Webinar Training

Essential education designed to ensure you meet and exceed your organization’s security and risk goals.

Our curriculum of webinars available at your fingertips offer the same in-depth advice and interaction as in-person training, but are available at your convenience.

or Become a Premium Member

200+ In-Depth Courses

Comprehensive in-depth information security, risk management, compliance, & fraud education.

Constantly Updated

Courses are constantly updated to stay ahead of industry trends, threats, and regulations.

Expert Presenter Faculty

Courses developed by industry experts with years of experience implementing these solutions.

Presentation Materials

Handbooks with additional reading, research, and tools to help you implement what was learned.

Don’t miss out.
Join the 45,000+
satisfied webinar attendees from thousands of organizations worldwide.

Browse the Course Library »

Sorting By:  

Course Library

Identity Data Privacy is Dead: Why We Need to Migrate From Static Identity Verification to Dynamic Identity Proofing

Identity Data Privacy is Dead: Why We Need to Migrate From Static Identity Verification to Dynamic Identity Proofing

Available Exclusively for Premium Members

Until we get to a stage where we can guarantee the confidentiality of traditional identity reference data such as names, addresses, emails and favorite cat colors, we must move away from relying on this static data for authentication. Truly massive amounts of this information are stolen on a regular basis, proving we ...

Presented By: Avivah Litan

Threat Intelligence and OSINT: What You Can Learn About Your Adversaries and What They Can Learn About You

Threat Intelligence and OSINT: What You Can Learn About Your Adversaries and What They Can Learn About You

Available Exclusively for Premium Members

There are two main critical components of intelligence gathering. The most widely accepted is external threat intelligence, gathered from monitoring and sharing malicious activity. But equally - if not more - important is the need to understand what your attackers know about you: "open source" information that is ...

The Fraud Ecosystem, Deep Web and Fraud-as-a-Service (FaaS)

The Fraud Ecosystem, Deep Web and Fraud-as-a-Service (FaaS)

Available Exclusively for Premium Members

As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a ...

Presented By: Ori Bach

Consumer Fraud Awareness: What's Working, What's Not & What's Next?

Consumer Fraud Awareness: What's Working, What's Not & What's Next?

Available Exclusively for Premium Members

With social engineering, phishing and a host of other attacks on the rise, the consumer remains the most vulnerable link in the fraud chain. Banks and financial institutions are helping to lead the way in education, supported by organizations like the FFIEC which recently issued new guidance on security awareness for ...

Presented By: Sean Sanner

2015 Faces of Fraud

2015 Faces of Fraud

Available Exclusively for Premium Members

As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobile payments? Receive insights ...

Insider Fraud Detection: The Appliance of Science

Insider Fraud Detection: The Appliance of Science

Available Exclusively for Premium Members

See the startling results of meticulous analysis of hundreds of real-life insider attacks from the team at Carnegie Mellon University, where the CERT (Computer Emergency Response Team) function was created. The analysis results clearly indicate that, contrary to the majority of headlines, stealthy insiders pose a huge ...

Presented By: Jeremy Strozer

Chasing Down RAT's - Combatting Account Takeover Fraud at the Age of Remote Access Trojan's and Data Breaches

Chasing Down RAT's - Combatting Account Takeover Fraud at the Age of Remote Access Trojan's and Data Breaches

April 1, 2015 @ 10:00 AM

Recent months have seen significant innovation by cybercriminals in performing banking fraud. A combination of new tools and tactics have challenged traditional fraud controls. In this live webinar we will review some of the latest threats and how they can best be mitigated: Use of RAT's (Remote Access ...

Presented By: Ori Bach

The Evolution of Advanced Malware

The Evolution of Advanced Malware

April 1, 2015 @ 11:30 AM

Every day there is a story in the news, about another business that has fallen prey to cybercriminals. Are you confident your business is protected against these attacks? Join this webinar to learn how you can best protect your business, and avoid becoming next weeks news. In this informative webinar, you will ...

How Cybercriminals Use Phone Scams To Take Over Accounts and Commit Fraud

How Cybercriminals Use Phone Scams To Take Over Accounts and Commit Fraud

April 1, 2015 @ 3:30 PM

"More than one in four unsolicited SMS messages reported in 2014 attempted to steal the victim's personal or financial information" reported Cloudmark in their Annual Security Threat Report. Vishing (voice/phone scams) along with SMiShing (text message scams) continue to rise as fraudsters exploit the trust inherent ...

Presented By: Don Jackson

ROI of Scalable Application Security

ROI of Scalable Application Security

April 2, 2015 @ 11:30 AM

The business case presented to internal stakeholders can make or break your security program. Statistics around breaches and vulnerabilities have not been sufficient in helping CISOs talk to their boards about funding more mature AppSec programs. Traditional ROI models often focus on proving that "something bad ...

Presented By: Hadrian Engel