Search Training Library


Live Webinar: Cisco | Cloud-Based Email Security: Best Practices for Securing Office 365

Rami Abbas - Cisco, Ibrahim Yusuf - Cisco SecOps Group  •  June 22, 2021 @ 5:00 AM (EDT) • 

Panel Discussion | Evangelising an Enterprise's Approach for the PAM Journey

June 23, 2021 @ 6:30 AM (EDT) • 

Live Webinar | The Role of Passwords in the Hybrid Workforce

Katie Petrillo - LogMeIn  •  June 24, 2021 @ 1:00 PM (EDT) • 

FRENCH Webinar | Sécuriser le travail à distance: maintenir la visibilité et maximiser l'efficacité

Jean-Sebastien Milliere - Cisco, Régis Phalivanh - Cisco  •  June 29, 2021 @ 5:00 AM (EDT) •  Available OnDemand • 

Live Webinar | Securing Remote in EMEA: Maintaining Visibility and Maximizing Efficiency

Jean Marie R. Pechette - Polsinelli, Régis Phalivanh - Cisco  •  June 29, 2021 @ 5:00 AM (EDT) •  Available OnDemand • 

Panel Discussion | Preventing Identity Fraud: The Road Ahead For Financial Services

Gaurav Gupta - United Overseas Bank, Hemanshu Parekh - Standard Chartered Bank, Keith Swanson - SAS Institute  •  June 30, 2021 @ 2:00 AM (EDT) • 

Live Webinar | Tips to Modernize Your Cloud-Native Security Strategy

Tom Llewelyn - Sysdig, Darragh O'Flannagn - Amazon Web Services  •  July 6, 2021 @ 5:30 AM (EDT) • 


Premium Membership

Only Premium Members have unrestricted access to our educational resource, including: exclusive breaking news, in-depth interviews, industry research, live expert Q&A sessions, ISMG Summit session recordings, OnDemand webinars, and our full archive of over 800 webinars.


Already a member?
Sign in.


Security Agenda

Nov Edition

Our monthly catalog showcasing some of the latest education and insight from industry experts.

Download

View all >>

Security Agenda

Nov Edition

Our monthly catalog showcasing some of the latest education and insight from industry experts.

Download

Oct Edition

Oct Edition

Oct Edition

View all >>


CPE Partners

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.