We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Data Protection Officer

Global Encryption Trends Study

The 2021 Global Encryption Trends Study shows that leading organizations worldwide are anchoring their data protection strategy with encryption, and details the fastest-growing use cases.
Join our session for a deep dive into the key findings and use cases to protect your most valuable assets.

Course duration Duration: 20 min.

Identity & Access Management: From Apps to Zero Trust

Cloud migration, IoT deployment and zero trust architecture have been paradigm shifts for enterprises and their information security teams. But what about the impact on identity and access management? "It's big," says June Leung, director of IAM at Economical Insurance and a panelist in this session.

Course duration Duration: 30 minutes

Democratization of Data Control

Allan Foster, chief evangelist officer, ForgeRock, explores the evolving landscape of user data management amid growing compliance demands. Learn how empowering users in the data process enhances control and authority, and discover secure frameworks for utilizing data effectively while meeting regulatory requirements.

Course duration Duration: 14 minutes

Zero Trust and Privacy

Explore data's critical role in zero trust strategies with Hudl's CISO Robert LaMagna-Reiter and Dr. Lisa McKee of Protiviti. Learn about privacy and security coordination, overcoming challenges, and integrating zero trust to enhance organizational security and compliance.

Course duration Duration: 30 minutes

Implement Enterprise Splunk for Your Business

Learn to implement Splunk Enterprise. Configure, maintain, and support Splunk operations. This course is part of a 3-course Splunk Enterprise administration series.

Course duration Duration: 2 hours

Getting Your Data Into Splunk Effortlessly

Learn to ingest data into Splunk Enterprise. Configure data inputs: files, network, scripted, and HTTP Event Collector. Make your Splunk deployment valuable with complete data.

Course duration Duration: 2 hours

Amping Up Splunk with Advanced Admin

Learn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.

Course duration Duration: 1 hour, 39 min.

Splunk Enterprise Administration Fundamentals

Learn Splunk Enterprise administration fundamentals. Configure data inputs, manage users, optimize search, and troubleshoot issues. Maximize the value of Splunk for your organization.

Course duration Duration: 5 hours, 31 min.

Palo Alto Networks Cybersecurity Fundamentals (PCCSA)

Learn cybersecurity fundamentals and Palo Alto Networks solutions. Prepare for an entry-level network security career. This exam is retired, but the skills may still be relevant.

Course duration Duration: 6 hours, 47 min.

Cisco CCNP Data Center DCCOR (350-601)

The DCCOR course helps you prepare for the CCNP Data Center and CCIE Data Center certifications for advanced-level data center roles.

Course duration Duration: 8 hours, 55 min.

Microsoft Power BI Skills

Enhance your Microsoft Power BI skills to create impactful data visualizations and business intelligence solutions.

Course duration Duration: 6 hours

Data Localization vs. Cross-Border Data Movement

Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.

Course duration Duration: 40 minutes

Navigating Data Privacy in the Age of AI

As the volume of data generated and shared online grows exponentially, privacy concerns have become more pressing than ever before. Sign up today to learn from Babatunde Bambigboye, Head - Legal Enforcement Regulations, Nigeria Data Protection Commission!

Course duration Duration: 25 minutes

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Course duration Duration: 21 hours, 20 min.

Automating Incident Response Challenges in Your SOC

Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.

Course duration Duration: 30 minutes

Control Cybersecurity Complexity by Knowing Assets

Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.

Course duration Duration: 15 minutes

Modernizing Data Security & Compliance

Luke Babarinde of Imperva shares strategies for securing critical data assets and maintaining regulatory compliance across diverse environments.

Course duration Duration: 25 minutes

Mitigating Risk in Unmonitored Business Channels

SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.

Course duration Duration: 25 minutes

Reclaim Control Over Your Secrets

Stephen Johnson introduces Entro's Secrets Security Platform for managing secrets across vaults, source code and cloud environments.

Course duration Duration: 10 minutes

Mitigating the Evolving DDoS Threat Landscape

Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.

Course duration Duration: 10 minutes

A Sit Down With the Former CISO of the City of New York

Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.

Course duration Duration: 30 minutes

Why FinServ Cyber Pros Must Embrace Data-Centric Security

Trevor Foskett of Virtru explores military-grade encryption and data-centric protection strategies for financial services compliance and security.

Course duration Duration: 10 minutes

Real-Time Attack Tracing and Automation in the SOC

David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.

Course duration Duration: 15 minutes

ChatGPT: I, for One, Welcome Our New AI Overlords!

Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.

