Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Andy Condliffe, Lead Sales Engineer, Orca Security, and learn how about how Orca offers a single integrated platform to detect security risks at every layer of the cloud estate.
Join our AI guide in this course about OWASP Top 10 for Large Language Models (LLMs) and learn all about the critical vulnerabilities that must be considered when building applications leveraging LLMs.
Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable, LLP and Coordinator, Better Identity Coalition and explore Identity Access Management today!
Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Digital payments and digital transformation have much in common. Both have undergone revolutionary changes in condensed periods, and both have indelibly changed their respective landscapes.
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
Learn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
Based on AXELOS M_o_R® material. Learn to identify, assess, and control risks. Build effective risk management frameworks. Access requires an exam voucher.
Learn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Prepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
Dive into OWASP's component related cybersecurity concerns, risk mitigation strategies and pro tips!
Embark on your cybersecurity journey with Cybersecurity Fundamentals, a course designed for those new to the field. This course prepares you for the ISC2 Certified in Cybersecurity (CC) exam
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.
In the US, NIST is the de-facto standard for security, compliance and privacy. If you are doing business with the US federal government, manage critical infrastructure, or maintain personally identifiable information (PII), you must be compliant with NIST standards. NIST provides the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) to guide organizations on securing their infrastructure, systems, and data.
Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Lance Moraitis-Jones from Recorded Future delves into automated threat profiling implementation, exploring dynamic prioritization methods and practical strategies for enhancing organizational security.
Join Prof. D Janakiram in a discussion of securing the digital transactional ecosystem.
Join Sharda Tickoo in a discussion of the defender's advantage in dealings with evolving attack surfaces.
Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
Dave Johnson of Expel discusses integrating risk and security practices, focusing on lessons from SolarWinds and strategies for effective cross-functional communication.
Jason Pope of Rubrik, Chris Holden of Crum & Forster, David Anderson of Woodruff Sawyer and Fred Harris of Citi explore vendor risk frameworks and monitoring strategies.
Fred Harris of Citi, Jagathi Gade of Square and David Sheidlower of Turner Construction share strategies for unifying fraud, cyber and tech risk approaches.
Panel featuring leaders Bemi Anjous, Jon Taylor, Ken Dohan and Nikolai Zlatarev discuss balancing security measures with operational efficiency.
Avangrid's Brian Harrell shares insights on translating cyber risks to board-level discussions and integrating security into business decisions.
Squalify's Asdrúbal Pichardo discusses cyber risk quantification and methods to communicate potential financial losses to C-suite executives.
Join Rajesh Hemrajani, Dilip Panjwani, Dharmesh Rathod, and Nandkumar Saravade in a lively discussion of cloud security.
Join Debashish Jyotiprakash in a discussion of the CISOs role establishing business and cyber resilience across functions.
Join Deepika Mathur in an exploration of the extent to which cyber insurance fuels ransomware attacks.
Synopsys's Girish Nanappa explores application security posture management for securing enterprise applications at scale in AI-fueled environments.
Join Anbu David, Mathan Babu Kasilingam, and Deval Mazmudar in an exploration of third party risk management.
Join Shobha Jagatpal in a discussion of the cloud, security, network operations, threat detection and response.
Join Sudip Banerjee for a discussion about zero-trust strategy and implementation.
Join Dr. Lopa Mudraa Basuu and Anuj Bhansali in an exploration of payment fraud and defense.
Join Ankit Wasnik in a discussion about going back to the basics of building a successful cybersecurity program.
Join Michael Bray, Joshua Hillsbery, Sean Murphy and Scott Roberts, in a conversation of share their perspectives on what lies ahead for the "modern" CISO.
Join Theresa Lanowitz in a discussion of healthtech, edge computing, and cybersecurity on the edge.
Join John Fahey in a discussion of how to detect threats in healthcare networks early in the kill chain.
Amol Deshpande of RPG Group and Bharat Panchal of Discover Financial Services analyze cyber insurance trends, coverage scenarios and future landscape.
Sreeji Gopinathan and Sammit Potdar of Lupin explore approaches to quantifying cyber risk beyond technology and automation.
Join Dr. David Isiavwe and Kenneth Palliam in a conversation about the the importance of cybersecurity resilience in the financial sector.
Join Anne Coulombe, Rick Doten, and Jigar Kadakia in a lively discussion about managing cybersecurity in healthcare on a budget.
Expert panel of CISOs, David Anderson, Michael Prakhye, Patty Ryan and Anahi Santiago discuss how to turn the Board into a Healthcare cybersecurity ally.
Join Bryan Chnowski and Daniel King in a high level, strategic discussion of securing resources healthcare cybersecurity professionals need to thrive.
Trish McGill, Gregory Blezard MBE and Marta Majtenyi explore strategies to promote human-centric cybersecurity while protecting against burnout. Session addresses communication, training, and building positive digital culture across organizations.
Dominic Storey from Tenable explores practical solutions for managing cyber risk in CPS environments, addressing architecture complexities and real-time performance requirements.
Gregory Blezard, head of BISO at ScottishPower Renewables, explores how systems thinking revolutionizes cybersecurity risk management.
1 2 3 Next