We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

CyberEd Essentials

Purchase Essentials

A Deep Dive Into AIOps & Its Impact on IT Operations

Sachin Seth of BSE Ebix examines how AI is revolutionizing IT operations and enhancing system monitoring capabilities.

Course duration Duration: 20 minutes

Raising the Game in AppSec

David Dechaux of Technip and Anthony Chiapello of Snyk share insights on implementing AppSec in a non-software company, addressing challenges across distributed teams, multiple languages and varying expertise levels.

Course duration Duration: 20 minutes

Reducing AI-Driven Social Engineering with Generative AI

Selim Houfani, Michael Bonhomme, Antoine Bajolet and Abdel Kander explore AI's dual role in social engineering attacks and defense strategies, including bug bounties and proactive measures.

Course duration Duration: 20 minutes

The True Potential of Web Race Conditions

James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.

Course duration Duration: 45 minutes

How I Hacked Your Bank Account

Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.

Course duration Duration: 25 minutes

MITM on PSTN

Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.

Course duration Duration: 30 minutes

Multiplying Threat Intelligence

John Lambert from Microsoft Security Research explores proactive threat detection strategies, advanced hunting techniques, and creative tactics for leveraging honeypot systems to enhance cybersecurity defenses.

Course duration Duration: 35 minutes

Uncovering Azure's Silent Threats

Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.

Course duration Duration: 50 minutes

What Does the Future Hold for AI in Cybersecurity?

Anders Thingholm and Jörgen Mellberg examine both the opportunities and risks of AI in cybersecurity, including AI-enabled cyberattacks and insider threats, while exploring how to harness AI's benefits and mitigate potential dangers.

Course duration Duration: 10 minutes

8 Cybercrime Trends to Watch Out For

Pierre Noel and Xandra Uth will explore the top cybercrime trends of the year, including AI-driven attacks, the impact of emerging technologies, the rise of hacktivism, and the growing complexity of phishing threats.

Course duration Duration: 25 minutes

Active Directory: "The Identity Immune System"

Oliver Keizers, area vice president EMEA Central at Semperis, will discuss why securing AD is essential and share insights from a real-world breach recovery.

Course duration Duration: 25 minutes

Building a Strong Security Program

Jari Rasinen shares insights on ISO 27001, IEC 62443 and other industry standards, along with challenges faced and lessons learned. You will gain guidance on aligning multiple frameworks for a comprehensive security strategy.

Course duration Duration: 25 minutes

Incident Response & Recovery in Financial Services

Imran Ahmad and Ruth Promislow discuss how financial institutions can strengthen cyber resilience through defensible documentation, multi-jurisdictional compliance and cultural integration of security across business functions.

Course duration Duration: 35 minutes

Collaboration & Communication

Emilio Soresi, security manager at Posti Group Oyj, will explore how collaboration and communication among stakeholders can enhance cyber resiliency and foster a culture of transparency.

Course duration Duration: 30 minutes

Cybersecurity as a Strategic Enabler Through Automation

Hazel Fitzgerald and Martin Clarke will discuss how automation can help organizations combat growing cybersecurity threats, mitigate risk and reduce tech debt.

Course duration Duration: 15 minutes

Cybersecurity in the Biotechnology Industry

Girish Agarwal and Markus Kluge share insights on the cyberthreats targeting the biotech industry, from R&D data to regulatory compliance, and best practices for protecting valuable intellectual property.

Course duration Duration: 25 minutes

Making Cybersecurity a Strategic Business Enabler

Sabrina Jensen explores how proactive security strategies build stakeholder confidence, enhance flexibility and contribute to resilient decision-making for long-term success.

Course duration Duration: 20 minutes

Managing Cybersecurity Risks

Tom John Fischer Jensen addresses the challenges of managing modern cybersecurity risks, focusing on how to measure, communicate and tackle them effectively.

Course duration Duration: 30 minutes

Managing Data Growth with Limited IT & Security Budgets

Andreas Aalberg will share how Cribl aims to solve the challenge of increasing data volume with stagnant IT budgets by providing an open, agnostic platform.

Course duration Duration: 10 minutes

NIS2 - An Industry Insider Perspective

Morten Kromann will discuss how the EU's NIS2 Directive will reshape cybersecurity in the Nordics and how to navigate its regulatory impact.

Course duration Duration: 30 minutes

One Company’s Gen AI Risk Policy

Jonas Rendahl will share insights on crafting an effective gen AI policy, overcoming challenges and mitigating risks tailored to different industries.

Course duration Duration: 30 minutes

Secure Coding Training

Yogeshwaran Sivasubramanian highlights the growing frequency of security breaches due to inadequate secure coding practices among developers.

Course duration Duration: 10 minutes

What Does a Culture of Cybersecurity Look Like?

German Fischer and Sarah Aalborg will share their experience of implementing a strong cybersecurity culture within their organization. You will learn what a positive security culture looks like and how to champion cybersecurity awareness.

Course duration Duration: 30 minutes

How Digital Forensics Will Enhance Your Investigation

Gavin Hornsey explores how to simplify internal and external threat investigations, enabling timely action.

Course duration Duration: 30 minutes

Maintaining Operational Resilience During a Breach

Andreas Östrin and Thomas Bonello Zuliani will discuss the breach's impact, key response measures, and best practices for strengthening security and ensuring business continuity.

Course duration Duration: 30 minutes

Learn How to Combat Adversaries

Mikkel Planck will share the latest insights from the frontline and reveal how adversaries are targeting organizations.

Course duration Duration: 30 minutes

How Should We Present Risk to the Board?

Lazar Petrov, Frederik Rune Nielsen, Søren Hansen and Antonio Martiradonna will share their strategies for effectively presenting risk to the board, ensuring key decision-makers fully understand the organization's risk level.

Course duration Duration: 40 minutes

How Can We Maximize Visibility to Fight Threats?

Humayun Khan, Siham Eisele, Teemu Ylhäisi and Jari Rasinenwill discuss how modern threats exploit visibility gaps and methods for real-time threat detection through data analysis and correlation.

Course duration Duration: 40 minutes

Why FinServ Cyber Pros Must Embrace Data-Centric Security

Trevor Foskett of Virtru explores military-grade encryption and data-centric protection strategies for financial services compliance and security.

Course duration Duration: 10 minutes

A Sit Down With the Former CISO of the City of New York

Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.

Course duration Duration: 30 minutes

ChatGPT: I, for One, Welcome Our New AI Overlords!

Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.

Course duration Duration: 35 minutes

Control Cybersecurity Complexity by Knowing Assets

Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.

Course duration Duration: 15 minutes

Gen AI & Cyber Mesh for Financial CISOs

Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.

Course duration Duration: 25 minutes

How to Prioritize, Measure and Convey It to the Board

Veracode CISO Sohail Iqbal provides guidance on prioritizing software security and effectively communicating metrics to board members.

Course duration Duration: 30 minutes

Navigating Cyberthreats in Financial Services

Fred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.

Course duration Duration: 30 minutes

Protecting Financial Services in an Era of Cyber Turbulence

Industry leaders Matanda Doss, Susan Koski, William Beer and Paul Leonhirth discuss cloud adoption challenges, API security and AI-powered fraud detection in financial services cybersecurity.

Course duration Duration: 25 minutes

Protecting Trust in a Changing World

Claire Le Gal, SVP at Mastercard, explores payment security evolution, cyber risk mitigation and fraud prevention strategies in an evolving digital landscape.

Course duration Duration: 25 minutes

Real-Time Attack Tracing and Automation in the SOC

David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.

Course duration Duration: 15 minutes

Reclaim Control Over Your Secrets

Stephen Johnson introduces Entro's Secrets Security Platform for managing secrets across vaults, source code and cloud environments.

Course duration Duration: 10 minutes

Modernizing Data Security & Compliance

Luke Babarinde of Imperva shares strategies for securing critical data assets and maintaining regulatory compliance across diverse environments.

Course duration Duration: 25 minutes

Mitigating the Evolving DDoS Threat Landscape

Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.

Course duration Duration: 10 minutes

Mitigating Risk in Unmonitored Business Channels

SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.

Course duration Duration: 25 minutes

Wartime CISO: From Battlefield to Boardroom

Joey Fontiveros, Acting Regiment Commander of the Philippines Army, shares insights on building cyber defense capabilities and countermeasures in an increasingly sophisticated threat landscape.

Course duration Duration: 35 minutes

Pivoting Technology From Cost Center to Revenue Generator

Discover how CIOs can position technology as a value creator and revenue generator with insights from Santosh Nair and Sourabh Chitrachar. Explore innovations for new revenue models, IT's role beyond enablement, and overcoming challenges in demonstrating IT's value.

Course duration Duration: 25 minutes

Integrating Cyber Risk Into Enterprise RMF

Learn from Frankie Shuai, Ken Soh, and Rishi Ganiswaran about aligning cyber risk with enterprise frameworks. Explore strategies for integrating cyber risks into decision-making, risk reporting, and effective mitigation within broader operational goals.

Course duration Duration: 30 minutes

Implementing Zero Trust for Resilient Business: CIO's Role

Join James Thang to explore zero trust’s business implications, challenges, and the CIO’s role. Learn how IT and security teams collaborate to balance security posture with user experience and align zero trust with business goals and risk tolerance.

Course duration Duration: 30 minutes

Hybrid Workplace: Fad or Future

Explore how CIOs empower hybrid workforces with insights from Anil Kumar Saha and Ivan Irawan. Learn about collaboration tools, evolving workforce needs, cybersecurity, and data-driven strategies for productivity and innovation in hybrid models.

Course duration Duration: 30 minutes

How to Operationalize Privacy in the Digital Era

Lt. Col. Francel Padilla-Taborlupa shares insights on privacy challenges CISOs face. Learn about compliance strategies, cross-team collaboration, and adapting privacy strategies to evolving regulations, AI, IoT, and rapid technological advancements.

Course duration Duration: 25 minutes

How Can CIOs Harness AI, Data, and Analytics

Join Khalid Nizami as he explores aligning digital technologies with business goals, adopting AI-driven innovations like generative AI, and addressing challenges in talent, skills, and governance to drive business transformation and growth.

Course duration Duration: 30 minutes

Gen AI: Impressive Enough to Be Dangerous

Learn from Gigi Mathew Thomas, Venkatesh Mahadevan, and Awais Ahmad about governance for generative AI, promoting responsible AI use, and enhancing security solutions to combat AI-enabled threats. Explore AI's potential and risks, including deepfakes and cyberattacks.

Course duration Duration: 35 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask CyberEd Learning Advisor a question?

Floating Button