We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Identity and Access Management

Search

Clear Expand Collapse

Active Directory: "The Identity Immune System"

Oliver Keizers, area vice president EMEA Central at Semperis, will discuss why securing AD is essential and share insights from a real-world breach recovery.

Price
Course duration Duration: 25 minutes

All Other Identities: Implications for Zero Trust

The world of identity and access management has spent the last 30 years or more focusing almost exclusively on the enterprise workforce.

Course duration Duration: 33 minutes

An Identity-First Approach to Your Zero Trust Journey

Ganesh Narasimhadevara of Okta discusses implementing identity-first approaches in zero trust architectures.

Price
Course duration Duration: 25 minutes

CIAM's Unique Challenges to CISOs & Cybersecurity

Join Tom Field and John Horn, Director, Cybersecurity Practice, Aite-Novarica Group in an exploration of customer identity and access management.

Course duration Duration: 25 minutes

CRISC: Certified in Risk and Information Systems Control

The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.

Course duration Duration: 16 hours, 30 min.

Customer IAM & the Path to Making Identity Better

Join Jeremy Grant in an examination of the critical role of digital identity as infrastructure.

Course duration Duration: 22 minutes

Cybersecurity Mesh Architecture

Learn how to do more with less! Join Vishak Raman in a discussion of cybersecurity mesh architecture, designed to make security more composable and scalable.

Price
Course duration Duration: 15 minutes

Darkweb & Compromised Credentials

Fabio Sammartino of Kaspersky covers credential theft as cybercriminals' most profitable vector, exploring darkweb monitoring, threat intelligence strategies and corporate defense against compromised accounts.

Price
Course duration Duration: 15 minutes

Demystifying Zero Trust with Greg Touhill

Greg Touhill
Director, CERT Division, Carnegie Mellon University Software Engineering Institute

Course duration Duration: 30 minutes

Engineering Secure ICS and OT Environments

Engineering Secure ICS and OT Environments is designed for industrial and critical infrastructure technical leaders and technical professionals. Build more secure ICS and OT environments today!

Course duration Duration: 40 minutes

FIDO Alliance: The Future of Automation

Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable LLP in an exploration of role of the FIDO Alliance in standardizing phishing-resistant logins that make authentication simpler and stronger.

Course duration Duration: 30 minutes

Fortinet Security Fabric

Join Prem Nithin R in an exploration of Fortinet and mesh architecture.

Price
Course duration Duration: 20 minutes

Fundamentals of Cybersecurity

The Fundamentals of Cybersecurity learning path covers essential cybersecurity concepts across six parts. You'll explore topics like risk management, access control, network security, endpoint protection, data security, cloud security, compliance, and emerging technologies such as AI and blockchain.

Price
Course duration Duration: 6 hours

Fundamentals of Cybersecurity - Part 2

Fundamentals of Cybersecurity, Part 2 is an introduction to Access Control and Network Security.

Course duration Duration: 40 minutes

Hands-on with MS Teams

The Hands-on with TEAMS show is designed for Enterprise Administrators who take part in evaluating, planning, deploying, and managing Microsoft Teams. Microsoft Teams is an integrated communication and collaboration solution for enabling all of your users to create and share content, as well as schedule meetings and interact with each other.

Course duration Duration: 18 hours, 35 min.

How Windows 11 Enables Zero Trust Protection

Join Nischay Kandpal, Program Manager Evangelism , Product Specialist-Commercial, Microsoft as he highlights how Windows 11 enables zero trust protection.

Course duration Duration: 25 minutes

Identity & Access Management: From Apps to Zero Trust

Cloud migration, IoT deployment and zero trust architecture have been paradigm shifts for enterprises and their information security teams. But what about the impact on identity and access management? "It's big," says June Leung, director of IAM at Economical Insurance and a panelist in this session.

Course duration Duration: 30 minutes

Identity Security: Moving the Goal Posts

Al Pascual explores the paradigm shift in identity management, from traditional controls to challenges posed by Web3, the Metaverse, and NFTs. Discover how identity goalposts have shifted, the new opportunities and challenges for vendors and practitioners, and what it means for the future of identity.

Course duration Duration: 24 minutes

Identity Vetting Using Decentralized ID

Identity Vetting Using Decentralized ID with Alan Bachmann, Senior Enterprise Architect, Technology Research and Innovation, CVS Health, explores how to leverage decentralized digital identity technology.

Course duration Duration: 20 minutes

Identity-Based Zero Trust: A Use Case Perspective

Amruta Gawde, Bala Ramanan and Dr. Ram Kumar G share perspectives on contextual security, AI integration for authentication, and implementing zero trust access across hybrid environments.

Price
Course duration Duration: 35 minutes

Identity-Centric Cybersecurity: Building on Zero Trust

Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable, LLP and Coordinator, Better Identity Coalition and explore Identity Access Management today!

Course duration Duration: 30 minutes

IDPro: Upscaling Digital Identity Management

Glazer is the senior vice president for identity product management at Salesforce. His responsibilities include leading the product management team, product strategy, and identity standards work.

Price
Course duration Duration: 30 minutes

Impact of Technology Deployments on Privacy

Join Shruti Dvidedi Sodhi, Khushbu Jain, Shivangi Nadkarni, and Gururaj Rao in a discussion of cybersecurity, identity access management, and privacy.

Price
Course duration Duration: 25 minutes

Implementing Zero Trust & Gaining Buy-In

Join Sudip Banerjee for a discussion about zero-trust strategy and implementation.

