Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Fang Yu explores the evolving tactics of fraudsters in online finance. This session covers popular banking fraud types, attack techniques, a detailed cash-out fraud case study, and how advanced technology can mitigate these threats effectively.
This course is for anyone wanting to learn how to write PowerShell scripts to automate tasks.
The Linux Fundamentals for Certification learning path provides essential Linux operating system skills and prepares you for entry-level Linux certification exams. You'll master core command-line operations and fundamental system administration concepts.
Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.
Chris Young explores strategies for defending against insider threats through data resilience measures and endpoint control, helping financial institutions protect sensitive information from internal risks.
Carlos Sanchez explores how global firewall deployments create automated threat detection networks, SOC automation addresses skills gaps and governance frameworks enable AI deployment in air-gapped OT environments.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Humayun Khan, Siham Eisele, Teemu Ylhäisi and Jari Rasinenwill discuss how modern threats exploit visibility gaps and methods for real-time threat detection through data analysis and correlation.
Sherelle Moore of Toyota Financial, Suryaparkash Nalluri of Fortune 500 Financial and Shawn Tuma of Spencer Fane dive into behavioral analytics for insider threat detection using machine learning and anomaly detection algorithms.
Mikkel Planck will share the latest insights from the frontline and reveal how adversaries are targeting organizations.
Rohit Shrivastava of Barclays shares expertise on conducting threat hunting in Windows environments and building proactive defense strategies.
Join Michael DeNicola in a conversation about social engineering tactics and what organizations can do to thwart them.
Neal Quinn of Radware examines AI-powered DDoS attacks in healthcare, offering practical defense strategies and real-world case studies of successful threat mitigation.
Join Satyavathi Divadari, Shyam Krishnamurthy, Bastin Robin and Visagan Subburayalu in a discussion of growth and ambiguity in unprecedented times in the cybersecurity industry.
Join Shobha Jagatpal in a discussion of the cloud, security, network operations, threat detection and response.
Join Ram Vaidyanathan, Product Marketing Manager - IT Security and SIEM Solutions, ManageEngine in a discussion about using AI and ML to defend Against Cybersecurity Attacks.
Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.
Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
Quest Software's Sivaramakrishnan Krishnamurthy covers Active Directory monitoring, identity management, and authentication tools for risk mitigation.
Join Sumnesh Joshi in a discussion of cybersecurity strategy to fight today’s hybrid warfare.
La Monte Yarborough of HHS, Laura Deaner of Northwestern Mutual and Preston Miller of Palo Alto Networks discuss emerging threats, zero-day attacks and leveraging AI/ML for threat detection.
OPSWAT's Manish Gautam explains implementing multiscanning techniques for enhanced threat detection and endpoint security in perimeterless environments.
Lance Moraitis-Jones from Recorded Future delves into automated threat profiling implementation, exploring dynamic prioritization methods and practical strategies for enhancing organizational security.
Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.