We have a great lineup of training classes scheduled before the 20th Annual Information Security Summit. Registration is required to attend training. Register before September 01, 2022 and get 20% off the cost of the class.
You can register here: TRAINING CLASS REGISTRATION.
We have the following classes available:
MONDAY 10/24/2022
A Practical Guide to Identity and Access Management (IAM)
Instructor: Jerod Brennen
Cost: $250.00
Time: 8:30 am – 5:00 pm
Description: This workshop provides audit and security professionals with a detailed understanding of identity and access management (IAM) from both a technical perspective and a programmatic standpoint. Delivered as a series of five (5) modules, each module builds on the one before as learners explore the following: Hacking Identity – An Attacker’s View of Your Identity Program; The Path to Identity Maturity; Building Your Identity Program from Start to Finish; Developing Your Identity Strategy; and Extending Your Identity Program to the Cloud. Continental breakfast, lunch and happy hour included
CCSK Foundation (Cloud Security)
Instructor: Van Paschalis
Cost: $1,095.00
Time: 8:30 am – 5:00 pm
Description: The CCSK certificate is widely recognized as the standard of expertise for cloud security and gives you a cohesive and vendor-neutral understanding of how to secure data in the cloud. The CCSK credential is the foundation to prepare you to earn additional cloud credentials specific to certain vendors or job functions. Earning the CCSK will provide you with the knowledge to effectively develop a holistic cloud security program relative to globally accepted standards. It covers key areas, including best practices for IAM, cloud incident response, application security, data encryption, SecaaS, securing emerging technologies, and more. Continental breakfast, lunch and happy hour included
TUESDAY 10/25/2022
Mechanized Security Architecture – A Primer on Enterprise Security Architecture (ESA)
Instructor: Dr. Selvan Snow
Cost: $359.00
Time: 8:00 am – 12:00 pm
Enterprise Security Architecture (ESA) is an architectural discipline related to aligning Information Security (Infosec) efforts to the highest priority risk and business objectives. This workshop outlines the architect’s view of optimizing and organizing Infosec strategic planning. Using the tools outlined in the workshop, Infosec leaders and architects will be able to take concepts back to their teams to aid in strategic planning, while efficiently addressing cybersecurity business alignment.
Are you ready to ‘Mechanize’ your Enterprise Security Architecture (ESA) program for the cyber war? Attend this session to gain insight into examples of creating ESA mechanics to drive Board Decisions and Infosec Program Maturity. Take your Infosec organization to the next level…
Target Audience: IT/InfoSec Directors, Enterprise and Enterprise Security Architects (current or aspiring), IT/InfoSec practitioners with interest in Enterprise Architecture for Infosec. Beginner, intermediate, & some advanced
Learning Objectives:
– Provide a foundational understanding of Enterprise Security Architecture as a discipline.
– Provide the audience with real-world examples of cybersecurity strategy including security architecture techniques.
– Examine Information Security Governance (ISG) as it pertains to budgeting and advancing program maturity..
– Learn the Top 5 considerations for Creating an ESA program.
Vision One – Threat Defense Challenge (Attendees must bring their own laptop)
Instructor: Tom Bouathong
Cost: 0$ / Free
Time: 8:00 am – 5:00 pm
Join our security experts for a hands-on learning experience as you navigate a simulated cyberattack in real-time. Learn to “think like a hacker” and then respond to and defend valuable assets. Whether you are a novice or a skilled security professional, this experience has something for everyone. Breakfast, lunch and happy hour included.
Security Governance Re-Imagined
Instructor: Dr. Selvan Snow
Cost: $359.00
Time: 1:00 pm – 5:00 pm
The concept of Information Security Governance (ISG) is to oversee the work efforts (budgeting of resources, compliance, security posture) to ensure that your organization can achieve business priorities and still be secure by design. ISG provides mechanics and due diligence that celebrate collaboration and coordination on critical cybersecurity resources. Through effective planning (strategic and intermediate), cybersecurity efforts and initiatives will enable and optimize business objectives and rally the cause to a modern cybersecurity architecture.
In this workshop, we’ll examine real-world examples on how to get the most out of your cybersecurity budget, while supporting your cybersecurity strategy and planning. Instead of asking all the cybersecurity leaders what they want to work on next year, these principles will create a single sheet of music for cybersecurity harmony.
Target Audience: IT/InfoSec Directors, Enterprise and Enterprise Security Architects (current or aspiring), IT/InfoSec practitioners with genuine interest in Cybersecurity Strategy & Governance. Beginner, intermediate, & some advanced
Learning Objectives:
– Provide a foundational understanding of Information Security Governance as a discipline.
– Provide the audience with real-world examples of cybersecurity strategy including security architecture techniques.
– Examine Information Security Governance (ISG) as it pertains to budgeting and advancing program maturity…
– Learn the Top 5 considerations for Creating an effective ISG program.