We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Incident Handling and Response

Cyber Insurance with Lynn Peachey

Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.

Course duration Duration: 2 hours, 47 min.

Absolute Musts in Your Incident Response Plan

Join Rocco Grillo, Kevin Li, and Parthiv Shah as they discuss incident response plans that work... and those that fail!

Course duration Duration: 27 minutes

CMMC With Kelly Hood

Join Kelly Hood, EVP & Cybersecurity Engineer @ Optic Cyber Solutions as she explains the Cybersecurity Maturity Model Certification, or CMMC. Learn how to get certified today!

Course duration Duration: 1 hour

Balancing Protection & Productivity: The UEM Approach

Join Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.

Course duration Duration: 27 minutes

BEC Attacks: Detection and Response

Business email compromise (BEC) attacks are increasingly used by attackers as a way of targeting organizations. According to Gartner, through 2023, BEC attacks will continue to double each year to over $5 billion and lead to large financial losses for enterprises.

Course duration Duration: 30 minutes

CertNexus CyberSec First Responder (CFR-310)

This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.

Course duration Duration: 13 hours, 20 min.

Automating Incident Response Challenges in Your SOC

Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.

Course duration Duration: 30 minutes

Strategies for CISOs Post-SolarWinds

Sean Mack, Walker Newell, Paul Kurtz and David Anderson examine SEC cybersecurity enforcement post-SolarWinds and strategies for CISOs.

Course duration Duration: 25 minutes

Cyberattack Mitigation, Response & Recovery

Industry leaders Jeff Cornelius, Anthony Souza, Dean Macris and Blake Gilson share insights on cyberattack mitigation, recovery strategies and incident response based on past breach experiences.

Course duration Duration: 35 minutes

Empowering a Cyber-Resilient Enterprise

Join Navin Mehra in an exploration of how the right strategy, platform and incident response plan can empower a cyber-resilient enterprise.

Course duration Duration: 25 minutes

Cyber Insurance: The Best Defense Against Cyberattacks?

Join Deepika Mathur in an exploration of the extent to which cyber insurance fuels ransomware attacks.

Course duration Duration: 20 minutes

SaaS for Cyber Core Services: Are CISOs Tuned In?

Join Shobha Jagatpal in a discussion of the cloud, security, network operations, threat detection and response.

Course duration Duration: 25 minutes

Setting Realistic Cybersecurity Goals

Join Ankit Wasnik in a discussion about going back to the basics of building a successful cybersecurity program.

Course duration Duration: 20 minutes

Future of Security: Threats and Opportunities

Join Suraj Jayaraman explores the cybersecurity disaster recovery process.

Course duration Duration: 15 minutes

Incident Reporting & Threat Information Sharing

Dr. Debabrata Nayak of Ericsson, Dilip Panjwani of LTIMindtree and Sambasivan G of Tata Play explore cyberthreat information sharing and incident reporting requirements.

Course duration Duration: 30 minutes

Risk, Response and Recovery for Remote Endpoints

Join Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.

Course duration Duration: 20 minutes

Best Practices for Zero-Day Response & Assessment

Shane Hasert of ProcessUnity details strategies for efficient zero-day vulnerability response, including vendor ecosystem management and automated assessment campaigns for rapid threat mitigation.

Course duration Duration: 15 minutes

Gen AI & Cyber Mesh for Financial CISOs

Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.

Course duration Duration: 25 minutes

How Can We Build Stronger Incident Response Strategies

Join Jigar Kadakia, Matt Kiely and Monsurat Ottun in a lively discussion of building stronger incident response strategies, plans, and programs in the health sector.

Course duration Duration: 30 minutes

Incident Response, Are You in Control?

Mathias Fuchs will share proven strategies for managing large-scale incidents, including preparation, teamwork and integrating law enforcement efforts. Attendees will gain insights from years of experience, learning key lessons to navigate complex investigations successfully.

Course duration Duration: 35 minutes

Maintaining Operational Resilience During a Breach

Andreas Östrin and Thomas Bonello Zuliani will discuss the breach's impact, key response measures, and best practices for strengthening security and ensuring business continuity.

Course duration Duration: 30 minutes

Breach Management: CISO's Practical Approach & Response

Sachin Khalap and Shivani Arni discuss CISO strategies for breach management, reputation recovery, and cyber resilience. Learn how to handle post-breach response, mitigate risks, and safeguard customer data.

