Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Nitin Dhavate, Navaneethan, and Arvind Sivaramakrishnan in a conversation about how to juxtapose privacy and security to achieve total compliance.
Greg Tatum, Jessica Bolton, Sudhakar Vishnubhotla and Asif Effendi discuss TDPSA compliance, implementing user-friendly privacy systems and cross-functional collaboration strategies.
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
Elevate your AI security expertise! Earn your certificate in AI Guardrails, RAG Security, and Input Validation today! Fortify your AI-powered infrastructure!
Learn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.
Expand your cybersecurity skill set with Agentic AI best practices. Sign your team up for Agentic AI risk management training today!
Forcepoint's Thejo Murthy discusses AI-driven data discovery, borderless architecture, and implementing risk-adaptive data protection strategies.
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
Zechariah Akinpelu of Unity Bank, Everett Bates of Crunchyroll and Tarek Ahmed of Cenlar FSB explore multi-faceted protection strategies, AI-powered anomaly detection and adaptive access controls for hybrid and cloud-native environments.
The CCPA and the CPRA affect all businesses dealing with Californian customer data. Learn how to comply with CCPA and CPRA today!
Join Vijayakumar Chandrasekaran, Ashutosh Jain, Dr. Deepak Kalambkar, Dr. Ramesh Shanmuganathan, and Brijesh Singh in a discussion of the CERT-In Directives.
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
Cisco CCNP Enterprise ENCOR (350-401) will help you to learn and prepare for the associated exam—Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401). This exam is the core exam for both the CCNP Enterprise and CCIE Enterprise certifications. In the show, you learn every topic covered in the official exam blueprint from Cisco. These areas include Architecture, Virtualization, Infrastructure, Network Assurance, Security and Automation.
Learn and master the material needed to pass the CompTIA A+ Core 2 exam!
Navigate the complex landscape of privacy regulations, implement best practices for compliance, and better comply with COPPA today!
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.
Girish Agarwal and Markus Kluge share insights on the cyberthreats targeting the biotech industry, from R&D data to regulatory compliance, and best practices for protecting valuable intellectual property.
Join Anne Coulombe, Rick Doten, and Jigar Kadakia in a lively discussion about managing cybersecurity in healthcare on a budget.
Empower your team to protect what matters most in an AI-powered world and start your AI data protection journey today!
Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.
Kevin Dunn of U.S. Retirement & Benefits Partner and Priya Narayan of Southwest Airlines discuss data decoupling strategies, privacy regulation compliance and best practices for minimizing data breach risks.
Connie Devine of Excelerate Energy and Danielle Jablanski of CISA explore critical infrastructure cybersecurity, key vulnerabilities across oil and gas operations, real-world attack case studies, and strategies for securing OT systems.
Allan Foster, chief evangelist officer, ForgeRock, explores the evolving landscape of user data management amid growing compliance demands. Learn how empowering users in the data process enhances control and authority, and discover secure frameworks for utilizing data effectively while meeting regulatory requirements.
Industry leaders Amit Sharma, Jagannath PV, Lakshminarayanan RS and Ramakant Mohapatra debate the intersection of security and privacy, exploring CISO accountability in data protection.
Justice BN Srikrishna, former Supreme Court Judge and Data Protection Committee Chairman, explains the implications of India's Digital Personal Data Protection Act for security leaders.
Tanin Chakraborty, Anand Pande, Kanishk Gaur, Rakesh Maheshwari, Saakshar Duggal and Tejveer Bhogal explore DPDP Rules implementation challenges, focusing on data governance, cross-border transfers and compliance automation.
Jagannath PV, Rajiv Bahl and Manoj Kuruvanthody explore India's DPDP Rules implications, compliance challenges and governance amid AI innovations, and critical breach response clauses for CISOs and security leaders.
Dr. Amirudin Abdul Wahab, CEO of CyberSecurity Malaysia, discusses evolving data protection frameworks and the balance between security and privacy in the digital era.
Join Tom Field and Kay Turner, U.S. Department of the Treasury as they discuss FinCEN, the Digital Identity Mission, and compliance.
The Fundamentals of Cybersecurity learning path covers essential cybersecurity concepts across six parts. You'll explore topics like risk management, access control, network security, endpoint protection, data security, cloud security, compliance, and emerging technologies such as AI and blockchain.
Fundamentals of Cybersecurity, Part 2 is an introduction to Access Control and Network Security.
Fundamentals of Cybersecurity Part 5 is an introduction to compliance and human risk management.
Navigate the complex landscape of privacy regulations, implement best practices for compliance, and better comply with the GDPR today!
Learn to ingest data into Splunk Enterprise. Configure data inputs: files, network, scripted, and HTTP Event Collector. Make your Splunk deployment valuable with complete data.
The 2021 Global Encryption Trends Study shows that leading organizations worldwide are anchoring their data protection strategy with encryption, and details the fastest-growing use cases. Join our session for a deep dive into the key findings and use cases to protect your most valuable assets.
The Hands-on with TEAMS show is designed for Enterprise Administrators who take part in evaluating, planning, deploying, and managing Microsoft Teams. Microsoft Teams is an integrated communication and collaboration solution for enabling all of your users to create and share content, as well as schedule meetings and interact with each other.
Even though the MCSA and MCSE have been retired, many of us still manage on-premises environments running Windows Server 2019. This course covers some of the basic administration tasks, updated for Windows Server 2019.
Navigate the complex landscape of privacy regulations, implement best practices for compliance, and better comply with HIPAA today!
Join Shruti Dvidedi Sodhi, Khushbu Jain, Shivangi Nadkarni, and Gururaj Rao in a discussion of cybersecurity, identity access management, and privacy.
Learn to implement Splunk Enterprise. Configure, maintain, and support Splunk operations. This course is part of a 3-course Splunk Enterprise administration series.
The OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!
Learn about OWASP's integrity related cybersecurity concerns, risk mitigation strategies and pro tips!
Everyone in finance should know the basics of payment card data security compliance. Learn about payment card industry data security standard compliance today!
Learn how the Gramm-Leach-Bliley Act requires financial institutions to explain information-sharing practices and safeguard sensitive data.
Every financial sector business professional should know the basics of data protection and NCUA compliance. Start your NCUA journey today!
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.
Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam
Join Susan Rhodes in a talk about HIPAA security and privacy and breach notification rule-making.
Lead teams that safeguard member information, maintain the integrity of financial operations, and remain NCUA compliant.
1 2 Next