Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join John Kindervag , E.P. Mathew, and Grant Schneider in a discussion about Zero Trust and Risk Management.
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
Join Jeremy Grant in an examination of the critical role of digital identity as infrastructure.
Greg Touhill Director, CERT Division, Carnegie Mellon University Software Engineering Institute
Even though the MCSA and MCSE have been retired, many of us still manage on-premises environments running Windows Server 2019. This course covers some of the basic administration tasks, updated for Windows Server 2019.
Al Pascual explores the paradigm shift in identity management, from traditional controls to challenges posed by Web3, the Metaverse, and NFTs. Discover how identity goalposts have shifted, the new opportunities and challenges for vendors and practitioners, and what it means for the future of identity.
Glazer is the senior vice president for identity product management at Salesforce. His responsibilities include leading the product management team, product strategy, and identity standards work.
The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions.
This course is designed for Microsoft Administrators who implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.
SC-300: Microsoft Identity and Access Administrator certification validates expertise in managing identities, implementing access management solutions, and securing authentication with Microsoft tools.
Join Chase Cunningham, the "Doctor of Zero Trust" in a conversation about why well-meaning enterprises fail.
Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.
Tony Steffe demystifies zero trust and microsegmentation, offering actionable steps to counter ransomware. Learn to identify vulnerabilities, close risky ports, and use existing tools effectively. Discover how to implement zero trust strategies without added complexity to protect your organization.
Join Tom Field, Jon Drake and John Kindervag to discuss Inwood National Bank's Zero Trust journey.
In this Q&A session, Greg Touhill shares key strategies for implementing zero trust. Learn how to understand your data environment, set access rules, and align organizational objectives. Gain practical advice on adopting enabling technologies, including reference checks and lessons from peers.