RecertHero
ISACA·Certification

CISM continuing education

Certified Information Security Manager. Management-focused certification covering information security governance, risk, program development, and incident management.

Renewal cycle

3 years

Between full re-certifications.

Credits required

120 CPE

Roughly 40 CPE per year.

Indexed here

30

Opportunities that map to CISM.

Opportunities that count

30 results mapped to CISM, ranked by what's coming up next.

Browse all 30

Artificial intelligence is rapidly reshaping the cybersecurity landscape, giving attackers new ways to automate, scale, and personalize cyberattacks while providing defenders powerful tools to detect and respond faster than ever. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores how AI is being used on both sides of the threat equation and what this escalating arms race means for organizations. Attendees will learn how AI-driven threats such as advanced phishing, deepfakes, and automated malware are changing attacker tactics, as well as how security teams can leverage AI for threat detection, response, and risk reduction. The session will highlight practical considerations for preparing defenses as AI continues to transform the future of cybersecurity.

Mar 12, 2026Free
CySA++1CISSP+1Security++1+1 more

Ransomware remains one of the most disruptive and costly threats facing enterprises today, and preparation is critical to minimizing its impact. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he discusses how security teams can build ransomware readiness before an attack occurs, rather than reacting under pressure once systems are locked and operations are disrupted. Attendees will learn how to assess ransomware preparedness, close common gaps in visibility and response, and ensure backup, recovery, and communication plans are tested and trusted. The session will also explore how security, IT, legal, public relations, and executive teams can align ahead of time to reduce downtime, contain damage, and maintain control during a high-pressure ransomware event.

Mar 12, 2026Free
CISM+1CISSP+1CySA++1

The cybersecurity landscape continues to evolve at a rapid pace, driven by emerging technologies, shifting attacker tactics, and changing business priorities. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores five key cybersecurity predictions that are expected to significantly influence how organizations manage risk and defend against threats as 2027 approaches. Attendees will gain insight into anticipated developments across areas such as AI-driven attacks and defenses, ransomware evolution, regulatory pressures, workforce challenges, and security architecture trends. The session will focus on what these predictions mean in practical terms and how security leaders can begin preparing today to stay ahead of tomorrow’s threats and build more resilient, future-ready cybersecurity strategies.

Mar 12, 2026Free
CISM+1CISSP+1CISA+0.75

As cyber threats grow more sophisticated, choosing the right security tools is critical for reducing risk and staying resilient. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he examines the technologies every organization should consider as part of a modern cyber defense strategy. Learn which tools are most effective at protecting endpoints, identities, cloud environments, and data—based on current threat trends and real-world adoption. Steve will discuss how to evaluate tools, avoid stack sprawl, and align investments with business priorities. Attendees will leave with practical guidance for building a streamlined, future-ready security toolkit. CPE Credit 1 Group A CPE Credit

Apr 22, 2026Free
CISSP+1CISM+1

As organizations continue to rely on hundreds of SaaS applications, traditional security models are struggling to keep up. In this session, Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, shares insights into why SaaS has become a prime target for attackers and where security teams are most likely to lose visibility and control. The discussion focuses on proven approaches for managing SaaS risk, protecting sensitive data, and improving governance without disrupting users. Attendees will learn how to prioritize SaaS security initiatives, align controls with business needs, and build a scalable approach to protecting cloud-based applications in today’s dynamic IT environments. CPE Credit 1 Group A CPE Credit

Apr 22, 2026Free
CCSP+1CISM+1

This webinar will cover why enterprises need to start planning their transition to Post-Quantum Cryptography (PQC) to safeguard their sensitive information against future adversaries. We will delve into the latest NIST PQC standards, discuss key considerations for cryptographic inventory and agility, and outline actionable steps for assessing risk, prioritizing systems and implementing hybrid approaches. Attendees will gain insights and an understanding of how to approach building a PQC readiness program for their organization. Join Sponsor Google Cloud Security and Host ISC2 on May 21, 2026 at 1:00 p.m. Eastern/10:00 am Pacific to learn more! CPE Credit 1 Group A CPE Credit

May 13, 2026Free
CISSP+1CISM+1

What LLM-assisted triage actually delivers today (and where it bites you). Includes failure modes from real deployments, prompt-injection examples, and a checklist for safe rollout.

1 hrMay 19, 2026Free
CySA++1Security++1CISM+0.75

How to design an insider risk program that respects employee trust, with concrete signal sources, escalation playbooks, and HR/Legal partnership patterns.

1 hr 15 minMay 26, 2026Free
CISM+1.25CISA+1.25

A leader's view of AI governance: model risk classification, vendor due diligence, the EU AI Act in practice, and a sample policy template you can adapt.

1 hrJun 2, 2026Free
CISM+1CISSP+1

An auditor's perspective on building a cloud risk register, evidence collection in serverless environments, and translating cloud control gaps into board-ready language.

1 hr 30 minJun 6, 2026Free
CISA+1.5CISM+1.5CCSP+1.5

Three QSA panelists walk through the most-failed PCI DSS 4.0 requirements, with evidence examples that pass and ones that don't.

1 hr 15 minJun 30, 2026Free
CISA+1.25CISM+1.25

Closing the Critical Skills Gap for Modern and Effective Security Operations Centers (SOCs): Survey Results Any successful security operations center (SOC) will combine skilled people, effective processes and efficient technology. Previous SANS surveys have shown that the skills of the people are the prime prerequisite to enable organizations to define critical SOC processes; create use cases, hypotheses and plans; architect effective security solutions; and efficiently deploy, operate and maintain security systems. From that skills base, sophisticated technology and tools can be used as a force multiplier. CISOs and SOC managers who can reduce or close their critical skills gaps have the highest probability of minimizing business impact from cyberattacks when budgets and staffing are constrained. Webcast attendees will learn:Where hiring managers turn when sourcing potential new hiresWhich skill areas are most sought afterWhat technologies employers wish new hires had hands-on experience usingWhich security technologies are perceived as enabling organizations to delay or mitigate the need for additional staff Register today to be among the first to receive the associated whitepaper written by SANS Director of Emerging Security Trends, John Pescatore. Click here'to register for a companion webcast to be held at 1 PM ET on Thursday, July 30, 2020 ' a panel discussion with survey author John Pescatore and selected sponsors that digs more deeply in to the results.WebinarCyber Defense Presented: 29 Jul 2020 Technical Presentation View details

Self-pacedFree
CISM+1.5CySA++1.5

Know one we're missing?

Submit any webinar, course, or training URL. We'll classify it with Claude and queue it for review.

Suggest an opportunity

ImportantRecertHero is an independent aggregator. Credit estimates are guidance only — always verify with your certifying body.