Webinar Training

Essential education designed to ensure you meet and exceed your organization’s security and risk goals.

Our curriculum of webinars available at your fingertips offer the same in-depth advice and interaction as in-person training, but are available at your convenience.

or Become a Premium Member

200+ In-Depth Courses

Comprehensive in-depth information security, risk management, compliance, & fraud education.

Constantly Updated

Courses are constantly updated to stay ahead of industry trends, threats, and regulations.

Expert Presenter Faculty

Courses developed by industry experts with years of experience implementing these solutions.

Presentation Materials

Handbooks with additional reading, research, and tools to help you implement what was learned.

Don’t miss out.
Join the 45,000+
satisfied webinar attendees from thousands of organizations worldwide.

Browse the Course Library »

Sorting By:  

Course Library

The Kill Chain & The ISMG APT Defense Framework Overview

The Kill Chain & The ISMG APT Defense Framework Overview

Available OnDemand

Although APT's can vary significantly from breach to breach, they generally have many common phases and mechanisms. In this session we will define and describe the APT lifecycle and introduce the ISMG APT Defense Framework. In this session attendees will learn: What is the "standard" lifecycle of an APT kill ...

Presented By: Patrick Vowles

Threat Intelligence & the Underground Eco-System

Threat Intelligence & the Underground Eco-System

Available Exclusively for Premium Members

Part 1 - Fraud Ecosystem In June this year, the "Ronald Reagan" batch of credit cards (potentially those stolen from P.F. Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. These cards were featured on the popular Rescator card shop (stolen card data marketplace), which ...

Presented By: Eric Thompson

Investigate, Respond Retaliate?

Investigate, Respond Retaliate?

Available Exclusively for Premium Members

You have identified the attack now it's time to react. How do you effectively respond, remediate, recover and potentially retaliate to the threat? This session will discuss how your organization can leverage the actionable intelligence gained from all the previous defense phases of threat indicators, analytics, ...

Beyond HIPAA Risk Assessments: Added Measures for Avoiding PHI Breaches

Beyond HIPAA Risk Assessments: Added Measures for Avoiding PHI Breaches

March 3, 2015 @ 11:30 AM

Last year, several high profile security incidents occurred at healthcare organizations where a HIPAA Risk Assessment (HSRA) had previously been conducted. This should provoke some pointed questions: Was the HSRA comprehensive enough? Was the remediation plan implemented correctly and in a timely manner? Was an ...

Presented By: Dan Berger

Mobile Deposit Capture: Balancing Fraud Prevention and Customer Convenience

Mobile Deposit Capture: Balancing Fraud Prevention and Customer Convenience

March 3, 2015 @ 1:30 PM

As a 20+ year leader in check fraud detection and prevention, Fiserv has the unique opportunity to observe market trends related to RDC and check fraud. During this webinar you will hear from Mike Urban with Fiserv Financial Crime Risk Management, who will discuss these trends and the specific capabilities banks need ...

Presented By: Mike Urban

2015 Insider Threat Report

2015 Insider Threat Report

March 4, 2015 @ 11:30 AM

Information is the life blood of modern business - and increasingly under attack from both traditional insiders motivated by financial gain, and external hackers that compromise insider accounts for criminal purposes and nation state goals. With insider threats spanning both these areas, this webinar features ...

Actionable Threat Intelligence: From Theory to Practice

Actionable Threat Intelligence: From Theory to Practice

March 5, 2015 @ 1:30 PM

Threat intelligence is one of the biggest buzzwords in the information security space. While organizations know that they need threat intelligence, many remain unsure of what the term really means. Is it a feed? Is it a collection of random security intelligence? What should organizations expect from threat ...

Presented By: Rob Kraus

Cloud Infrastructure: Same Security Needs, Dynamic New Environment

Cloud Infrastructure: Same Security Needs, Dynamic New Environment

March 6, 2015 @ 11:30 AM
Available OnDemand

There is a common perception among organizations that cloud security, especially when using a public cloud model - is a shared responsibility model. According to one of the largest cloud services provider, Amazon Web Services "...the customer should assume responsibility and management of, but not limited to, ...

Presented By: Amrit Williams

How to Identify Meaningful Alerts from the Security Noise

How to Identify Meaningful Alerts from the Security Noise

March 6, 2015 @ 1:30 PM
Available OnDemand

Today's cyber defenses generate a cacophony of security alerts. Some might be useful. Most are not. And telling the difference isn't always easy. With so many fish in the sea, it can be a challenge to find the meaningful ones. Join us for this live webinar as FireEye Managed Defense analysts Nicole Oppenheim and ...

PHI Security: The Role of Encryption and Tokenization

PHI Security: The Role of Encryption and Tokenization

March 6, 2015 @ 3:30 PM
Available OnDemand

Chasing yesterday's concerns - policies, procedures, training and agreements - are still important, But addressing privacy, risk and security issues is critical to protecting today's evolving threat landscape. It's no surprise that healthcare records and systems are seen by cyber crooks as "rewarding and valuable" ...