Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Government and Public Sector
Cyber defense, compliance, and risk management for government agencies and contractors.
Washington State Attorney General Bob Ferguson discusses the Congressional AI Task Force's mandate, bipartisan collaboration and efforts to maintain equity in AI advancement.
Join Siba Narayan Panda, and Dr. N. Rajendran for an exploration of central bank digital currency (CBDC) and what it means for financial service organizations and their security practices.
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.
In this session, Ran Shahor, IDF Brigadier General (Ret.), discusses the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected, and stay ahead of the curve.
Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.
Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
ISO/IEC 27001: Secure your information assets. Learn about ISMS, risk management, and security controls. Understand the 2018 to 2022 changes and how to plan, execute, and maintain ISO/IEC 27001 certification.
As the volume of data generated and shared online grows exponentially, privacy concerns have become more pressing than ever before. Sign up today to learn from Babatunde Bambigboye, Head - Legal Enforcement Regulations, Nigeria Data Protection Commission!
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Kelly Hood, a cybersecurity engineer with Optic Cyber Solutions, breaks down the NIST framework’s core, tiers, and profiles. Learn its risk-based approach, integration with other standards, and its role in critical infrastructure. Gain insights into its five functions, 23 categories, and 108 subcategories for managing cybersecurity risks effectively.
Sean Mack, Walker Newell, Paul Kurtz and David Anderson examine SEC cybersecurity enforcement post-SolarWinds and strategies for CISOs.
Start your journey toward enhancing your organization's cybersecurity posture with the National Institute of Standards and Technology Cybersecurity Framework, known as NIST!
Zero trust, supply chain security and DevSecOps.