RecertHero

Browse opportunities

30 results

Artificial intelligence is rapidly reshaping the cybersecurity landscape, giving attackers new ways to automate, scale, and personalize cyberattacks while providing defenders powerful tools to detect and respond faster than ever. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores how AI is being used on both sides of the threat equation and what this escalating arms race means for organizations. Attendees will learn how AI-driven threats such as advanced phishing, deepfakes, and automated malware are changing attacker tactics, as well as how security teams can leverage AI for threat detection, response, and risk reduction. The session will highlight practical considerations for preparing defenses as AI continues to transform the future of cybersecurity.

Mar 12, 2026Free
CySA++1CISSP+1Security++1+1 more

Ransomware remains one of the most disruptive and costly threats facing enterprises today, and preparation is critical to minimizing its impact. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he discusses how security teams can build ransomware readiness before an attack occurs, rather than reacting under pressure once systems are locked and operations are disrupted. Attendees will learn how to assess ransomware preparedness, close common gaps in visibility and response, and ensure backup, recovery, and communication plans are tested and trusted. The session will also explore how security, IT, legal, public relations, and executive teams can align ahead of time to reduce downtime, contain damage, and maintain control during a high-pressure ransomware event.

Mar 12, 2026Free
CISM+1CISSP+1CySA++1

The cybersecurity landscape continues to evolve at a rapid pace, driven by emerging technologies, shifting attacker tactics, and changing business priorities. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores five key cybersecurity predictions that are expected to significantly influence how organizations manage risk and defend against threats as 2027 approaches. Attendees will gain insight into anticipated developments across areas such as AI-driven attacks and defenses, ransomware evolution, regulatory pressures, workforce challenges, and security architecture trends. The session will focus on what these predictions mean in practical terms and how security leaders can begin preparing today to stay ahead of tomorrow’s threats and build more resilient, future-ready cybersecurity strategies.

Mar 12, 2026Free
CISM+1CISSP+1CISA+0.75

As cyber threats grow more sophisticated, choosing the right security tools is critical for reducing risk and staying resilient. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he examines the technologies every organization should consider as part of a modern cyber defense strategy. Learn which tools are most effective at protecting endpoints, identities, cloud environments, and data—based on current threat trends and real-world adoption. Steve will discuss how to evaluate tools, avoid stack sprawl, and align investments with business priorities. Attendees will leave with practical guidance for building a streamlined, future-ready security toolkit. CPE Credit 1 Group A CPE Credit

Apr 22, 2026Free
CISM+1CISSP+1

As organizations continue to rely on hundreds of SaaS applications, traditional security models are struggling to keep up. In this session, Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, shares insights into why SaaS has become a prime target for attackers and where security teams are most likely to lose visibility and control. The discussion focuses on proven approaches for managing SaaS risk, protecting sensitive data, and improving governance without disrupting users. Attendees will learn how to prioritize SaaS security initiatives, align controls with business needs, and build a scalable approach to protecting cloud-based applications in today’s dynamic IT environments. CPE Credit 1 Group A CPE Credit

Apr 22, 2026Free
CCSP+1CISM+1

This webinar will cover why enterprises need to start planning their transition to Post-Quantum Cryptography (PQC) to safeguard their sensitive information against future adversaries. We will delve into the latest NIST PQC standards, discuss key considerations for cryptographic inventory and agility, and outline actionable steps for assessing risk, prioritizing systems and implementing hybrid approaches. Attendees will gain insights and an understanding of how to approach building a PQC readiness program for their organization. Join Sponsor Google Cloud Security and Host ISC2 on May 21, 2026 at 1:00 p.m. Eastern/10:00 am Pacific to learn more! CPE Credit 1 Group A CPE Credit

May 13, 2026Free
CISSP+1CISM+1

What LLM-assisted triage actually delivers today (and where it bites you). Includes failure modes from real deployments, prompt-injection examples, and a checklist for safe rollout.

1 hrMay 19, 2026Free
CySA++1Security++1CISM+0.75

How to design an insider risk program that respects employee trust, with concrete signal sources, escalation playbooks, and HR/Legal partnership patterns.

1 hr 15 minMay 26, 2026Free
CISM+1.25CISA+1.25

A leader's view of AI governance: model risk classification, vendor due diligence, the EU AI Act in practice, and a sample policy template you can adapt.

1 hrJun 2, 2026Free
CISM+1CISSP+1

An auditor's perspective on building a cloud risk register, evidence collection in serverless environments, and translating cloud control gaps into board-ready language.

1 hr 30 minJun 6, 2026Free
CISA+1.5CISM+1.5CCSP+1.5

Three QSA panelists walk through the most-failed PCI DSS 4.0 requirements, with evidence examples that pass and ones that don't.

1 hr 15 minJun 30, 2026Free
CISA+1.25CISM+1.25

Closing the Critical Skills Gap for Modern and Effective Security Operations Centers (SOCs): Survey Results Any successful security operations center (SOC) will combine skilled people, effective processes and efficient technology. Previous SANS surveys have shown that the skills of the people are the prime prerequisite to enable organizations to define critical SOC processes; create use cases, hypotheses and plans; architect effective security solutions; and efficiently deploy, operate and maintain security systems. From that skills base, sophisticated technology and tools can be used as a force multiplier. CISOs and SOC managers who can reduce or close their critical skills gaps have the highest probability of minimizing business impact from cyberattacks when budgets and staffing are constrained. Webcast attendees will learn:Where hiring managers turn when sourcing potential new hiresWhich skill areas are most sought afterWhat technologies employers wish new hires had hands-on experience usingWhich security technologies are perceived as enabling organizations to delay or mitigate the need for additional staff Register today to be among the first to receive the associated whitepaper written by SANS Director of Emerging Security Trends, John Pescatore. Click here'to register for a companion webcast to be held at 1 PM ET on Thursday, July 30, 2020 ' a panel discussion with survey author John Pescatore and selected sponsors that digs more deeply in to the results.WebinarCyber Defense Presented: 29 Jul 2020 Technical Presentation View details

Self-pacedFree
CISM+1.5CySA++1.5
Webinar·SANS Institute

How Are Remote Workers Working? A SANS Poll Remote work has quickly become the \new normal" with the COVID-19 pandemic. Organizations have been forced to rethink how they will get work done with their employees mandated to stay home. 'How are organizations handling working from home? How well were companies prepared for remote work? How have technological needs changed with this shift? How are teams communicating? How are devices and communications being secured? When a time like this does not allow for the mission to halt, employees and employers have scrambled to keep the work going. 'Ensuring that teams are equipped, communicating, and are safe at home is key during this time.'this webinar, led by Heather Mahalik SANS Senior Instructor, Author and Senior Director of Digital Intelligence at Cellebrite, covers how companies have adjusted to this new landscape as a workforce. How have things changed and how are we coping and keeping the ball rolling forward from home.WebinarCyber Defense Presented: 4 Jun 2020 Technical Presentation View details

Self-pacedFree
CISM+1Security++1
Webinar·SANS Institute

Women in Cybersecurity: A SANS Survey Today, women are entering and rising through the ranks of cybersecurity experts, with more expected to join these ranks in coming years. By the end of 2019, women are expected to represent 20% of the global cybersecurity workforce, up dramatically from 2013, when only 11% of the workforce was female, according to the most recent statistics from Cybersecurity Ventures.At this webcast, survey author, forensic examiner and SANS instructor Heather Mahalik discusses key results of the survey of successful women in varied roles within the cybersecurity community and draws on experiences of such women to provide practical advice to women all along their career life cycle. Attendees will learn about:Directing your career pathGrowing as a manager/leaderInteracting with othersAs an added bonus, Heather will share the advice successful women have provided to those entering the cybersecurity field today.Register today to be among the first to receive the associated whitepaper written by Heather Mahalik.Click here 'to register for a companion webcast to be held at 1 PM ET on Tuesday, March 24, 2020, a panel discussion with survey author Heather Mahalik and selected sponsors that digs more deeply in to the results.WebinarCyber Defense Presented: 17 Mar 2020 Technical Presentation View details

