Top of Page
 

SECURE Webinars

North America | Asia-Pacific | UK & Europe

About

(ISC)² SECURE Webinars bring you together with leading cybersecurity experts to explore solutions that answer the most critical challenges facing your regional market. Take back actionable ideas and strategies that help strengthen the security of your organization’s cyber operations, assets and critical data. During these collaborative virtual learning events, you’ll have the opportunity to ask the speakers questions and chat with attendees in real time. If you’re unable to attend the live webinar or need to revisit the content, you can access the recording at your convenience on-demand.

(ISC)² SECURE Webinars are open to members and non-members, and cybersecurity professionals in every stage of their career are encouraged to attend. Earn 1.5 CPE credits for each webinar you attend.

Upcoming Webinars

Monday, September 12, 2022 | How to Win the Cyberwar with Zero Trust

1:00 p.m. EST I Earn 1.5 CPE Credits

Register Now

Zero Trust is revolutionizing network security architecture. Designed to stop data breaches while protecting critical infrastructure, it’s data- and device-centric. During this interactive webinar, John will discuss the concept of Zero Trust and explain why it’s the world’s only true cybersecurity strategy.

Strategically resonant to the highest levels of an organization, Zero Trust is practically and tactically implementable using commercial off-the-shelf technologies. Because it focuses on providing granular protections around sensitive assets, the architectural model, which designs the network from the inside out, is positioned to solve the security challenges of modern critical infrastructure and IOT networks. John will explain how a Zero Trust Network Strategy achieves tactical and operational goals that make security organizations business enablers, not inhibitors.

John Kindervag, Senior Vice President, Cybersecurity Strategy and ON2IT Group Fellow, ON2IT Cybersecurity

John is best known for creating the Zero Trust Model of Cybersecurity. He joined ON2IT last year as Senior Vice President Cybersecurity Strategy and ON2IT Global Fellow. Previously, he served as field CTO at Palo Alto Networks and as vice president and principal analyst at Forrester Research. John was named to the U.S. National Security Telecommunications Advisory Committee’s (NSATC) Zero Trust Sub-Committee and is a primary author of the NSATC Zero Trust and Trusted Identity Management report that is being delivered to the President of the United States. At the Cloud Security Alliance, he serves as the Security Advisor to the CEO and the President, focusing on helping to bring Zero Trust Concepts to the cloud.

Monday, October 31, 2022

1:00 p.m. EST I Earn 1.5 CPE Credits

Register Now

Speaker and session description coming soon!

Previous Webinars

January 19, 2022 | Cybersecurity Tips, Tools, and Techniques for Every Cybersecurity Professional

Purchase Recording

Every cybersecurity professional needs to keep a toolkit of programs, apps, and resources for troubleshooting and securing systems. This rapid-fire presentation, updated for 2022, showcases apps, websites and resources used in cybersecurity testing, investigations, administration, compliance, and just day-to-day work. You will get many tricks and techniques for optimizing their use based on your organization’s needs. This session also provides a variety of websites, references and resources to help you do your job as a cybersecurity professional and local tech support and then tips to keeps yourself and others out of trouble. Leave with ideas to make intelligent choices as cybersecurity professionals and keep your skills sharp.

Ron Woerner, CISSP, CISM, President and Chief Security Evangelist, Cyber-AAA
Ron has over 20 years of IT and Security experience and is a noted educator, consultant, keynote speaker, and writer in the Security industry. As President and Chief Security Evangelist at Cyber-AAA, he works as a Security Consultant delivering awareness, performing security risk assessments, and advising small, medium, and large organizations. Ron established the Cybersecurity Studies program at Bellevue University, an NSA Center of Academic Excellence where he still teaches. Ron has numerous technology degrees and is passionate about building the next generation of cyber professionals.

Monday, May 9, 2022 | More NERF, Less HERF: Looking back on 30 years of Information Warfare

Purchase Recording

It was the early 90's, WIRED magazine had just launched, extolling the techno-anarchism utopia of the emerging internet. While our moderator for this event, Brandon Dunlap, was just a young security engineer, tracing data flows in Visio, Winn Schwartau was busy briefing 3 letter agencies and politicians around the world on the threat of Information Warfare. Brandon had just picked up his book of the same name in 1995 at the Border's in Tysons Corner, VA (likely with the latest issue of WIRED) and it changed his entire outlook on our profession. Despite working in the shadow of the beltway, Brandon was oblivious to the types of conversations Winn was having with the Military Industrial Complex, but the message wasn't lost. Enjoy this delightful conversation between Brandon and Winn as we check in on Winn’s dire predictions against the current backdrop of global conflict, social media disinformation and citizen privacy concerns.

Winn Schwartau, Author
Winn has lived Cybersecurity since 1983, and now says, “I think, maybe, I’m just starting to understand it.” His predictions about the internet & security have been scarily spot on. He coined the term “Electronic Pearl Harbor” while testifying before Congress in 1991 and showed the world how and why massive identify theft, cyber-espionage, nation-state hacking and cyber-terrorism would be an integral part of our future. He was named the “Civilian Architect of Information Warfare,” by Admiral Tyrrell of the British MoD.

His latest book, “Analogue Network Security” is a mathematical, time-based and probabilistic approach to justifiable security. His goal is to provide a first set of tools and methods to “fix security and the internet”, including fake news, spam, phishing, DDoS and more. It will twist your mind.

Virtual Experience

Take advantage of the flexibility offered with virtual learning, and join your peers and our expert speaker for this interactive online experience. Our virtual platform will allow you to feel like you are sitting front row:

  • Ask the presenter your questions in real-time
  • Take notes from the session right on your screen, and have them emailed to you post event
  • Engage in a live chat with your peers around the topic
  • Download resources and handouts
  • Request live support at any time
  • Closed captioning and live transcript available
  • Recording available 24 hours after the event
  • For (ISC)² members, CPE will automatically be added to your account within 10 business days of the live event

System Requirements

  • Supported Browsers: Latest builds of Firefox, Chrome, Edge and Safari. Internet Explorer is not supported.
  • Computer with headset/speakers
  • High-speed internet connection

Sponsors

Don't miss this opportunity to feature your brand, gain premium leads, and demonstrate your products and services. Speaking opportunities available.

Download Our Prospectus


Pricing

Member pricing applies to all (ISC)² Members and Candidates.

PricingMemberNon-Member

Individual Webinar Purchase

Single Webinar Live + Recording$99$129

Bundle Webinar Purchase Options

(3) North American Webinars Live + Recording – Save 15%!$250$330
(4) North American Webinars Live + Recording – Save 20%!$290$390
(10) SECURE Webinars Live + Recording – Save 40%!$595$775
All (11) SECURE Webinars Live + Recording – Save 40%!$635$835
Ok