Trainings & CEU/CPE

How Phishing Your Users Will Make You More Secure

Risky Business: When End-Users Continue Bad Security Behavior

Securing IoT Data: Compliance, Privacy, and New Regulations

CYBRARY: Certified Information Security Manager (CISM)

SecureWorld: Best Practices and Future Direction of Security Awareness Training

Firebrand UK: Certified Information Systems Security Professional (CISSP)

Incident Response Plan: Don’t Leave Home Without It

Which Phishing Emails Fool the Most People?

Trend Micro: Defending the Hybrid Cloud: Top 5 Challenges and How to Succeed

ISO/IEC 27001:2013 Information Security Management Systems: Lead Auditor

CYBRARY: ISC2 Certified Information Systems Security Professional (CISSP)

CYBRARY: ISC2 Certified Cloud Security Professional (CCSP)

SecureWorld: Securing the Cloud and Driving Business Forward

Cisco: Ransomware, Banking Trojans and Floki Bot: A Threat Trifecta

SecureWorld: How Phishing and Social Engineering Became #1 Attack Vector

Terrapinn: World Cyber-security Congress 2017

ICRMC: International Cyber Risk Management Conference

SecureWorld: Beyond Next-Gen: Future-Ready Endpoint Security

SecureWorld: IoT DDOS Attacks: Yes – They are Real and on the Rise

CYBRARY: Certified in Risk and Information Systems Control (CRISC)

SANS: Analyzing the DHS/FBI\’s GRIZZLY STEPPE Report

SANS: Practical Application of Threat Intel for Network Defenders

SANS: Think Like an Attacker: What You Must Know About Targeted Attack Techniques

State of the Phish 2017 – A 360-degree View

Insiders Are the New Malware

2016 Breaches – Lessons Learned

Six Sigma Green & Black Belt

ISO/IEC 27001:2013 Information Security Management Systems: Lead Implementer

How to Build a Security Awareness Program That Really Works

Endpoint Protection: What Does Next-Generation Really Mean?

SecureWorld PLUS:Designing and Building a Cyber-security Program Based on the NIST Cyber-security Framework

Project Management Professional (PMP)

How To Catch a Phish

Advanced Threat Detection in ICS – SCADA Environments

Application Security – The New Perimeter

Data Protection / Data Security

Security, Privacy and Trust

Security and Compliance Unite

Application Security Attack and Response

Risk and Compliance – Audit Fatigue

Improve the Audit, Minimize the Risk

PCI Compliance – What do the Guidelines Mean to Me?

Effectively Managing Risk in Today’s Economy

Optimizing Your Enterprise GRC Program

Security Vulnerabilities and Safeguards

IT Audit: Challenges and Opportunities

Web Application Security: Intelligent Choices

Harmonizing Security and Compliance

PCI Compliance: A Holistic View

Data Protection Planning: How and Why?

The Cloud and Service Management: How do they connect?

Mobile Communication When Disaster Strikes – Your Business Continuity Management Plan

Protecting Yourself and Your Enterprise from Data-based Vulnerabilities

The Ultimate DLP Project Planning Tool