Self-pacedFree
CISM+1

2020 SANS Cyber Threat Intelligence (CTI) Survey Results Over the past several years, SANS has seen a gradual maturation of cyber threat intelligence (CTI) and its applications in information security. The 2019 CTI survey saw an increase in usage of and interest in CTI, along with a diversification in how the intelligence is being used by organizations. While the use of CTI continued to grow, it became evident that there is no one-size-fits-all approach. Organizations leverage different types of CTI to meet different needs.The 2020 Cyber Threat Intelligence (CTI) Survey builds on previous surveys to provide guidance on how organizations of all types can get the most out of CTI. Attendees at this webcast will gain insight into:How consumers and generators of CTI leverage, create and measure intelligenceWhat progress has been made on automation of intelligence collection and processingWhat improvements organizations have realized as a result of using CTIWhich best practices are in use across respondents' organizationsRegister today to be among the first to receive the associated whitepaper written by SANS instructor and CTI expert Robert M. Lee.Click here to register for a panel discussion of the survey results on Thursday, February 13, 2020, at 1PM Eastern. On this webcast, Robert M. Lee and sponsor speakers will explore how these results can improve CTI programs.WebinarDigital Forensics and Incident Response Presented: 11 Feb 2020 Technical Presentation View details

Self-pacedFree
CySA++1.5CISM+1.5

Building and Maturing Your Threat Hunt Program While threat hunting sounds exciting--and promising--building an effective program can be daunting. The very definition of threat hunting is fluid, creating confusion about how to use it. Practitioners often have varying opinions about what would be involved in a threat hunt program and how to use it. And, there are many questions about how to develop a program that can evolve into an effective, mature one.In this new SANS webcast, SANS instructor Davis Szili, with insights from a Cisco representative, will help attendees define threat hunting and create an effective process for using it.'the webcast will address getting started, including building a team, what a typical hunt might look like and building a knowledge base for later use. 'Attendees also will learn how to create a test lab and use effective metrics.Register now and be among the first to receive the associated white paper written by David Szili.WebinarDigital Forensics and Incident Response Presented: 25 Jun 2019 Technical Presentation View details

Self-pacedFree
CySA++1CISM+0.75

Microsoft 365 Copilot accesses organizational data to generate responses, which introduces new risks for sensitive information exposure. Learn how to use Microsoft Purview audit, sensitivity labels, and data loss prevention to investigate, classify, and protect data in a Copilot-enabled environment.

2 hr 55 minSelf-pacedFree
CCSP+3Security++2.75CISM+2.75
Vendor training·Microsoft Learn

Build hands-on expertise with Microsoft Security Copilot. Start with enabling the solution and writing effective prompts to configuring enterprise workspaces and managing plugins and agents at scale.

1 hr 41 minSelf-pacedFree
CySA++1.75Security++1.75CISM+1.5

Organizations need to classify, label, and protect sensitive data to prevent exposure and ensure compliance. Microsoft Purview solutions provide data classification, sensitivity labels, and encryption to secure information across Microsoft 365 and on-premises storage. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.

6 hr 16 minSelf-pacedFree
CCSP+6.25CISSP+6.25CISM+6.25

Implement Microsoft Purview Insider Risk Management to detect, investigate, and respond to internal risks while protecting data, ensuring compliance, and maintaining employee trust.

3 hr 59 minSelf-pacedFree
CISM+4CCSP+4CISA+3.75

A facilitator's kit + recording of a 90-minute exercise simulating a ransomware incident touching on-prem AD, two cloud tenants, and a third-party MSP. Includes injects, scoring sheet, and after-action template.

1 hr 30 minSelf-pacedFree
CISM+1.5CySA++1.5CCSP+1.5

Vendor walkthrough of the SecureX orchestration story — integrations, response workflows, threat hunting via cross-product pivots.

1 hr 30 minSelf-pacedFree
CySA++1.5CISM+1.5

Lessons from a 12,000-employee company's migration from ISO 27001:2013 to the 2022 controls. Includes a mapped control delta and an evidence-gathering checklist.

45 minSelf-pacedFree
CISA+0.75CISM+0.75
Vendor training·Microsoft Learn

A 3-hour learning path covering conditional access, Privileged Identity Management, workload identities, and migration patterns from legacy AD. Includes 5 labs and a knowledge check.

3 hrSelf-pacedFree
CCSP+3CISSP+3CISM+2.5