Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Delve into essential domains including Security and Risk Management, Asset Security, Security Architecture, and Engineering required by the CISSP
We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to provide guidance and real world examples to help you understand how to create and manage BCDR in your organization.
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.
Join Grant Schneider in an exploration of external drivers that influence cybersecurity programs! Learn how organizations are rapidly adapting policies, including AI frameworks like ChatGPT, to address evolving risks.
Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.
Sameer Ratolikar highlights how CISOs are leading banking’s digital transformation with a "security by design" approach. This session examines challenges, opportunities, and priorities for balancing innovation and security to achieve a competitive edge in the cloud-native era.
Brian Barnier, a technology leader with nine U.S. patents and experience at Ameritech, Lucent, and IBM, brings expertise from global economics to advanced tech. Drawing from his teaching at institutions like Wharton, this master class merges critical and design thinking to tackle cybersecurity challenges innovatively.
Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.
As we evaluate emerging technologies like blockchain, 5G, artificial intelligence, IoT and more, what are the implications on our cybersecurity? How do we even identify the risks of these emerging technologies? What controls, frameworks and skills do we need to manage them?
Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance
What are the breaches/incidents that got the attention of security leaders in Europe and France in 2021? And what are their defensive priorities as they enter 2022? Paul McKay, principal analyst at Forrester, tackles these questions and more in this session.
Sadia Mirza, Ginger Armbruster, and Randy Sabett discuss: The new state of privacy, impact of COVID-19 on security and privacy, & vulnerabilities in the work-from-home model.
Explore how ransomware impacts the cyber insurance industry with Diktesh Singh Puri. Learn about rising premiums, insurer challenges, and the growing role of insurers in shaping enterprise security programs amid increasing cybercrime.
Join experts Becky Pinkard, Andrew McGuigan, and Nic Miller in an exploration of pandemic related cybersecurity threats, and adapting to the evolving threat landscape.
Join Matanda Doss, Ty Howard, Steve King, and Mike Manrod, in an exploration of the convergence of conventional, cyber, and information warfare. Learn about evolving Russian tactics, the role of perception warfare, and the need for integrated defense strategies in modern conflict.
Join John Kindervag, creator of the Zero Trust Model, to explore how CISOs can leverage zero trust for cyber resiliency. Learn about security perimeter changes, zero trust maturity assessments, and dependencies for securing future work environments.
CISOs face pressure to cut security costs without bigger budgets. Learn to simplify security landscapes, consolidate vendor licensing, and leverage automation to reduce TCO, enhance efficiency, and streamline operations. Join us and register now!
What does digital innovation mean to security? Can enterprises align their business priorities and security needs? This keynote with Greg McKenna sets the tone for the board room agenda, detailing how to get buy in from the CEO and the board to invest in the security resources required.
Tarique Amin Bhuiyan urges enterprises in India & SAARC to invest in secure infrastructure for digital transformation. Tune in to cover aligning strategies, addressing the digital innovation-security gap, and building cyber-resilience.
Learn to implement VeriSM™ for digital transformation. Understand the impact on teams and stakeholders. Create and adapt the Management Mesh. Prepare for the VeriSM™ Professional certification.
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Ian Thornton-Trump, Jon Staniforth and Heather Lowrie share their frontline experiences managing major ransomware attacks, offering practical strategies for incident response, stakeholder communication and recovery strategies.
Join Debashish Jyotiprakash in a discussion of the CISOs role establishing business and cyber resilience across functions.
Join Siba Narayan Panda, and Dr. N. Rajendran for an exploration of central bank digital currency (CBDC) and what it means for financial service organizations and their security practices.
Expert panel of CISOs, David Anderson, Michael Prakhye, Patty Ryan and Anahi Santiago discuss how to turn the Board into a Healthcare cybersecurity ally.
Join Bryan Chnowski and Daniel King in a high level, strategic discussion of securing resources healthcare cybersecurity professionals need to thrive.
Sean Mack, Walker Newell, Paul Kurtz and David Anderson examine SEC cybersecurity enforcement post-SolarWinds and strategies for CISOs.
Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.
Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
The transition from DevOps and CI/CD to cloud-native technologies, microservices architecture, security, and governance, and ultimately automation and artificial intelligence, necessitates a modern approach to software supply chain management.
This leadership-focused course equips cybersecurity managers and executives with practical strategies to design, strengthen, and future-proof their security teams. It guides learners through the lifecycle of workforce planning, from understanding organizational needs to succession planning, using real-world case studies, practical activities, and structured frameworks like the NIST NICE Framework.