Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Ensuring business continuity through data backups and incident recovery plans.
Identifying, assessing, and mitigating cybersecurity risks to protect assets.
Ensuring adherence to cybersecurity regulations, standards, and policies.
Safeguarding sensitive data and ensuring compliance with privacy regulations.
Delve into essential domains including Security and Risk Management, Asset Security, Security Architecture, and Engineering required by the CISSP
The Systems Security Certified Practitioner (SSCP) is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization's critical assets
The CompTIA CySA+ is an industry-recognized certification that aims to validate the skills and knowledge of cybersecurity analysts.
Kelly Hood, a cybersecurity engineer with Optic Cyber Solutions, breaks down the NIST framework’s core, tiers, and profiles. Learn its risk-based approach, integration with other standards, and its role in critical infrastructure. Gain insights into its five functions, 23 categories, and 108 subcategories for managing cybersecurity risks effectively.
In this series the learner will be introduced to concepts in cybersecurity, such as the core principles of security, wired and wireless network security. The learner will explore topics like operating system security and security software and more.
This course is designed for Microsoft Administrators who implement, manage, and monitor security and compliance solutions for Microsoft 365 and hybrid environments.
This course is designed for for business and IT professionals alike and helps prepare for the COBIT 2019 Foundation Certificate. Manage and govern your enterprise IT cybersecurity more effectively today with the COBIT 2019 Foundation!
The Certified Information Security Manager certification course is designed for those individuals seeking to enhance their skills and be recognized for their expertise in Information Security Management.
Join Grant Schneider in an exploration of external drivers that influence cybersecurity programs! Learn how organizations are rapidly adapting policies, including AI frameworks like ChatGPT, to address evolving risks.
From baby monitors to printers, tablets and automobiles, home offices are loaded with smart devices that share two common traits: They are internet connected, and they are hackable. In the remote work era, it is more important than ever that cybersecurity teams ensure that their networks and critical infrastructure are well-secured, even when endpoints have been compromised.
Join Ayelet Biger-Levin and Erin Englund as they examine real-world fraud cases and analyze digital behavior to decide whether the transaction is being conducted by a genuine customer or a criminal.
Join John Kindervag , E.P. Mathew, and Grant Schneider in a discussion about Zero Trust and Risk Management.
SOC 2, developed by the American Institute of CPAs, outlines how organizations manage customer data. Comply with SOC 2 today!
As we evaluate emerging technologies like blockchain, 5G, artificial intelligence, IoT and more, what are the implications on our cybersecurity? How do we even identify the risks of these emerging technologies? What controls, frameworks and skills do we need to manage them?
Sadia Mirza, Ginger Armbruster, and Randy Sabett discuss: The new state of privacy, impact of COVID-19 on security and privacy, & vulnerabilities in the work-from-home model.
Explore how ransomware impacts the cyber insurance industry with Diktesh Singh Puri. Learn about rising premiums, insurer challenges, and the growing role of insurers in shaping enterprise security programs amid increasing cybercrime.
Join Geetha Nandikotkur and Jayaraj Puthanveedu, MD-Cyber and Tech. Risk, Global Head - Operational Resilience, BNP Paribas Group to discuss building relationships with business unit leaders and driving practical risk-based discussions.
Tom Field joins Congressman Jim Langevin in a discussion about the impact of President Biden's cybersecurity executive order and it's impact on the state of critical infrastructure defense.
Join Tom Field and Kay Turner, U.S. Department of the Treasury as they discuss FinCEN, the Digital Identity Mission, and compliance.
Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Join Kelly Hood, EVP & Cybersecurity Engineer @ Optic Cyber Solutions as she explains the Cybersecurity Maturity Model Certification, or CMMC. Learn how to get certified today!
In 2021, we saw a steady drum beat toward mainstream adoption of cryptocurrencies by traditional financial institutions and investors of all sizes. We saw a move from a bitcoin-only world to an explosion of digital assets. And, we saw global regulators and policy makers begin discussions about building a clear regulatory framework for crypto.
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
ISO/IEC 27001: Secure your information assets. Learn about ISMS, risk management, and security controls. Understand the 2018 to 2022 changes and how to plan, execute, and maintain ISO/IEC 27001 certification.
SIAM: Manage multi-provider services. Learn the business case, benefits, processes, and challenges. Prepare for the EXIN SIAM Foundation exam.
Learn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
Based on AXELOS M_o_R® material. Learn to identify, assess, and control risks. Build effective risk management frameworks. Access requires an exam voucher.
Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Jonathan Armstrong, Declan Burke and Rory Alsop navigate the complexities of NIS2, DORA and AI Act compliance for U.K. organizations in the post-Brexit landscape.
Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
Join Vasanth Pai, Srinivas Poosarla, Poorav Sheth and Justice B.N. Srikrishna in a discussion of India's fourth bill on data protection.
Join Sumnesh Joshi in a discussion of cybersecurity strategy to fight today’s hybrid warfare.
Join Lt. Gen. Deependra Singh Hooda in a discussion about real-life innovative strategies and techniques that can be applied in a cyberwar by CISOs taking on a commandant’s role.
Join Vijayakumar Chandrasekaran, Ashutosh Jain, Dr. Deepak Kalambkar, Dr. Ramesh Shanmuganathan, and Brijesh Singh in a discussion of the CERT-In Directives.
Join Nitin Dhavate, Navaneethan, and Arvind Sivaramakrishnan in a conversation about how to juxtapose privacy and security to achieve total compliance.
Join Ralph Johnson in a discussion of how he tackled security on a state-wide scale.
Catch Nitin Natarajan's expert insights on healthcare cyberthreats and leveraging CISA’s expertise to bolster incident response and recovery capabilities.
Join Susan Rhodes in a talk about HIPAA security and privacy and breach notification rule-making.
Join Phillip Englert and Suzanne Schwartz in a conversation about medical device security.
Join Dr. David Isiavwe and Kenneth Palliam in a conversation about the the importance of cybersecurity resilience in the financial sector.
Justice BN Srikrishna, former Supreme Court Judge and Data Protection Committee Chairman, explains the implications of India's Digital Personal Data Protection Act for security leaders.
Join industry experts Jan Tilo Kirchhoff, Andreas Bogk, Diana Nadeborn and Michał Kowalczyk for an insightful discussion on legal frameworks, recent cases and strategies for responsible vulnerability disclosure across Europe.
Join Elie Abouzeid, Krista Arndt, Karen Habercoss, John Moynihan and Aaron Weismann, in a discussion of streamlining regulatory compliance in healthcare.
Join Greg Garcia, Sara Hall, Christopher Logan, Bobby Rao, Lorianne Sainsbury-Wong in a panel discussion about the requirements of the HSCC's Five-Year Health Industry Cybersecurity Strategic Plan
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Trish McGill, Gregory Blezard MBE and Marta Majtenyi explore strategies to promote human-centric cybersecurity while protecting against burnout. Session addresses communication, training, and building positive digital culture across organizations.
Thomas Mortsell, Adam Paturej, Philipp Amann and Antoine d'Haussy discuss pragmatic strategies for implementing multiple EU regulations while maintaining security and operational efficiency.
1 2 Next