We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

CyberEd Free Trial

Cyber Insurance with Lynn Peachey

Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.

Course duration Duration: 2 hours, 47 min.

Cryptocurrency with Ari Redbord

Join Ari Redbord in an exploration of how TRM Labs aids law enforcement in tracking crypto fraud and financial crime. Learn about crypto's dual role as a tool for illicit actors and investigators, the challenges of noncompliant VAPs, and the need for regulation to enhance compliance and user safety.

Course duration Duration: 31 minutes

Demystifying Modern Fraud Attacks in Banking

Fang Yu explores the evolving tactics of fraudsters in online finance. This session covers popular banking fraud types, attack techniques, a detailed cash-out fraud case study, and how advanced technology can mitigate these threats effectively.

Course duration Duration: 30 minutes

Cybersecurity Mesh Architecture

Learn how to do more with less! Join Vishak Raman in a discussion of cybersecurity mesh architecture, designed to make security more composable and scalable.

Price
Course duration Duration: 15 minutes

Security Misconfiguration with Tal Kollender

Tal Kollender highlights how human errors and default settings lead to 80% of ransomware attacks. Discover the risks of manual remediation and how automation can reduce misconfigurations, shrinking the attack surface and enhancing network protection.

Course duration Duration: 27 minutes

Boosting Discovery & Visibility for Operational Resilience

Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.

Price
Course duration Duration: 25 minutes

Achieving Predictive Resilience With AI

Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.

Price
Course duration Duration: 35 minutes

Guarding Against AI's Expanded Threats

Nathan Swain of Binance, Max Kington of BNP and Surinder Lall of Paramount analyze AI-driven cyberthreats, from deepfakes to automated phishing, sharing real-world examples and practical defense strategies.

Price
Course duration Duration: 35 minutes

Harnessing AI in Cybersecurity

David Tsao, Nicole Ford and Suha Can share insights on integrating AI into security operations, addressing CISO challenges and developing risk mitigation strategies.

Price
Course duration Duration: 30 minutes

Wielding the Double-Edged Sword of AI

Jake Gillen of Expel shares insights on ethical AI decision-making in cybersecurity, regulatory challenges, and cross-industry collaboration against AI-enhanced threats.

Price
Course duration Duration: 30 minutes

Adapting to New Regulations While Improving OT Security

Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.

Price
Course duration Duration: 30 minutes

Proactive Security Posture Against Evolving Adversaries

La Monte Yarborough of HHS, Laura Deaner of Northwestern Mutual and Preston Miller of Palo Alto Networks discuss emerging threats, zero-day attacks and leveraging AI/ML for threat detection.

Price
Course duration Duration: 25 minutes

CISO Challenges & Solutions in the Era of Generative AI

Capt. Felix Mohan of CISO Cybersecurity addresses vulnerabilities in LLMs, focusing on security controls, ethical guidelines, and risk assessments.

Price
Course duration Duration: 50 minutes

CBDC: Security Risks and Response

Join Siba Narayan Panda, and Dr. N. Rajendran for an exploration of central bank digital currency (CBDC) and what it means for financial service organizations and their security practices.

Price
Course duration Duration: 25 minutes

CERT-In Directives - The Status Check

Join Vijayakumar Chandrasekaran, Ashutosh Jain, Dr. Deepak Kalambkar, Dr. Ramesh Shanmuganathan, and Brijesh Singh in a discussion of the CERT-In Directives.

Price
Course duration Duration: 30 minutes

ChatGPT: Going Beyond AI for Threat Detection

Join Rajeev Batra and Sumit Gupta in an exploration of ChatGPT’s potential, limitations and business use cases.

Price
Course duration Duration: 25 minutes

Cloud Security Lessons Learned

Join Rajesh Hemrajani, Dilip Panjwani, Dharmesh Rathod, and Nandkumar Saravade in a lively discussion of cloud security.

Price
Course duration Duration: 25 minutes

Balancing Agility & Cyber Resilience

Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.

Price
Course duration Duration: 25 minutes

Gen AI & Cyber Mesh for Financial CISOs

Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.

Price
Course duration Duration: 25 minutes

A Sit Down With the Former CISO of the City of New York

Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.

