Skip to main content


 
Icon Legend
Additional Fee Required
Additional Fee Required
Pre-Registration Required
Pre-Registration Required
Online & Virtual
Online & Virtual
Onsite Only
Onsite Only
Earn CPE Credits
Earn CPE Credits
Livestreamed Session
Livestreamed Session
Included in Guest Pass
Included in Guest Pass
Invite Only
Invite Only
Session Recorded
Session Recorded
Student Experience
Student Experience

Governance, Risk and Compliance (GRC)   
GRC refers to the principles, processes, and practices organizations use to ensure that they have and operate good governance principles, adhere to laws, regulations, and standards and make risk-aware decisions. GRC activities help organizations effectively balance risk and compliance obligations with overall business goals and strategies.  

Cyber Leadership  
Cyber leadership refers to the ethics, principles, skills, and practices that are necessary to effectively manage and lead their organization’s understanding of the risks associated with the use of both emerging and existing technologies. Cyber leaders help their organizations identify and maintain or inform effective security strategies and practices to minimize, mitigate or remove risks and protect the organization's reputation, assets and interests.  

Cloud Security  
Cloud security refers to the measures and technologies used to protect data, applications, and infrastructure associated with cloud computing from unauthorized access, use, disclosure, disruption, modification, or destruction. This includes securing data in transit and at rest, as well as ensuring the privacy and compliance of data stored in the cloud through effective cyber supply chain and third-party management.  
  
Security Operations  
Security operations, also known as "SecOps," integrate the processes, practices, and technologies used by organizations to identify and manage cybersecurity threats.  This includes the continuous monitoring of security events, the detection and response to security incidents, and the ongoing improvement of security processes and procedures to minimize harm to the organization.  

Software Security   
Software security refers to the development of good practice and measures to identify and mitigate threats and vulnerabilities in software, and to ensure that they operate safely and as intended.  An effective secure software development lifecycle is a critical aspect of overall cybersecurity, as software patching and maintenance play a critical role in most organizations.  

Network Security  
Network security refers to the practices and technologies used to protect an organization's communications infrastructure from unauthorized access, use, disclosure, disruption, modification, or destruction.  
  
Emerging Technologies  
Innovations in hardware and software are constantly evolving, and with each new technology, additional risk is introduced to organizations.  This domain addresses the challenges related to the security of interconnected and complex systems as new technologies are integrated into existing practices.