Search Training Library


Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Cyber-Physical Systems and IoT Devices

Ron Ross - National Institute of Standards and Technology (NIST)  •  In Development • 

Monitor and Identify Malicious Threat Before they Cripple your Organization

Dave Martin - Open Systems  •  November 16, 2030 @ 12:00 AM (EST) •  Available Exclusively for Premium Members • 

Myth-busting and the move toward a clear legal and regulatory framework for crypto.

Dante A. Disparte - Circle, Ari Redbord, Head of Legal and Government Affairs, TRM Labs - Head of Legal and Government Affairs, TRM Labs  •  Available Exclusively for Premium Members • 

Implications of the UAE’s New Data Protection Federal Decree-Law on Security

Astrid Gobardhan, Global Data Privacy and Protection Counsel, VFS Global - Global Data Privacy and Protection Counsel, VFS Global  •  Available Exclusively for Premium Members • 

Spike in Online Fraud: Balancing Fraud Detection and Customer Experience

Raina Verma, Executive Board Member & Member of ACFE Advisory Council, Association of Certified Financial Crime Specialist & Association of Certified Fraud Examiners - Executive Board Member & Member of ACFE Advisory Council, Association of Certified Financial Crime Specialist & Association of Certified Fraud Examiners  •  Available Exclusively for Premium Members • 

Cybersecurity in Healthcare: Tackling Threats in the Post-Pandemic Era

Ashish Khanna, Advisor to CISO & Cybersecurity Specialist, Healthcare Entity - Advisor to CISO & Cybersecurity Specialist, Healthcare Entity  •  Available Exclusively for Premium Members • 

Building an Effective Risk Management Program to Drive Business Value

Nisreen Al Khatib, Info Sec and Resilience Expert, At a large organisation  •  Available Exclusively for Premium Members • 

Building an Effective Security Program with Limited Resources

Paul Prokop, Enterprise Security Engineer, LogRhythm - Enterprise Security Engineer, LogRhythm  •  Available Exclusively for Premium Members • 

Two-Way Street: A Cybersecurity Debate between CTO vs. CISO-Where is the Disagreement?

Daniel Pludek - Kip McGrath, Jo Stewart-Rattray, Vice President-Communities and CISO, Silver Chain Group - Vice President-Communities and CISO, Silver Chain Group  •  Available Exclusively for Premium Members • 

How to Build a Proactive Cyber Crisis Management Plan against Attacks?

Tom Daniewski, Advisory Committee Member, CISO, Federal Court of Australia - Advisory Committee Member, CISO, Federal Court of Australia  •  Available Exclusively for Premium Members • 

Applying Right Defenses in Fighting Ransomware Attacks

Ram Vaidyanathan, Cybersecurity Expert, ManageEngine, a division of Zoho Corporation Pty Ltd - Cybersecurity Expert, ManageEngine, a division of Zoho Corporation Pty Ltd  •  Available Exclusively for Premium Members • 

Lessons Learned from the Log4j Exploit

Ax Sharma  •  Available Exclusively for Premium Members • 

How Financial Services Can Differentiate Themselves with Modern Strong Authentication

Karen Boyer, SVP Financial Crimes, Fraud Intelligence, M&T Bank - SVP Financial Crimes, Fraud Intelligence, M&T Bank, Jeremy Grant - Venable, LLP, Chuck McAllister - Yubico  •  Available Exclusively for Premium Members • 


Premium Membership

Only Premium Members have unrestricted access to our educational resource, including: exclusive breaking news, in-depth interviews, industry research, live expert Q&A sessions, ISMG Summit session recordings, OnDemand webinars, and our full archive of over 800 webinars.


Already a member?
Sign in.


Security Agenda

Nov Edition

Our monthly catalog showcasing some of the latest education and insight from industry experts.

Download

View all >>

Security Agenda

Nov Edition

Our monthly catalog showcasing some of the latest education and insight from industry experts.

Download

Oct Edition

Oct Edition

Oct Edition

View all >>


CPE Partners

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.