Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Government and Public Sector
Cyber defense, compliance, and risk management for government agencies and contractors.
Kelly Hood, a cybersecurity engineer with Optic Cyber Solutions, breaks down the NIST framework’s core, tiers, and profiles. Learn its risk-based approach, integration with other standards, and its role in critical infrastructure. Gain insights into its five functions, 23 categories, and 108 subcategories for managing cybersecurity risks effectively.
In this session, Ran Shahor, IDF Brigadier General (Ret.), discusses the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected, and stay ahead of the curve.
ISO/IEC 27001: Secure your information assets. Learn about ISMS, risk management, and security controls. Understand the 2018 to 2022 changes and how to plan, execute, and maintain ISO/IEC 27001 certification.
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Sean Mack, Walker Newell, Paul Kurtz and David Anderson examine SEC cybersecurity enforcement post-SolarWinds and strategies for CISOs.
Washington State Attorney General Bob Ferguson discusses the Congressional AI Task Force's mandate, bipartisan collaboration and efforts to maintain equity in AI advancement.
Join Siba Narayan Panda, and Dr. N. Rajendran for an exploration of central bank digital currency (CBDC) and what it means for financial service organizations and their security practices.
Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.
Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
As the volume of data generated and shared online grows exponentially, privacy concerns have become more pressing than ever before. Sign up today to learn from Babatunde Bambigboye, Head - Legal Enforcement Regulations, Nigeria Data Protection Commission!
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
Zero trust, supply chain security and DevSecOps.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Michael Schwab outlines AI governance frameworks for government entities, covering data accountability, human-in-the-loop requirements and executive support for enterprise AI programs.
Join Ralph Johnson in a discussion of how he tackled security on a state-wide scale.
Rohit Kumar Singh shares how to balance innovation speed with regulatory oversight through digital transformation case studies, compliance strategies and frameworks for building trust-centric organizations.
Margaux Tawil of Abnormal AI demonstrates how defensive AI combats generative AI threats by analyzing identity, behavior and content patterns across thousands of signals.
Pierre-François Guglielmi of Rubrik explores how unified identity protection reduces recovery time from days to hours while maintaining cyber resilience across hybrid environments.
Aurélien Svevi explains how application detection and response cuts through security noise by analyzing applications in production to connect attacks with exploitable vulnerabilities.
Gaspard Droz of Mantra shows how successful organizations build security awareness programs that reduce human factor risks through strategic content, consistent engagement and behavioral psychology.
Vincent Porte explains how organizations must evolve from periodic awareness training to comprehensive human risk management addressing AI-powered threats and sophisticated attacks.
Ramit Sharma and Madina Rashid explore how cybercriminals exploit AI capabilities through autonomous bots and deepfakes, while examining implementation challenges and ethical considerations for defense.
Gareth Dothie explores how criminal organizations systematically infiltrate financial institutions through insider targeting, examining governance failures and sophisticated intelligence gathering tactics.
Jennifer Huang and Chris Rankin share insights on balancing developer productivity with security in fintech environments, addressing AI-driven shadow IT and shifting security from gatekeeper to enabler role.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Daniel Norman of Information Security Forum moderates discussion with Sune Aggergaard Mortensen of DCAI and Rune Ören Skarphagen of Play'n GO on managing hyperscaler dependencies amid geopolitical fragmentation.
Vida Ahmadi of Electrolux Group shares lessons from transforming data governance from compliance overhead into business enabler through value-focused implementation.
Thomas Hassing Huge of Saxo Bank, Jonas Helweg-Mikkelsen of Nordic RCC, Søren Hansen of ECCO, Ilter Onder Aptula of Klarna and Tor Auster discuss transforming employees into active security defenders.
Mark Van Der Horst and Gagan Delouri share how identity replaced the network as primary attack perimeter, balancing friction and experience through risk-based authentication to reduce fraud and customer churn.
Xandra Uth of SoSafe examines how motivation and ability drive behavior change, proving data importance through targeted phishing simulations and compelling narratives.
Salvatore Buccoliero explores how to define minimum viable company requirements for rapid recovery, how identity-based attacks bypass traditional defenses including MFA, and how data protection platforms instantly detect encryption.
Andreas Bergqvist shares integrating security from code review through production using independent verification and crisis communication strategies.
Patrick Van Eecke discusses assessing whether AI systems fall within the EU AI Act's scope and risk categories, what cybersecurity requirements mean for security professionals, and the AI practices that are prohibited.
Marvin Ngoma of Elastic explores how NIS2's technical requirements reshape risk-informed detection strategies and how AI-powered security platforms strengthen compliance and operational resilience.
Hitesh Pathak explores how AI has transformed cybersecurity landscapes, sharing strategies for implementing cloud-native security frameworks and threat intelligence.
Pravin Savant, Nishant Pradhan, Girish Hadkar, Dishika Tandon and Prasanna Lohar address the disconnect between boardroom strategy and execution realities.
Rakesh Bhardwaj discusses building data-first strategies, transitioning from project to product management, and democratizing data capabilities across organizations.
Bhavit Bhatt maps organizations across the AI maturity spectrum and shares strategies for building simplified, high-performance AI foundations with cloud-agnostic platforms.
Damian Stephenson examines the dramatic shift from AI skepticism to adoption, exploring strategic transformation approaches across the AI capability spectrum.
Atul Jayawant shares three fundamental principles for CIO success: ownership mindset, comprehensive competency and simplicity in business communication.
Aparna Kumar explores how CIOs can transform technology from cost center to valuation multiplier through strategic boardroom storytelling and cybersecurity resilience.
Mohit Agarwal and Pankaj Bhargava explore supplier risk assessment platforms, demand sensing capabilities and traceability systems for volatile supply chains.
Nim Nadarajah and Sandra Pesic examine AI-driven cyberthreats, resilience strategies, automation benefits and post-quantum security preparations for modern organizations.
Dr. Amiruddin Abdul Wahab of Cybersecurity Malaysia explores strategic human-AI interaction in cybersecurity operations and real-world threat detection applications.
Kenneth Townsend of Ingredion explores how AI-driven leadership balances business innovation with data governance, operational efficiency and responsible security practices.
Sateesh Kumar Challa examines how synthetic identity fraud leverages cutting-edge AI to bypass traditional detection systems.
Taka Ariga and Brennan Lodge discuss how Retrieval Augmented Generation transforms threat detection and compliance operations by grounding AI responses in trusted organizational data rather than public sources.
Varun Shrivastava of UBS, Armani Ibrahim of DeepAI and Darren Grayson Chng of Electrolux discuss leveraging agentic AI for threat simulation, managing AI bias risks and balancing automation with human intuition.
Sudhir Tiku of KEENFINITY Group shares governance frameworks for multi-agent AI ecosystems, regulatory expectations and building interdisciplinary teams for responsible AI development.
1 2 3 4 5 6 7 8 9 Next