RRecertHero
BrowseCertificationsProvidersPricing
Sign inGet started

Browse

Continuing education opportunities

6 certifications. Updated daily.

FiltersBrightTALKClear all

Certification

Activity type

Cost

Duration

Showing 52 opportunities

FreeWebinar
BrightTALKLive

Security Report Trends - Without the Reading

So many security reports, so little time! Join our experts as we cut through the noise to highlight the trends that truly matter. In this session, we’ll explore: - SIEM Re-evaluation: Why 75% of CISOs are rethinking their strategies - The Rise of AI: How artificial intelligence is reshaping security practices (because we can't have a conversation without AI in 2025) - Emerging Threats and Vital Capabilities: What security leaders must prioritize to stay ahead From practitioner to CISO, you’ll leave with a more clear understanding of the market shifts and actionable insights from the latest security reports.

Sep 3, 2025Scheduled
Free
RRecertHero

An independent aggregator and tracking tool for IT continuing education. Built for the professionals who keep things running.

Product

  • Browse
  • Certifications
  • Pricing

Company

  • About
  • Methodology
  • Contact

Legal

  • Terms
  • Privacy

© 2026 RecertHero. Not affiliated with (ISC)², CompTIA, ISACA, or Cisco.

Credit estimates are guidance only — verify with your certifying body.

Webinar
BrightTALKLive

Eat Well, Work Well: Nutrition for Cybersecurity and High-Stress Careers

Burnout is a growing concern in cybersecurity, but nutrition can be a powerful tool to combat it. The Center hosted a webinar with Melissa Majumdar, MS, RD, CSOWM, LDN, who shared science-backed strategies for sustaining energy, improving focus, and building healthy habits under pressure.

Sep 4, 2025Scheduled
FreeWebinar
BrightTALKLive

Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough

Cybercriminals have moved beyond spray-and-pray phishing campaigns into the age of AI-powered precision attacks. Using generative AI, they're now creating hyper-personalized scams that mimic your colleagues' writing styles, clone your CEO's voice for vishing attacks, and craft multi-channel campaigns designed to slip past both technical controls and human intuition. In this eye-opening webinar at 1:00 p.m. Eastern/10:00 a.m. Pacific on September 2, 2025 KnowBe4 and ISC2 strip away the AI hype and exposes the stark reality of how artificial intelligence is transforming social engineering, making your people simultaneously your greatest vulnerability and your most critical defense. Join us and discover: • AI Threat Evolution: How attackers are using generative AI to scale sophisticated attacks that previously required weeks of research into automated campaigns launched in minutes • Deepfake Danger Zone: Real-world case studies of voice cloning, video manipulation and other AI-powered tactics that have successfully compromised organizations • Psychological Warfare 2.0: How AI allows attackers to exploit cognitive biases and emotional triggers with unprecedented precision • Human Risk Quantification: Practical frameworks for measuring your organization's human attack surface and tracking improvements over time • Next-Gen Defense Strategies: Actionable techniques to transform your security awareness program to counter AI-enhanced social engineering Whether you're securing a small business or a global enterprise, you'll walk away with concrete strategies to prepare your workforce for the AI threat revolution already underway.

CISSP~1Security+~1CISM~1
Sep 9, 2025Scheduled
FreeWebinar
BrightTALKLive

The Do's and Don'ts of Device Control Beyond USB Storage

Modern Device Control needs to support multiple data transfer channels, adapt to emerging business and compliance requirements, and provide detailed, context-aware protections without compromising productivity. Today, data leaves organizations not only through USB sticks, but also through wireless methods such as Bluetooth, local and network printers, peer-to-peer sharing tools like AirDrop, mobile devices, and specialized ports, such as FireWire. Managing these risks is further compounded by mixed OS environments that include Windows, macOS, and Linux. During this webinar on September 3, 2025, at 1:00 p.m. Eastern/10:00 a.m. Pacific, attendees will learn how to overcome challenges related to: - Device Control: Data loss via USB, Bluetooth, printers, mobile devices, and more - Ransomware Protection: Blocking unauthorized devices completely and eliminating risk at the hardware level - Enforcing Encryption: Encrypting files and devices to accommodate authorized data transfers while controlling access to decryption keys - DLP for Mixed OS Environments: Overcoming the unique device control and DLP challenges associated with environments that include Windows, macOS and Linux.

CISSP~1.5Security+~1.5
Sep 9, 2025Scheduled
FreeWebinar
BrightTALKLive

Your Sneak Peek into Cybersecurity and Business Alignment at ISC2 Security Congress 2025- #3

ISC2 Security Congress 2025 is right around the corner, and we’re so excited about this year’s speaker line-up that we decided to bring a sample of this year’s content to you early! Join three of our esteemed conference speakers as they preview their upcoming presentations, all of which relate to aligning cybersecurity strategy with business needs. By joining this webinar you’ll get a snapshot of session content, which includes the following presentations: · Building Robust Enterprise-wide Business Information Security Officer (BISO) Programs: Key Elements for Success · Cybersecurity: From Cost Center to Competitive Advantage · Drop-Shipping a New Security Department into a Multibillion-Dollar Company Join us live Sept. 11, 2025 at 1:00 p.m. Eastern/10:00 a.m.Pacific to be among the first to gain valuable insights into these sessions, plus have an opportunity to as your questions. Like what you see? Register for ISC2 Security Congress 2025 to unlock access to even more great content this October: https://web.cvent.com/event/00885cdc-a7ef-4682-81d1-77950c2f3d07/websitePage:e3e1427f-5c48-423a-a0e5-60dcec1c4363?RefId=Attend&utm_campaign=GBL-SecurityCongress&utm_content=congress&utm_medium=bannerep&utm_source=isc2web&utm_term=eventpage

