Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Nitin Dhavate, Navaneethan, and Arvind Sivaramakrishnan in a conversation about how to juxtapose privacy and security to achieve total compliance.
In this series we explore the concepts of the ISO / IEC 27,000 standard and prepare for the ISO / IEC 27,000 Information Security Management examination accredited by EXIN.
Learn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.
Forcepoint's Thejo Murthy discusses AI-driven data discovery, borderless architecture, and implementing risk-adaptive data protection strategies.
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
The CCPA and the CPRA affect all businesses dealing with Californian customer data. Learn how to comply with CCPA and CPRA today!
Join Vijayakumar Chandrasekaran, Ashutosh Jain, Dr. Deepak Kalambkar, Dr. Ramesh Shanmuganathan, and Brijesh Singh in a discussion of the CERT-In Directives.
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
Cisco CCNP Enterprise ENCOR (350-401) will help you to learn and prepare for the associated exam—Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401). This exam is the core exam for both the CCNP Enterprise and CCIE Enterprise certifications. In the show, you learn every topic covered in the official exam blueprint from Cisco. These areas include Architecture, Virtualization, Infrastructure, Network Assurance, Security and Automation.
Learn and master the material needed to pass the CompTIA A+ Core 2 exam!
Navigate the complex landscape of privacy regulations, implement best practices for compliance, and better comply with COPPA today!
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.
Girish Agarwal and Markus Kluge share insights on the cyberthreats targeting the biotech industry, from R&D data to regulatory compliance, and best practices for protecting valuable intellectual property.
Join Anne Coulombe, Rick Doten, and Jigar Kadakia in a lively discussion about managing cybersecurity in healthcare on a budget.
Shiju Rawther, Kalpesh Doshi, Puneet Bhasin and Anil Lole debate data localization versus cross-border data movement under DPDP Act.
Allan Foster, chief evangelist officer, ForgeRock, explores the evolving landscape of user data management amid growing compliance demands. Learn how empowering users in the data process enhances control and authority, and discover secure frameworks for utilizing data effectively while meeting regulatory requirements.
Industry leaders Amit Sharma, Jagannath PV, Lakshminarayanan RS and Ramakant Mohapatra debate the intersection of security and privacy, exploring CISO accountability in data protection.
Justice BN Srikrishna, former Supreme Court Judge and Data Protection Committee Chairman, explains the implications of India's Digital Personal Data Protection Act for security leaders.
Dr. Amirudin Abdul Wahab, CEO of CyberSecurity Malaysia, discusses evolving data protection frameworks and the balance between security and privacy in the digital era.
Join Tom Field and Kay Turner, U.S. Department of the Treasury as they discuss FinCEN, the Digital Identity Mission, and compliance.
Fundamentals of Cybersecurity, Part 2 is an introduction to Access Control and Network Security.
Fundamentals of Cybersecurity Part 5 is an introduction to compliance and human risk management.
Navigate the complex landscape of privacy regulations, implement best practices for compliance, and better comply with the GDPR today!
Learn to ingest data into Splunk Enterprise. Configure data inputs: files, network, scripted, and HTTP Event Collector. Make your Splunk deployment valuable with complete data.
The 2021 Global Encryption Trends Study shows that leading organizations worldwide are anchoring their data protection strategy with encryption, and details the fastest-growing use cases. Join our session for a deep dive into the key findings and use cases to protect your most valuable assets.
The Hands-on with TEAMS show is designed for Enterprise Administrators who take part in evaluating, planning, deploying, and managing Microsoft Teams. Microsoft Teams is an integrated communication and collaboration solution for enabling all of your users to create and share content, as well as schedule meetings and interact with each other.
Even though the MCSA and MCSE have been retired, many of us still manage on-premises environments running Windows Server 2019. This course covers some of the basic administration tasks, updated for Windows Server 2019.
Navigate the complex landscape of privacy regulations, implement best practices for compliance, and better comply with HIPAA today!
Join Shruti Dvidedi Sodhi, Khushbu Jain, Shivangi Nadkarni, and Gururaj Rao in a discussion of cybersecurity, identity access management, and privacy.
Learn to implement Splunk Enterprise. Configure, maintain, and support Splunk operations. This course is part of a 3-course Splunk Enterprise administration series.
The OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!
Learn about OWASP's integrity related cybersecurity concerns, risk mitigation strategies and pro tips!
Everyone in finance should know the basics of payment card data security compliance. Learn about payment card industry data security standard compliance today!
Learn how the Gramm-Leach-Bliley Act requires financial institutions to explain information-sharing practices and safeguard sensitive data.
Every financial sector business professional should know the basics of data protection and NCUA compliance. Start your NCUA journey today!
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.
Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam
Join Susan Rhodes in a talk about HIPAA security and privacy and breach notification rule-making.
Lead teams that safeguard member information, maintain the integrity of financial operations, and remain NCUA compliant.
Sabrina Jensen explores how proactive security strategies build stakeholder confidence, enhance flexibility and contribute to resilient decision-making for long-term success.
Andreas Aalberg will share how Cribl aims to solve the challenge of increasing data volume with stagnant IT budgets by providing an open, agnostic platform.
Matthieu Rouvre, regional sales manager at Cribl, explores practical approaches to managing growing data volumes despite budget constraints, covering agent consolidation, cost-effective retention and avoiding vendor lock-in.
This course is designed for Microsoft Administrators who implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.
Enhance your Microsoft Power BI skills to create impactful data visualizations and business intelligence solutions.
Luke Babarinde of Imperva shares strategies for securing critical data assets and maintaining regulatory compliance across diverse environments.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Ron Yosefi shares strategies for managing OT data explosion, prioritizing threats, and maximizing SecOps resources to improve security posture while addressing skill.
This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security.
Learn cybersecurity fundamentals and Palo Alto Networks solutions. Prepare for an entry-level network security career. This exam is retired, but the skills may still be relevant.
1 2 Next