Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Delve into essential domains including Security and Risk Management, Asset Security, Security Architecture, and Engineering required by the CISSP
We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to provide guidance and real world examples to help you understand how to create and manage BCDR in your organization.
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.
Join Grant Schneider in an exploration of external drivers that influence cybersecurity programs! Learn how organizations are rapidly adapting policies, including AI frameworks like ChatGPT, to address evolving risks.
Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.
Sameer Ratolikar highlights how CISOs are leading banking’s digital transformation with a "security by design" approach. This session examines challenges, opportunities, and priorities for balancing innovation and security to achieve a competitive edge in the cloud-native era.
Brian Barnier, a technology leader with nine U.S. patents and experience at Ameritech, Lucent, and IBM, brings expertise from global economics to advanced tech. Drawing from his teaching at institutions like Wharton, this master class merges critical and design thinking to tackle cybersecurity challenges innovatively.
Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.
As we evaluate emerging technologies like blockchain, 5G, artificial intelligence, IoT and more, what are the implications on our cybersecurity? How do we even identify the risks of these emerging technologies? What controls, frameworks and skills do we need to manage them?
Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance
What are the breaches/incidents that got the attention of security leaders in Europe and France in 2021? And what are their defensive priorities as they enter 2022? Paul McKay, principal analyst at Forrester, tackles these questions and more in this session.
Sadia Mirza, Ginger Armbruster, and Randy Sabett discuss: The new state of privacy, impact of COVID-19 on security and privacy, & vulnerabilities in the work-from-home model.
Explore how ransomware impacts the cyber insurance industry with Diktesh Singh Puri. Learn about rising premiums, insurer challenges, and the growing role of insurers in shaping enterprise security programs amid increasing cybercrime.
Join experts Becky Pinkard, Andrew McGuigan, and Nic Miller in an exploration of pandemic related cybersecurity threats, and adapting to the evolving threat landscape.
Join Matanda Doss, Ty Howard, Steve King, and Mike Manrod, in an exploration of the convergence of conventional, cyber, and information warfare. Learn about evolving Russian tactics, the role of perception warfare, and the need for integrated defense strategies in modern conflict.
Join John Kindervag, creator of the Zero Trust Model, to explore how CISOs can leverage zero trust for cyber resiliency. Learn about security perimeter changes, zero trust maturity assessments, and dependencies for securing future work environments.
What does digital innovation mean to security? Can enterprises align their business priorities and security needs? This keynote with Greg McKenna sets the tone for the board room agenda, detailing how to get buy in from the CEO and the board to invest in the security resources required.
Learn to implement VeriSM™ for digital transformation. Understand the impact on teams and stakeholders. Create and adapt the Management Mesh. Prepare for the VeriSM™ Professional certification.
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Ian Thornton-Trump, Jon Staniforth and Heather Lowrie share their frontline experiences managing major ransomware attacks, offering practical strategies for incident response, stakeholder communication and recovery strategies.
Join Debashish Jyotiprakash in a discussion of the CISOs role establishing business and cyber resilience across functions.
Join Siba Narayan Panda, and Dr. N. Rajendran for an exploration of central bank digital currency (CBDC) and what it means for financial service organizations and their security practices.
Expert panel of CISOs, David Anderson, Michael Prakhye, Patty Ryan and Anahi Santiago discuss how to turn the Board into a Healthcare cybersecurity ally.
Join Bryan Chnowski and Daniel King in a high level, strategic discussion of securing resources healthcare cybersecurity professionals need to thrive.
Sean Mack, Walker Newell, Paul Kurtz and David Anderson examine SEC cybersecurity enforcement post-SolarWinds and strategies for CISOs.
Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.
Dr. Yoginder Talwar of NICSI explores cybersecurity challenges and opportunities in Digital India's evolving landscape.
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
The transition from DevOps and CI/CD to cloud-native technologies, microservices architecture, security, and governance, and ultimately automation and artificial intelligence, necessitates a modern approach to software supply chain management.
This leadership-focused course equips cybersecurity managers and executives with practical strategies to design, strengthen, and future-proof their security teams. It guides learners through the lifecycle of workforce planning, from understanding organizational needs to succession planning, using real-world case studies, practical activities, and structured frameworks like the NIST NICE Framework.
Sunil Chand discusses what it takes to succeed as a modern CISO, from asking tough questions about reporting structures and legal coverage to translating technical risks into business language and planning career progression.
Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.
Learn about cutting edge trends in AI-Powered SOCs today!
Explore data's critical role in zero trust strategies with Hudl's CISO Robert LaMagna-Reiter and Dr. Lisa McKee of Protiviti. Learn about privacy and security coordination, overcoming challenges, and integrating zero trust to enhance organizational security and compliance.
As the volume of data generated and shared online grows exponentially, privacy concerns have become more pressing than ever before. Sign up today to learn from Babatunde Bambigboye, Head - Legal Enforcement Regulations, Nigeria Data Protection Commission!
Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.
Industry leaders Matanda Doss, Susan Koski, William Beer and Paul Leonhirth discuss cloud adoption challenges, API security and AI-powered fraud detection in financial services cybersecurity.
Fred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.
Veracode CISO Sohail Iqbal provides guidance on prioritizing software security and effectively communicating metrics to board members.
Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.
Luke Babarinde of Imperva shares strategies for securing critical data assets and maintaining regulatory compliance across diverse environments.
SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.
Stephen Johnson introduces Entro's Secrets Security Platform for managing secrets across vaults, source code and cloud environments.
Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
1 2 3 Next