channel company logo

ISC2 Security Briefings - EMEA

ISC2 Security Briefings - EMEA

ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in
cyber, information, software and infrastructure security while earning CPEs
  • 105,011 Subscribers
  • 423 talks
  • 4 series

ISC2 Security Briefings - EMEA

ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in
cyber, information, software and infrastructure security while earning CPEs
  • 105,011 Subscribers
  • 423 talks
  • 4 series

Upcoming talks

Certified Information Systems Security Professional (CISSP) Info Session

Certified Information Systems Security Professional (CISSP) Info Session

Join us for a deep dive into Certified Information Systems Security Professional (CISSP), the cybersecurity leadership credential from ISC2. Earning the CISSP
is an investment in your future and an important next step in your career. Consistently recognized globally as the gold standard cybersecurity certification, it
distinguishes you as a leader committed to excellence. CISSP certification demonstrates that you have the advanced knowledge and technical skills to desi…

Playing The Hand You're Dealt in Access Management

Playing The Hand You're Dealt in Access Management

When it comes to authentication and access management, there is no one-size-fits-all solution. Organizations face diverse environments, technologies and
user needs that shape the way access policies should be constructed and implemented. You might have a set of great policy options at your disposal, but the
environment you're in may limit your ability to play the best cards at the right time. In this session on 15 April at 1:00 p.m. BST, join ISC2 and 1Password as…

Key Insights from CyberEdge’s 2025 Cyberthreat Defense Report

Key Insights from CyberEdge’s 2025 Cyberthreat Defense Report

CyberEdge’s annual Cyberthreat Defense Report (CDR) has become a staple for assessing organizations’ security postures, for gauging perceptions of IT
security professionals, and for ascertaining current and planned investments in IT security infrastructure. It incorporates dozens of insights from 1,200
security professionals from 17 countries and 19 industries. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he reviews key findi…

From Legacy to Leading-Edge: How to Maximize Your Vulnerability Management Investment

From Legacy to Leading-Edge: How to Maximize Your Vulnerability Management Investment

Legacy vulnerability management approaches often struggle to keep pace with today’s dynamic threat landscape. Maximizing the value of your vulnerability
management program requires moving beyond outdated practices to adopt a proactive and risk-based approach. Join Steve Piper, CEO of CyberEdge and
Editor-in-Chief of Security Buzz, as he shares strategies for transforming legacy vulnerability management systems into efficient, leading-edge cyber expos…

The Rise of Deepfakes: How Smart Security Teams Stay Ahead

The Rise of Deepfakes: How Smart Security Teams Stay Ahead

Deepfakes are no longer a distant concern—they’re an active threat to businesses, governments, and individuals. As deepfake technology grows more
sophisticated, security teams face mounting challenges in combating its misuse. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as
he discusses the evolution of deepfakes, methods for their detection, and strategies for mitigating risks. From leveraging AI to enhance defenses to improvi…

Surviving Ransomware: Strategies to Defend, Respond, and Recover

Surviving Ransomware: Strategies to Defend, Respond, and Recover

Ransomware attacks have reached unprecedented levels of sophistication, targeting organizations across all industries and sectors. As these threats evolve,
so too must the strategies to combat them. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he provides a deep dive into
strategies that can help organizations effectively navigate the ransomware threat lifecycle. From advanced prevention techniques and risk mitigation to str…

The Future is Here: Top IT Security Technologies Shaping 2025

The Future is Here: Top IT Security Technologies Shaping 2025

Today’s cyberthreat landscape is marked by sophisticated attacks, including ransomware, deepfakes, and advanced persistent threats. The rise of AI-powered
malware, supply chain vulnerabilities, and insider risks compounds challenges. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he
explores the cutting-edge advancements driving the evolution of IT security, such as continuous threat exposure management (CTEM), identity threat detec…

From Shield to Spear: How AI is Reshaping Cyber Defense and Offense

From Shield to Spear: How AI is Reshaping Cyber Defense and Offense

The rise of artificial intelligence in cybersecurity is both a blessing and a curse. AI is redefining the cybersecurity battlefield, offering unprecedented
advantages for security teams and threat actors. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores AI’s transformative
impact on the IT security industry. On the defense side, AI is revolutionizing threat detection, automating incident response, and predicting vulnerabilities be…

