Search Training Library


Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Cyber-Physical Systems and IoT Devices

Ron Ross - National Institute of Standards and Technology (NIST)  •  In Development • 

Monitor and Identify Malicious Threat Before they Cripple your Organization

Dave Martin - Open Systems  •  November 16, 2030 @ 12:00 AM (EST) •  Available Exclusively for Premium Members • 

Why SOCs Fail - The Maturity Model Required for Cyber Resilience

Scott Gillis, District Sales Manager, Exabeam - District Sales Manager, Exabeam  •  Available Exclusively for Premium Members • 

How to Manage Your Two Biggest Risks: Cybersecurity & Third Parties

Sandeep Bhide, VP of Product Management, ProcessUnity - VP of Product Management, ProcessUnity, Chris Frenz - Mount Sinai South Nassau  •  Available Exclusively for Premium Members • 

Fireside Chat: Are Detection Technologies Playing Harder on Privacy? The Balancing Act

Dr. Pavan Duggal (Conference Co-Chair), Advocate, Supreme Court of India - (Conference Co-Chair), Advocate, Supreme Court of India, Sanjeev Singh, CISO, Birlasoft - CISO, Birlasoft  •  Available OnDemand for Premium Members • 

An IAM Approach to Cybersecurity: Building on Zero Trust

Vivin Sathyan, Senior Technical Evangelist, ManageEngine - a division of Zoho Corp - Senior Technical Evangelist, ManageEngine - a division of Zoho Corp  •  Available Exclusively for Premium Members • 

OnDemand | Don't Get Swindled: The Dangers of Location Sharing Apps

Felipe Cerqueira - Felipe Cerqueira, Rappi, André Ferraz, CEO & Founder, Incognia - CEO & Founder, Incognia  • 

OnDemand | Who is Faking Location? - How are Fraudsters Using Location Spoofing to Attack Location-Based Apps

Felipe Cerqueira - Felipe Cerqueira, Rappi, André Ferraz, CEO & Founder, Incognia - CEO & Founder, Incognia  • 

Conquering Third-Party Security Risk

Michael McNeil - Mckesson, Anahi Santiago - Christiana Care Health System, Rob Suárez, HCISPP - Becton, Dickinson and Company  •  Available Exclusively for Premium Members • 

Microsoft and Health-ISAC Disrupt Ransomware Botnet

Rich Boscovich, Senior Attorney, Microsoft - Senior Attorney, Microsoft, Errol Weiss - Chief Security Officer, H-ISAC  •  Available Exclusively for Premium Members • 

Breach and Attack Simulation: Trust Keysight to Validate Your Cybersecurity Posture

Vivek Delhikar, Technical Product Manager, Keysight Technoligies - Technical Product Manager, Keysight Technoligies  •  Available Exclusively for Premium Members • 


Premium Membership

Only Premium Members have unrestricted access to our educational resource, including: exclusive breaking news, in-depth interviews, industry research, live expert Q&A sessions, ISMG Summit session recordings, OnDemand webinars, and our full archive of over 800 webinars.


Already a member?
Sign in.


Security Agenda

Nov Edition

Our monthly catalog showcasing some of the latest education and insight from industry experts.

Download

View all >>

Security Agenda

Nov Edition

Our monthly catalog showcasing some of the latest education and insight from industry experts.

Download

Oct Edition

Oct Edition

Oct Edition

View all >>


CPE Partners

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.