Search Training Library


Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Cyber-Physical Systems and IoT Devices

Ron Ross - National Institute of Standards and Technology (NIST)  •  In Development • 

Monitor and Identify Malicious Threat Before they Cripple your Organization

Dave Martin - Open Systems  •  November 16, 2030 @ 12:00 AM (EST) •  Available Exclusively for Premium Members • 

Lessons from the SolarWinds Hack: A CISOs Response

Ismamuradi Abdul Kadir, Acting CISO-Risk Management Division, Bank Muamalat Malaysia Berhad - Acting CISO-Risk Management Division, Bank Muamalat Malaysia Berhad  •  Available Exclusively for Premium Members • 

Building Threat & Risk Management Programs for Digital Transformation

Brendan Laws, Director. Solutions Architecture Asia Pacific & Japan, Rapid7 - Director. Solutions Architecture Asia Pacific & Japan, Rapid7  •  Available Exclusively for Premium Members • 

The Next Evolution in XDR: The Security Promise

Christopher Kruegel, VP of Security Services, VMware - VP of Security Services, VMware  •  Available Exclusively for Premium Members • 

Securing your Endpoints in the Era of Digital Transformation

Romanus Prabhu Raymond, Director of Product Support, ManageEngine - Director of Product Support, ManageEngine  •  Available Exclusively for Premium Members • 

Two-Way Street: A Cybersecurity Debate between CTO vs. CISO-Where is the Disagreement?

Mario Demarillas, CISO and Head of IT Consulting and Software Engineering, Exceture, Philippines - CISO and Head of IT Consulting and Software Engineering, Exceture, Philippines, Edmund Situmorang, Group CTO, Asian Bulk Logistics, Indonesia - Group CTO, Asian Bulk Logistics, Indonesia  •  Available Exclusively for Premium Members • 

Risk-Based Discussion: Are you Aligned with the Board?

Jayaraj Puthanveedu, MD-Cyber and Tech. Risk, Global Head - Operational Resilience, BNP Paribas Group - MD-Cyber and Tech. Risk, Global Head - Operational Resilience, BNP Paribas Group  •  Available Exclusively for Premium Members • 

Are You SoC 2 Compliant? Assessing the Third-Party Risks

Shane Read, Former Global CISO, Noble Group and vCISO, TJL Cyber, Hong Kong - Former Global CISO, Noble Group and vCISO, TJL Cyber, Hong Kong  •  Available Exclusively for Premium Members • 

The Next Evolution in XDR – Are You a Confident Organization with Resilient, Dynamic and Living Security?

Chris Burch, CISO, RoundGlass - CISO, RoundGlass, Vahidin “Vaha” Memić, Solutions Architect , Trellix - Solutions Architect , Trellix, Brian Shea, BISO, Salesforce - BISO, Salesforce  •  Available Exclusively for Premium Members • 

"Trust but Verify" - Analysts on Securing Data Across Public Clouds

Fernando Montenegro - Omida, Tari Schreider - Aite-Novarica Group  •  Available Exclusively for Premium Members • 

Identity Vetting Using Decentralized ID

Alan Bachmann - CVS Health  •  Available Exclusively for Premium Members • 

OT Security: Bridging the Silos

Mel Migrino, Group CISO, Manila Electric Company (MERALCO) - Group CISO, Manila Electric Company (MERALCO)  •  Available Exclusively for Premium Members • 


Premium Membership

Only Premium Members have unrestricted access to our educational resource, including: exclusive breaking news, in-depth interviews, industry research, live expert Q&A sessions, ISMG Summit session recordings, OnDemand webinars, and our full archive of over 800 webinars.


Already a member?
Sign in.


Security Agenda

Nov Edition

Our monthly catalog showcasing some of the latest education and insight from industry experts.

Download

View all >>

Security Agenda

Nov Edition

Our monthly catalog showcasing some of the latest education and insight from industry experts.

Download

Oct Edition

Oct Edition

Oct Edition

View all >>


CPE Partners

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.