We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

FranSec

Search

Clear Expand Collapse

Reducing AI-Driven Social Engineering with Generative AI

Selim Houfani, Michael Bonhomme, Antoine Bajolet and Abdel Kander explore AI's dual role in social engineering attacks and defense strategies, including bug bounties and proactive measures.

Price
Course duration Duration: 20 minutes

Raising the Game in AppSec

David Dechaux of Technip and Anthony Chiapello of Snyk share insights on implementing AppSec in a non-software company, addressing challenges across distributed teams, multiple languages and varying expertise levels.

Price
Course duration Duration: 20 minutes

Integrating Security Into IT Projects

Gaetan Labat shares cost-effective strategies for embedding security into projects, covering early visibility techniques, risk prioritization, streamlined documentation and practical acceptance procedures.

Course duration Duration: 25 minutes

Reducing the Financial Impact of Cyberattacks

Pierre-François Guglielmi, EMEA field CTO at Rubrik, explores strategic approaches to minimize financial damage from breaches, covering compromise detection, privilege escalation prevention and data mapping to reduce exposure risk.

Course duration Duration: 30 minutes

Pentesting: Lessons in Tactical Intrusions

Christophe Seigneur of Toray Carbon Fibers Europe shares insights from implementing a pragmatic pentesting program at Toray Industries, covering strategic communication, quick wins and SOC/EDR effectiveness evaluation.

Course duration Duration: 35 minutes

Managing Data Growth with Limited IT Budgets

Matthieu Rouvre, regional sales manager at Cribl, explores practical approaches to managing growing data volumes despite budget constraints, covering agent consolidation, cost-effective retention and avoiding vendor lock-in.

Course duration Duration: 10 minutes

Using Bug Bounty

Sebastien Lecocq, director of Cyber Security at Decathlon Digital, examines how organizations can effectively implement bug bounty programs to enhance security through ethical hacking and continuous testing.

Course duration Duration: 15 minutes

Enhancing Your SOC Model with a Systematic Approach

Thomas Billaut, head of cyber operations at FORVIA, challenges traditional SOC structures, examining four critical areas: addressing root causes, connecting expertise silos, aligning with business priorities and preventing burnout.

Course duration Duration: 25 minutes

Search

Clear

Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement