We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

DynamicCISO Excellence Awards and Conference

Search

Clear Expand Collapse

Active Directory for Critical Infrastructure

Quest Software's Dilip George shares insights on treating AD as a critical application, risk assessment strategies, and best practices for maintaining compliance.

Price
Course duration Duration: 15 minutes

Balancing Security and Customer Experience

Cisco's Samir Mishra explains strategies to reduce security complexity, enhance security posture, and implement AI-enabled solutions with zero trust.

Price
Course duration Duration: 25 minutes

CISO Challenges & Solutions in the Era of Generative AI

Capt. Felix Mohan of CISO Cybersecurity addresses vulnerabilities in LLMs, focusing on security controls, ethical guidelines, and risk assessments.

Price
Course duration Duration: 50 minutes

Combating Phishing Attacks With Modern Authentication

Alex Wilson of Yubico and Pranav Bhayani of iValue Group explore modern authentication methods and defense-in-depth strategies against phishing.

Price
Course duration Duration: 15 minutes

Demystifying DPDP Act: What It Means to Security Leaders

Justice BN Srikrishna, former Supreme Court Judge and Data Protection Committee Chairman, explains the implications of India's Digital Personal Data Protection Act for security leaders.

Price
Course duration Duration: 15 minutes

Enhancing Advanced Threat Prevention with Multiscanning

OPSWAT's Manish Gautam explains implementing multiscanning techniques for enhanced threat detection and endpoint security in perimeterless environments.

Price
Course duration Duration: 15 minutes

Establishing a DevSecOps Culture: The C-Suite Debate

Panelists Pramod Kumar Dubey, Pradipta Patro and Lalit Trivedi discuss C-suite priorities, tool integration, and automation in DevSecOps implementation.

Price
Course duration Duration: 25 minutes

Establishing the Right Authentication & Authorization

Industry experts Ramesh Gurram, Sanjeev Kaushik and Mitish Chitnavis discuss API security standards, authentication mechanisms, and access control configurations.

Price
Course duration Duration: 25 minutes

Establishing Trust & Safety in AI Development

Snyk's Lawrence Crowther discusses security vulnerabilities in AI development, cloud security best practices, and AI's role in future cybersecurity developments.

Price
Course duration Duration: 25 minutes

IoT Risks: Tactics, Techniques and Procedures to Remediate

Panel featuring leaders Dhananjay Rokde, Jasbir Singh Solanki and Sujit Christy explore tactics and techniques for IoT/OT device security and risk remediation.

Price
Course duration Duration: 30 minutes

Is Ransomware Evolving? Best Strategies for Security Leaders

Industry leaders Jayant Gupta, Mihirr P Thaker and Saloni Vijay discuss data resilience, third-party SLAs, and AI-powered threat detection for ransomware defense.

Price
Course duration Duration: 30 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement