersecurity Maturity Model Certification, or CMMC. Learn how to get certified today!

Course duration Duration: 1 hour

Congressman Jim Langevin on US Cybersecurity Defense

Tom Field joins Congressman Jim Langevin in a discussion about the impact of President Biden's cybersecurity executive order and it's impact on the state of critical infrastructure defense.

Course duration Duration: 30 minutes

Critical Thinking & Design Thinking Meet Cybersecurity

Brian Barnier, a technology leader with nine U.S. patents and experience at Ameritech, Lucent, and IBM, brings expertise from global economics to advanced tech. Drawing from his teaching at institutions like Wharton, this master class merges critical and design thinking to tackle cybersecurity challenges innovatively.

Course duration Duration: 19 minutes

Crypto's Promise: The Use of Digital Assets

Crypto's Promise: The Use of Digital Assets is a panel discussion led by Ari Redbord, Head of Legal and Governmental Affairs at TRM Labs, along with Alex Zerden, Caroline Hill, and Eric Lorber

Course duration Duration: 40 Minutes

Cryptocurrency with Ari Redbord

Join Ari Redbord in an exploration of how TRM Labs aids law enforcement in tracking crypto fraud and financial crime. Learn about crypto's dual role as a tool for illicit actors and investigators, the challenges of noncompliant VAPs, and the need for regulation to enhance compliance and user safety.

Price
Course duration Duration: 31 minutes

Customer IAM & the Path to Making Identity Better

Join Jeremy Grant in an examination of the critical role of digital identity as infrastructure.

Course duration Duration: 22 minutes

Cyber Defense During a Time of Crisis and After

In this session, Ran Shahor, IDF Brigadier General (Ret.), discusses the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected, and stay ahead of the curve.

Course duration Duration: 25 minutes

Cyber Insurance with Lynn Peachey

Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.

Price
Course duration Duration: 2 hours, 47 min.

Defending Against Cyber Attacks with AI & ML

Join Ram Vaidyanathan, Product Marketing Manager - IT Security and SIEM Solutions, ManageEngine in a discussion about using AI and ML to defend Against Cybersecurity Attacks.

Course duration Duration: 30 minutes

Digital Security: Taking the C-Suite & Board on the Ride

What does digital innovation mean to security? Can enterprises align their business priorities and security needs? This keynote with Greg McKenna sets the tone for the board room agenda, detailing how to get buy in from the CEO and the board to invest in the security resources required.

Course duration Duration: 17 minutes

E-Commerce, Fraud & Payments in a COVID-19 World

Chris Thomas explores how shifting consumer attitudes to fraud post-pandemic are creating new risks for e-commerce. Learn strategies to balance user experience and fraud prevention. Take action now to safeguard your business.

Course duration Duration: 27 minutes

Establishing a Secure Digital Future

Explore aligning strategy, security, and business priorities to enable digital transformation. Understand digital innovation’s impact on security and learn to build a cyber-resilient organization. Presentation by Shaik Abdulkhader, CISO, Qatar Petrochemical Company.

Course duration Duration: 38 minutes

FIDO Alliance: The Future of Automation

Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable LLP in an exploration of role of the FIDO Alliance in standardizing phishing-resistant logins that make authentication simpler and stronger.

Course duration Duration: 30 minutes

FinCEN and the Digital Identity Mission

Join Tom Field and Kay Turner, U.S. Department of the Treasury as they discuss FinCEN, the Digital Identity Mission, and compliance.

Course duration Duration: 25 minutes

How Can CIO & CISO Collaborate for a Shared Vision

Join Nastassja Finnegan, Cyber Security Officer, FNB South Africa in a discussion about how to get a CIO and the CISO to work on a common goal to facilitate the continued success of their organization.

Course duration Duration: 25 minutes

How Hybrid Work Enabled Security Service Edge in UKI

Join Christopher Hines and Tom Field as they discuss how hybrid work paved the way for the security service edge in UKI.

Course duration Duration: 30 minutes

How Windows 11 Enables Zero Trust Protection

Join Nischay Kandpal, Program Manager Evangelism , Product Specialist-Commercial, Microsoft as he highlights how Windows 11 enables zero trust protection.

Course duration Duration: 25 minutes

Identity Security: Moving the Goal Posts

Al Pascual explores the paradigm shift in identity management, from traditional controls to challenges posed by Web3, the Metaverse, and NFTs. Discover how identity goalposts have shifted, the new opportunities and challenges for vendors and practitioners, and what it means for the future of identity.

Course duration Duration: 24 minutes

Identity-Centric Cybersecurity: Building on Zero Trust

Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable, LLP and Coordinator, Better Identity Coalition and explore Identity Access Management today!

Course duration Duration: 30 minutes

Leveraging AI to Predict, Protect & Improve Outcomes

Join Guy Sheppard, Head of APAC Financial Crime, Intelligence and Initiatives for SWIFT for a discussion of digital transformation and how we can leverage AI to predict, protect and improve cybersecurity efforts.

Course duration Duration: 35 minutes

Managing Identity in an Abstract World

Join Manuel Garat, Marco Lattavo and Denny Prvu in a discussion of how traditional identity technologies struggle to meet demands for secure, frictionless experiences. Register now!

Course duration Duration: 28 minutes

Navigating the Risks of Social Engineering Attacks

Join Bob Slocum, Product Marketing Director at Tessian discusses the most sophisticated, real-world email social engineering attacks found by Tessian's threat intelligence team.

Course duration Duration: 15 minutes

Nefarious Use of Modern Money

Join Karen Boyer, Claire Le Gal and David Pollino in a discussion of the criminal use of newer forms of money movement to hide criminal proceeds and cash out.

Course duration Duration: 35 minutes

NIST Framework with Kelly Hood

Kelly Hood, a cybersecurity engineer with Optic Cyber Solutions, breaks down the NIST framework’s core, tiers, and profiles. Learn its risk-based approach, integration with other standards, and its role in critical infrastructure. Gain insights into its five functions, 23 categories, and 108 subcategories for managing cybersecurity risks effectively.

Price
Course duration Duration: 35 minutes

Quantum Threat to Security

Join Prashant Chugh, Group Leader, C-DOT (Centre for Development of Telematics) in this seminar about quantum threats to security and a need for a new post-quantum cryptography.

Course duration Duration: 30 minutes

Risk-Based Discussion: Are you Aligned with the Board?

Join Geetha Nandikotkur and Jayaraj Puthanveedu, MD-Cyber and Tech. Risk, Global Head - Operational Resilience, BNP Paribas Group to discuss building relationships with business unit leaders and driving practical risk-based discussions.

Course duration Duration: 25 minutes

Securing Users' Access to Applications Using ZTNA

Control application and database access when identity is the new perimeter. Explore how ZTNA enhances access policies, reporting, and threat detection. Gain insights into its use cases and its role within a connected cybersecurity strategy. Presented by Linette Mananghaya, Senior Security Solutions Engineer, Sophos.

Course duration Duration: 15 minutes

Securing Your Business With Zero Trust

Join Chip Mason, Lead, Mainframe Security Product Management, Broadcom, and Henk van Achterberg, Security Strategist, Broadcom as they discuss why zero trust is everywhere, in the cloud, on-premises including, and in the mainframe.

Course duration Duration: 25 minutes

Security Misconfiguration with Tal Kollender

Tal Kollender highlights how human errors and default settings lead to 80% of ransomware attacks. Discover the risks of manual remediation and how automation can reduce misconfigurations, shrinking the attack surface and enhancing network protection.

Price
Course duration Duration: 27 minutes

Shaping Cyber Policy with Grant Schneider

Join Grant Schneider in an exploration of external drivers that influence cybersecurity programs! Learn how organizations are rapidly adapting policies, including AI frameworks like ChatGPT, to address evolving risks.

Course duration Duration: 35 minutes

Starting With Zero Trust

Zero trust is becoming a key enterprise security philosophy, raising questions about its practicality, priority, and challenges. This session explores whether zero trust should be a focus, its role in environments like IoT, and its impact on users, devices, and networks, along with business drivers like cloud and continuity needs. Join us to learn more and assess if zero trust is right for your organization.

Course duration Duration: 25 minutes

The Road to Zero Trust Security

Experts agree that zero trust is based on the premise of "assume breach" and treat every asset as breached and all traffic as hostile. Join Manish Dave, Head of Information Security, Aarti Industries Ltd. in a discussion of Zero Trust.

Course duration Duration: 30 minutes

The State of Medical Device Security

Join Kevin Fu, Acting Director, Medical Device Cybersecurity, FDA Center for Devices and Radiological Health and Tom field as they discuss the state of medical device security.

Course duration Duration: 25 minutes

Zero Trust 101 - John Kindervag

In this session, John Kindervag shares the background of his research on broken trust models and identifies the fundamental problem of trusting the internal network and not the external network. Explore Zero Trust with the expert!

Course duration Duration: 1 hour 17 min.

Zero Trust and Microsegmentation

Tony Steffe demystifies zero trust and microsegmentation, offering actionable steps to counter ransomware. Learn to identify vulnerabilities, close risky ports, and use existing tools effectively. Discover how to implement zero trust strategies without added complexity to protect your organization.

Course duration Duration: 12 minutes

Zero Trust Case Study: Inwood Bank

Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.

Course duration Duration: 25 minutes

Zero Trust: The Key to Securing Higher Education

Join George Finney, the CISO at Southern Methodist University and explore higher education specific cybersecurity challenges.

Course duration Duration: 40 Minutes

Zero Trust: The Strategic Approach

John Kindervag, Creator of Zero Trust, discusses zero trust, a strategy designed to stop data breaches and other cyberattacks. Done right, it provides demonstrable, positive security outcomes for companies who adopt it. Done wrong, it is a whole different story.

Course duration Duration: 28 minutes

ZT Q&A with Greg Touhill

In this Q&A session, Greg Touhill shares key strategies for implementing zero trust. Learn how to understand your data environment, set access rules, and align organizational objectives. Gain practical advice on adopting enabling technologies, including reference checks and lessons from peers.

Course duration Duration: 11 minutes

ZTNA-Evolving Beyond Antiquated VPNs

Join Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.

Course duration Duration: 30 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement