We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

CS4CA Canada

Search

Clear Expand Collapse

An OT Cyberattack Simulation on a Chemical Plant

Prashant Prashant and Rajat Kumar Kundu demonstrate realistic cyberattack simulation using Graphic Realism Framework, showing how attackers exploit vulnerabilities in industrial control systems.

Price
Course duration Duration: 1 hour, 10 minutes

Applying Mandiant's M-Trends Insights to Modern Defenses

Josh Iroko shares Mandiant's latest threat intelligence on exploit vectors, advanced persistent threat techniques and cloud misconfigurations requiring targeted monitoring approaches.

Price
Course duration Duration: 25 minutes

Balancing Innovation With Security & Human-Centric Care

Ramzi Naouali explores security-by-design principles, human-centric AI approaches and policy frameworks balancing innovation with regulatory compliance in healthcare AI implementation.

Price
Course duration Duration: 15 minutes

Consequence-Driven Cybersecurity

Anirban Ghosh of Black & Veatch explores shifting from vulnerability management to consequence-driven cybersecurity, covering all-vector protection, process safety integration and holistic approaches for critical infrastructure.

Price
Course duration Duration: 25 minutes

Digital Chaos Engineering

Brendan Clace presents a practical framework for high-functioning remote cybersecurity teams, covering communication optimization, collaboration methods and recognition systems.

Price
Course duration Duration: 25 minutes

Ensuring Security in the Face of Increasing IT-OT Convergence

Anton Kouznetsov explores risk-based approaches for converged environments, building collaborative IT-OT relationships and lessons from real-world critical infrastructure deployments.

Price
Course duration Duration: 35 minutes

Guidelines for Safe and Secure AI Implementation

Michael Schwab outlines AI governance frameworks for government entities, covering data accountability, human-in-the-loop requirements and executive support for enterprise AI programs.

Price
Course duration Duration: 25 minutes

How Can We Develop the CISOs of Tomorrow?

Leonardo Ovidio, Bernadette Silva-Nguyen, Kashif Parvaiz and Shelly Davidson discuss business acumen, stakeholder management and talent development for future cybersecurity leaders.

Price
Course duration Duration: 40 minutes

Insights Into Canada's Threat Landscape From 2025 & Beyond

Richard Larose analyzes sophisticated state-sponsored actors like Volt Typhoon, ransomware's impact on essential services, and exploitation of edge devices for cyberwarfare positioning.

Price
Course duration Duration: 30 minutes

Level-Up Your Cyber Resilience Effectively

Chris Johnson presents a four-phase framework for building OT cyber resilience, covering threat landscapes, regulatory requirements and implementation strategies for critical infrastructure sectors.

Price
Course duration Duration: 15 minutes

Motivating Teams Amid a Growing Threat Landscape

Brendan Clace, Henry Bosch and Leonardo Ovidio address cybersecurity's mental health crisis, sharing strategies for preventing burnout, maintaining morale and creating psychological safety.

Price
Course duration Duration: 40 minutes

Our Adventures With AI-Advanced Control

Mark Brosseau shares real-world experiences implementing reinforcement learning AI for industrial control, covering practical strategies, cybersecurity considerations and future implications.

Price
Course duration Duration: 25 minutes

Our Strategy for Supply Chain Risk Management

Kashif Parvaiz demonstrates how to secure third-party relationships through procurement integration, risk assessment methods and evaluation approaches for healthcare and critical infrastructure.

Price
Course duration Duration: 25 minutes

Ransomware With Gen AI

Craig Seidler examines how generative AI transforms ransomware tactics through deepfake social engineering, polymorphic malware and AI agent hijacking for sophisticated attacks.

Price
Course duration Duration: 30 minutes

Securing Digital Transformation: Frontline Strategies

Amogh Bhosle shares real-world insights from pharmaceutical smart factory transformation, covering cyberthreats, patch management and workforce training for digitalized operations.

Price
Course duration Duration: 15 minutes

Strengthening OT Security Beyond Bill C-26

Keith Lawson, Roger Dery, Richard Larose, Renny Kochubaby and Martin Laberge discuss Bill C-26's status, regulatory frameworks and OT scope definitions for critical infrastructure.

Price
Course duration Duration: 30 minutes

The Hidden Threat in the Cloud: The Real Impact of Bots

Manolito Liwanag and Lina Dabit reveal how AI-driven bots weaponize networks for disinformation, conduct sophisticated attacks and target healthcare data for dark market sales.

Price
Course duration Duration: 25 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement