Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Rocco Grillo, Kevin Li, and Parthiv Shah as they discuss incident response plans that work... and those that fail!
Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.
Join Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.
Business email compromise (BEC) attacks are increasingly used by attackers as a way of targeting organizations. According to Gartner, through 2023, BEC attacks will continue to double each year to over $5 billion and lead to large financial losses for enterprises.
Shane Hasert of ProcessUnity details strategies for efficient zero-day vulnerability response, including vendor ecosystem management and automated assessment campaigns for rapid threat mitigation.
Sachin Khalap and Shivani Arni discuss CISO strategies for breach management, reputation recovery, and cyber resilience. Learn how to handle post-breach response, mitigate risks, and safeguard customer data.
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.
Join Kelly Hood, EVP & Cybersecurity Engineer @ Optic Cyber Solutions as she explains the Cybersecurity Maturity Model Certification, or CMMC. Learn how to get certified today!
Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.
Join Deepika Mathur in an exploration of the extent to which cyber insurance fuels ransomware attacks.
Industry leaders Jeff Cornelius, Anthony Souza, Dean Macris and Blake Gilson share insights on cyberattack mitigation, recovery strategies and incident response based on past breach experiences.
Join Navin Mehra in an exploration of how the right strategy, platform and incident response plan can empower a cyber-resilient enterprise.
Join Suraj Jayaraman explores the cybersecurity disaster recovery process.
Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.
Join Jigar Kadakia, Matt Kiely and Monsurat Ottun in a lively discussion of building stronger incident response strategies, plans, and programs in the health sector.
Dr. Debabrata Nayak of Ericsson, Dilip Panjwani of LTIMindtree and Sambasivan G of Tata Play explore cyberthreat information sharing and incident reporting requirements.
Learn about strategic importance of SOCs and consider potential career paths within this essential domain.
"OT Attack!" is a hands-on tabletop simulating cyber-attacks on OT systems.
Join Shobha Jagatpal in a discussion of the cloud, security, network operations, threat detection and response.
Join Ankit Wasnik in a discussion about going back to the basics of building a successful cybersecurity program.
Sean Mack, Walker Newell, Paul Kurtz and David Anderson examine SEC cybersecurity enforcement post-SolarWinds and strategies for CISOs.
"The Perfect Storm" is an interactive team exercise for leadership, security leadership, IT, technical professionals, comms, legal and member support. Test your team's skills against relentless cyber threats!