Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
A GRC (Governance, Risk, and Compliance) Analyst is responsible for ensuring that an organization’s cybersecurity practices align with regulatory requirements, industry standards, and internal policies. They identify, assess, and manage risks to safeguard information assets and support compliance initiatives. These professionals play a key role in developing governance frameworks, conducting audits, and advising on risk mitigation strategies to maintain a strong security posture and regulatory readiness.
Delve into essential domains including Security and Risk Management, Asset Security, Security Architecture, and Engineering required by the CISSP
The CompTIA CySA+ is an industry-recognized certification that aims to validate the skills and knowledge of cybersecurity analysts.
We have Rob Carson from SemperSec in the studios to lend his considerable expertise. With 10+ years in the Information Security industry, Rob is able to provide guidance and real world examples to help you understand how to create and manage BCDR in your organization.
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
This course is designed for for business and IT professionals alike and helps prepare for the COBIT 2019 Foundation Certificate. Manage and govern your enterprise IT cybersecurity more effectively today with the COBIT 2019 Foundation!
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.
Join Grant Schneider in an exploration of external drivers that influence cybersecurity programs! Learn how organizations are rapidly adapting policies, including AI frameworks like ChatGPT, to address evolving risks.
Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.
Join John Kindervag , E.P. Mathew, and Grant Schneider in a discussion about Zero Trust and Risk Management.
SOC 2, developed by the American Institute of CPAs, outlines how organizations manage customer data. Comply with SOC 2 today!
Sadia Mirza, Ginger Armbruster, and Randy Sabett discuss: The new state of privacy, impact of COVID-19 on security and privacy, & vulnerabilities in the work-from-home model.
ISO/IEC 27001: Secure your information assets. Learn about ISMS, risk management, and security controls. Understand the 2018 to 2022 changes and how to plan, execute, and maintain ISO/IEC 27001 certification.
SIAM: Manage multi-provider services. Learn the business case, benefits, processes, and challenges. Prepare for the EXIN SIAM Foundation exam.
Learn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
Based on AXELOS M_o_R® material. Learn to identify, assess, and control risks. Build effective risk management frameworks. Access requires an exam voucher.
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
As the volume of data generated and shared online grows exponentially, privacy concerns have become more pressing than ever before. Sign up today to learn from Babatunde Bambigboye, Head - Legal Enforcement Regulations, Nigeria Data Protection Commission!
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Learn cybersecurity fundamentals and Palo Alto Networks solutions. Prepare for an entry-level network security career. This exam is retired, but the skills may still be relevant.
Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.
Explore data's critical role in zero trust strategies with Hudl's CISO Robert LaMagna-Reiter and Dr. Lisa McKee of Protiviti. Learn about privacy and security coordination, overcoming challenges, and integrating zero trust to enhance organizational security and compliance.
Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Veracode CISO Sohail Iqbal provides guidance on prioritizing software security and effectively communicating metrics to board members.
Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.
Luke Babarinde of Imperva shares strategies for securing critical data assets and maintaining regulatory compliance across diverse environments.
SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.
Stephen Johnson introduces Entro's Secrets Security Platform for managing secrets across vaults, source code and cloud environments.
Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.
David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.
Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.
Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.
Claire Le Gal, SVP at Mastercard, explores payment security evolution, cyber risk mitigation and fraud prevention strategies in an evolving digital landscape.
PayPal's Phoram Mehta, Gojek's Aarthi Sureshkumar and Advance Intelligence Group's Shishir Kumar Singh discuss blockchain's role in securing cross-border payments and CBDC implementation.
Dr. Amirudin Abdul Wahab, CEO of CyberSecurity Malaysia, discusses evolving data protection frameworks and the balance between security and privacy in the digital era.
Ali Abdulla Alsadadi shares insights on managing multi-cloud security. Learn about quantifying risks, tackling API complexities, integrating data, and building offensive strategies to mitigate risks in siloed multi-cloud environments.
Learn from Christophe Barel about securing supply chains, adopting shift-left strategies, and managing open-source risks. Explore frameworks for secure coding, automated security-by-design, and faster detection and remediation of supply chain attacks.
Learn from Matthias Yeo, Mel Migrino, and Jenny Tan about tackling the cybersecurity talent crunch, building resilient offensive strategies, leveraging automation, and weaving cybersecurity accountability across business functions for enhanced defense.
Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.
Join Khalid Nizami as he explores aligning digital technologies with business goals, adopting AI-driven innovations like generative AI, and addressing challenges in talent, skills, and governance to drive business transformation and growth.
Lt. Col. Francel Padilla-Taborlupa shares insights on privacy challenges CISOs face. Learn about compliance strategies, cross-team collaboration, and adapting privacy strategies to evolving regulations, AI, IoT, and rapid technological advancements.
Learn from Frankie Shuai, Ken Soh, and Rishi Ganiswaran about aligning cyber risk with enterprise frameworks. Explore strategies for integrating cyber risks into decision-making, risk reporting, and effective mitigation within broader operational goals.
Explore how CIOs empower hybrid workforces with insights from Anil Kumar Saha and Ivan Irawan. Learn about collaboration tools, evolving workforce needs, cybersecurity, and data-driven strategies for productivity and innovation in hybrid models.
Vincent Porte explains how organizations must evolve from periodic awareness training to comprehensive human risk management addressing AI-powered threats and sophisticated attacks.
Gaspard Droz of Mantra shows how successful organizations build security awareness programs that reduce human factor risks through strategic content, consistent engagement and behavioral psychology.
Sunil Chand discusses what it takes to succeed as a modern CISO, from asking tough questions about reporting structures and legal coverage to translating technical risks into business language and planning career progression.
Neal Jardine and Karen Continenza explore how cyber insurance evolved into a business necessity, covering expanded coverages, ransomware trends, the importance of insurer-friendly vendor alignment and regulatory developments shaping 2026.
1 2 Next