Webinar Training

Essential education designed to ensure you meet and exceed your organization’s security and risk goals.

Our curriculum of webinars available at your fingertips offer the same in-depth advice and interaction as in-person training, but are available at your convenience.

or Become a Premium Member

200+ In-Depth Courses

Comprehensive in-depth information security, risk management, compliance, & fraud education.

Constantly Updated

Courses are constantly updated to stay ahead of industry trends, threats, and regulations.

Expert Presenter Faculty

Courses developed by industry experts with years of experience implementing these solutions.

Presentation Materials

Handbooks with additional reading, research, and tools to help you implement what was learned.

Don’t miss out.
Join the 45,000+
satisfied webinar attendees from thousands of organizations worldwide.

Browse the Course Library »

Sorting By:  

Course Library

The Kill Chain & The ISMG APT Defense Framework Overview

The Kill Chain & The ISMG APT Defense Framework Overview

Available OnDemand

Although APT's can vary significantly from breach to breach, they generally have many common phases and mechanisms. In this session we will define and describe the APT lifecycle and introduce the ISMG APT Defense Framework. In this session attendees will learn: What is the "standard" lifecycle of an APT kill ...

Presented By: Patrick Vowles

Keynote: The State of Fraud Today

Keynote: The State of Fraud Today

Available Exclusively for Premium Members

This session will set the stage for the rest of the day, describing how in the last few years we have seen an explosion of technological innovations which have brought many opportunities for commercial growth and consumer convenience. This growth has, however, come at a price. This almost unchecked pace of change has ...

The Future Of Payment Security: Where Do We Go From Here And Who Is Liable When We Get There?

The Future Of Payment Security: Where Do We Go From Here And Who Is Liable When We Get There?

Available Exclusively for Premium Members

Retail breaches are endemic in the U.S. primarily due to the lack of effective, in-person payment card security. As the rest of the world has embraced EMV, perhaps there is an opportunity for the U.S. to leapfrog even that significant level of security with technologies such as tokenization (as employed in the ...

Preparing For and Responding To Large Scale Data Breaches

Preparing For and Responding To Large Scale Data Breaches

Available Exclusively for Premium Members

For as long as data can be compromised and misused, businesses that store or transmit data will be at risk of compromise. Yet those industries and segments that are common targets today are implementing solutions, such as data obfuscation and advanced authentication, which will dramatically reduce their risk profile ...

Investigate, Respond Retaliate?

Investigate, Respond Retaliate?

Available Exclusively for Premium Members

You have identified the attack now it's time to react. How do you effectively respond, remediate, recover and potentially retaliate to the threat? This session will discuss how your organization can leverage the actionable intelligence gained from all the previous defense phases of threat indicators, analytics, ...

Actionable Threat Intelligence: From Theory to Practice

Actionable Threat Intelligence: From Theory to Practice

March 5, 2015 @ 1:30 PM

Threat intelligence is one of the biggest buzzwords in the information security space. While organizations know that they need threat intelligence, many remain unsure of what the term really means. Is it a feed? Is it a collection of random security intelligence? What should organizations expect from threat ...

Presented By: Rob Kraus

Cloud Infrastructure: Same Security Needs, Dynamic New Environment

Cloud Infrastructure: Same Security Needs, Dynamic New Environment

March 6, 2015 @ 11:30 AM
Available OnDemand

There is a common perception among organizations that cloud security, especially when using a public cloud model - is a shared responsibility model. According to one of the largest cloud services provider, Amazon Web Services "...the customer should assume responsibility and management of, but not limited to, ...

Presented By: Amrit Williams

How to Identify Meaningful Alerts from the Security Noise

How to Identify Meaningful Alerts from the Security Noise

March 6, 2015 @ 1:30 PM
Available OnDemand

Today's cyber defenses generate a cacophony of security alerts. Some might be useful. Most are not. And telling the difference isn't always easy. With so many fish in the sea, it can be a challenge to find the meaningful ones. Join us for this live webinar as FireEye Managed Defense analysts Nicole Oppenheim and ...

Security Alerts: Identifying Noise vs. Signals

Security Alerts: Identifying Noise vs. Signals

March 9, 2015 @ 3:30 PM
Available OnDemand

For anyone working in a security operations center, this is a familiar picture: lots of alerts, but not enough analysts; too many disparate tools to manage effectively; not enough visibility, and too little context to make fast decisions. What if you could change the status quo? How are organizations today taking ...

Advances in Application Security: Run-time Application Self Protection

Advances in Application Security: Run-time Application Self Protection

March 11, 2015 @ 3:30 PM

In this post Target/Home Depot breach era, Application Security programs still seem to struggle at organizations of all sizes. The reasons for this 'mediocre' success range from mis-alignment between information security and application development groups to simply the lack of resources available for identification ...