We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Chief Information Security Officer

Search

Clear Expand Collapse

Accredited ISO/IEC 27001 Foundation

In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.

Course duration Duration: 10 hours, 43 min.

Accredited VeriSM Professional

Learn to implement VeriSM™ for digital transformation. Understand the impact on teams and stakeholders. Create and adapt the Management Mesh. Prepare for the VeriSM™ Professional certification.

Course duration Duration: 19 hours, 48 min.

Anticipating Emerging Technology Risks

As we evaluate emerging technologies like blockchain, 5G, artificial intelligence, IoT and more, what are the implications on our cybersecurity? How do we even identify the risks of these emerging technologies? What controls, frameworks and skills do we need to manage them?

Course duration Duration: 30 minutes

Applying Smart Cybersecurity Strategies to Maximize Returns

CISOs face pressure to cut security costs without bigger budgets. Learn to simplify security landscapes, consolidate vendor licensing, and leverage automation to reduce TCO, enhance efficiency, and streamline operations. Join us and register now!

Price
Course duration Duration: 30 minutes

Business Continuity and Disaster Recovery

We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to provide guidance and real world examples to help you understand how to create and manage BCDR in your organization.

Price
Course duration Duration: 5 hours, 22 min.

Can You Outsource Your Cybersecurity Operations?

Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance

Price
Course duration Duration: 30 minutes

CBDC: Security Risks and Response

Join Siba Narayan Panda, and Dr. N. Rajendran for an exploration of central bank digital currency (CBDC) and what it means for financial service organizations and their security practices.

Price
Course duration Duration: 25 minutes

CISA: Certified Information Systems Auditor

This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.

Course duration Duration: 26 hours, 40 min.

CRISC: Certified in Risk and Information Systems Control

The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.

Course duration Duration: 16 hours, 30 min.

Critical Thinking & Design Thinking Meet Cybersecurity

Brian Barnier, a technology leader with nine U.S. patents and experience at Ameritech, Lucent, and IBM, brings expertise from global economics to advanced tech. Drawing from his teaching at institutions like Wharton, this master class merges critical and design thinking to tackle cybersecurity challenges innovatively.

Course duration Duration: 19 minutes

Cyber Insurance & Rising Ransomware Attacks

Explore how ransomware impacts the cyber insurance industry with Diktesh Singh Puri. Learn about rising premiums, insurer challenges, and the growing role of insurers in shaping enterprise security programs amid increasing cybercrime.

Price
Course duration Duration: 30 minutes

Cyber Warfare A New Playbook

Join Matanda Doss, Ty Howard, Steve King, and Mike Manrod, in an exploration of the convergence of conventional, cyber, and information warfare. Learn about evolving Russian tactics, the role of perception warfare, and the need for integrated defense strategies in modern conflict.

Price
Course duration Duration: 30 minutes

Cybersecurity Trends in the European & French Markets

What are the breaches/incidents that got the attention of security leaders in Europe and France in 2021? And what are their defensive priorities as they enter 2022? Paul McKay, principal analyst at Forrester, tackles these questions and more in this session.

Course duration Duration: 30 minutes

Data Localization vs. Cross-Border Data Movement

Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.

Price
Course duration Duration: 40 minutes

Decoding the Future of Software Supply Chain

The transition from DevOps and CI/CD to cloud-native technologies, microservices architecture, security, and governance, and ultimately automation and artificial intelligence, necessitates a modern approach to software supply chain management.

Price
Course duration Duration: 30 min.

Digital India: A Cybersecurity Perspective

Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.

Price
Course duration Duration: 25 minutes

Digital Security: Taking the C-Suite & Board on the Ride

What does digital innovation mean to security? Can enterprises align their business priorities and security needs? This keynote with Greg McKenna sets the tone for the board room agenda, detailing how to get buy in from the CEO and the board to invest in the security resources required.

Course duration Duration: 17 minutes

Digital Transformation: CISOs as Transformation Leaders

Sameer Ratolikar highlights how CISOs are leading banking’s digital transformation with a "security by design" approach. This session examines challenges, opportunities, and priorities for balancing innovation and security to achieve a competitive edge in the cloud-native era.

Course duration Duration: 22 minutes

Establishing a Cyber-Resilient Enterprise in 2022

Tarique Amin Bhuiyan urges enterprises in India & SAARC to invest in secure infrastructure for digital transformation. Tune in to cover aligning strategies, addressing the digital innovation-security gap, and building cyber-resilience.

Price
Course duration Duration: 26 minutes

Is New U.S. National Cybersecurity Strategy Viable?

Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?

Price
Course duration Duration: 25 minutes

ISACA Certified Information Security Manager (CISM)

The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.

Course duration Duration: 13 hours, 49 min.

ISC2 CISSP: Certified Information Systems Security Professional (2024)

Delve into essential domains including Security and Risk Management, Asset Security, Security Architecture, and Engineering required by the CISSP

Course duration Duration: 39 hours, 32 min.

Lessons from 3 CISOs Who Battled Ransomware

Ian Thornton-Trump, Jon Staniforth and Heather Lowrie share their frontline experiences managing major ransomware attacks, offering practical strategies for incident response, stakeholder communication and recovery strategies.

Price
Course duration Duration: 35 minutes

Next-Gen CISO: The Custodian of Digital Trust

Join Debashish Jyotiprakash in a discussion of the CISOs role establishing business and cyber resilience across functions.

Price
Course duration Duration: 20 minutes

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Course duration Duration: 21 hours, 20 min.

Shaping Cyber Policy with Grant Schneider

Join Grant Schneider in an exploration of external drivers that influence cybersecurity programs! Learn how organizations are rapidly adapting policies, including AI frameworks like ChatGPT, to address evolving risks.

Course duration Duration: 35 minutes

Strategies for CISOs Post-SolarWinds

Sean Mack, Walker Newell, Paul Kurtz and David Anderson examine SEC cybersecurity enforcement post-SolarWinds and strategies for CISOs.

Price
Course duration Duration: 25 minutes

Strengthening Security: Best Practices & Resources

Join Bryan Chnowski and Daniel King in a high level, strategic discussion of securing resources healthcare cybersecurity professionals need to thrive.

Price
Course duration Duration: 25 minutes

The Challenges and Opportunities of 2021

Join experts Becky Pinkard, Andrew McGuigan, and Nic Miller in an exploration of pandemic related cybersecurity threats, and adapting to the evolving threat landscape.

Course duration Duration: 35 minutes

The Cybersecurity Legal, Privacy and Compliance Outlook

Sadia Mirza, Ginger Armbruster, and Randy Sabett discuss:
The new state of privacy, impact of COVID-19 on security and privacy, & vulnerabilities in the work-from-home model.

Course duration Duration: 35 minutes

Turning the Board Into Your Greatest Ally

Expert panel of CISOs, David Anderson, Michael Prakhye, Patty Ryan and Anahi Santiago discuss how to turn the Board into a Healthcare cybersecurity ally.

Price
Course duration Duration: 30 minutes

Winning the Account Takeover Battle

Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.
 

Price
Course duration Duration: 35 minutes

Zero Trust & Cyber Resilience: A CISO's Approach

Join John Kindervag, creator of the Zero Trust Model, to explore how CISOs can leverage zero trust for cyber resiliency. Learn about security perimeter changes, zero trust maturity assessments, and dependencies for securing future work environments.

Price
Course duration Duration: 30 minutes

Zero Trust Case Study: Inwood Bank

Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.

Course duration Duration: 25 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement