Type
-- Select a Product Type --
Package
Conference
Session
Track
-- Select a Track --
3rd Party Risk
Application Security / Software Assurance
Application Security/ Software Assurance
Application Security/software Assurance
Attack Surface Management
Career Center
Career Development
Cloud Security
Control Validation Through Adversary Emulation At Dtcc
Critical Thinking
Cutting Edge
Cyber Crime
Cyber Leadership
Data Protection
Devsecop
Devsecops
Devsecops Demystified - Navigating The Conundrum
Diversity, Equity And Inclusion
Elevating Efficiency And Cloud Security: Saas Products In Public Sector
Emerging Technologies
Forward Thinking
Governance, Regulation And Compliance
Governance, Risk & Compliance
Governance, Risk & Compliance (grc)
Healthcare Security
How Does Ai Affect Intellectual Property Right?
Human Factors
Ics/critical Infrastructure
Identity/authentication/access Management
Incident Response
Incident Response/investigations/forensics
Incident Response/investigations/forensics/e-discovery
Inclusionready
Information Security Careers
Information Security Management
Insider Threat(s)
Internet Of Things (iot)
Investigations/forensics
Iot
Is Network Evidence Really Needed For Security Operations?
Keynote
Malware
Managing Cyber Risk For It And Ot Using Nist, Iec62443 & Iso27001
Mobile Security
Mobile/remote Workforce Security
Netwoking
Network Security
Networking
Outside The Algorithm: Cognitive Hacking And Online Influence
Owasp Cloud-native Application Security Top 10
Preventing Bad From Becoming Worse: Crisis Communication
Privacy
Professional & Career Development
Professional & Career Development
Protecting Cyberinfrastructure With Ai �vs. Attacking Cyberinfrastructure
Quantum Computing
Ransomware
Regulation
Research
Securing Employee-adopted Saas Apps
Security Architecture/engineering
Security Automation
Security Automation/artificial Intelligence/machine Learning
Security Awareness/training
Security Operations
Small/medium-sized Business Security
Software Security
Someone Bring Me Starbucks, Please - Part 2
Student Focused
Supply Chain Security
Technical & Practical
Threats (detection/hunting/intelligence/mitigation/monitoring)
What Ai Fans And Foes Need To Know About Information System Vulnerabilities
Why Effective Third-party Management Critical For A Robust Cyber Resilience
Workforce Trends (diversity/recruiting)
Zero Trust
Specialty
-- Select a Specialty --
test specialty
Sort
Newest
Oldest
Title
Price, Ascending
Price, Descending
Likes, Descending
Display Products with Available Credit
Apply Filters
Chapters 101
Jun 27, 2023
Collection: 2023 (ISC)² Global Chapter Leaders Summit
Credits: None available.
Type:
Session
Speakers:
Mr. James R. Mcquiggan
, CISSP, Security Awareness Advocate,
KnowBe4
Tags:
For new leaders and new chapters