Course duration Duration: 35 minutes

Gen AI & Cyber Mesh for Financial CISOs

Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.

Course duration Duration: 25 minutes

Protecting Trust in a Changing World

Claire Le Gal, SVP at Mastercard, explores payment security evolution, cyber risk mitigation and fraud prevention strategies in an evolving digital landscape.

Course duration Duration: 25 minutes

DPDP Rules 2025 Demystified: What Are the Stakes for CXOs?

Jagannath PV, Rajiv Bahl and Manoj Kuruvanthody explore India's DPDP Rules implications, compliance challenges and governance amid AI innovations, and critical breach response clauses for CISOs and security leaders.

Course duration Duration: 35 minutes

CIO & CISO: Collaborate to Defend

Wahyu Agung Prasetyo, Thuraya Al-Harthi and Sujit Christy explore the evolving partnership between CIOs and CISOs in driving business enablement while maintaining robust cybersecurity.

Course duration Duration: 25 minutes

APAC's Decentralized Financial Systems

PayPal's Phoram Mehta, Gojek's Aarthi Sureshkumar and Advance Intelligence Group's Shishir Kumar Singh discuss blockchain's role in securing cross-border payments and CBDC implementation.

Course duration Duration: 25 minutes

Establishing Privacy & Data Protection in the Digital Era

Dr. Amirudin Abdul Wahab, CEO of CyberSecurity Malaysia, discusses evolving data protection frameworks and the balance between security and privacy in the digital era.

Course duration Duration: 30 minutes

Wartime CISO: From Battlefield to Boardroom

Joey Fontiveros, Acting Regiment Commander of the Philippines Army, shares insights on building cyber defense capabilities and countermeasures in an increasingly sophisticated threat landscape.

Course duration Duration: 35 minutes

Conquering Software Supply Chain Insecurities

Learn from Christophe Barel about securing supply chains, adopting shift-left strategies, and managing open-source risks. Explore frameworks for secure coding, automated security-by-design, and faster detection and remediation of supply chain attacks.

Course duration Duration: 25 minutes

CISOs' Rebalancing Practices

Learn from Matthias Yeo, Mel Migrino, and Jenny Tan about tackling the cybersecurity talent crunch, building resilient offensive strategies, leveraging automation, and weaving cybersecurity accountability across business functions for enhanced defense.

Course duration Duration: 30 minutes

Balancing Agility & Cyber Resilience

Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.

Course duration Duration: 25 minutes

How Can CIOs Harness AI, Data, and Analytics

Join Khalid Nizami as he explores aligning digital technologies with business goals, adopting AI-driven innovations like generative AI, and addressing challenges in talent, skills, and governance to drive business transformation and growth.

Course duration Duration: 30 minutes

How to Operationalize Privacy in the Digital Era

Lt. Col. Francel Padilla-Taborlupa shares insights on privacy challenges CISOs face. Learn about compliance strategies, cross-team collaboration, and adapting privacy strategies to evolving regulations, AI, IoT, and rapid technological advancements.

Course duration Duration: 25 minutes

Integrating Cyber Risk Into Enterprise RMF

Learn from Frankie Shuai, Ken Soh, and Rishi Ganiswaran about aligning cyber risk with enterprise frameworks. Explore strategies for integrating cyber risks into decision-making, risk reporting, and effective mitigation within broader operational goals.

Course duration Duration: 30 minutes

Implementing Zero Trust for Resilient Business: CIO's Role

Join James Thang to explore zero trust’s business implications, challenges, and the CIO’s role. Learn how IT and security teams collaborate to balance security posture with user experience and align zero trust with business goals and risk tolerance.

Course duration Duration: 30 minutes

Hybrid Workplace: Fad or Future

Explore how CIOs empower hybrid workforces with insights from Anil Kumar Saha and Ivan Irawan. Learn about collaboration tools, evolving workforce needs, cybersecurity, and data-driven strategies for productivity and innovation in hybrid models.

Course duration Duration: 30 minutes

Pivoting Technology From Cost Center to Revenue Generator

Discover how CIOs can position technology as a value creator and revenue generator with insights from Santosh Nair and Sourabh Chitrachar. Explore innovations for new revenue models, IT's role beyond enablement, and overcoming challenges in demonstrating IT's value.

Course duration Duration: 25 minutes

Incident Response & Recovery in Financial Services

Imran Ahmad and Ruth Promislow discuss how financial institutions can strengthen cyber resilience through defensible documentation, multi-jurisdictional compliance and cultural integration of security across business functions.

Course duration Duration: 35 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask Apollo a question?

Floating Button