We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Supply Chain Security

Can You Outsource Your Cybersecurity Operations?

Samer Adi, IT Security Leader - CISO, Green Shield Canada; Chris Schweigert, Senior Director of Cybersecurity Operations, TrueBlue Inc.; and Hadas Cassorla, CISO, M1 Finance

Course duration Duration: 30 minutes

Is New U.S. National Cybersecurity Strategy Viable?

Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?

Course duration Duration: 25 minutes

Zero Trust, The DoD & You

Zero trust, supply chain security and DevSecOps.

Course duration Duration: 40 minutes

The Future of Ransomware & Evolving Attacks

Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.

Course duration Duration: 30 minutes

Third-Party Risk & Emerging Supply Chain Threats

Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.

Course duration Duration: 30 minutes

Supply Chain Attacks

JFrog's Prasanna Raghavendra discusses DevOps security intersection, AI/ML's role in detecting malicious code, and implementing security-by-design approaches for supply chain protection.

Course duration Duration: 30 minutes

A Modern Approach to Supply Chain Complexities

Snyk's Shilpa Raghunathan explores effective ways to identify malicious code and secure first-party code in supply chains using security-by-design principles.

Course duration Duration: 20 minutes

Evolving a Third-Party Risk Management Program

Join Anbu David, Mathan Babu Kasilingam, and Deval Mazmudar in an exploration of third party risk management.

Course duration Duration: 25 minutes

The Rising Complexities of Software Supply Chain

Venkatesh Vanjaku of CloudSEK discusses proactive measures for identifying and mitigating software supply chain risks in the modern digital ecosystem.

Course duration Duration: 15 minutes

Mitigating Modern Cyberthreats From Third Parties

Tai Alad of CyberGRX presents new approaches to third-party risk management using data-rich insights and modern monitoring capabilities.

Course duration Duration: 15 minutes

Advanced Supply Chain Risk Mitigation Strategies

Hugo Lai, Errol Weiss, Christopher Frenz and John Banghart explore comprehensive supply chain security strategies, from vendor assessments to medical device protection.

Course duration Duration: 30 minutes

Fault Injection and the Supply Chain

DirectDefense's Nolen Johnson and OSOM's Jan Altensen reveal critical vulnerabilities in Amlogic devices, demonstrating how fault injection attacks can compromise supply chain security through eMMC manipulation.

Course duration Duration: 35 minutes

Overcoming a Breach to Our Supply Chain’s Cybersecurity

Michel Harthoorn, Maurice Snoeren, Anton Shipulin, and Dave White discuss collaborative response strategies to supply chain attacks, focusing on risk management and regulatory compliance.

Course duration Duration: 35 minutes

Decoding the Future of Software Supply Chain

The transition from DevOps and CI/CD to cloud-native technologies, microservices architecture, security, and governance, and ultimately automation and artificial intelligence, necessitates a modern approach to software supply chain management.

Course duration Duration: 30 min.

Securing Electronics Supply Chains: Threats & Solutions

Dr. Basel Halak reveals the scale of hardware-level attacks in globally distributed electronic supply chains, demonstrating how physical unclonable functions with blockchain and AI-based monitoring can create tamper-resistant systems.

Course duration Duration: 25 minutes

Our Framework for Securing Our Supply Chains

Abdulhakeem Al Alawi shares a framework for managing supply chain risk, exploring standardized third-party risk management across supply chain participants, and discussing protection strategies against cyberattacks.

Course duration Duration: 25 minutes

Software Supply Chain Security

Abhisek Datta of SafeDep, Cassie Crossley of Schneider Electric and Sanjay Bahl of CERT-In address supply chain attacks, SBOM implementation, third-party component risks and global policy impacts.

Course duration Duration: 30 minutes

Our Strategy for Supply Chain Risk Management

Kashif Parvaiz demonstrates how to secure third-party relationships through procurement integration, risk assessment methods and evaluation approaches for healthcare and critical infrastructure.

