Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Nitin Dhavate, Navaneethan, and Arvind Sivaramakrishnan in a conversation about how to juxtapose privacy and security to achieve total compliance.
Based on AXELOS M_o_R® material. Learn to identify, assess, and control risks. Build effective risk management frameworks. Access requires an exam voucher.
Learn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
SIAM: Manage multi-provider services. Learn the business case, benefits, processes, and challenges. Prepare for the EXIN SIAM Foundation exam.
Learn VeriSM™ to implement digital transformation. Adapt the Management Mesh and guide products through lifecycle stages. Prepare for the VeriSM™ certification exam.
Learn to implement VeriSM™ for digital transformation. Understand the impact on teams and stakeholders. Create and adapt the Management Mesh. Prepare for the VeriSM™ Professional certification.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
From baby monitors to printers, tablets and automobiles, home offices are loaded with smart devices that share two common traits: They are internet connected, and they are hackable. In the remote work era, it is more important than ever that cybersecurity teams ensure that their networks and critical infrastructure are well-secured, even when endpoints have been compromised.
As we evaluate emerging technologies like blockchain, 5G, artificial intelligence, IoT and more, what are the implications on our cybersecurity? How do we even identify the risks of these emerging technologies? What controls, frameworks and skills do we need to manage them?
Mostafa Nassar examines why standard GRC platforms fail in industrial settings and provides strategies for developing OT-specific solutions that integrate with IT frameworks while addressing specialized operational needs.
Join John Kindervag , E.P. Mathew, and Grant Schneider in a discussion about Zero Trust and Risk Management.
The CCPA and the CPRA affect all businesses dealing with Californian customer data. Learn how to comply with CCPA and CPRA today!
Join Vijayakumar Chandrasekaran, Ashutosh Jain, Dr. Deepak Kalambkar, Dr. Ramesh Shanmuganathan, and Brijesh Singh in a discussion of the CERT-In Directives.
Catch Nitin Natarajan's expert insights on healthcare cyberthreats and leveraging CISA’s expertise to bolster incident response and recovery capabilities.
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
Join Kelly Hood, EVP & Cybersecurity Engineer @ Optic Cyber Solutions as she explains the Cybersecurity Maturity Model Certification, or CMMC. Learn how to get certified today!
This course is designed for for business and IT professionals alike and helps prepare for the COBIT 2019 Foundation Certificate. Manage and govern your enterprise IT cybersecurity more effectively today with the COBIT 2019 Foundation!
The CompTIA CySA+ is an industry-recognized certification that aims to validate the skills and knowledge of cybersecurity analysts.
Tom Field joins Congressman Jim Langevin in a discussion about the impact of President Biden's cybersecurity executive order and it's impact on the state of critical infrastructure defense.
Navigate the complex landscape of privacy regulations, implement best practices for compliance, and better comply with COPPA today!
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
Explore how ransomware impacts the cyber insurance industry with Diktesh Singh Puri. Learn about rising premiums, insurer challenges, and the growing role of insurers in shaping enterprise security programs amid increasing cybercrime.
Join Dr. David Isiavwe and Kenneth Palliam in a conversation about the the importance of cybersecurity resilience in the financial sector.
Join Vasanth Pai, Srinivas Poosarla, Poorav Sheth and Justice B.N. Srikrishna in a discussion of India's fourth bill on data protection.
Justice BN Srikrishna, former Supreme Court Judge and Data Protection Committee Chairman, explains the implications of India's Digital Personal Data Protection Act for security leaders.
Trish McGill, Gregory Blezard MBE and Marta Majtenyi explore strategies to promote human-centric cybersecurity while protecting against burnout. Session addresses communication, training, and building positive digital culture across organizations.
Jonathan Armstrong, Declan Burke and Rory Alsop navigate the complexities of NIS2, DORA and AI Act compliance for U.K. organizations in the post-Brexit landscape.
Make sure your institution stays compliant. Brush up on FDIC Laws and Regulations today!
Learn about the FFIEC Cybersecurity Assessment Tool, known as the CAT, its components, and how it can benefit your institution. Kick off your FFIEC CAT journey today!
Join Tom Field and Kay Turner, U.S. Department of the Treasury as they discuss FinCEN, the Digital Identity Mission, and compliance.
Fundamentals of Cybersecurity Part 5 is an introduction to compliance and human risk management.
Navigate the complex landscape of privacy regulations, implement best practices for compliance, and better comply with the GDPR today!
Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
Navigate the complex landscape of privacy regulations, implement best practices for compliance, and better comply with HIPAA today!
Vipin Raj shares how Ahalia Hospital adapted its processes to align with cybersecurity regulations, highlighting how regulatory compliance has strengthened organizational maturity and enhanced critical infrastructure protection.
Join Lt. Gen. Deependra Singh Hooda in a discussion about real-life innovative strategies and techniques that can be applied in a cyberwar by CISOs taking on a commandant’s role.
Join Greg Garcia, Sara Hall, Christopher Logan, Bobby Rao, Lorianne Sainsbury-Wong in a panel discussion about the requirements of the HSCC's Five-Year Health Industry Cybersecurity Strategic Plan
Join Ralph Johnson in a discussion of how he tackled security on a state-wide scale.
Join Tom Field and Katie Jenkins in a discussion of how to inspire an enterprise to change its entire cybersecurity mindset.
Everyone in finance should know the basics of payment card data security compliance. Learn about payment card industry data security standard compliance today!
Learn how the Gramm-Leach-Bliley Act requires financial institutions to explain information-sharing practices and safeguard sensitive data.
Every financial sector business professional should know the basics of data protection and NCUA compliance. Start your NCUA journey today!
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.
Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam
Delve into essential domains including Security and Risk Management, Asset Security, Security Architecture, and Engineering required by the CISSP
The Systems Security Certified Practitioner (SSCP) is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization's critical assets
Implement best practices to comply with ISO 27001 and ISO 27002 standards today!
ISO/IEC 27001: Secure your information assets. Learn about ISMS, risk management, and security controls. Understand the 2018 to 2022 changes and how to plan, execute, and maintain ISO/IEC 27001 certification.
Join Susan Rhodes in a talk about HIPAA security and privacy and breach notification rule-making.
1 2 Next