Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
Learn to implement VeriSM™ for digital transformation. Understand the impact on teams and stakeholders. Create and adapt the Management Mesh. Prepare for the VeriSM™ Professional certification.
As we evaluate emerging technologies like blockchain, 5G, artificial intelligence, IoT and more, what are the implications on our cybersecurity? How do we even identify the risks of these emerging technologies? What controls, frameworks and skills do we need to manage them?
CISOs face pressure to cut security costs without bigger budgets. Learn to simplify security landscapes, consolidate vendor licensing, and leverage automation to reduce TCO, enhance efficiency, and streamline operations. Join us and register now!
We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to provide guidance and real world examples to help you understand how to create and manage BCDR in your organization.
Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance
Join Siba Narayan Panda, and Dr. N. Rajendran for an exploration of central bank digital currency (CBDC) and what it means for financial service organizations and their security practices.
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
Brian Barnier, a technology leader with nine U.S. patents and experience at Ameritech, Lucent, and IBM, brings expertise from global economics to advanced tech. Drawing from his teaching at institutions like Wharton, this master class merges critical and design thinking to tackle cybersecurity challenges innovatively.
Explore how ransomware impacts the cyber insurance industry with Diktesh Singh Puri. Learn about rising premiums, insurer challenges, and the growing role of insurers in shaping enterprise security programs amid increasing cybercrime.
Join Matanda Doss, Ty Howard, Steve King, and Mike Manrod, in an exploration of the convergence of conventional, cyber, and information warfare. Learn about evolving Russian tactics, the role of perception warfare, and the need for integrated defense strategies in modern conflict.
What are the breaches/incidents that got the attention of security leaders in Europe and France in 2021? And what are their defensive priorities as they enter 2022? Paul McKay, principal analyst at Forrester, tackles these questions and more in this session.
Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.
The transition from DevOps and CI/CD to cloud-native technologies, microservices architecture, security, and governance, and ultimately automation and artificial intelligence, necessitates a modern approach to software supply chain management.
Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
What does digital innovation mean to security? Can enterprises align their business priorities and security needs? This keynote with Greg McKenna sets the tone for the board room agenda, detailing how to get buy in from the CEO and the board to invest in the security resources required.
Sameer Ratolikar highlights how CISOs are leading banking’s digital transformation with a "security by design" approach. This session examines challenges, opportunities, and priorities for balancing innovation and security to achieve a competitive edge in the cloud-native era.
Tarique Amin Bhuiyan urges enterprises in India & SAARC to invest in secure infrastructure for digital transformation. Tune in to cover aligning strategies, addressing the digital innovation-security gap, and building cyber-resilience.
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.
Delve into essential domains including Security and Risk Management, Asset Security, Security Architecture, and Engineering required by the CISSP
Ian Thornton-Trump, Jon Staniforth and Heather Lowrie share their frontline experiences managing major ransomware attacks, offering practical strategies for incident response, stakeholder communication and recovery strategies.
Join Debashish Jyotiprakash in a discussion of the CISOs role establishing business and cyber resilience across functions.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Join Grant Schneider in an exploration of external drivers that influence cybersecurity programs! Learn how organizations are rapidly adapting policies, including AI frameworks like ChatGPT, to address evolving risks.
Sean Mack, Walker Newell, Paul Kurtz and David Anderson examine SEC cybersecurity enforcement post-SolarWinds and strategies for CISOs.
Join Bryan Chnowski and Daniel King in a high level, strategic discussion of securing resources healthcare cybersecurity professionals need to thrive.
Join experts Becky Pinkard, Andrew McGuigan, and Nic Miller in an exploration of pandemic related cybersecurity threats, and adapting to the evolving threat landscape.
Sadia Mirza, Ginger Armbruster, and Randy Sabett discuss: The new state of privacy, impact of COVID-19 on security and privacy, & vulnerabilities in the work-from-home model.
Expert panel of CISOs, David Anderson, Michael Prakhye, Patty Ryan and Anahi Santiago discuss how to turn the Board into a Healthcare cybersecurity ally.
Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.
Join John Kindervag, creator of the Zero Trust Model, to explore how CISOs can leverage zero trust for cyber resiliency. Learn about security perimeter changes, zero trust maturity assessments, and dependencies for securing future work environments.
Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.