Course duration Duration: 25 minutes

Supply Chain Attacks Are the New Backdoor Into Banks

John Nayagam and Don Gibson examine how financial institutions can move beyond compliance theater to risk-based supplier assessment while extending zero trust principles to third-party relationships.

Course duration Duration: 25 minutes

Lessons From the New Wave of Supply Chain Attacks

Imran Khan examines the latest supply chain attack tactics, revealing hidden vulnerabilities in vendor relationships and third-party dependencies that can lead to catastrophic breaches in financial services.

Course duration Duration: 25 minutes

The Advent of the OT SOC

WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.

Course duration Duration: 15 minutes

Accredited DevOps Foundation

Learn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.

Course duration Duration: 7 hours, 37 min.

Accredited DevOps Professional

Prepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.

Course duration Duration: 13 hours, 10 min.

Introduction to Programming Using Python

In this series, we are going to take a look at programming using the Python programming language. If you have tried to start before and just spun your wheels, then you should give it a try again.

Course duration Duration: 9 hours, 45 min.

The True Potential of Web Race Conditions

James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.

Course duration Duration: 45 minutes

MITM on PSTN

Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.

Course duration Duration: 30 minutes

Navigating Cyberthreats in Financial Services

Fred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.

Course duration Duration: 30 minutes

Control Cybersecurity Complexity by Knowing Assets

Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.

Course duration Duration: 15 minutes

Reclaim Control Over Your Secrets

Stephen Johnson introduces Entro's Secrets Security Platform for managing secrets across vaults, source code and cloud environments.

Course duration Duration: 10 minutes

Real-Time Attack Tracing and Automation in the SOC

David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.

Course duration Duration: 15 minutes

Protecting Trust in a Changing World

Claire Le Gal, SVP at Mastercard, explores payment security evolution, cyber risk mitigation and fraud prevention strategies in an evolving digital landscape.

Course duration Duration: 25 minutes

Wartime CISO: From Battlefield to Boardroom

Joey Fontiveros, Acting Regiment Commander of the Philippines Army, shares insights on building cyber defense capabilities and countermeasures in an increasingly sophisticated threat landscape.

Course duration Duration: 35 minutes

Conquering Software Supply Chain Insecurities

Learn from Christophe Barel about securing supply chains, adopting shift-left strategies, and managing open-source risks. Explore frameworks for secure coding, automated security-by-design, and faster detection and remediation of supply chain attacks.

Course duration Duration: 25 minutes

Balancing Agility & Cyber Resilience

Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.

Course duration Duration: 25 minutes

How Can CIOs Harness AI, Data, and Analytics

Join Khalid Nizami as he explores aligning digital technologies with business goals, adopting AI-driven innovations like generative AI, and addressing challenges in talent, skills, and governance to drive business transformation and growth.

Course duration Duration: 30 minutes

The Online Supply Chain Behind Trillion-Dollar Fraud

Nico Martinez and Jan Indra of Resistant AI discuss how openly accessible template farms sell forged documents at scale, how AI-powered forgery and data breaches challenge fraud controls, and how to combat industrialized document fraud.

Course duration Duration: 30 minutes

Implementing Zero Trust for Resilient Business: CIO's Role

Join James Thang to explore zero trust’s business implications, challenges, and the CIO’s role. Learn how IT and security teams collaborate to balance security posture with user experience and align zero trust with business goals and risk tolerance.

Course duration Duration: 30 minutes

Strengthening Cyber Resilience Across Your Supply Network

Muyiwa Olufon, Pieter Van Goethem and Fred Pintchman share insights on mapping suppliers to business processes for priority-based risk assessment, using retrieval-augmented AI to harvest audit rights and balancing operational efficiency.

Price
Course duration Duration: 25 minutes

Supply Chain Management Lifecycle

Singuyen Vo explores continuous life cycle vigilance for OT supply chain risk management. He discusses threat-informed vetting, SBOM documentation and behavioral monitoring during operations.

Course duration Duration: 30 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask Apollo a question?

Floating Button