Webinar Training

Essential education designed to ensure you meet and exceed your organization’s security and risk goals.

Our curriculum of webinars available at your fingertips offer the same in-depth advice and interaction as in-person training, but are available at your convenience.

or Become a Premium Member

200+ In-Depth Courses

Comprehensive in-depth information security, risk management, compliance, & fraud education.

Constantly Updated

Courses are constantly updated to stay ahead of industry trends, threats, and regulations.

Expert Presenter Faculty

Courses developed by industry experts with years of experience implementing these solutions.

Presentation Materials

Handbooks with additional reading, research, and tools to help you implement what was learned.

Don’t miss out.
Join the 45,000+
satisfied webinar attendees from thousands of organizations worldwide.

Browse the Course Library »

Sorting By:  

Course Library

The Kill Chain & The ISMG APT Defense Framework Overview

The Kill Chain & The ISMG APT Defense Framework Overview

Available OnDemand

Although APT's can vary significantly from breach to breach, they generally have many common phases and mechanisms. In this session we will define and describe the APT lifecycle and introduce the ISMG APT Defense Framework. In this session attendees will learn: What is the "standard" lifecycle of an APT kill ...

Presented By: Patrick Vowles

Identity Data Privacy is Dead: Why We Need to Migrate From Static Identity Verification to Dynamic Identity Proofing

Identity Data Privacy is Dead: Why We Need to Migrate From Static Identity Verification to Dynamic Identity Proofing

Available Exclusively for Premium Members

Until we get to a stage where we can guarantee the confidentiality of traditional identity reference data such as names, addresses, emails and favorite cat colors, we must move away from relying on this static data for authentication. Truly massive amounts of this information are stolen on a regular basis, proving we ...

Presented By: Avivah Litan

Insider Fraud Detection: The Appliance of Science

Insider Fraud Detection: The Appliance of Science

Available Exclusively for Premium Members

See the startling results of meticulous analysis of hundreds of real-life insider attacks from the team at Carnegie Mellon University, where the CERT (Computer Emergency Response Team) function was created. The analysis results clearly indicate that, contrary to the majority of headlines, stealthy insiders pose a huge ...

Presented By: Jeremy Strozer

Integrating the 3 R's of Data Protection to Reduce Risk

Integrating the 3 R's of Data Protection to Reduce Risk

April 28, 2015 @ 11:30 AM

As the cost and complexity of data breaches continue to rise, agencies need to adapt to an ever-changing threat landscape. So how do you reduce your risk of sensitive data loss? The first step in any data protection strategy is gaining visibility into your organization's sensitive data and how it's being used. ...

Actionable Threat Intelligence: From Theory to Practice

Actionable Threat Intelligence: From Theory to Practice

April 29, 2015 @ 1:30 PM

Threat intelligence is one of the biggest buzzwords in the information security space. While organizations know that they need threat intelligence, many remain unsure of what the term really means. Is it a feed? Is it a collection of random security intelligence? What should organizations expect from threat ...

Presented By: Rob Kraus

Dispelling the Myths of Malware Attacks

Dispelling the Myths of Malware Attacks

April 30, 2015 @ 11:30 AM

Detecting fraud and defending against malware attacks is a constant and persistent reality for organizations that offer online banking. To effectively combat the perils of fraud, organizations that offer financial services over the Internet must defend themselves with a combination of security technologies. To stay ...

Presented By: Ilan Meller

I Found an APT: Now What? Operationalizing Advanced Threat and Breach Response

I Found an APT: Now What? Operationalizing Advanced Threat and Breach Response

April 30, 2015 @ 3:30 PM

You can't open your email without hearing about the latest public security incident and data breach. The advancing techniques of attackers and sophisticated malware makes it harder and harder to stay ahead of threats. We all know we need protection against advanced threats. We all know we need to be ready to ...

Chasing Down RATs - Combatting Account Takeover Fraud at the Age of Remote Access Trojans and Data Breaches

Chasing Down RATs - Combatting Account Takeover Fraud at the Age of Remote Access Trojans and Data Breaches

May 1, 2015 @ 11:30 AM

Recent months have seen significant innovation by cybercriminals in performing banking fraud. A combination of new tools and tactics have challenged traditional fraud controls. In this live webinar we will review some of the latest threats and how they can best be mitigated: Use of RATs (Remote Access Trojans) ...

Presented By: Ori Bach

Beyond HIPAA Risk Assessments: Added Measures for Avoiding PHI Breaches

Beyond HIPAA Risk Assessments: Added Measures for Avoiding PHI Breaches

May 1, 2015 @ 3:30 PM

Last year, several high profile security incidents occurred at healthcare organizations where a HIPAA Risk Assessment (HSRA) had previously been conducted. This should provoke some pointed questions: Was the HSRA comprehensive enough? Was the remediation plan implemented correctly and in a timely manner? Was an ...

Presented By: Dan Berger

Securing the Borderless Enterprise

Securing the Borderless Enterprise

May 5, 2015 @ 1:30 PM

As the borders of the enterprise dissolve in the mobile world, security becomes increasingly important and inherently more complex. Single Sign-On becomes the key to providing a convenient experience when accessing enterprise resources across web, mobile and APIs. Join this webinar to learn how the National Rural ...