Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Join Andy Condliffe, Lead Sales Engineer, Orca Security, and learn how about how Orca offers a single integrated platform to detect security risks at every layer of the cloud estate.
Learn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Prepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
Based on AXELOS M_o_R® material. Learn to identify, assess, and control risks. Build effective risk management frameworks. Access requires an exam voucher.
Learn practical Risk Management. Explore case studies and exercises. Prepare for the Management of Risk® Practitioner exam.
Learn VeriSM™ to implement digital transformation. Adapt the Management Mesh and guide products through lifecycle stages. Prepare for the VeriSM™ certification exam.
Learn to implement VeriSM™ for digital transformation. Understand the impact on teams and stakeholders. Create and adapt the Management Mesh. Prepare for the VeriSM™ Professional certification.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
Avangrid's Brian Harrell shares insights on translating cyber risks to board-level discussions and integrating security into business decisions.
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination.
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
Join Rajesh Hemrajani, Dilip Panjwani, Dharmesh Rathod, and Nandkumar Saravade in a lively discussion of cloud security.
Take practical, actionable steps to enhance the overall security posture of your financial service organization today!
The ISACA Certified in Risk and Information Systems Control certification is one of the top risk management certifications in the world. This course will help prepare you to be acknowledged as a Risk Management expert.
Amol Deshpande of RPG Group and Bharat Panchal of Discover Financial Services analyze cyber insurance trends, coverage scenarios and future landscape.
Join Deepika Mathur in an exploration of the extent to which cyber insurance fuels ransomware attacks.
Sreeji Gopinathan and Sammit Potdar of Lupin explore approaches to quantifying cyber risk beyond technology and automation.
Join Anne Coulombe, Rick Doten, and Jigar Kadakia in a lively discussion about managing cybersecurity in healthcare on a budget.
Join Dr. David Isiavwe and Kenneth Palliam in a conversation about the the importance of cybersecurity resilience in the financial sector.
Join Sharda Tickoo in a discussion of the defender's advantage in dealings with evolving attack surfaces.
This course emphasizes practical, actionable steps for any financial services institution's technical defenders to utilize in defense against ransomware.
Royal Caribbean's Jason Stockinger shares leadership strategies for aligning cybersecurity with business priorities in Fortune 500 companies.
MITRE Labs' Mark Bristow discusses current threat landscape and strategies for efficiently reducing risks to critical infrastructure.
Fred Harris of Citi, Jagathi Gade of Square and David Sheidlower of Turner Construction share strategies for unifying fraud, cyber and tech risk approaches.
Trish McGill, Gregory Blezard MBE and Marta Majtenyi explore strategies to promote human-centric cybersecurity while protecting against burnout. Session addresses communication, training, and building positive digital culture across organizations.
Synopsys's Girish Nanappa explores application security posture management for securing enterprise applications at scale in AI-fueled environments.
Join Anbu David, Mathan Babu Kasilingam, and Deval Mazmudar in an exploration of third party risk management.
Implement stronger third party vendor and supply chain cybersecurity risk mitigation tactics today!
Digital payments and digital transformation have much in common. Both have undergone revolutionary changes in condensed periods, and both have indelibly changed their respective landscapes.
Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
Gregory Blezard, head of BISO at ScottishPower Renewables, explores how systems thinking revolutionizes cybersecurity risk management.
Join Jeremy Grant, Managing Director, Technology Business Strategy, Venable, LLP and Coordinator, Better Identity Coalition and explore Identity Access Management today!
Join Sudip Banerjee for a discussion about zero-trust strategy and implementation.
Every financial sector business professional should know the basics of third-party vendor and supply chain cybersecurity risk. Learn some cybersecurity best practices to keep your organization safe!
Explore the principles of malware analysis and set up your own malware analysis lab!
The OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!
Dive into OWASP's identification or authentication related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's broken access control related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's encryption related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's integrity related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's injection related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's design related cybersecurity concerns, risk mitigation strategies and pro tips!
Dive into OWASP's component related cybersecurity concerns, risk mitigation strategies and pro tips!
Dive into OWASP's logging or monitoring related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's misconfiguration related cybersecurity concerns, risk mitigation strategies and pro tips!
Dive into OWASP's server-side request forgery cybersecurity concerns, risk mitigation strategies and pro tips!
Every financial sector business professional should know the basics of social engineering and insider threat risks. Learn some cybersecurity best practices to keep your organization safe!
Learn about strategic importance of SOCs and consider potential career paths within this essential domain.
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
1 2 Next