Webinar Training

Essential education designed to ensure you meet and exceed your organization’s security and risk goals.

Our curriculum of webinars available at your fingertips offer the same in-depth advice and interaction as in-person training, but are available at your convenience.

or Become a Premium Member

200+ In-Depth Courses

Comprehensive in-depth information security, risk management, compliance, & fraud education.

Constantly Updated

Courses are constantly updated to stay ahead of industry trends, threats, and regulations.

Expert Presenter Faculty

Courses developed by industry experts with years of experience implementing these solutions.

Presentation Materials

Handbooks with additional reading, research, and tools to help you implement what was learned.

Don’t miss out.
Join the 45,000+
satisfied webinar attendees from thousands of organizations worldwide.

Browse the Course Library »

Sorting By:  

Course Library

Preparing For The Ripple Effects Of EMV and The Future Of Payment Card Security

Preparing For The Ripple Effects Of EMV and The Future Of Payment Card Security

Available Exclusively for Premium Members

Part 1 - EMV Here We Come If you squeeze a balloon in one place, it will expand in another. When we secure in-person transactions with EMV, the fraudsters will begin testing other channels of entry, and one of the least secure portals is that of card-not-present (CNP), online transactions. Many other regions have ...

Fraud Investigations: How to Work Effectively with Law Enforcement, Government and Litigators

Fraud Investigations: How to Work Effectively with Law Enforcement, Government and Litigators

Available Exclusively for Premium Members

Public-sector organizations need to better understand the driving forces, priorities and procedures within the organizations they "protect." But equally as important is that the private sector organizations reciprocate and understand the how, what and why of the law enforcement/public body process. This mutual ...

Upgrading to an APT-Capable Defense; Where to Start, How to Get Funding and See an Immediate Reduction in Risk

Upgrading to an APT-Capable Defense; Where to Start, How to Get Funding and See an Immediate Reduction in Risk

Available Exclusively for Premium Members

As we've seen, we can't just keep doing what we've been doing. The cost of not ensuring the confidentiality, integrity and availability of information is on an upward ramp and, at some stage - if not already, we will reach the tipping point where the cost of not having an effective security program will overtake the ...

Trust and the APT Defense Framework

Trust and the APT Defense Framework

Available Exclusively for Premium Members

Although APT's can vary significantly from breach to breach, they generally have many common phases and mechanisms. In this session, we will define and describe the APT attack and defend lifecycle, provide an overview of how the day is structured and what we aim to achieve, answering such questions as: What is ...

Presented By: Patrick Vowles

Identity Theft: How the Name Game Has Changed

Identity Theft: How the Name Game Has Changed

Available Exclusively for Premium Members

Our identities are clearly becoming more and more of a critical asset every day, providing us access to and authority within every aspect of our personal, financial and professional lives. Because of this, their value is increasing exponentially, thus making their theft far more lucrative. In this opening session ...

Keynote: The State of Fraud Today

Keynote: The State of Fraud Today

Available Exclusively for Premium Members

This session will set the stage for the rest of the day, describing how in the last few years we have seen an explosion of technological innovations which have brought many opportunities for commercial growth and consumer convenience. This growth has, however, come at a price. This almost unchecked pace of change has ...

Breaking Down Ease-of-Use Barriers to Log Data Analysis for Security

Breaking Down Ease-of-Use Barriers to Log Data Analysis for Security

June 9, 2015 @ 3:30 PM

The security benefits of log and machine data analysis are widely accepted by CISOs and CIOs, and yet too many organizations have difficulty executing on this opportunity due to bottlenecks imposed by archaic systems and processes that manage this data. Without the right tools to give easy visibility into the data, ...

Healthcare Information Security Today:  2015 Survey Results and Analysis

Healthcare Information Security Today: 2015 Survey Results and Analysis

June 11, 2015 @ 3:30 PM

What are the biggest cyberthreats facing healthcare entities today and on the horizon? What steps are healthcare organizations taking to prevent and detect breaches? And what are the top data security priorities for the year ahead? For answers to these questions and many more, check out the Healthcare Information ...

Technology Spotlight: Identity Theft Protection Using Advanced Analytics

Technology Spotlight: Identity Theft Protection Using Advanced Analytics

Available Exclusively for Premium Members

See how LifeLock's threat detection, proactive identity alerts and comprehensive remediation services help provide peace of mind for consumers and enterprises amid the growing threat of identity theft. This technology presentation will demonstrate how leveraging unique data, science and patented technology from their ...

Presented By: Domenic Paci

Investigate, Respond Retaliate?

Investigate, Respond Retaliate?

Available Exclusively for Premium Members

You have identified the attack now it's time to react. How do you effectively respond, remediate, recover and potentially retaliate to the threat? This session will discuss how your organization can leverage the actionable intelligence gained from all the previous defense phases of threat indicators, analytics, ...