We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

DynamicCISO Excellence Awards and Conference

Search

Clear Expand Collapse

Demystifying DPDP Act: What It Means to Security Leaders

Justice BN Srikrishna, former Supreme Court Judge and Data Protection Committee Chairman, explains the implications of India's Digital Personal Data Protection Act for security leaders.

Price
Course duration Duration: 15 minutes

Establishing Trust & Safety in AI Development

Snyk's Lawrence Crowther discusses security vulnerabilities in AI development, cloud security best practices, and AI's role in future cybersecurity developments.

Price
Course duration Duration: 25 minutes

IoT Risks: Tactics, Techniques and Procedures to Remediate

Panel featuring leaders Dhananjay Rokde, Jasbir Singh Solanki and Sujit Christy explore tactics and techniques for IoT/OT device security and risk remediation.

Price
Course duration Duration: 30 minutes

Establishing the Right Authentication & Authorization

Industry experts Ramesh Gurram, Sanjeev Kaushik and Mitish Chitnavis discuss API security standards, authentication mechanisms, and access control configurations.

Price
Course duration Duration: 25 minutes

Balancing Security and Customer Experience

Cisco's Samir Mishra explains strategies to reduce security complexity, enhance security posture, and implement AI-enabled solutions with zero trust.

Price
Course duration Duration: 25 minutes

Active Directory for Critical Infrastructure

Quest Software's Dilip George shares insights on treating AD as a critical application, risk assessment strategies, and best practices for maintaining compliance.

Price
Course duration Duration: 15 minutes

Is Ransomware Evolving? Best Strategies for Security Leaders

Industry leaders Jayant Gupta, Mihirr P Thaker and Saloni Vijay discuss data resilience, third-party SLAs, and AI-powered threat detection for ransomware defense.

Price
Course duration Duration: 30 minutes

Enhancing Advanced Threat Prevention with Multiscanning

OPSWAT's Manish Gautam explains implementing multiscanning techniques for enhanced threat detection and endpoint security in perimeterless environments.

Price
Course duration Duration: 15 minutes

CISO Challenges & Solutions in the Era of Generative AI

Capt. Felix Mohan of CISO Cybersecurity addresses vulnerabilities in LLMs, focusing on security controls, ethical guidelines, and risk assessments.

Price
Course duration Duration: 50 minutes

Combating Phishing Attacks With Modern Authentication

Alex Wilson of Yubico and Pranav Bhayani of iValue Group explore modern authentication methods and defense-in-depth strategies against phishing.

Price
Course duration Duration: 15 minutes

Establishing a DevSecOps Culture: The C-Suite Debate

Panelists Pramod Kumar Dubey, Pradipta Patro and Lalit Trivedi discuss C-suite priorities, tool integration, and automation in DevSecOps implementation.

Price
Course duration Duration: 25 minutes

Search

Clear

Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement