Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Theresa Lanowitz reveals key findings from LevelBlue's 2024 research on healthcare cyber resilience, exploring barriers, priorities and strategic solutions for the evolving digital landscape.
SecurityGate's Ted Gutierrez presents three actionable tactics for enhancing cyber programs across OT, IT and IoT convergence.
Pierre Noel and Xandra Uth will explore the top cybercrime trends of the year, including AI-driven attacks, the impact of emerging technologies, the rise of hacktivism, and the growing complexity of phishing threats.
Join Nitin Dhavate, Navaneethan, and Arvind Sivaramakrishnan in a conversation about how to juxtapose privacy and security to achieve total compliance.
Sachin Seth of BSE Ebix examines how AI is revolutionizing IT operations and enhancing system monitoring capabilities.
Don Gibson, CISO of Kinly, shares insights on preventing burnout in cybersecurity teams and maintaining balance during periods of rapid transformation.
Snyk's Shilpa Raghunathan explores effective ways to identify malicious code and secure first-party code in supply chains using security-by-design principles.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Quest Software's Dilip George shares insights on treating AD as a critical application, risk assessment strategies, and best practices for maintaining compliance.
Oliver Keizers, area vice president EMEA Central at Semperis, will discuss why securing AD is essential and share insights from a real-world breach recovery.
Rick Kaun presents strategies for managing new regulations like NIS2 while strengthening baseline cybersecurity practices through real-world case studies.
Dr. Ram Kumar, Sreeni Venugopal and Sridhar Sidhu debate AI's role in cybersecurity leadership and risk management, exploring accountability and innovation balance.
Hugo Lai, Errol Weiss, Christopher Frenz and John Banghart explore comprehensive supply chain security strategies, from vendor assessments to medical device protection.
AI and ML in Cybersecurity explores the intersection of AI and cybersecurity in this comprehensive course designed for learners at all levels.
Cory Brennan and David Hoffman examine AI bias in healthcare, exploring ethical implications and strategies for ensuring fair, secure AI implementation.
Abhijit Chakravarty, Khushbu Jain, and Ritesh Bhatia discuss AI-powered cybersecurity, real-time threat detection, and future challenges. Learn how AI enhances security frameworks and mitigates cyber risks.
Join Julie Conroy as she shares insights from her latest research on fraud in the digital era. Explore emerging fraud trends, the increasing sophistication and speed of attacks, and the technologies and controls set to shape 2022's risk landscape.
Ganesh Narasimhadevara of Okta discusses implementing identity-first approaches in zero trust architectures.
PayPal's Phoram Mehta, Gojek's Aarthi Sureshkumar and Advance Intelligence Group's Shishir Kumar Singh discuss blockchain's role in securing cross-border payments and CBDC implementation.
Deval Mazmudar, Pawan Chawla, Abhishek Jha, and Sandesh Jadhav discuss API security challenges, breach prevention, and risk management. Learn how CISOs can balance API security with innovation in digital enterprises.
Dr. N Rajendran of MCX, Kiran Belsekar of Aegon, Rajat Sen of FS-ISAC and Apurva Dalal of Adani discuss API security challenges and risk management strategies.
Prof. Syed Munir Khasru shares insights on fostering business-IT collaboration, building enterprise-wide data strategies, and ensuring robust data governance. Learn how to optimize data use while safeguarding security and privacy in a data-driven world.
Forcepoint's Thejo Murthy discusses AI-driven data discovery, borderless architecture, and implementing risk-adaptive data protection strategies.
Join Romanus Prabhu Raymond in a conversation about expanding attack surfaces and cybersecurity strategies to protect endpoints.
Cisco's Samir Mishra explains strategies to reduce security complexity, enhance security posture, and implement AI-enabled solutions with zero trust.
Shane Hasert of ProcessUnity details strategies for efficient zero-day vulnerability response, including vendor ecosystem management and automated assessment campaigns for rapid threat mitigation.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
Arpan Jati reveals critical vulnerabilities in Xilinx's Zynq-7000 SoC platform, demonstrating RSA authentication bypass and encrypted bitstream recovery techniques that impact critical infrastructure security.
Dom Lucas of British International, Don Gibson of Kinly and Milos Pesic of ABB discuss strategic resource allocation and ROI maximization in cybersecurity investments.
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
Rick Kaun, VP solutions at Verve, shares practical strategies for building resilient OT security, offering insights on implementing effective security programs, proven strategies and efficiency gains in manufacturing environments.
Join Eric Anderson in an exploration of achieving the right balance between stringent security requirements and a seamless user experience.
Join a conversation with healthtech cybersecurity experts Phil Englert, Patty Ryan, Anahi Santiago and Luisa Soares de Brito in a conversation about managing hospital device security.
Jari Rasinen shares insights on ISO 27001, IEC 62443 and other industry standards, along with challenges faced and lessons learned. You will gain guidance on aligning multiple frameworks for a comprehensive security strategy.
Avangrid's Brian Harrell shares insights on translating cyber risks to board-level discussions and integrating security into business decisions.
Join Siba Narayan Panda, and Dr. N. Rajendran for an exploration of central bank digital currency (CBDC) and what it means for financial service organizations and their security practices.
Join Vijayakumar Chandrasekaran, Ashutosh Jain, Dr. Deepak Kalambkar, Dr. Ramesh Shanmuganathan, and Brijesh Singh in a discussion of the CERT-In Directives.
Join Rajeev Batra and Sumit Gupta in an exploration of ChatGPT’s potential, limitations and business use cases.
Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.
Explore the impact of GPT-4, -5, and beyond on cybersecurity. Sam Curry examines the dangers of generative AI in creating phishing emails and malware, while also highlighting its potential for threat hunting, hygiene automation, and compliance. Gain insights through real-world use cases and strengthen your defensive strategies.
Wahyu Agung Prasetyo, Thuraya Al-Harthi and Sujit Christy explore the evolving partnership between CIOs and CISOs in driving business enablement while maintaining robust cybersecurity.
Catch Nitin Natarajan's expert insights on healthcare cyberthreats and leveraging CISA’s expertise to bolster incident response and recovery capabilities.
Capt. Felix Mohan of CISO Cybersecurity addresses vulnerabilities in LLMs, focusing on security controls, ethical guidelines, and risk assessments.
Learn from Matthias Yeo, Mel Migrino, and Jenny Tan about tackling the cybersecurity talent crunch, building resilient offensive strategies, leveraging automation, and weaving cybersecurity accountability across business functions for enhanced defense.
Join Rajesh Hemrajani, Dilip Panjwani, Dharmesh Rathod, and Nandkumar Saravade in a lively discussion of cloud security.
Emilio Soresi, security manager at Posti Group Oyj, will explore how collaboration and communication among stakeholders can enhance cyber resiliency and foster a culture of transparency.
Take practical, actionable steps to enhance the overall security posture of your financial service organization today!
Commanding the IT-OT Convergence is designed for leaders tasked with driving the secure convergence of IT and OT systems. Click continue to start!
Sean Blenkhorn from Axonius explains modern approaches to cybersecurity asset management in increasingly complex environments.
1 2 Next