Blog
Top Webinars of 2020
This year presented us all with challenges we never could have expected. Our vacations were cancelled, our parties were virtual, and most of us started living at work. Isn’t that what working from home feels like sometimes?
Beginning in March, conferences started to get postponed, cancelled or eventually pivoted to a virtual format. Our own (ISC)² Security Congress happened last month online and while we were excited to welcome our largest group of attendees yet, we know that many cybersecurity professionals weren’t able to find the time, or budget, for a conference, even a virtual one.
As cybersecurity professionals, you work in an industry that constantly evolves with new threats and vulnerabilities being discovered almost daily; therefore, the need for continuing education persists, even in a pandemic, not just as a membership requirement. As a reminder, CPE credits are due at the end of your three-year membership cycle , not annually.
(ISC)² has a team of professionals who produce award-winning cybersecurity webinars for our members. These webinars are free to members and are broadcast live on Tuesday and Thursday afternoons, depending on your location. Once the live webinars are complete, they’re available in our archive for on-demand viewing whenever your schedule allows. Each webinar counts for 1 CPE credit. With new webinars coming out weekly, there are many to choose from. To make things a little easier, we’ve compiled a list of the top member-rated (ISC)² webinars this year
- Gigamon #1: Transport Layer Security (TLS) 1.3: A New Private World
- Gigamon #2: Encrypted Things – Finding Threats in an Obscure World
- Gamechanger! What We’ve Learned (So Far) from the COVID-19 Outbreak
- Key Insights from CyberEdge’s 2020 Cyberthreat Defense Report
- Imperva #1: How Automated Attacks Can Derail Your Company’s Business
- Navigating the Career Maze – Where do I go Next?
- Gigamon #2: What Zero Trust Networking Means for Network Visibility
- Gigamon #3: Network Visibility in Today’s Complex World
- Your Data Held Hostage: Understanding the Extensive Ransomware Threat
- The Infinite Variety of Phishing Attacks & the Security Controls to Address Them
EMEA:
- Maximizing the Value of Threat Intelligence
- Ransomware: New Variants & Better Tactics to Defend & Defeat These Threats
- Is Encrypting Everything A Good Idea?
- Managing Shadow IT Realities with A Remote Workforce
- TLS1.3: Two Years On
- Minimizing Security Impacts of a Growing Remote Workforce
- Encrypted DNS: Friend or Frenemy?
- 10 Ways to Harden Your Multi-Cloud Security Posture
- How to Get the Most Out of Your Security Investments
- The Industrialization of Cybercrime and Evolution of Cybercrime Syndicates