Search Training Library


We've Been Breached. Now What? How to Effectively Work With Law Enforcement

John Salmon - Pinsent Masons LLP, Paul Simmonds - Global Identity Foundation, DCI Jason Tunn - Metropolitan Police Service London, Peter Yapp - National Cyber Security Centre  •  Available Exclusively for Premium Members • 

What the SWIFT Attacks Teach Us about the Need for More Information Sharing

Jeremy King - PCI Security Standards Council, Ben Lindgreen - Payments UK, Ralph Smith - FS-ISAC  •  Available Exclusively for Premium Members • 

The Route to Trusted Identity

John Marsden - Equifax  •  Available Exclusively for Premium Members • 

The Insider Threat: Detecting Risky Behavior

Tom Salmon - LogRhythm  •  Available Exclusively for Premium Members • 

The Devil Inside the Beltway: the FTC vs. LabMD

Mike Daugherty - LabMD  •  In Development • 

How the Next President Will Deal with Obama's Cybersecurity Legacy?

Steve Chabinsky - CrowdStrike, Eric Chabrow - ISMG Security Report, GovInfoSecurity & InfoRiskToday, Larry Clinton - Internet Security Alliance, Karen Evans - U.S. Cyber Challenge, Ari Schwartz - Venable  •  In Development • 

Modelling Advanced Persistent Threats

Arkajyoti Dutta - Ixia  •  Available Exclusively for Premium Members • 


Premium Membership

Only Premium Members have unrestricted access to our educational resource, including: exclusive breaking news, in-depth interviews, industry research, live expert Q&A sessions, ISMG Summit session recordings, OnDemand webinars, and our full archive of over 800 webinars.


Already a member?
Sign in.


Security Agenda

Feb Edition

Our monthly catalog showcasing some of the latest education and insight from industry experts.

Download

View all >>

Security Agenda

December Edition

Our monthly catalog showcasing some of the latest education and insight from industry experts.

Download

Feb Edition

Feb Edition

Feb Edition

View all >>


CPE Partners