Webinar Training

Essential education designed to ensure you meet and exceed your organization’s security and risk goals.

Our curriculum of webinars available at your fingertips offer the same in-depth advice and interaction as in-person training, but are available at your convenience.

or Become a Premium Member

200+ In-Depth Courses

Comprehensive in-depth information security, risk management, compliance, & fraud education.

Constantly Updated

Courses are constantly updated to stay ahead of industry trends, threats, and regulations.

Expert Presenter Faculty

Courses developed by industry experts with years of experience implementing these solutions.

Presentation Materials

Handbooks with additional reading, research, and tools to help you implement what was learned.

Don’t miss out.
Join the 45,000+
satisfied webinar attendees from thousands of organizations worldwide.

Browse the Course Library »

Sorting By:  

Course Library

Developing a Comprehensive Security Program and Creating a "Culture of Security"

Developing a Comprehensive Security Program and Creating a "Culture of Security"

Available Exclusively for Premium Members

Typically the traditional Healthcare Information "culture" has not been managed or even significantly influenced by centralized IT or InfoSec personnel. The current environment can be heavily fragmented into various functional and geographic groups, each with very different governance programs and priorities which ...

The Fraud Ecosystem and Threat Intelligence - Understanding the Underground and Perhaps Even Predicting Targeted Healthcare Attacks

The Fraud Ecosystem and Threat Intelligence - Understanding the Underground and Perhaps Even Predicting Targeted Healthcare Attacks

Available Exclusively for Premium Members

We are possibly approaching a perfect storm of ePHI vulnerability. As the cyber defenses in other sectors mature, the portability of ePHI and its value increases and easy access becomes available from a host of devices, the opportunity of its theft increases. It's almost impossible to defend against an enemy that you ...

Data Protection Strategies for Healthcare

Data Protection Strategies for Healthcare

Available Exclusively for Premium Members

With PHI and PII increasingly becoming targets for theft - and steady rise of the resulting embarrassment, fraud, prosecutions and penalties - we need to take a fresh look at how best to protect this data from being exposed in the first place. An effective data protection strategy can only be arrived at by considering ...

Preparing for and Passing an OCR HIPAA Audit

Preparing for and Passing an OCR HIPAA Audit

Available Exclusively for Premium Members

The HHS Office for Civil Rights' much-delayed resumption of its random HIPAA compliance audit program is expected in the coming months. So now is the time to prepare. This session will cover the highest priority tasks that should be started immediately if not already underway to help lay the groundwork for a ...

The Internet of Absolutely Everything, Connected Medical Devices and BYOD - Securing the Information They Access and the Information They Can Leak

The Internet of Absolutely Everything, Connected Medical Devices and BYOD - Securing the Information They Access and the Information They Can Leak

Available Exclusively for Premium Members

Any device that can communicate with anything else provides a potential open door for the valuable information it accesses and that an organization is responsible for protecting. In our rush to connect everything together, secure information handling is very often an afterthought, if ever even a thought at all. The ...

Presented By: Stephen Grimes

2015 Healthcare Information Security Today Survey Results: Analysis

2015 Healthcare Information Security Today Survey Results: Analysis

Available Exclusively for Premium Members

In this session, we'll highlight the major findings from Information Security Media Group's new national survey of healthcare information security leaders. For example, an overwhelming majority of respondents were confident their organization would "pass" a Department of Health and Human Services HIPAA compliance ...

CISO Agenda 2015: Adding Value to a Security Program with Application Security

CISO Agenda 2015: Adding Value to a Security Program with Application Security

July 7, 2015 @ 1:30 PM
Available OnDemand

The business case presented to internal stakeholders can make or break your security program. Statistics around breaches and vulnerabilities have not been sufficient in helping CISOs talk to their boards about funding more mature AppSec programs. Traditional ROI models often focus on proving that "something bad ...

Presented By: Hadrian Engel

Mobile Banking: Empowering Banks to Protect Customers Against Online Fraud

Mobile Banking: Empowering Banks to Protect Customers Against Online Fraud

July 9, 2015 @ 1:30 PM

Mobile banking is growing out of its infancy and experts predict it will soon be the dominant banking and payments channel. However, with mobile operating systems and their varying support of security best practices, multiple new threat vectors are being introduced and many are already being widely utilized for ...

Healthcare Information Security Today:  2015 Survey Results and Analysis

Healthcare Information Security Today: 2015 Survey Results and Analysis

July 10, 2015 @ 1:30 PM

What are the biggest cyberthreats facing healthcare entities today and on the horizon? What steps are healthcare organizations taking to prevent and detect breaches? And what are the top data security priorities for the year ahead? For answers to these questions and many more, check out the Healthcare Information ...

The Enterprise at Risk: The 2015 State of Mobility Security

The Enterprise at Risk: The 2015 State of Mobility Security

July 10, 2015 @ 3:30 PM

When it comes to mobility, enterprises are not nearly as secure as their security leaders believe them to be. In a global survey of 400 information security executives, 44 percent rate themselves at above average or superior when self-assessing their organizations' mobility security. Yet, 41 percent suffered a ...