Home
Why Zero Trust is the Key to Cybersecurity in 2024 and Beyond
1 day ago
12:16
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
8 days ago
2:20
Elevating Your Audit Strategy: Insights from the CRF Audit Framework
3 weeks ago
57:19
Practical Threat Modeling Based on Community Templates
3 weeks ago
1:00:50
SANS Live Training: Security West 2024 Recap
3 weeks ago
1:08
Navigating the Path to Zero Trust in 2024
1 month ago
31:50
A Winning Partnership in Cybersecurity Talent Development
1 month ago
2:49
SANS | GIAC Workforce Report Outcomes Panel Conversation
1 month ago
46:13
Breaking Barriers: Christine Morency's Inspirational Cybersecurity Journey
1 month ago
32:44
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
1 month ago
12:19
Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
1 month ago
51:52
A Story of One Cybersecurity Professional Parenting Two Neurodivergent Youngsters
1 month ago
34:30
I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec
1 month ago
27:52
Different Voices, Different Perspectives: The Importance of Neuroinclusion for Better Mental Health
1 month ago
27:40
Value of Mentorship: Building a Better Approach to Support Neurodiversity in Cybersecurity
1 month ago
21:47
How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less
1 month ago
10:35
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
1 month ago
9:27
The Autistic Advantage: Thriving in Cybersecurity
1 month ago
33:44
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
1 month ago
10:38
Strategies for retaining and advancing neurodivergent employees in Cybersecurity
1 month ago
22:30
Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 8
2 months ago
3:45
Understanding the New NIS2 Directive: Compliance for EU Businesses
2 months ago
42:37
Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 7
2 months ago
5:37
Cyber Wars: The Legal Force Awakens
2 months ago
56:35
Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 6
2 months ago
5:22
Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 5
3 months ago
4:31
Part 2 - The Achilles Systems Hack Assessment Series: Revisiting Enterprise Controls
3 months ago
58:15
Part 1 - The Achilles Systems Hack Assessment Series: Breach or Blueprint?
3 months ago
52:35
Security Assurance | The 8 Domains of the Cloud Security Maturity Model | Part 4
3 months ago
4:53
For the Win: Aligning Security Initiatives with the Business
3 months ago
33:41