Latest Talk
Navigating Work-Life Balance in the Cybersecurity Field
Cybersecurity is a high-pressure industry that frequently requires extended hours and can be stressful, making it tough to achieve a healthy work-life
balance. Tune into this webinar to learn how to manage a healthy work-life balance, create solutions and thrive both professionally and personally in the c…
Upcoming talks
Certified Information Systems Security Professional (CISSP) Info Session
Join us for a deep dive into Certified Information Systems Security Professional (CISSP), the cybersecurity leadership credential from ISC2. Earning the CISSP
is an investment in your future and an important next step in your career. Consistently recognized globally as the gold standard cybersecurity certification, it
distinguishes you as a leader committed to excellence. CISSP certification demonstrates that you have the advanced knowledge and technical skills to desi…
Key Insights from CyberEdge’s 2025 Cyberthreat Defense Report
CyberEdge’s annual Cyberthreat Defense Report (CDR) has become a staple for assessing organizations’ security postures, for gauging perceptions of IT
security professionals, and for ascertaining current and planned investments in IT security infrastructure. It incorporates dozens of insights from 1,200
security professionals from 17 countries and 19 industries. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he reviews key findi…
Agentic AI Ransomware: What You Need to Know
Brace yourself for agentic AI ransomware – a terrifying fusion of cutting-edge tech and malicious intent that's set to redefine cyber threats as we know them.
Unlike traditional ransomware, which follows pre-programmed rules, agentic AI ransomware can adapt its behavior in real-time based on its environment and
the defenses it encounters. Is your organization prepared? Join KnowBe4 and ISC on May 8, 2025 at 1:00 p.m. Eastern/10:00 a.m. Pacific for this mind-blo…
From Legacy to Leading-Edge: How to Maximize Your Vulnerability Management Investment
Legacy vulnerability management approaches often struggle to keep pace with today’s dynamic threat landscape. Maximizing the value of your vulnerability
management program requires moving beyond outdated practices to adopt a proactive and risk-based approach. Join Steve Piper, CEO of CyberEdge and
Editor-in-Chief of Security Buzz, as he shares strategies for transforming legacy vulnerability management systems into efficient, leading-edge cyber expos…
The Rise of Deepfakes: How Smart Security Teams Stay Ahead
Deepfakes are no longer a distant concern—they’re an active threat to businesses, governments, and individuals. As deepfake technology grows more
sophisticated, security teams face mounting challenges in combating its misuse. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as
he discusses the evolution of deepfakes, methods for their detection, and strategies for mitigating risks. From leveraging AI to enhance defenses to improvi…
Surviving Ransomware: Strategies to Defend, Respond, and Recover
Ransomware attacks have reached unprecedented levels of sophistication, targeting organizations across all industries and sectors. As these threats evolve,
so too must the strategies to combat them. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he provides a deep dive into
strategies that can help organizations effectively navigate the ransomware threat lifecycle. From advanced prevention techniques and risk mitigation to str…
The Future is Here: Top IT Security Technologies Shaping 2025
Today’s cyberthreat landscape is marked by sophisticated attacks, including ransomware, deepfakes, and advanced persistent threats. The rise of AI-powered
malware, supply chain vulnerabilities, and insider risks compounds challenges. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he
explores the cutting-edge advancements driving the evolution of IT security, such as continuous threat exposure management (CTEM), identity threat detec…
From Shield to Spear: How AI is Reshaping Cyber Defense and Offense
The rise of artificial intelligence in cybersecurity is both a blessing and a curse. AI is redefining the cybersecurity battlefield, offering unprecedented
advantages for security teams and threat actors. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores AI’s transformative
impact on the IT security industry. On the defense side, AI is revolutionizing threat detection, automating incident response, and predicting vulnerabilities be…
On-demand talks
Navigating Work-Life Balance in the Cybersecurity Field
Cybersecurity is a high-pressure industry that frequently requires extended hours and can be stressful, making it tough to achieve a healthy work-life
balance. Tune into this webinar to learn how to manage a healthy work-life balance, create solutions and thrive both professionally and personally in the
cybersecurity industry!
Beyond the Buzzword: Achieving Real Value with Zero Trust Security
Zero Trust Security has moved from a trending buzzword to a cornerstone of modern cybersecurity strategy. But how can organizations move beyond theory
to achieve measurable value? Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he discusses the key principles of Zero Trust,
practical steps to reduce attack surfaces, and methods for improving resilience against emerging threats. He’ll delve into the operationalization of Zero Tru…
Augmenting Microsoft to Defeat the Email Hacker Playbook
In today’s evolving cyber landscape, email threats are becoming increasingly sophisticated, often bypassing Microsoft’s built-in email defenses.
Cybercriminals are leveraging advanced social engineering and generative AI to craft highly evasive attacks. These threats are growing in volume and
complexity, making traditional email security methods insufficient. Today’s organizations need a comprehensive, adaptive, and effective approach to protec…
Bridging the Gap: Strategies to Overcome the Cybersecurity Skills Shortage
The cybersecurity talent crisis poses significant risks to organizations worldwide. It’s leaving businesses vulnerable to escalating threats as they struggle to
find qualified professionals to secure their systems. This talent gap hampers incident response, delays security improvements, and increases the risk of
breaches. Organizations face higher costs, operational disruptions, and reputational damage as they compete for scarce expertise. Join Steve Piper, CEO o…
North Korea’s Secret IT Army: Has Your Workforce Been Infiltrated?
Organizations around the world are unknowingly recruiting and hiring fake employees and contractors from North Korea. These sophisticated operatives aim
to earn high salaries while potentially stealing money and confidential information - a chilling fact that KnowBe4 recently learned firsthand when we
discovered and stopped one of these operatives at our own organization. Since sharing our experience, we've discovered that many others have faced simi…
Do CISOs Need Their Own Legal Counsel? Some Lessons from SolarWinds and Uber
In October 2023, the U.S. Securities and Exchange Commission (SEC) filed a civil complaint against SolarWinds and its CISO, Timothy Brown. The charges
stemmed from the September 2019 intrusion by threat actors into SolarWinds, which affected some 18,000 customers. This action by the SEC is likely the
first time the agency targeted a CISO for alleged cybersecurity failures. It comes on the heels of the October 2022 criminal conviction of Uber CSO Joe Sulli…
AI-Enabled Compliance: Your Secret Weapon for Smarter Security
Today, artificial intelligence presents both unprecedented opportunities and unique challenges for security teams. Grab your coffee and join our webinar to
explore the intersection of AI, compliance, and security. On December 19th at 1:00 p.m. Eastern/10:00 a.m. Pacific, RegScale and ISC2 demonstrate how
AI-enabled compliance can serve as a powerful tool to strengthen your organization’s security posture. You’ll learn: -The symbiotic relationship between go…
Top Five Cybersecurity Predictions for 2025
Embark on a foresight journey into the future of cybersecurity, highlighting key trends and innovations that are set to redefine the digital defense landscape
in the year ahead. Discover how advancements in artificial intelligence will revolutionize the way security teams reduce cybersecurity risks and improve their
abilities to defend against modern threats. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he shares his top five cybersecurity predicti…