CISM1.5CISSP~1.5
Sep 17, 2025Scheduled
FreeWebinar
BrightTALKLive

Navigating Malware-Free Attacks

We started with a simple question: what do modern attackers do? After analyzing over 700,000 security incidents, one technique was almost universally present: a staggering 84% of major attacks incorporated Living Off The Land (LOTL) tactics, using the same native tools and utilities your administrators use every day. If the tools are the same, how do you tell an attacker from a user? To find out, we turned our focus to legitimate usage data. By comparing this legitimate activity side-by-side with the malicious activity, we found quite a lot of interesting patterns. Join the Bitdefender team and ISC2 at 1:00 p.m. Eastern/10:00 a.m. Pacific on September 16, 2025 to get actionable insights from real-world attacks to better detect threats hiding in plain sight.

CySA+1Security+~1CISSP~1
Sep 23, 2025Scheduled
FreeWebinar
BrightTALKLive

From Shield to Spear: How AI is Reshaping Cyber Defense and Offense

The rise of artificial intelligence in cybersecurity is both a blessing and a curse. AI is redefining the cybersecurity battlefield, offering unprecedented advantages for security teams and threat actors. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores AI’s transformative impact on the IT security industry. On the defense side, AI is revolutionizing threat detection, automating incident response, and predicting vulnerabilities before they’re exploited. However, threat actors are also leveraging AI to enhance phishing attacks, create evasive malware, and orchestrate sophisticated social engineering campaigns. This webinar provides a balanced view of AI’s dual role in cybersecurity, showcasing both the opportunities and challenges it presents. Gain insights into how IT security teams can adopt AI to stay ahead, while understanding how adversaries may use it to their advantage. With expert commentary and real-world examples, this session equips attendees with the knowledge to navigate AI’s impact on the evolving threat landscape.

CISSP~1.5CySA+~1.5Security+~1.25
Sep 24, 2025Scheduled
FreeWebinar
BrightTALKLive

Ready to Launch Your Cybersecurity Career After Military or Government Service?

Making the move from military or government roles to the civilian cybersecurity workforce can feel like a big shift. The good news: your discipline, leadership, and technical expertise are in high demand — if you know how to showcase them. That’s where ISC2 comes in. Join us for an exclusive webinar featuring two of our own accomplished veterans: · Timothy Campo – Former Navy Information Warfare Naval Officer, now leading Security and Technical Operations at ISC2. · William Orr – USMC veteran and current ISC2 Standards Development Manager. Together, they’ll share first-hand insights on: · Translating your military experience into language that resonates with employers. · Leveraging your transferable skills to stand out in the corporate world. · Unlocking the career growth, flexibility, and opportunities unique to civilian cybersecurity. Don’t miss this chance to gain practical tools, resources, and insider advice to position yourself for success — and land your next role with confidence.

Oct 7, 2025Scheduled
FreeWebinar
BrightTALKLive

Securing the Future: AI, Resilience, and Evolving Cyber Roles (#3)

As AI reshapes job functions and workflows across cybersecurity, professionals face new questions: Which roles will grow or disappear? What skills will matter most? And how can we stay resilient amid constant change? In this forward-looking session, we explore ISC2 data on AI’s workforce impact alongside real-world insights from hiring trends and resilience research. Speakers will discuss how to prepare for the evolving landscape—from emerging AI-related security roles to the enduring value of human skills like judgment, adaptability, and emotional regulation. Attendees will leave with a clearer view of how to future-proof their careers—and their well-being—in an AI-driven world.

CISSP~1.5CISM~1.5
Oct 20, 2025Scheduled
FreeWebinar
BrightTALKLive

The Workforce Under Pressure: Burnout, Skills Gaps and Organizational Risk (#1)

Cybersecurity professionals are under more pressure than ever—with 90% of teams reporting skills gaps, 67% facing staffing shortages, and burnout rising across roles. In this opening session, we reveal the latest workforce data from ISC2, CyberSN and Cybermindz to unpack the human and operational impacts of today’s talent crisis. Speakers will explore how stress, role ambiguity, and unsustainable workloads are accelerating risk—both personal and organizational—and introduce the concept of mental resilience as an essential component of operational readiness. Attendees will gain insights into identifying burnout risks in themselves and their teams, along with practical guidance for setting healthier boundaries at work.

CISM~1CISA~1
Oct 20, 2025Scheduled
FreeWebinar
BrightTALKLive

Level Up Your Strategies in Cybersecurity Awareness Month and Beyond!

We’re already into Cybersecurity Awareness Month and that may have you asking: How do you turn mandatory security awareness into a fun and engaging campaign that actually reduces human risk and keeps momentum going for months to come? On Tuesday, October 14, 2025 at 1:00 p.m., Eastern/10:00 a.m. Pacific join sponsor KnowBe4 and host ISC2 to discover how to leverage engaging campaign ideas. This webinar will include KnowBe4's free ready-to-use kit, to run a complete themed campaign all year long. We've done the heavy lifting so you can focus on what matters most: building a stronger security culture that lasts. In this fun and practical session, you'll learn: -How to explain cyber threats to users in ways they can relate to and understand in their daily work -Real examples and creative campaign ideas showing how admins have created wildly successful cybersecurity awareness campaigns -Simple gamification techniques that transform passive learning into competitive fun -How to select the right training modules that entertain while they educate and why it matters -How to maintain momentum and engagement long after Cybersecurity Awareness Month ends Join us to get practical tools and creative ideas that will make your Cybersecurity Awareness Month campaign the talk of the organization while dramatically reducing your human risk.

CISM~1CISSP~1
Oct 22, 2025Scheduled
FreeWebinar
BrightTALKLive

Security Industry 101: What Every Newcomer Needs to Know

New to the security industry? Or thinking about transitioning into an information security role? If so, this webinar is for you. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he provides a one-hour ‘crash course’ on the entire security industry, including: - Size and growth of the security industry - Useful vocabulary terms and buzz words - Five types of cyberthreat actors - Modern cyberthreats and tactics - Categories of security defenses - Common security job roles - Security industry ecosystem

Security+~1CISSP~1
Oct 27, 2025Scheduled
FreeWebinar
BrightTALKLive

From Technicians to Professionals: The Duty of Care in Cybersecurity (#2)

What does it mean to treat cybersecurity as a true profession—not just a discipline? This session challenges practitioners, leaders, and hiring managers to rethink professional standards in cyber, highlighting the role of credentialing, clear career pathways, and people-centric leadership in retaining and growing talent. Speakers will explore how human factors such as stress and burnout can impact performance, and why self-awareness, empathy, and communication are essential leadership skills in today’s environment. Drawing from workforce insights and neuroscience, this session helps attendees understand how to position themselves for advancement—by building a foundation of professional efficacy, emotional insight, and resilience.

CISM~1CISSP~1
Oct 28, 2025Scheduled
FreeWebinar
BrightTALKLive

How to Modernize Threat Protection in the Age of AI

The surge in generative AI and increasingly sophisticated social engineering tactics has given cybercriminals powerful new tools to exploit human vulnerabilities—especially through email. These attacks are no longer just technical; they’re psychological, targeting your employees to gain access, steal data, and inflict financial and reputational damage. Join sponsor, Proofpoint and host, ISC2 on October 21, 2025 at 1:00 p.m. Eastern/10:00 a.m. Pacific for a live 60-minute webinar. During this session we’ll explore actionable approaches for strengthening your human firewall. Discover how to empower your workforce, reduce risk, and build a resilient defense against today’s AI-enhanced threats. Don’t miss it!

Security+~1CySA+~1CISSP~1
Oct 28, 2025Scheduled
FreeWebinar
BrightTALKLive

The Road Ahead: Top Five Cybersecurity Predictions for 2026

The cybersecurity landscape is evolving rapidly. As cyberthreats grow in complexity, organizations must stay ahead of the curve by anticipating what’s next. So, what’s in store for our industry in the coming year? Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he recaps the good, the bad, and the ugly cybersecurity events of 2025 and shares his top five cybersecurity predictions for 2026. This webinar provides a forward-looking perspective, equipping attendees with the insights and strategies needed to stay ahead of emerging threats and capitalize on new opportunities.

CISSP~1CISM~1
Nov 19, 2025Scheduled
FreeWebinar
BrightTALKLive

AI-Powered SOCs: Automate Smarter, Defend Better

AI-driven SOCs promise efficiency gains, but how much automation is too much? While AI-powered security tools enhance SIEM, SOAR, and threat detection, adversaries are exploiting automation blind spots, manipulating AI models, and evading AI-driven defenses. This session dissects real-world adversarial AI attacks, including a case study on Microsoft Copilot’s AI vulnerabilities—where attackers exploited indirect prompt injection and adversarial inputs to manipulate security workflows. Attendees will learn how AI can be both a force multiplier and a security risk, gaining: - An understanding of how attackers bypass AI-powered security automation - A breakdown of adversarial AI tactics and AI-specific SOC vulnerabilities - A hybrid AI-human SOC model that reduces false positives while maintaining resilience This session offers a practical roadmap to securely integrate AI in SOC operations without increasing attack surfaces.

CySA+1CISSP~1CISM~0.75
Dec 9, 2025Scheduled
FreeWebinar
BrightTALKLive

Building a Post-Quantum Tech Stack: From Readiness to Implementation

Preparing for the post-quantum era requires more than awareness - it demands a modern cryptographic foundation built for agility, visibility, and compliance. Organizations must be able to discover and manage their cryptographic assets, modernize and consolidate their infrastructure, and confidently test and implement post-quantum cryptography (PQC). On December 2, 2025 at 1:00 p.m. Eastern/10:00 a.m. Pacific, Sponsor Entrust and host ISC2 explore practical steps for aligning your PQC readiness journey with execution - including cryptographic asset management, PKI, and HSMs. We’ll discuss how crypto discovery, agility, and modernization strategies - supported by automation, compliance management, and integrated visibility - can help organizations strengthen security now and through migration. Join us to learn how you can move from planning to deploying PQC, building a tech stack ready to secure your organization against quantum threats today and tomorrow.

CISSP1CCSP~1CISM~0.75
Dec 9, 2025Scheduled
FreeWebinar
BrightTALKLive

5 Key Learnings from the Frontlines: Enterprise Passkey Deployment Realities in 2026

In the first half of 2025, over 16 billion passwords were leaked—highlighting the urgent need for stronger, phishing-resistant authentication methods. Despite growing awareness, many organizations still hesitate to adopt passkeys due to perceived complexity, cost concerns, and a lack of clear guidance, as noted in recent research by the FIDO Alliance and HID. On December 11, 2025 at 1:00 p.m. Eastern/10:00 a.m Pacific, Sponsor HID Global and Host ISC2 share practical, field-tested insights into accelerating enterprise passkey adoption. Learn how to: * Navigate common deployment challenges * Align authentication strategies with evolving security goals * Drive user adoption and organizational buy-in Join us to stay ahead of the passwordless curve and prepare your enterprise for a more secure, streamlined authentication future in 2026.

CISSP~1Security+~1CISM~1
Dec 16, 2025Scheduled
FreeWebinar
BrightTALKLive

The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

Approximately $350 million in preventable losses stem from polymorphic malware, malicious software that constantly changes its code to evade detection. With 18% of new malware using adaptive techniques that challenge traditional defenses, now is the time to enhance your organization's security posture. Join us December 9, 2025 at 1:00 p.m. Eastern/10:00 a.m. Pacific for this webinar where Sponsor, KnowBe4 and Host, ISC2 share valuable insights and proactive strategies to strengthen your security framework against sophisticated attacks. In this session, you'll discover: - Enhanced detection strategies that go beyond traditional signature-based approaches to identify polymorphic threats before they impact your systems - Proactive defense frameworks specifically designed to counter the most sophisticated shape-shifting malware - Success stories from organizations that effectively neutralized advanced threats through strategic security improvements - Communication templates for building stakeholder support for security enhancements - Practical implementation roadmaps to strengthen your security posture against adaptive threats drawing from real-world scenarios and emerging threat intelligence, You'll leave with a practical toolkit of strategies you can be implemented immediately to enhance your organization's resilience.

CySA+1Security+1CISSP~1
Dec 16, 2025Scheduled
FreeWebinar
BrightTALKLive

Darwinian Offense: Generative Curricula for Autonomous Red Teaming- a Security Congress Encore

AI has historically struggled to assist in offensive security due to a critical shortage of real-world training data. This session takes a deep dive into the methodology behind recently published research designed to overcome this limitation through adversarial self-learning. Following up on her popular Security Congress 2025 keynote, researcher Alissa Knight will dissect a novel architecture where an AI teaches itself to hack not by studying past attacks, but by engaging in a continuous, high-stakes war game against itself. Attendees will learn the mechanics of this "survival of the fittest" loop, where two competing agents—one constructing defensive puzzles and the other evolving breaking strategies—force the emergence of increasingly sophisticated API attacks without human intervention. The session will move from research theory to validation with a live demonstration against a banking API using Ares, a prototype implementation of this autonomous framework.

CISSP~1.5CySA+~1.5
Dec 24, 2025Scheduled
FreeWebinar
BrightTALKLive

Systems Security Certified Practitioner (SSCP) Info Session

Join us for a deep dive into Systems Security Certified Practitioner (SSCP), the security operations and network security credential from ISC2, creator of the CISSP. As organizations continue to pursue digital transformation initiatives, the threat landscape is always expanding. Yet cybersecurity leadership talent is scarce. That’s where SSCP from ISC2 comes in — to help fill the gap. Once certified, the opportunities for certified professionals are near limitless. The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets. It shows you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures. In this 60-minute live virtual session, you’ll learn: - If SSCP is right for you - How Official ISC2 Training flexes with your learning style - What to expect on exam day - How to become endorsed and maintain your certification Plus! Get answers to your SSCP questions during the Q&A section. Register now and begin your SSCP certification journey today!

CISSP~1Security+~1
Jan 16, 2026Scheduled
FreeWebinar
BrightTALKLive

Modernizing PKI for the Post-Quantum Transition

Preparing for the post-quantum era isn’t as simple as swapping algorithms. Organizations face growing complexity across certificates, identities and encrypted data — all while standards, timelines and risks continue to evolve. On January 15, 2026, at 1:00 p.m. Eastern/10:00 a.m. Pacific, sponsor Entrust and host ISC2 will explore why PKI (public key infrastructure) plays a central role in post-quantum readiness, the practical trade-offs between pure post-quantum and hybrid approaches, and how building crypto agility today helps reduce future disruption, risk and operational strain.

CISSP1Security+~1
Jan 29, 2026Scheduled
FreeWebinar
BrightTALKLive

Cybersecurity: From Cost Center to Competitive Advantage

Security professionals often focus solely on defense. But what if we viewed cybersecurity as a strategic asset that drives sales and builds customer trust? This session on January 27, 2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific will explore the untapped potential of cybersecurity to become a key enabler for revenue generation and enhanced customer relationships. We will delve into practical strategies for proactively integrating security considerations into the sales cycle, leveraging security as competitive differentiators, and effectively communicating your security posture to build unwavering customer confidence. This session will demonstrate how a shift in mindset can position cybersecurity as a vital contributor to business growth while upholding ethical responsibilities in data protection, offering actionable insights for security professionals across all levels.

CISM~1CISSP~1
Feb 5, 2026Scheduled
FreeWebinar
BrightTALKLive

AI and Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

Two technological forces are converging to reshape cybersecurity forever: AI and quantum computing. Most organizations are dangerously unprepared for what's coming next. These aren't just buzzwords—they're fundamentally changing how attacks happen, who can launch them, and which defenses will fail under pressure. While most security guidance offers surface-level awareness, attackers are already weaponizing these technologies against specific vulnerabilities in YOUR environment—from social engineering to ransomware to password cracking. Join Sponsor KnowBe4 and Host ISC2 February 12, 2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific for a no-nonsense deep dive into the specific threats you're facing and the exact defenses you need now. KnowBe4 CISO Advisor Roger Grimes cuts through the hype to deliver actionable intelligence on how AI and quantum will impact each attack vector in your organization. Discover: -What AI actually is (and isn't) and why that distinction matters for your security strategy -The real quantum threats emerging now and which defenses become obsolete overnight -Exactly how AI and quantum amplify social engineering, password cracking, ransomware and vulnerability exploitation against your systems -How to protect against threats coming from AI and quantum while securing the AI and quantum tools you’re already deploying -Specific changes to implement in your security program to counter these advanced threats effectively Stop preparing for yesterday's threats. Arm yourself with the precise intelligence and practical defenses that will actually protect your organization in the AI and quantum era.

CISSP1.5Security+~1.5CISM~1.25
Feb 23, 2026Scheduled
FreeWebinar
BrightTALKLive

Winning the Cyber Talent War: How to Attract and Keep Top Security Professionals

The competition for skilled cybersecurity professionals has never been more intense. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores proven, practical strategies organizations can use to attract top-tier security talent—and keep them engaged for the long term. Learn how leading teams are modernizing recruiting practices, expanding talent pipelines, and differentiating themselves in a crowded market. Steve will also examine retention drivers such as career development, work hours and location flexibility, employee recognitions, and leadership support. Attendees will leave with actionable insights to reduce turnover, combat burnout, and build resilient, high-performing security teams that can keep pace with today’s evolving threat landscape.

CISM~1
Feb 24, 2026Scheduled
FreeWebinar
BrightTALKLive

Building an AI Security Champions Program

Security champions programs are a proven way to scale security across large development teams, but the rise of AI-assisted development introduces new challenges, risks, and opportunities that traditional programs were not designed to handle. As AI coding assistants and autonomous agents accelerate how software is built, security champions play a critical role in embedding secure-by-design practices earlier and at greater scale. Join sponsor Snyk and host ISC2 on February 19, 2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific to learn how to build an AI-ready Security Champions Program from the ground up, empowering developers to advocate for security across both human-written and AI-generated code. Attend this session to: - Understand how the role of security champions evolves in AI-accelerated development environments - Learn how to identify, train, and enable champions to address AI-specific risks alongside traditional AppSec concerns - Discover how to define success, establish KPIs, and integrate security tooling into modern workflows - Gain practical guidance on fostering collaboration, recognizing champions, and creating feedback loops that scale security as AI adoption grows

CISSP~1CISM~1Security+~1
Mar 2, 2026Scheduled
FreeWebinar
BrightTALKLive

Agentic Security in the SOC: Concept vs. Reality

Agentic security is no longer a future concept – it’s already reshaping how today’s SOCs operate. But with the hype accelerating, security leaders need clarity on what “agentic” actually looks like in production, which capabilities are real today, and what’s still on the roadmap. Join this session on February 26th, 2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific to learn: - What “agentic security” actually means in the context of the SOC - Which agentic capabilities are realistic and deployable today with concrete examples from security teams seeing value today - How agentic systems complement human analysts in detection and response - Metrics CISOs and security leaders are using to prove measurable outcomes - What’s coming next – and how to prepare for the future SOC We’ll separate practical reality from future promise, explore how agents work alongside human analysts, and outline what the next evolution of the SOC will require. You’ll leave with a clear understanding of what’s deployable today, what’s coming next, and how to prepare your SOC for an agent-driven future.

CySA+1.5CISM~1.5Security+~1.25
Mar 4, 2026Scheduled
FreeWebinar
BrightTALKLive

Staying Sober Under Pressure: Recovery, Resources and Community in High-Stress Careers

Sponsored by the Center for Cyber Safety and Education. In high-pressure fields like cybersecurity, long hours and constant demands can make it challenging to maintain balance—especially for professionals exploring a sober or sober-curious path while navigating intense work environments. The Center hosted a candid conversation with Jen VanAntwerp, founder of Sober in Cyber, and Tom Eston, Sr. Director of Professional Services at Snyk, who shared practical strategies for managing stress in healthier ways and building supportive peer networks within the industry. View the recording below to gain actionable insights for creating a more sustainable, balanced approach to your professional and personal well-being.

Mar 11, 2026Scheduled
FreeWebinar
BrightTALKLive

Certified in Governance, Risk and Compliance (CGRC) Info Session

Join us for a deep dive into Certified in Governance, Risk and Compliance (CGRC), the governance, risk and compliance credential from ISC2, creator of the CISSP. The CGRC is an information security practitioner who champions system security commensurate with an organization’s mission and risk tolerance, while meeting legal and regulatory requirements. CGRC, a vendor-neutral cybersecurity credential, recognizes your knowledge, skills and abilities to authorize and maintain information systems within the RMF. It proves you know how to formalize processes to assess risk and establish security documentation. CGRC is particularly well-suited for IT, information security and cybersecurity practitioners who manage risk in information systems. It is also recommended for any practitioner involved in authorizing and maintaining information systems. In this 60-minute live virtual session, you’ll learn: - If CGRC is right for you - How Official ISC2 Training flexes with your learning style - What to expect on exam day - How to become endorsed and maintain your certification Plus! Get answers to your CGRC questions during the Q&A section. Register now and begin your CGRC certification journey today!

CISM~1CISSP~1
Mar 12, 2026Scheduled
FreeWebinar
BrightTALKLive

Why Your PTaaS is Failing the Speed Test

In 2026, software is deployed multiple times a day, often automatically with every code commit, but many security teams are still operating on “on-demand” testing cycles that can’t keep up. While PTaaS (penetration testing as a service) modernized how findings are delivered, it often fails to close the exposure gaps created by daily deployments and shifting cloud infrastructure. Join sponsor Sprocket Security and host ISC2 March 5,2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific to explore why traditional PTaaS is breaking under the pressure of modern engineering and how moving to a Continuous Penetration Testing (CPT) model allows your offensive strategy to match the velocity of your development team.

CySA+1CISSP~1
Mar 12, 2026Scheduled
FreeWebinar
BrightTALKLive

The AI Arms Race: Attackers, Defenders, and the Future of Cybersecurity

Artificial intelligence is rapidly reshaping the cybersecurity landscape, giving attackers new ways to automate, scale, and personalize cyberattacks while providing defenders powerful tools to detect and respond faster than ever. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores how AI is being used on both sides of the threat equation and what this escalating arms race means for organizations. Attendees will learn how AI-driven threats such as advanced phishing, deepfakes, and automated malware are changing attacker tactics, as well as how security teams can leverage AI for threat detection, response, and risk reduction. The session will highlight practical considerations for preparing defenses as AI continues to transform the future of cybersecurity.

CISSP~1Security+~1CySA+~1+1 more
Mar 12, 2026Scheduled
FreeWebinar
BrightTALKLive

Ransomware Readiness: Preparing Your Security Team Before an Attack Hits

Ransomware remains one of the most disruptive and costly threats facing enterprises today, and preparation is critical to minimizing its impact. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he discusses how security teams can build ransomware readiness before an attack occurs, rather than reacting under pressure once systems are locked and operations are disrupted. Attendees will learn how to assess ransomware preparedness, close common gaps in visibility and response, and ensure backup, recovery, and communication plans are tested and trusted. The session will also explore how security, IT, legal, public relations, and executive teams can align ahead of time to reduce downtime, contain damage, and maintain control during a high-pressure ransomware event.

CISM1CySA+~1CISA~1
Mar 12, 2026Scheduled
FreeWebinar
BrightTALKLive

Looking Ahead: Five Cybersecurity Predictions That Will Shape 2027

The cybersecurity landscape continues to evolve at a rapid pace, driven by emerging technologies, shifting attacker tactics, and changing business priorities. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores five key cybersecurity predictions that are expected to significantly influence how organizations manage risk and defend against threats as 2027 approaches. Attendees will gain insight into anticipated developments across areas such as AI-driven attacks and defenses, ransomware evolution, regulatory pressures, workforce challenges, and security architecture trends. The session will focus on what these predictions mean in practical terms and how security leaders can begin preparing today to stay ahead of tomorrow’s threats and build more resilient, future-ready cybersecurity strategies.

CISM1Security+~1CISSP~1
Mar 12, 2026Scheduled
FreeWebinar
BrightTALKLive

People-Powered Security: How to Build a Cyber-Savvy Workforce

Cybersecurity is no longer just a technology challenge—it’s a people challenge. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores how organizations can reduce risk by empowering employees to recognize, prevent, and respond to cyber threats. This webinar will cover practical strategies for creating engaging security awareness programs, reinforcing secure behaviors, and embedding security into everyday work routines. Learn how phishing simulations, role-based training, and measurable outcomes can transform employees from the weakest link into a critical line of defense. Attendees will leave with actionable insights to strengthen security culture and reduce human-driven cyber risk.

CISM1CISSP~1Security+~1
Mar 18, 2026Scheduled
FreeWebinar
BrightTALKLive

The Human-Centric Email Exfiltration Crisis and How to Stop it Cold

Most data exfiltration doesn’t start with sophisticated malware, it starts with a person and a simple email action. Whether intentional or accidental, employees forwarding sensitive information to personal accounts, partners, or competitors continues to expose organizations to regulatory, financial, and reputational risk. On March 19, 2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific, sponsor Proofpoint and host ISC2 examine how human-driven email data loss unfolds inside real organizations, what current Data Loss Assessments (DLAs) reveal about everyday user behavior, and why traditional, rule-based DLP controls often fail to detect subtle but high-risk activity. We’ll also discuss how behavioral AI and machine learning are enabling security teams to move from reactive detection to proactive prevention. You’ll learn: -Why user-driven email exfiltration remains a persistent, overlooked risk -Key insights from recent cross-industry Data Loss Assessments, including: - Engineers sending proprietary designs externally - Legal staff exporting sensitive client data before departure - Healthcare employees emailing credentials and unencrypted patient records - Finance teams sharing confidential revenue data outside the organization -How behavioral analysis detects personal emails and high-risk destinations -How anomaly detection flags spikes in sensitive attachments and unusual recipient activity that static DLP misses

CISSP1CISM~1Security+~1+1 more
Mar 27, 2026Scheduled
FreeWebinar
BrightTALKLive

Stop Chasing Alerts: Automating Email Security with Behavioral AI Roundtable

Phishing, business email compromise (BEC), and account takeover (ATO) remain some of the most disruptive and resource-draining security challenges for modern organizations. AI-generated attacks now convincingly mimic trusted colleagues, vendors, and partners, bypassing traditional defenses and landing directly in user inboxes. On April 9, 2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific, sponsor Abnormal AI and host ISC2 discuss how security teams can shift from reactive alert triage to automated, behavior-based defense. They'll cover: - Why modern phishing, BEC, and ATO attacks evade traditional email security controls - The operational strain on SOC and IT teams, including alert fatigue and investigation backlogs - Practical ways behavioral AI can automate detection, investigation, and remediation Join us to learn how to create a smarter, automated defense against modern email threats.

CySA+1Security+~1CISSP~1
Apr 22, 2026Scheduled
FreeWebinar
BrightTALKLive

Certified Cloud Security Professional (CCSP) Info Session

Join us for a deep dive into Certified Cloud Security Professional (CCSP), the cloud security credential from ISC2, creator of the CISSP. As cyber threats make daily headlines, the need for cloud security experts is at an all-time high. Yet talent is scarce. The cyber workforce needs an influx of 3.4 million more professionals to meet global demand. As a result, the career opportunities for CCSP-certified professionals are near limitless. CCSP, a vendor-neutral credential, not only provides a strong foundational understanding of key concepts, it shows you’re able to quickly learn and adapt to different scenarios, including working with platforms from different vendors. As more organizations worldwide move to multi-cloud operations, the versatile skills from vendor-neutral certification are highly desirable for cloud security teams. In this 60-minute live virtual session, you’ll learn: - If CCSP is right for you - How Official ISC2 Training flexes with your learning style - What to expect on exam day - How to become endorsed and maintain your certification Plus! Get answers to your CCSP questions during the Q&A section. Register now and begin your CCSP certification journey today! CPE Credit 1 Group A CPE Credit

CCSP1
Apr 22, 2026Scheduled
FreeWebinar
BrightTALKLive

Certified in Cybersecurity (CC) Info Session

Join us for a deep dive into Certified in Cybersecurity (CC), the entry-level cybersecurity credential from ISC2, creator of the CISSP. Cyberthreats continue to escalate worldwide, and the need for cybersecurity experts is critical. But talent is scarce. Research shows the workforce needs an influx of 3.4 million cybersecurity professionals to meet global demand. ISC2 seeks to help close the skills gap with CC by opening opportunities in the industry to a new pool of professionals. With no experience required, it creates a clear pathway and breaks down traditional barriers to entry, enabling candidates to build confidence and enter their first cybersecurity role ready for what’s next. In this 60-minute live virtual session, you’ll learn: - If CC is right for you - How Official ISC2 Training flexes with your learning style - What to expect on exam day - How to maintain your certification Plus! Get answers to your CC questions during the Q&A section. Register now and begin your CC certification journey today! CPE Credit 1 Group A CPE Credit

Security+~1
Apr 22, 2026Scheduled
FreeWebinar
BrightTALKLive

The 2026 Security Stack: Tools Defining the Future of Cyber Defense

As cyber threats grow more sophisticated, choosing the right security tools is critical for reducing risk and staying resilient. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he examines the technologies every organization should consider as part of a modern cyber defense strategy. Learn which tools are most effective at protecting endpoints, identities, cloud environments, and data—based on current threat trends and real-world adoption. Steve will discuss how to evaluate tools, avoid stack sprawl, and align investments with business priorities. Attendees will leave with practical guidance for building a streamlined, future-ready security toolkit. CPE Credit 1 Group A CPE Credit

CISSP1CCSP~1CISM~1
Apr 22, 2026Scheduled
FreeWebinar
BrightTALKLive

Securing SaaS at Scale: Protecting Data in a Cloud-First World

As organizations continue to rely on hundreds of SaaS applications, traditional security models are struggling to keep up. In this session, Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, shares insights into why SaaS has become a prime target for attackers and where security teams are most likely to lose visibility and control. The discussion focuses on proven approaches for managing SaaS risk, protecting sensitive data, and improving governance without disrupting users. Attendees will learn how to prioritize SaaS security initiatives, align controls with business needs, and build a scalable approach to protecting cloud-based applications in today’s dynamic IT environments. CPE Credit 1 Group A CPE Credit

CCSP1CISSP~1CISM~1
Apr 22, 2026Scheduled
FreeWebinar
BrightTALKLive

Certified Secure Software Lifecycle Professional (CSSLP) Info Session

Join us for a deep dive into Certified Secure Software Lifecycle Professional (CSSLP), the software security credential from ISC2, creator of the CISSP. As organizations continue to pursue digital transformation initiatives, the threat landscape is always expanding. Yet cybersecurity leadership talent is scarce. That’s where CSSLP from ISC2 comes in — to help fill the gap. Once certified, the opportunities for certified professionals are near limitless. The CSSLP is ideal for software development and security professionals responsible for applying best practices to each phase of the Software Development Lifecycle (SDLC). It shows your expertise and ability to incorporate security practices - authentication, authorization and auditing - into each phase of Software Development Lifecycle. In this 60-minute live virtual session, you’ll learn: - If CSSLP is right for you - How Official ISC2 Training flexes with your learning style - What to expect on exam day - How to become endorsed and maintain your certification Plus! Get answers to your CSSLP questions during the Q&A section. Register now and begin your CSSLP certification journey today! CPE Credit 1 Group A CPE Credit

CISSP~1
Apr 22, 2026Scheduled
FreeWebinar
BrightTALKLive

Security Industry 101: A Crash Course for New and Aspiring Security Professionals

Cybersecurity is one of the fastest-growing and most in-demand fields—but breaking in can feel overwhelming. This crash course is designed for aspiring and early-career security professionals who want a clear, practical introduction to the cybersecurity industry. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he covers important topics that every cybersecurity newcomer ought to know, including: • Size and growth of the security industry • Useful vocabulary terms and buzz words • Five types of cyberthreat actors • Modern cyberthreats and tactics • Categories of security defenses • Common security job roles • Security industry ecosystem CPE Credit 1 Group A CPE Credit

