We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About CyberEd.io
    Who We AreOur ValuesChallenges We Solve
    Community
    Information Security Media GroupCyberEdBoardAdvisory Board
    Innovation
    Our MethodologyAI-Powered TrainingEnterprise Integration
  • Training Solutions
    On-Demand
    Security Insights LibraryIndustry-BasedRole-BasedMasterclasses
    Hands-On
    Cyber Capability PlatformSkill PathwaysLab EnvironmentsCapture the Flag
    Live & Instructor-Led
    Instructor-Led ExperiencesLive WorkshopsTabletop ExercisesCrisis Simulations
  • Security Insights Library
    Sectors
    Financial ServicesHealthcareManufacturingPaymentsLegalDefenseComms and Media
    On-Demand Topics
    Artificial Intelligence (AI) in SecurityCloud SecurityIncident ResponseForensics and Malware AnalysisThreat Intelligence & Threat HuntingGovernance, Risk & Compliance (GRC)Software Supply Chain Security
    Event Topics
    AI Security (Adversarial AI & Defense)Bug HuntingHardware & Embedded SecurityDevice SecurityOperational Technology (OT) SecurityPlatform SecurityResearch and Vulnerabilities
  • Resources
  • Contact
  • Login
  • About
    About CyberEd.io
    Who We AreOur ValuesChallenges We Solve
    Community
    Information Security Media GroupCyberEdBoardAdvisory Board
    Innovation
    Our MethodologyAI-Powered TrainingEnterprise Integration
  • Training Solutions
    On-Demand
    Security Insights LibraryIndustry-BasedRole-BasedMasterclasses
    Hands-On
    Cyber Capability PlatformSkill PathwaysLab EnvironmentsCapture the Flag
    Live & Instructor-Led
    Instructor-Led ExperiencesLive WorkshopsTabletop ExercisesCrisis Simulations
  • Security Insights Library
    Sectors
    Financial ServicesHealthcareManufacturingPaymentsLegalDefenseComms and Media
    On-Demand Topics
    Artificial Intelligence (AI) in SecurityCloud SecurityIncident ResponseForensics and Malware AnalysisThreat Intelligence & Threat HuntingGovernance, Risk & Compliance (GRC)Software Supply Chain Security
    Event Topics
    AI Security (Adversarial AI & Defense)Bug HuntingHardware & Embedded SecurityDevice SecurityOperational Technology (OT) SecurityPlatform SecurityResearch and Vulnerabilities
  • Resources
  • Contact
  • Login
Back

Preview

Securing Legacy Systems Across the IT-OT Divide

Dino DiMarino and Dan Hewitt of Tenable examine how real-world OT breaches highlight the need for holistic exposure management across converged IT/OT environments, from asset visibility to identity governance.

Price
Course duration Duration: 30 minutes

AI in Financial Services: Separating Hype From Reality

Moriah Hara and Hardik Mehta explore practical AI implementation in financial services, cutting through industry hype to reveal real-world applications, risk management strategies and governance frameworks that protect institutions.

Price
Course duration Duration: 20 minutes

Lessons Learned in Secure Remote Access

Ronald Chan of Aboitiz Power Corporation shares practical lessons from deploying a unified secure remote access framework across a major energy operator's OT network, from zero-trust principles to cultural change.

Price
Course duration Duration: 20 minutes

Practical Frameworks for AI Deployment and Oversight

ISMG's Sean D. Mack walks through the NIST AI RMF's four-pillar model - Govern, Map, Measure and Manage - to help organizations at any maturity level tackle real-world AI governance failures head-on.

Price
Course duration Duration: 25 minutes

Securing Outdated Hospital Operational Technology

Chris Christensen of Honeywell addresses legacy building systems vulnerabilities, common attack vectors against hospital systems, IT-OT collaboration strategies and defense-in-depth frameworks using NIST standards.

Price
Course duration Duration: 30 minutes

Securing the 80% of Data Most Organizations Overlook

Aaron Jensen reveals critical vulnerabilities in non-production environments most organizations overlook and shares strategies to secure test, development and backup data containing sensitive information.

Price
Course duration Duration: 30 minutes

Securing Factories & Remote Access Systems

Hitesh Chhabra of Zscaler examines how zero trust principles - privileged remote access, east-west segmentation and OT deception - can replace VPN-based architectures and reduce the attack surface in manufacturing environments.

Price
Course duration Duration: 30 minutes
Information Security Media Group

CyberEd.io, the education division of ISMG, is the AI-native cyber capability platform that helps organizations build, measure, and continuously improve cybersecurity readiness across their workforce.

About
  • About CyberEd.io
  • About ISMG
  • Contact Us
Training Solutions
  • Security Insights Library
  • Cyber Capability Platform
  • Instructor-Led Experiences
Enterprise
  • Managed Services
  • Custom Training
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io About ISMG Privacy & GDPR Statement
Ask CyberEd Learning Advisor a question?

Floating Button