Type
-- Select a Product Type --
Package
Conference
Session
Track
-- Select a Track --
3rd Party Risk
Application Security / Software Assurance
Application Security/ Software Assurance
Application Security/software Assurance
Attack Surface Management
Career Center
Career Development
Cloud Security
Control Validation Through Adversary Emulation At Dtcc
Critical Thinking
Cutting Edge
Cyber Crime
Cyber Leadership
Data Protection
Devsecop
Devsecops
Devsecops Demystified - Navigating The Conundrum
Diversity, Equity And Inclusion
Elevating Efficiency And Cloud Security: Saas Products In Public Sector
Emerging Technologies
Forward Thinking
Governance, Regulation And Compliance
Governance, Risk & Compliance
Governance, Risk & Compliance (grc)
Healthcare Security
How Does Ai Affect Intellectual Property Right?
Human Factors
Ics/critical Infrastructure
Identity/authentication/access Management
Incident Response
Incident Response/investigations/forensics
Incident Response/investigations/forensics/e-discovery
Inclusionready
Information Security Careers
Information Security Management
Insider Threat(s)
Internet Of Things (iot)
Investigations/forensics
Iot
Is Network Evidence Really Needed For Security Operations?
Keynote
Malware
Managing Cyber Risk For It And Ot Using Nist, Iec62443 & Iso27001
Mobile Security
Mobile/remote Workforce Security
Netwoking
Network Security
Networking
Outside The Algorithm: Cognitive Hacking And Online Influence
Owasp Cloud-native Application Security Top 10
Preventing Bad From Becoming Worse: Crisis Communication
Privacy
Professional & Career Development
Professional & Career Development
Protecting Cyberinfrastructure With Ai �vs. Attacking Cyberinfrastructure
Quantum Computing
Ransomware
Regulation
Research
Securing Employee-adopted Saas Apps
Security Architecture/engineering
Security Automation
Security Automation/artificial Intelligence/machine Learning
Security Awareness/training
Security Operations
Small/medium-sized Business Security
Software Security
Someone Bring Me Starbucks, Please - Part 2
Student Focused
Supply Chain Security
Technical & Practical
Threats (detection/hunting/intelligence/mitigation/monitoring)
What Ai Fans And Foes Need To Know About Information System Vulnerabilities
Why Effective Third-party Management Critical For A Robust Cyber Resilience
Workforce Trends (diversity/recruiting)
Zero Trust
Specialty
-- Select a Specialty --
test specialty
Sort
Newest
Oldest
Title
Price, Ascending
Price, Descending
Likes, Descending
Display Products with Available Credit
Apply Filters
Zero Trust and Third-Party Risk: Reduce the Blast Radius
Nov 13, 2023
Collection: Best of ISC2 Security Congress 2023
Credits: None available.
Type:
Session
Speakers:
Mr. Gregory Rasner
, CISSP, CCNA, CIPM, ITIL, Author
Tags:
Intermediate
Defending Against Token Theft
Nov 13, 2023
Collection: Best of ISC2 Security Congress 2023
Credits: None available.
Type:
Session
Speakers:
Mr. Etan Basseri
, CISSP, Senior Product Manager, Microsoft
Mr. Sergio Romero
, Senior Data Scientist, Microsoft
Tags:
Intermediate
The Day After: Managing Post-Incident Hardening and Resiliency
Nov 13, 2023
Collection: Best of ISC2 Security Congress 2023
Credits: None available.
Type:
Session
Speakers:
Mr. Jacob Norwood
, Director,
Booz Allen Hamilton Netherlands
Tags:
Intermediate
Learning from History: What Past Cyber Attacks Taught Us
Nov 13, 2023
Collection: Best of ISC2 Security Congress 2023
Credits: None available.
Type:
Session
Speakers:
Mr. Jeff Foresman
, Vice President, Rapid7
Tags:
Intermediate
Zero Trust Threat Modeling
Nov 13, 2023
Collection: Best of ISC2 Security Congress 2023
Credits: None available.
Type:
Session
Speakers:
Mr. Chris Romeo
, CISSP, CSSLP, CEO,
Kerr Ventures
Tags:
Intermediate
Legal Perspectives on the NIST AI Risk Management Framework
Nov 13, 2023
Collection: Best of ISC2 Security Congress 2023
Credits: None available.
Type:
Session
Speakers:
Mr. Scott M. Giordano
, Esq., CISSP, CCSP, Attorney at Law, Giordano Law Offices
Mr. Adam Cohen
, JD, CISSP, CCSP, CEH, Counsel, Baker Hostetler
Mr. David N. Patariu
, JD; MEng; MS; Privacy Law Specialist (PLS); IAPP Fellow of Infor, Attorney,
Venable LLP
Mr. John Bates
, JD, CISSP, CCSP, CIPP/US, CIPP/E, Senior Manager, Cybersecurity (Cyber Program Transformation), EY
Tags:
Intermediate
Generative AI: Your New Secret Weapon or Insider Threat?
Nov 13, 2023
Collection: Best of ISC2 Security Congress 2023
Credits: None available.
Type:
Session
Speakers:
Mr. Kyle Hinterberg
, CISSP, CISA, QSA, AWS SCS, Manager,
LBMC
Mr. Brian Willis
, CISSP, QSA, CCSK, ISO 27001 Sr. Lead Auditor, Senior Manager,
LBMC
Tags:
Intermediate
Cloud Architectures: Secure Experimentation and Innovation
Nov 13, 2023
Collection: Best of ISC2 Security Congress 2023
Credits: None available.
Type:
Session
Speakers:
Mr. Joshua Bregler
, MBA,CISSP, CCSP, Senior Security Manager, McKinsey & Company
Mr. Jonathan Barney
, CISSP, Senior Security Architect, McKinsey & Company
Tags:
Intermediate
The Art of Privilege Escalation - How Hackers Become Admins
Nov 13, 2023
Collection: Best of ISC2 Security Congress 2023
Credits: None available.
Type:
Session
Speakers:
Mr. Joseph Carson
, CISSP, OSCP, Chief Security Scientist & Advisory CISO,
Delinea
Tags:
Intermediate
Protecting the ML Pipeline: Practical Guidance for Securing Machine Learning Systems
Nov 13, 2023
Collection: Best of ISC2 Security Congress 2023
Credits: None available.
Type:
Session
Speakers:
Dr. Thomas P. Scanlon
, CISSP, Technical Program Manager, Carnegie Mellon University
Tags:
Intermediate
Displaying 1 - 10 of 117
First
«
1
2
3
4
5
»
Last