Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Nitin Dhavate, Navaneethan, and Arvind Sivaramakrishnan in a conversation about how to juxtapose privacy and security to achieve total compliance.
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
Learn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.
Forcepoint's Thejo Murthy discusses AI-driven data discovery, borderless architecture, and implementing risk-adaptive data protection strategies.
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
Join Vijayakumar Chandrasekaran, Ashutosh Jain, Dr. Deepak Kalambkar, Dr. Ramesh Shanmuganathan, and Brijesh Singh in a discussion of the CERT-In Directives.
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
Cisco CCNP Enterprise ENCOR (350-401) will help you to learn and prepare for the associated exam—Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401). This exam is the core exam for both the CCNP Enterprise and CCIE Enterprise certifications. In the show, you learn every topic covered in the official exam blueprint from Cisco. These areas include Architecture, Virtualization, Infrastructure, Network Assurance, Security and Automation.
Compliance - CCPA and CPRA highlights the California Consumer Privacy Act of 2018 (CCPA) which gives consumers more control over the personal information that businesses collect about them. The CPRA, amended the CCPA.
Learn and master the material needed to pass the CompTIA A+ Core 2 exam!
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.
Join Anne Coulombe, Rick Doten, and Jigar Kadakia in a lively discussion about managing cybersecurity in healthcare on a budget.
Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.
Allan Foster, chief evangelist officer, ForgeRock, explores the evolving landscape of user data management amid growing compliance demands. Learn how empowering users in the data process enhances control and authority, and discover secure frameworks for utilizing data effectively while meeting regulatory requirements.
Industry leaders Amit Sharma, Jagannath PV, Lakshminarayanan RS and Ramakant Mohapatra debate the intersection of security and privacy, exploring CISO accountability in data protection.
Justice BN Srikrishna, former Supreme Court Judge and Data Protection Committee Chairman, explains the implications of India's Digital Personal Data Protection Act for security leaders.
Dr. Amirudin Abdul Wahab, CEO of CyberSecurity Malaysia, discusses evolving data protection frameworks and the balance between security and privacy in the digital era.
Join Tom Field and Kay Turner, U.S. Department of the Treasury as they discuss FinCEN, the Digital Identity Mission, and compliance.
Fundamentals of Cybersecurity, Part 2 is an introduction to Access Control and Network Security.
Fundamentals of Cybersecurity Part 5 is an introduction to compliance and human risk management.
Learn to ingest data into Splunk Enterprise. Configure data inputs: files, network, scripted, and HTTP Event Collector. Make your Splunk deployment valuable with complete data.
The 2021 Global Encryption Trends Study shows that leading organizations worldwide are anchoring their data protection strategy with encryption, and details the fastest-growing use cases. Join our session for a deep dive into the key findings and use cases to protect your most valuable assets.
The Hands-on with TEAMS show is designed for Enterprise Administrators who take part in evaluating, planning, deploying, and managing Microsoft Teams. Microsoft Teams is an integrated communication and collaboration solution for enabling all of your users to create and share content, as well as schedule meetings and interact with each other.
Even though the MCSA and MCSE have been retired, many of us still manage on-premises environments running Windows Server 2019. This course covers some of the basic administration tasks, updated for Windows Server 2019.
Join Shruti Dvidedi Sodhi, Khushbu Jain, Shivangi Nadkarni, and Gururaj Rao in a discussion of cybersecurity, identity access management, and privacy.
Learn to implement Splunk Enterprise. Configure, maintain, and support Splunk operations. This course is part of a 3-course Splunk Enterprise administration series.
The OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!
Learn about OWASP's integrity related cybersecurity concerns, risk mitigation strategies and pro tips!
Everyone in finance should know the basics of payment card data security compliance. Learn about payment card industry data security standard compliance today!
Learn how the Gramm-Leach-Bliley Act requires financial institutions to explain information-sharing practices and safeguard sensitive data.
Every financial sector business professional should know the basics of data protection and NCUA compliance. Start your NCUA journey today!
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.
Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam
Join Susan Rhodes in a talk about HIPAA security and privacy and breach notification rule-making.
Lead teams that safeguard member information, maintain the integrity of financial operations, and remain NCUA compliant.
This course is designed for Microsoft Administrators who implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.
Enhance your Microsoft Power BI skills to create impactful data visualizations and business intelligence solutions.
Luke Babarinde of Imperva shares strategies for securing critical data assets and maintaining regulatory compliance across diverse environments.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Ron Yosefi shares strategies for managing OT data explosion, prioritizing threats, and maximizing SecOps resources to improve security posture while addressing skill.
This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security.
Learn cybersecurity fundamentals and Palo Alto Networks solutions. Prepare for an entry-level network security career. This exam is retired, but the skills may still be relevant.
Take this technical practical application course to implement the data security best practices that ensure PCI DSS requirement compliance.
Join Dr. Lopa Mudraa Basuu and Anuj Bhansali in an exploration of payment fraud and defense.
Explore zero trust strategies with Sudip Banerjee, Field CTO at Zscaler. Learn phased approaches to zero trust, balancing agility with risk, and adapting security strategies for hybrid workforces and disappearing perimeters in a post-pandemic world.
Jonathan Andresen, Senior Director, Marketing and Products, Asia Pacific and Japan, Bitglass examines the shift to Secure Access Service Edge (SASE) architecture in response to evolving cyber threats like the SolarWinds breach. Learn about modern breach trends, SASE's key pillars, and the cost-benefit analysis of SASE protection versus data breaches.
Sumant Mauskar of Pindrop shares insights on protecting healthcare IVR systems while balancing compliance, patient experience and operational efficiency.
Learn Splunk Enterprise administration fundamentals. Configure data inputs, manage users, optimize search, and troubleshoot issues. Maximize the value of Splunk for your organization.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
1 2 Next