Price
Course duration Duration: 30 minutes

Active Directory: "The Identity Immune System"

Oliver Keizers, area vice president EMEA Central at Semperis, will discuss why securing AD is essential and share insights from a real-world breach recovery.

Price
Course duration Duration: 25 minutes

Raising the Game in AppSec

David Dechaux of Technip and Anthony Chiapello of Snyk share insights on implementing AppSec in a non-software company, addressing challenges across distributed teams, multiple languages and varying expertise levels.

Price
Course duration Duration: 20 minutes

Build Secure LLMs with the OWASP Top 10

Explore the OWASP Top 10 for LLM Applications!

Course duration Duration: 30 minutes

Building an AI-First Organization: Realistic or Hype?

Shishir Kumar Singh, Vinay Simha and Matthias Yeo discuss strategies for moving beyond AI pilot projects to full integration, aligning initiatives with strategic objectives and leveraging AI for sustainable innovation.

Price
Course duration Duration: 30 minutes

Building Stronger Defenses With AI

Mike Manrod, Andres Andreu and Phillip Davies explore integrating AI into daily security functions, data management for AI models and best practices for implementing AI within security architecture while maintaining scalability.

Price
Course duration Duration: 30 minutes

Collaborating With AI to Enhance Security

Arielle Baine and Mario Rivas explore how AI and human expertise complement each other in cybersecurity, covering the optimization of workflows that integrate AI tools with human intuition and training security teams to work effectively with AI.

Price
Course duration Duration: 25 minutes

Ethical AI in Cybersecurity

Jayant Narayan and Pedro Tavares examine ethical considerations in AI-powered cybersecurity, focusing on identifying and mitigating bias, enhancing transparency in AI models, and balancing robust security with privacy protection.

Price
Course duration Duration: 35 minutes

Integrating AI Into Cybersecurity Operations

Wan Roshaimi Bin Wan Abdullah discusses AI governance structures, unique security risks of AI-powered applications, and methods to implement AI across organizations to build cyber resiliency in today's rapidly evolving threat landscape.

Price
Course duration Duration: 30 minutes

Preparing Tech Infrastructure for Gen AI

John Chan and Aaron Hand discuss foundational infrastructure requirements for successful generative AI adoption, covering cloud computing resources, advanced security measures and strategies for addressing technology integration challenges.

Price
Course duration Duration: 35 minutes

Secure AI 2025: Lessons We've Learned

Dr. Anton Chuvakin of Google Cloud shares insights on securing AI in production environments, adversarial AI use, emerging governance best practices, agentic AI risks, and AI's impact on cybersecurity resilience in 2025 and beyond.

Price
Course duration Duration: 25 minutes

AI vs. AI: The Battle for Cybersecurity's Future

Tim Morris of Tanium explores the dual nature of AI in cybersecurity, from threat mitigation to real-time visibility, offering actionable strategies to harness AI responsibly and prepare for cybersecurity's evolving landscape.

Price
Course duration Duration: 30 minutes

AI-Powered Cyberattacks: Facing the Future of Threats

Todd Covert and Giles Douglas examine AI-enabled cyberthreats including deepfakes and autonomous malware, exploring how adversaries leverage AI for sophisticated attacks and discussing proactive strategies to counter these evolving threats.

Price
Course duration Duration: 20 minutes

Building an AI Governance Framework: Essential Steps

Charmaine Valmonte, Mario Demarillas and David Siah outline key steps for developing AI governance frameworks, covering responsible AI guidelines, appropriate human oversight and effective governance structures for deploying AI.

Price
Course duration Duration: 35 minutes

AI & Supercomputing: The Power of Duo Driving the Future of Tech

Sergio Gago and Eric Harris explore how supercomputing empowers AI development, accelerating scientific research and real-time analytics across industries while examining emerging technologies shaping this computational partnership.

Price
Course duration Duration: 40 minutes

Accelerating Scams & Deepfakes in the AI Era

Mel Migriño discusses the impact of deepfakes on information credibility, examining detection methods and defense strategies against AI weaponization. Learn to develop proactive crisis responses and use AI to assess deepfake risks.

Price
Course duration Duration: 30 minutes

The Future of Digital Identity in an AI-Powered World

Jeremy Grant and Dennis Gamiello explore how financial firms must embrace public key cryptography and digitally signed credentials to enhance verification and counter sophisticated AI-enabled identity attacks in an increasingly AI-powered world.

Price
Course duration Duration: 40 minutes

Solving the Supply Chain Security Puzzle Through AI

Sudhir Tiku and Abid Adam discuss AI-driven supply chain visibility, early vulnerability detection and frameworks for ensuring accountability in AI-based threat detection systems to address growing supply chain security challenges.

Price
Course duration Duration: 25 minutes

The Journey to Risk Management & Beyond

D Parthasarathy shares insights on transitioning from vulnerability management to comprehensive risk management, with a focus on building risk operations centers and implementing proactive security approaches.

Price
Course duration Duration: 20 minutes

How AI Continues to Change Cybersecurity

Soumya Datta, Bastin Robin and Sathyan Murugesan explore AI's cybersecurity transformation, discussing the unique security risks of AI applications, making AI ubiquitous for cyber resiliency, and redefining security practices.

Price
Course duration Duration: 25 minutes

Security Meets Convenience: Rise of Adaptive Access Controls

Ganesh Chellappa of ManageEngine explores how adaptive access controls use AI to balance security and user experience, discussing solutions beyond traditional measures and integrating AI into zero trust strategies.

Price
Course duration Duration: 20 minutes

IoT Cyberattack Response Strategies

Pragatheesh B and Utkarsh Sawant discuss strategies for addressing IoT vulnerabilities, leveraging AI and automation in threat response, and building resilience against future IoT attacks.

Price
Course duration Duration: 25 minutes

Identity-Based Zero Trust: A Use Case Perspective

Amruta Gawde, Bala Ramanan and Dr. Ram Kumar G share perspectives on contextual security, AI integration for authentication, and implementing zero trust access across hybrid environments.

Price
Course duration Duration: 35 minutes

Enterprise Security Challenges in Establishing Cyber Resilience

Deepak Kumar, IDRBT director, explores cyberthreats in India's banking sector, discussing digital risks, DPDP Act implications and strategies to strengthen cyber resilience in financial systems.

Price
Course duration Duration: 25 minutes

Challenges in Compliance & Cyber Resilience

Avneesh Pandey, CGM and CISO at SEBI, addresses complex compliance demands facing organizations, exploring automation strategies and risk-based approaches to enhance cyber resilience.

Price
Course duration Duration: 20 minutes

Get Ahead of Attacks With AI-Driven Security Analytics

Ravindra Ramnani from Elastic demonstrates how AI-powered security analytics accelerates threat detection and response, improving alert triage and investigations through automation.

Price
Course duration Duration: 25 minutes

Breach Accountability: CRO or CISO?

Urvish Acharya of Birla Carbon and Sriranga Narasimha of Reliance Industries debate breach accountability, examining AI-powered deepfakes, detection systems and proactive defense strategies against emerging threats.

Price
Course duration Duration: 25 minutes

Evolving Compliance in Finance: A CISO’s View

Ramesh Gurram, CISO at BSE India, examines securing modern payment rails against emerging threats like AI fraud and deepfakes while addressing regulatory challenges in fragmented financial ecosystems.

Price
Course duration Duration: 15 minutes

Zero Trust for OT Security: A Practical Use Case

Mini Sharma and Dr. Yusuf Hashmi discuss implementing zero trust for OT environments through continuous authentication, microsegmentation and real-time monitoring while ensuring operational continuity.

Price
Course duration Duration: 30 minutes

Application Security Trends 2025

Colin Bell of HCLSoftware explores AI-driven cybersecurity challenges including privacy concerns, data misuse and regulatory compliance, focusing on practical privacy-by-design implementation in AI systems.

Price
Course duration Duration: 20 minutes

Convergence of AI & Cybersecurity

Vinai Kumar Kanaujia of NSCS discusses integrating AI with cybersecurity policy frameworks that balance innovation, compliance and data privacy, while ensuring global collaboration against evolving threats.

Price
Course duration Duration: 20 minutes
Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement
Ask CyberEd Learning Advisor a question?

Floating Button