Course duration Duration: 40 minutes

Reducing the Financial Impact of Cyberattacks

Pierre-François Guglielmi, EMEA field CTO at Rubrik, explores strategic approaches to minimize financial damage from breaches, covering compromise detection, privilege escalation prevention and data mapping to reduce exposure risk.

Course duration Duration: 30 minutes

Securing Our ICS Systems

Abdulhakeem Al Alawi, Gopinath Kishorekumar, Dr. Ali Ismail Awad, Ahmed Al-Bahdoor and Keith Christie-Smith explore security-by-design approaches, vendor selection, zero trust architecture and easy wins to protect ICS systems.

Course duration Duration: 45 minutes

Cyber Lessons from Catalonia’s National Response

Ivan Monforte Fugarolas shares how human intelligence complements technical responses in crisis management, demonstrating through a hospital breach case study why communication specialists must be involved from "minute zero."

Course duration Duration: 30 minutes

Incident Response Readiness in the Cloud

Bhowmik Shah, CTO of CyberNX Technologies, addresses cloud-specific incident response challenges, forensic best practices and legal considerations for effective cloud security investigations.

Course duration Duration: 25 minutes

Advancing Incident Response in OT

James Brake, James Goosby, Chris Sistrunk and Amanda Bosco provide essential OT incident response guidance.

Course duration Duration: 1 hour

How to Prepare for & Recover From Cyberattacks

Andreas Bergqvist shares integrating security from code review through production using independent verification and crisis communication strategies.

Course duration Duration: 25 minutes

Incident Response & Recovery in Financial Services

Imran Ahmad and Ruth Promislow discuss how financial institutions can strengthen cyber resilience through defensible documentation, multi-jurisdictional compliance and cultural integration of security across business functions.

Course duration Duration: 35 minutes

The Advent of the OT SOC

WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.

Course duration Duration: 15 minutes

The True Potential of Web Race Conditions

James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.

Course duration Duration: 45 minutes

How I Hacked Your Bank Account

Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.

Course duration Duration: 25 minutes

Multiplying Threat Intelligence

John Lambert from Microsoft Security Research explores proactive threat detection strategies, advanced hunting techniques, and creative tactics for leveraging honeypot systems to enhance cybersecurity defenses.

Course duration Duration: 35 minutes

Protecting Financial Services in an Era of Cyber Turbulence

Industry leaders Matanda Doss, Susan Koski, William Beer and Paul Leonhirth discuss cloud adoption challenges, API security and AI-powered fraud detection in financial services cybersecurity.

Course duration Duration: 25 minutes

Eliminating Shared Password Risks in Manufacturing

Mohit Garg explores passwordless authentication strategies for manufacturing floors, addressing shared terminal challenges through RFID badges and biometric solutions that reduce IT costs, phishing risks and productivity losses.

Course duration Duration: 10 minutes

Mitigating Risk in Unmonitored Business Channels

SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.

Course duration Duration: 25 minutes

Mitigating the Evolving DDoS Threat Landscape

Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.

Course duration Duration: 10 minutes

Establishing Security in a Multi-Cloud Environment

Ali Abdulla Alsadadi shares insights on managing multi-cloud security. Learn about quantifying risks, tackling API complexities, integrating data, and building offensive strategies to mitigate risks in siloed multi-cloud environments.

Course duration Duration: 20 minutes

CISOs' Rebalancing Practices

Learn from Matthias Yeo, Mel Migrino, and Jenny Tan about tackling the cybersecurity talent crunch, building resilient offensive strategies, leveraging automation, and weaving cybersecurity accountability across business functions for enhanced defense.

Course duration Duration: 30 minutes

How Can CIOs Harness AI, Data, and Analytics

Join Khalid Nizami as he explores aligning digital technologies with business goals, adopting AI-driven innovations like generative AI, and addressing challenges in talent, skills, and governance to drive business transformation and growth.

Course duration Duration: 30 minutes

Digital Forensics in Modern Incident Response

Niels Renken of Magnet Forensics demonstrates remote evidence collection, MITRE ATT&CK framework integration, and workflow automation between EDR platforms and forensic tools to accelerate investigations across distributed endpoints.

Price
Course duration Duration: 25 minutes

How to Respond to a Targeted Cyberattack

Johan Huijgen of VEON shares lessons from responding to a nation-state attack on Kyivstar, covering session replay attacks, implementing Microsoft's three-tier access model and building user awareness against AI-powered threats.

Price
Course duration Duration: 15 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask Apollo a question?

Floating Button