Price
Course duration Duration: 25 minutes

Improving Business Resilience Through Identity-First Security

Josh Wasserman of Semperis discusses protecting core identity systems, highlighting critical steps for cyber disaster recovery and business continuity in healthcare.

Price
Course duration Duration: 15 minutes

Intro to OWASP

The OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!

Course duration Duration: 1 hour, 30 minutes

Intro to OWASP & Auth Failures

Dive into OWASP's identification or authentication related cybersecurity concerns, risk mitigation strategies and pro tips!

Course duration Duration: 10 minutes

Intro to OWASP & Broken Access Control

Learn about OWASP's broken access control related cybersecurity concerns, risk mitigation strategies and pro tips!

Course duration Duration: 20 minutes

Is Your IAM Policy Adequate? Perils of Overprovisioning

Girish Dixit of Kotak Securities and S V Sunder Krishnan of Reliance Life Insurance discuss comprehensive IAM strategies and the risks of overprovisioning.

Price
Course duration Duration: 20 minutes

Is Your Identity Management Comprehensive Enough?

Join Milind Mungale, Manickam Sampath, Sridhar Sidhu, and Ambarish Kumar Singh in an exploration of the critical components of an identity strategy.

Price
Course duration Duration: 25 minutes

Managing Identity in an Abstract World

Join Manuel Garat, Marco Lattavo and Denny Prvu in a discussion of how traditional identity technologies struggle to meet demands for secure, frictionless experiences. Register now!

Course duration Duration: 28 minutes

New Frontiers for Digital Identity Security

David Ciamberlano and Salvatore Bertolino of Ping Identity demonstrate AI-powered identity protection, real-time behavioral analysis and decentralized identity as the future of access management.

Price
Course duration Duration: 40 minutes

NIST Cybersecurity and Risk Management Frameworks

In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.

Course duration Duration: 21 hours, 20 min.

PAM (R)evolution

Marco Di Martino of Delinea explores modern PAM evolution into comprehensive identity security, covering authorization management, non-human identity governance and AI-driven analytics for unified platforms.

Price
Course duration Duration: 25 minutes

Pause Words & Shift to Passkeys

Niharika Arora and Manish Khedawat discuss the transition from password-based authentication to passkeys, implementation steps, enterprise vs. consumer adoption challenges, and best practices.

Price
Course duration Duration: 25 minutes

Protecting the Identity-Based Attack Life Cycle

Marco Magnaguagno of Semperis and Michele Fabbri of De Nora share insights on securing identity infrastructure across multinational operations, addressing the complete identity-based attack life cycle.

Price
Course duration Duration: 25 minutes

Redefining Identity: Verification & Passwordless

Siddharth Gandhi of 1Kosmos breaks down what identity means today, exploring how security models rely on strong identity checks and how verification, biometrics and passwordless logins are making access safer and easier.

Price
Course duration Duration: 20 minutes

Redefining Identity: Verification & Passwordless

Siddharth Gandhi of 1Kosmos explores identity's evolving role in security, examining verification techniques, biometrics and passwordless authentication within zero trust frameworks.

Price
Course duration Duration: 20 minutes

SC-300: Microsoft Identity and Access Administrator

SC-300: Microsoft Identity and Access Administrator certification validates expertise in managing identities, implementing access management solutions, and securing authentication with Microsoft tools.

Course duration Duration: 16 hours

Securing Your Business With Zero Trust

Join Chip Mason, Lead, Mainframe Security Product Management, Broadcom, and Henk van Achterberg, Security Strategist, Broadcom as they discuss why zero trust is everywhere, in the cloud, on-premises including, and in the mainframe.

Course duration Duration: 25 minutes

The Future of Passwordless

Shasta Turney explores how decentralized identity and verifiable credentials are transforming passwordless authentication, addressing deepfake threats and enhancing security in healthcare.

Price
Course duration Duration: 15 minutes

The Passwordless Road Map

Guillermo Arias and Carlos Scott from Ping Identity present a practical road map to implementing passwordless authentication, replacing outdated password systems with FIDO standards and biometrics to enhance both security and user experience.

Price
Course duration Duration: 30 minutes

The Road to Zero Trust Security

Experts agree that zero trust is based on the premise of "assume breach" and treat every asset as breached and all traffic as hostile. Join Manish Dave, Head of Information Security, Aarti Industries Ltd. in a discussion of Zero Trust.

Course duration Duration: 30 minutes

This Is How You Fail

Join Chase Cunningham, the "Doctor of Zero Trust" in a conversation about why well-meaning enterprises fail.

Course duration Duration: 27 minutes

Working with SSH

The Working with SSH show aims to remove the intimidation of using the Secure Shell protocol on your network. SSH allows for encrypting network communications to protect from eavesdropping and man-in-the-middle attacks. This series demonstrates how to configure and use SSH to securely manage your systems.

Course duration Duration: 40 minutes

Zero Trust Myth Busting

The concept of zero trust has received unprecedented attention. After languishing for over 10 years following John Kindervag's invention of the concept, suddenly every security product and services vendor on the planet was offering a pathway to the zero trust promised land.

Course duration Duration: 45 minutes

Zero Trust: The Key to Securing Higher Education

Join George Finney, the CISO at Southern Methodist University and explore higher education specific cybersecurity challenges.

Course duration Duration: 40 Minutes

ZTNA-Evolving Beyond Antiquated VPNs

Join Dr. Chase Cunningham in an explanation of why companies should move away from VPNs and toward zero-trust network access (ZTNA) solutions.

Course duration Duration: 30 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement