Type
-- Select a Product Type --
Package
Conference
Session
Track
-- Select a Track --
3rd Party Risk
Application Security / Software Assurance
Application Security/ Software Assurance
Application Security/software Assurance
Attack Surface Management
Career Center
Career Development
Cloud Security
Control Validation Through Adversary Emulation At Dtcc
Critical Thinking
Cutting Edge
Cyber Crime
Cyber Leadership
Data Protection
Devsecop
Devsecops
Devsecops Demystified - Navigating The Conundrum
Diversity, Equity And Inclusion
Elevating Efficiency And Cloud Security: Saas Products In Public Sector
Emerging Technologies
Forward Thinking
Governance, Regulation And Compliance
Governance, Risk & Compliance
Governance, Risk & Compliance (grc)
Healthcare Security
How Does Ai Affect Intellectual Property Right?
Human Factors
Ics/critical Infrastructure
Identity/authentication/access Management
Incident Response
Incident Response/investigations/forensics
Incident Response/investigations/forensics/e-discovery
Inclusionready
Information Security Careers
Information Security Management
Insider Threat(s)
Internet Of Things (iot)
Investigations/forensics
Iot
Is Network Evidence Really Needed For Security Operations?
Keynote
Malware
Managing Cyber Risk For It And Ot Using Nist, Iec62443 & Iso27001
Mobile Security
Mobile/remote Workforce Security
Netwoking
Network Security
Networking
Outside The Algorithm: Cognitive Hacking And Online Influence
Owasp Cloud-native Application Security Top 10
Preventing Bad From Becoming Worse: Crisis Communication
Privacy
Professional & Career Development
Professional & Career Development
Protecting Cyberinfrastructure With Ai �vs. Attacking Cyberinfrastructure
Quantum Computing
Ransomware
Regulation
Research
Securing Employee-adopted Saas Apps
Security Architecture/engineering
Security Automation
Security Automation/artificial Intelligence/machine Learning
Security Awareness/training
Security Operations
Small/medium-sized Business Security
Software Security
Someone Bring Me Starbucks, Please - Part 2
Student Focused
Supply Chain Security
Technical & Practical
Threats (detection/hunting/intelligence/mitigation/monitoring)
What Ai Fans And Foes Need To Know About Information System Vulnerabilities
Why Effective Third-party Management Critical For A Robust Cyber Resilience
Workforce Trends (diversity/recruiting)
Zero Trust
Specialty
-- Select a Specialty --
test specialty
Sort
Newest
Oldest
Title
Price, Ascending
Price, Descending
Likes, Descending
Display Products with Available Credit
Apply Filters
Securing the Architecture of the Industrial Internet of Things: from the Edge to the Cloud
Oct 20, 2021
Collection: (ISC)² Security Congress 2021 - Career Center & Recordings
Credits: None available.
Type:
Session
Speakers:
Mr. Daniel A. Paillet
, CISSP, CCSK, CEH, CCNA,, Cybersecurity Architect, Schneider Electric
Tags:
Basic
Evolution of the EU "Cookie Law"
Oct 20, 2021
Collection: (ISC)² Security Congress 2021 - Career Center & Recordings
Credits: None available.
Type:
Session
Speakers:
Laurie-Anne Bourdain
, CISSP, Data Protection Officer, Isabel Group
Tags:
Basic
Incident Response: How To Keep Your Company Name Out Of The Evening News
Oct 20, 2021
Collection: (ISC)² Security Congress 2021 - Career Center & Recordings
Credits: None available.
Type:
Session
Speakers:
Meg West
, M.S., CISSP, Cybersecurity Incident Response Consultant, IBM X-Force Incident Response
John Dwyer
, Global Threat Assessment Lead, IBM X-Force Incident Response
Tags:
Basic
10 MORE Things Attorneys Can Do For Your InfoSec Team
Oct 20, 2021
Collection: (ISC)² Security Congress 2021 - Career Center & Recordings
Credits: None available.
Type:
Session
Speakers:
Mr. John Bandler
, Esq., CISSP, Founder and Principal,
Bandler Law Firm PLLC
Mr. John Bates
, JD, CISSP, CCSP, CIPP/US, CIPP/E, Senior Manager, Cybersecurity (Cyber Program Transformation), EY
Mr. Scott M. Giordano
, Esq., CISSP, CCSP, Attorney at Law, Giordano Law Offices
Tags:
Basic
Securing Critical Infrastructure Through Cyber-Focused Procurement Language
Oct 20, 2021
Collection: (ISC)² Security Congress 2021 - Career Center & Recordings
Credits: None available.
Type:
Session
Speakers:
Ms. Lori Ross O'Neil
, CISSP, PMP, Sr Cyber Security Researcher, Pacific Northwest National Laboratory, ISC2 Board of Directors
Tags:
Basic
Ransomware Happens, We Stop It From Spreading - Sponsored by illumio
Oct 20, 2021
Collection: (ISC)² Security Congress 2021 - Career Center & Recordings
Credits: None available.
Type:
Session
Speakers:
Nathanael Iversen
, Chief Evangelist, Illumio
Tags:
Basic
Diversity is a result of inclusive cultures
Oct 20, 2021
Collection: (ISC)² Security Congress 2021 - Career Center & Recordings
Credits: None available.
Type:
Session
Speakers:
Ms. Deidre Diamond
, Founder and CEO,
CyberSN and Secure Diversity
Jessica Gottsleben
, SD Ambassador and vCSO/vCISO, Secure Diversity
Tags:
Basic
Outsourcing IT, would you like security with that?
Oct 20, 2021
Collection: (ISC)² Security Congress 2021 - Career Center & Recordings
Credits: None available.
Type:
Session
Speakers:
Rob Ayoub
, CISSP, Senior Product Marketing Manager, Trellix
Sharon Smith
, CISSP, Program Manager, Amazon
Tags:
Basic
Keynote - Women in Security: A Strategy for Safety
Oct 20, 2021
Collection: (ISC)² Security Congress 2021 - Career Center & Recordings
Credits: None available.
Type:
Session
Speakers:
Jane Frankland
, Award-winning leader, best-selling author, speaker and women's change agent
Tags:
Basic
Trends and Trajectories in Control System Cyber Security: Findings of the (CS)2AI-KPMG 2021 CSCS Report
Oct 19, 2021
Collection: (ISC)² Security Congress 2021 - Career Center & Recordings
Credits: None available.
Type:
Session
Speakers:
Mr. Derek R. Harp
, Founder & Chairman, (CS)2AI
Tags:
Basic
Displaying 1 - 10 of 36
First
«
1
2
3
4
5
»
Last