Why Zero Trust is the Key to Cybersecurity in 2024 and Beyond

Why Zero Trust is the Key to Cybersecurity in 2024 and Beyond

SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers

SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers

Elevating Your Audit Strategy: Insights from the CRF Audit Framework

Elevating Your Audit Strategy: Insights from the CRF Audit Framework

Practical Threat Modeling Based on Community Templates

Practical Threat Modeling Based on Community Templates

SANS Live Training: Security West 2024 Recap

SANS Live Training: Security West 2024 Recap

Navigating the Path to Zero Trust in 2024

Navigating the Path to Zero Trust in 2024

A Winning Partnership in Cybersecurity Talent Development

A Winning Partnership in Cybersecurity Talent Development

SANS | GIAC Workforce Report Outcomes Panel Conversation

SANS | GIAC Workforce Report Outcomes Panel Conversation

Breaking Barriers: Christine Morency's Inspirational Cybersecurity Journey

Breaking Barriers: Christine Morency's Inspirational Cybersecurity Journey

Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4

Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4

Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace

Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace

A Story of One Cybersecurity Professional Parenting Two Neurodivergent Youngsters

A Story of One Cybersecurity Professional Parenting Two Neurodivergent Youngsters

I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec

I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec

Different Voices, Different Perspectives: The Importance of Neuroinclusion for Better Mental Health

Different Voices, Different Perspectives: The Importance of Neuroinclusion for Better Mental Health

Value of Mentorship: Building a Better Approach to Support Neurodiversity in Cybersecurity

Value of Mentorship: Building a Better Approach to Support Neurodiversity in Cybersecurity

How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less

How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less

Supporting Thinking outside The Box-Allyship for neurodiverse colleagues

Supporting Thinking outside The Box-Allyship for neurodiverse colleagues

The Autistic Advantage: Thriving in Cybersecurity

The Autistic Advantage: Thriving in Cybersecurity

Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities

Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities

Strategies for retaining and advancing neurodivergent employees in Cybersecurity

Strategies for retaining and advancing neurodivergent employees in Cybersecurity

Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 8

Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 8

Understanding the New NIS2 Directive: Compliance for EU Businesses

Understanding the New NIS2 Directive: Compliance for EU Businesses

Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 7

Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 7

Cyber Wars: The Legal Force Awakens

Cyber Wars: The Legal Force Awakens

Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 6

Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 6

Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 5

Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 5

Part 2 - The Achilles Systems Hack Assessment Series: Revisiting Enterprise Controls

Part 2 - The Achilles Systems Hack Assessment Series: Revisiting Enterprise Controls

Part 1 - The Achilles Systems Hack Assessment Series: Breach or Blueprint?

Part 1 - The Achilles Systems Hack Assessment Series: Breach or Blueprint?

Security Assurance | The 8 Domains of the Cloud Security Maturity Model | Part 4

Security Assurance | The 8 Domains of the Cloud Security Maturity Model | Part 4

For the Win: Aligning Security Initiatives with the Business

For the Win: Aligning Security Initiatives with the Business