Webinar Training

Essential education designed to ensure you meet and exceed your organization’s security and risk goals.

Our curriculum of webinars available at your fingertips offer the same in-depth advice and interaction as in-person training, but are available at your convenience.

or Become a Premium Member

200+ In-Depth Courses

Comprehensive in-depth information security, risk management, compliance, & fraud education.

Constantly Updated

Courses are constantly updated to stay ahead of industry trends, threats, and regulations.

Expert Presenter Faculty

Courses developed by industry experts with years of experience implementing these solutions.

Presentation Materials

Handbooks with additional reading, research, and tools to help you implement what was learned.

Don’t miss out.
Join the 45,000+
satisfied webinar attendees from thousands of organizations worldwide.

Browse the Course Library »

Sorting By:  

Course Library

The Kill Chain & The ISMG APT Defense Framework Overview

The Kill Chain & The ISMG APT Defense Framework Overview

Available OnDemand

Although APT's can vary significantly from breach to breach, they generally have many common phases and mechanisms. In this session we will define and describe the APT lifecycle and introduce the ISMG APT Defense Framework. In this session attendees will learn: What is the "standard" lifecycle of an APT kill ...

Presented By: Patrick Vowles

Keynote: The State of Fraud Today

Keynote: The State of Fraud Today

Available Exclusively for Premium Members

This session will set the stage for the rest of the day, describing how in the last few years we have seen an explosion of technological innovations which have brought many opportunities for commercial growth and consumer convenience. This growth has, however, come at a price. This almost unchecked pace of change has ...

The Future Of Payment Security: Where Do We Go From Here And Who Is Liable When We Get There?

The Future Of Payment Security: Where Do We Go From Here And Who Is Liable When We Get There?

Available Exclusively for Premium Members

Retail breaches are endemic in the U.S. primarily due to the lack of effective, in-person payment card security. As the rest of the world has embraced EMV, perhaps there is an opportunity for the U.S. to leapfrog even that significant level of security with technologies such as tokenization (as employed in the ...

Preparing For and Responding To Large Scale Data Breaches

Preparing For and Responding To Large Scale Data Breaches

Available Exclusively for Premium Members

For as long as data can be compromised and misused, businesses that store or transmit data will be at risk of compromise. Yet those industries and segments that are common targets today are implementing solutions, such as data obfuscation and advanced authentication, which will dramatically reduce their risk profile ...

Investigate, Respond Retaliate?

Investigate, Respond Retaliate?

Available Exclusively for Premium Members

You have identified the attack now it's time to react. How do you effectively respond, remediate, recover and potentially retaliate to the threat? This session will discuss how your organization can leverage the actionable intelligence gained from all the previous defense phases of threat indicators, analytics, ...

Actionable Threat Intelligence: From Theory to Practice

Actionable Threat Intelligence: From Theory to Practice

March 5, 2015 @ 1:30 PM

Threat intelligence is one of the biggest buzzwords in the information security space. While organizations know that they need threat intelligence, many remain unsure of what the term really means. Is it a feed? Is it a collection of random security intelligence? What should organizations expect from threat ...

Presented By: Rob Kraus

Targeted Attacks - 6 Keys for Fighting Back

Targeted Attacks - 6 Keys for Fighting Back

March 6, 2015 @ 11:30 AM

Target, Sony, Anthem - the biggest recent breaches have taught us all big lessons. Namely, that traditional security solutions are ineffective against advanced threats. And today's targeted attacks not only can rob your organization of sensitive data, customers, reputation - they can cost senior leaders their jobs. ...

Cloud Infrastructure: Same Security Needs, Dynamic New Environment

Cloud Infrastructure: Same Security Needs, Dynamic New Environment

March 6, 2015 @ 11:30 AM
Available OnDemand

There is a common perception among organizations that cloud security, especially when using a public cloud model - is a shared responsibility model. According to one of the largest cloud services provider, Amazon Web Services "...the customer should assume responsibility and management of, but not limited to, ...

Presented By: Amrit Williams

How to Identify Meaningful Alerts from the Security Noise

How to Identify Meaningful Alerts from the Security Noise

March 6, 2015 @ 1:30 PM
Available OnDemand

Today's cyber defenses generate a cacophony of security alerts. Some might be useful. Most are not. And telling the difference isn't always easy. With so many fish in the sea, it can be a challenge to find the meaningful ones. Join us for this live webinar as FireEye Managed Defense analysts Nicole Oppenheim and ...

PHI Security: The Role of Encryption and Tokenization

PHI Security: The Role of Encryption and Tokenization

March 6, 2015 @ 3:30 PM
Available OnDemand

Chasing yesterday's concerns - policies, procedures, training and agreements - are still important, But addressing privacy, risk and security issues is critical to protecting today's evolving threat landscape. It's no surprise that healthcare records and systems are seen by cyber crooks as "rewarding and valuable" ...