Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
Based on AXELOS M_o_R® material. Learn to identify, assess, and control risks. Build effective risk management frameworks. Access requires an exam voucher.
Learn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
SIAM: Manage multi-provider services. Learn the business case, benefits, processes, and challenges. Prepare for the EXIN SIAM Foundation exam.
We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to provide guidance and real world examples to help you understand how to create and manage BCDR in your organization.
Join John Kindervag , E.P. Mathew, and Grant Schneider in a discussion about Zero Trust and Risk Management.
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
This course is designed for for business and IT professionals alike and helps prepare for the COBIT 2019 Foundation Certificate. Manage and govern your enterprise IT cybersecurity more effectively today with the COBIT 2019 Foundation!
The CompTIA CySA+ is an industry-recognized certification that aims to validate the skills and knowledge of cybersecurity analysts.
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.
Delve into essential domains including Security and Risk Management, Asset Security, Security Architecture, and Engineering required by the CISSP
ISO/IEC 27001: Secure your information assets. Learn about ISMS, risk management, and security controls. Understand the 2018 to 2022 changes and how to plan, execute, and maintain ISO/IEC 27001 certification.
As the volume of data generated and shared online grows exponentially, privacy concerns have become more pressing than ever before. Sign up today to learn from Babatunde Bambigboye, Head - Legal Enforcement Regulations, Nigeria Data Protection Commission!
Navigating ICS and OT Compliance is for industrial and critical infrastructure technical leaders and technical professionals. Get the resources you need to implement your ICS and OT cybersecurity compliance strategy today!
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Join Grant Schneider in an exploration of external drivers that influence cybersecurity programs! Learn how organizations are rapidly adapting policies, including AI frameworks like ChatGPT, to address evolving risks.
SOC 2, developed by the American Institute of CPAs, outlines how organizations manage customer data. Comply with SOC 2 today!
Sadia Mirza, Ginger Armbruster, and Randy Sabett discuss: The new state of privacy, impact of COVID-19 on security and privacy, & vulnerabilities in the work-from-home model.
Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.