Discover the most impactful ISC2 sessions that security leaders and practitioners can’t stop talking about. From boardroom legal debates to cutting-edge AI ransomware threats, these on-demand webinars deliver real-world insights, practical strategies and expert perspectives to help you stay ahead in today’s fast-moving cyber landscape. These six top-rated webinars can be found along with all ISC2 Webinars at the ISC2 Events page.
Do CISOs Need Their Own Legal Counsel? Lessons from SolarWinds and Uber
CISOs are increasingly on the hook for breach-related missteps. This session dissects the SEC’s action against SolarWinds’ CISO and Uber’s criminal case to explore when—and why—a CISO might need independent legal representation.
Key Takeaways:
- Evaluate the SolarWinds and Uber rulings through a CISO’s lens
- Identify the point at which to retain personal legal counsel
- Compare cyber-specific insurance options and their coverage gaps
Reducing the Risk Created by the Digitalization of Critical Infrastructure
Industry 4.0 and digital transformation boost efficiency, but also amplify exposure. Trevor Dearing shifts the conversation from breach prevention to impact mitigation, showing how resilience-first strategies can slash downtime and financial fallout.
Key Takeaways:
- Adopt “assume breach” mindsets to limit blast radius
- Leverage network segmentation and micro-segmentation best practices
- Real-world examples demonstrating rapid recovery post-attack
Augmenting Microsoft to Defeat the Email Hacker Playbook
Microsoft’s native filters aren’t enough against today’s AI-driven phishing and social engineering waves. This webinar unpacks the anatomy of advanced email attacks and shows how layered defenses can protect your people, not just your perimeter.
Key Takeaways:
- Spot emerging trends in AI-powered phishing
- Break down real-world attack chains and evasion tactics
- Deploy complementary tools and processes to strengthen Microsoft 365 defenses
Managing Stress and Coping with Change in an Ever-Evolving Cyber World
Stress Awareness Month meets the relentless pace of cyber change. Brought to you by the Center for Cyber Safety and Education, this panel explores actionable techniques to embrace transformation, avoid burnout and maintain a healthy work-life balance—even when threats, tools and regulations shift daily.
Key Takeaways:
- Strategies to reframe change as an opportunity, not an obstacle
- Practices to protect mental health in high-pressure roles
- Tips for keeping your skills current without feeling overwhelmed
Playing the Hand You’re Dealt in Access Management
No environment is perfect. Legacy systems, cloud migrations and remote workforces force us to improvise access policies. Wendy Nather walks through designing stage-based controls, handling exceptions and enforcing security without sacrificing usability.
Key Takeaways:
- Tailor access policies for pre-login and mid-session contexts
- Build exception workflows that don’t introduce risks
- Maintain user satisfaction while upholding strong authentication
Agentic AI Ransomware: What You Need to Know
Welcome to cyberspace’s wild frontier: ransomware that thinks for itself. Roger Grimes reveals how agentic AI malware adapts on the fly, bypassing static defenses and amplifying damage. Learn next-generation tactics to outsmart an evolving foe.
Key Takeaways:
- Understand agentic AI behavior and decision-making loops
- Preview real-world agentic ransomware demos
- Implement dynamic defense layers to stay one step ahead
Ready to dive deeper? Access all these top-rated sessions and earn six CPE credits on the ISC2 channel.
Stay informed, stay resilient and shape the future of cybersecurity—one webinar at a time.
Related Insights