Security+1CISSP~1
Apr 22, 2026Scheduled
FreeWebinar
BrightTALKLive

2026 Supply Chain Attacks: Axios NPM and TeamPCP Compromises

In early 2026, we witnessed an escalation in software supply chain attacks. Threat actors are increasingly targeting widely used open-source tools and repositories to maximize their downstream impact. Notably, the North Korean threat actor UNC1069 compromised the widely used Axios NPM package, introducing a malicious dependency into a platform that sees over 100 million weekly downloads. Simultaneously, the threat group TeamPCP orchestrated a cascading supply chain compromise targeting CI/CD pipelines via popular tools like the Trivy vulnerability scanner, Checkmarx GitHub Actions and the LiteLLM PyPI package. These compromised pipelines were weaponized to harvest cloud credentials for later data theft and extortion, and to pave the way for potential ransomware deployment. On April 16, 2026 at 1:00 pm Eastern/10:00 a.m. Pacific, sponsor Google and host ISC2 will provide a look at the rapid evolution, impact and response to these dual supply chain campaigns. This session will cover: -An overview of the North Korea-nexus UNC1069 campaign targeting Axios NPM releases, detailing how the plain-crypto-js malicious dependency was used to deploy the WAVESHAPER.V2 backdoor across Windows, macOS and Linux environments. -The tactics, techniques and procedures (TTPs) of TeamPCP, including their deployment of the SANDCLOCK credential stealer via poisoned GitHub Actions to extract cloud credentials, local environment variables and cryptocurrency wallets. -How TeamPCP and collaborating actors stole highly privileged cloud tokens to facilitate data extortion and planned deployments of VECTORLOCK ransomware. -Actionable guidance and rapid response strategies alongside critical remediation steps like dependency pinning, auditing lockfiles and rotating exposed secrets. CPE Credit 1 Group A CPE Credit

CySA+1CISSP~1CCSP~1
Apr 29, 2026Scheduled
FreeWebinar
BrightTALKLive

Securing Remote & Hybrid Workforces Without Killing Productivity

Remote and hybrid work are now permanent realities, but they have dramatically expanded the attack surface and introduced new security challenges. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores how organizations can protect users, devices, and data—without slowing down the business or frustrating employees. This webinar will cover practical strategies for securing access, managing endpoints, and protecting sensitive information across distributed environments. Steve will discuss how modern identity controls, cloud security, and user-focused policies can reduce risk while supporting flexibility and performance. Attendees will leave with actionable guidance to balance strong security with a seamless employee experience.

Security+~1CISM~1CCSP~0.75
Apr 29, 2026Scheduled
FreeWebinar
BrightTALKLive

Certified Information Systems Security Professional (CISSP) Info Session

Join us for a deep dive into Certified Information Systems Security Professional (CISSP), the cybersecurity leadership credential from ISC2. Earning the CISSP is an investment in your future and an important next step in your career. Consistently recognized globally as the gold standard cybersecurity certification, it distinguishes you as a leader committed to excellence. CISSP certification demonstrates that you have the advanced knowledge and technical skills to design, develop and manage an organization’s overall security posture. If you’re vendor-certified, it expands the depth and breadth of your knowledge and positions your skills as more versatile. In this 60-minute live virtual session, you’ll learn: - If CISSP is right for you - How Official ISC2 Training flexes with your learning style - What to expect on exam day - How to become endorsed and maintain your certification Plus! Get answers to your CISSP questions during the Q&A section. Register now and begin your CISSP certification journey today! CPE Credit 1 Group A CPE Credit

CISSP1
May 5, 2026Scheduled
FreeWebinar
BrightTALKLive

Key Insights from CyberEdge’s 2026 Cyberthreat Defense Report

CyberEdge’s annual Cyberthreat Defense Report (CDR) has become a staple for assessing organizations’ security postures, for gauging perceptions of IT security professionals, and for ascertaining current and planned investments in IT security infrastructure. It incorporates dozens of insights from 1,200 security professionals from 17 countries and 19 industries. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he reviews key findings from CyberEdge’s 2026 CDR. Steve will break down trends in cyberattacks, ransomware, AI-driven threats, security spending, and security team challenges. Attendees will gain a clear, benchmark-driven view of how organizations are responding to today’s evolving threat landscape and learn how to apply these insights to strengthen security strategies, prioritize investments, and reduce cyber risk in the year ahead. CPE Credit 1 Group A CPE Credit

CISM~1CISSP~1
May 13, 2026Scheduled
FreeWebinar
BrightTALKLive

Enterprise Readiness for Post-Quantum Cryptography: A Practical Guide

This webinar will cover why enterprises need to start planning their transition to Post-Quantum Cryptography (PQC) to safeguard their sensitive information against future adversaries. We will delve into the latest NIST PQC standards, discuss key considerations for cryptographic inventory and agility, and outline actionable steps for assessing risk, prioritizing systems and implementing hybrid approaches. Attendees will gain insights and an understanding of how to approach building a PQC readiness program for their organization. Join Sponsor Google Cloud Security and Host ISC2 on May 21, 2026 at 1:00 p.m. Eastern/10:00 am Pacific to learn more! CPE Credit 1 Group A CPE Credit

CISSP1CISM~1
May 13, 2026Scheduled
FreeWebinar
BrightTALK1 hrLive

Securing the SDLC: Threat Modeling at Sprint Cadence

How appsec teams at high-velocity orgs run lightweight threat modeling during planning. Includes the STRIDE-per-element worksheet template and three real case studies.

CISSP1Security+~1
May 30, 2026Scheduled

Showing 48 of 52

Load more →