On-demand talks

Defenders’ Guide 2025: Fortify the Future of Your Defense

Defenders’ Guide 2025: Fortify the Future of Your Defense

The attack surface is not only getting wider but also deeper - wider as new attack vectors emerge, and deeper as threat actors find new ways to exploit
traditional ones. With the growing use of LLMs and APIs, we can only expect this expansion to continue. That’s why the Akamai SOTI research team created
something new for 2025; a practical, hands-on, highly technical defenders’ guide for those working on the front lines of the digital battlefield. Mapped to th…

Beyond the Buzzword: Achieving Real Value with Zero Trust Security

Beyond the Buzzword: Achieving Real Value with Zero Trust Security

Zero Trust Security has moved from a trending buzzword to a cornerstone of modern cybersecurity strategy. But how can organizations move beyond theory
to achieve measurable value? Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he discusses the key principles of Zero Trust,
practical steps to reduce attack surfaces, and methods for improving resilience against emerging threats. He’ll delve into the operationalization of Zero Tru…

Bridging the Gap: Strategies to Overcome the Cybersecurity Skills Shortage

Bridging the Gap: Strategies to Overcome the Cybersecurity Skills Shortage

The cybersecurity talent crisis poses significant risks to organizations worldwide. It’s leaving businesses vulnerable to escalating threats as they struggle to
find qualified professionals to secure their systems. This talent gap hampers incident response, delays security improvements, and increases the risk of
breaches. Organizations face higher costs, operational disruptions, and reputational damage as they compete for scarce expertise. Join Steve Piper, CEO o…

CISSP EXAM READY: Ask the Experts Before You Sit

CISSP EXAM READY: Ask the Experts Before You Sit

Join us for a live Q&A where our panel of experts will answer your questions about CISSP before you sit for the exam. We’ll go over certification requirements,
the domains, self-study resources, training strategies, career paths and more to help you build confidence so you’re ready on exam day. You’ll learn: • How
CISSP builds your end-to-end foundational understanding of cybersecurity • Why vendor-neutral certification is in demand • What training tools are availabl…

Top Five Cybersecurity Predictions for 2025

Top Five Cybersecurity Predictions for 2025

Embark on a foresight journey into the future of cybersecurity, highlighting key trends and innovations that are set to redefine the digital defense landscape
in the year ahead. Discover how advancements in artificial intelligence will revolutionize the way security teams reduce cybersecurity risks and improve their
abilities to defend against modern threats. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he shares his top five cybersecurity predicti…

Nutzung von Cyber Security Frameworks zur Vorbereitung auf kommende Cyber-Gesetzgebung wie NIS2

Nutzung von Cyber Security Frameworks zur Vorbereitung auf kommende Cyber-Gesetzgebung wie NIS2

Die europäische Cyber-Gesetzgebung und -Verordnung prägt die nationale und europäische Cybersicherheitslandschaft und darüber hinaus auch
internationale Normen. Vom Digital Operational Resilience Act (DORA) über den Cyber Resilience Act (CRA) bis hin zur Network and Information Systems
Directive 2 (NIS2) und darüber hinaus – eine wachsende Zahl von Organisationen sind höheren Anforderungen an die Cybersicherheit ausgesetzt. Für die Ja…

Security Industry 101: A ‘Crash Course’ For Security Newbies

Security Industry 101: A ‘Crash Course’ For Security Newbies

New to the security industry? Or thinking about transitioning into an information security role? If so, this webinar is for you. Join Steve Piper, Founder & CEO of
CyberEdge (and proud CISSP), as he provides a one-hour ‘crash course’ on the entire security industry, including: - Size and growth of the security industry -
Useful vocabulary terms and buzz words - Five types of cyberthreat actors - Modern cyberthreats and tactics - Categories of security defenses - Common s…

Infostealer Malware in Focus: Extracting Hidden Intelligence

Infostealer Malware in Focus: Extracting Hidden Intelligence

Infostealer malware continues to pose a significant threat to organizations and individuals alike. This webinar offers a deep dive into the world of infostealer
malware, providing an overview of the current threat landscape and a closer look at notorious malware families such as Redline, Lumma, and Agent Tesla.
Join VMRay and ISC2 8 October 2024 at 1:00 p.m. BST as we discuss how these malware families operate, explore their capabilities, and reveal the critical c…

Series