Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Andy Condliffe, Lead Sales Engineer, Orca Security, and learn how about how Orca offers a single integrated platform to detect security risks at every layer of the cloud estate.
Join our AI guide in this course about OWASP Top 10 for Large Language Models (LLMs) and learn all about the critical vulnerabilities that must be considered when building applications leveraging LLMs.
Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable, LLP and Coordinator, Better Identity Coalition and explore Identity Access Management today!
Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Digital payments and digital transformation have much in common. Both have undergone revolutionary changes in condensed periods, and both have indelibly changed their respective landscapes.
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
Learn about taming ICS and OT cyber threats to implement more secure cybersecurity risk management strategies today!
This course emphasizes practical, actionable steps for any financial services institution's technical defenders to utilize in defense against ransomware.
"The Perfect Storm" is an interactive team exercise for leadership, security leadership, IT, technical professionals, comms, legal and member support. Test your team's skills against relentless cyber threats!
Take practical, actionable steps to enhance the overall security posture of your financial service organization today!
Learn about the strategic role leaders play in fostering a secure culture and protecting organizations from social engineering and insider threat cybersecurity risks.
Every financial sector business professional should know the basics of social engineering and insider threat risks. Learn some cybersecurity best practices to keep your organization safe!
Expand your third party vendor and supply chain cybersecurity leadership skills and drive better business impact, for your business today!
Learn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
Based on AXELOS M_o_R® material. Learn to identify, assess, and control risks. Build effective risk management frameworks. Access requires an exam voucher.
Learn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Prepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
Dive into OWASP's server-side request forgery cybersecurity concerns, risk mitigation strategies and pro tips!
Dive into OWASP's logging or monitoring related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's integrity related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's injection related cybersecurity concerns, risk mitigation strategies and pro tips!
Dive into OWASP's identification or authentication related cybersecurity concerns, risk mitigation strategies and pro tips!
Dive into OWASP's component related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's broken access control related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's design related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's encryption related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's misconfiguration related cybersecurity concerns, risk mitigation strategies and pro tips!
The OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!
Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.
Learn about strategic importance of SOCs and consider potential career paths within this essential domain.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Lance Moraitis-Jones from Recorded Future delves into automated threat profiling implementation, exploring dynamic prioritization methods and practical strategies for enhancing organizational security.
Every financial sector business professional should know the basics of third-party vendor and supply chain cybersecurity risk. Learn some cybersecurity best practices to keep your organization safe!
Join Prof. D Janakiram in a discussion of securing the digital transactional ecosystem.
Join Sharda Tickoo in a discussion of the defender's advantage in dealings with evolving attack surfaces.
Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
Dave Johnson of Expel discusses integrating risk and security practices, focusing on lessons from SolarWinds and strategies for effective cross-functional communication.
Jason Pope of Rubrik, Chris Holden of Crum & Forster, David Anderson of Woodruff Sawyer and Fred Harris of Citi explore vendor risk frameworks and monitoring strategies.
Fred Harris of Citi, Jagathi Gade of Square and David Sheidlower of Turner Construction share strategies for unifying fraud, cyber and tech risk approaches.
Panel featuring leaders Bemi Anjous, Jon Taylor, Ken Dohan and Nikolai Zlatarev discuss balancing security measures with operational efficiency.
Avangrid's Brian Harrell shares insights on translating cyber risks to board-level discussions and integrating security into business decisions.
Squalify's Asdrúbal Pichardo discusses cyber risk quantification and methods to communicate potential financial losses to C-suite executives.
Join Rajesh Hemrajani, Dilip Panjwani, Dharmesh Rathod, and Nandkumar Saravade in a lively discussion of cloud security.
Join Debashish Jyotiprakash in a discussion of the CISOs role establishing business and cyber resilience across functions.
1 2 Next