Cybrary Events & Webinars
Hear from industry experts and stay up-to-date on the latest research, training, and product developments at Cybrary, through our webinars and live online events. Get practical insights into growing and optimizing your skills and team members. Check out the calendar for upcoming FREE sessions.
On Demand Webinars
Part 2 of our interactive SOC Analyst Playbook series teaches users how to set up their own technical environment, leverage data collected from the SOC survey to gain insights into their own SOC, and optimize their environment through data-driven analysis.
How to Dispel Cybersecurity Training Myths: Make the Case for Training with Research-Backed Insights
Today’s evolving threat landscape has left cybersecurity leaders scrambling to prepare staff to protect their organization. While training programs can improve readiness, common myths that training increases employee turnover or fails to produce measurable benefits cast doubt on the value of these programs. This webinar reviews the real value of training your cybersecurity team with insights backed by research from a new Omdia survey report.
In this AMA style webinar with Chief Security and Trust Officer, Malcolm Harkins, we dive deep into the background and qualifications needed to make the jump into a CISO role. What skills and certifications (or degree) should you pursue? How do you gain experience toward this role? Should CISO's have a techical background and who should they report to? Get answers to all these questions and more in this session hosted by Cybrary's Chief Impact Officer, Chloé Messdaghi, and Chief Mentor, Mark Nibert. View the recording today.
What background and qualifications do you need to make the jump into cybersecurity? What skills and certifications should you pursue? And how do you gain experience? In this session, you’ll get a rundown of everything you need to know to jumpstart your career in Cybersecurity from our Chief Impact Officer, Chloé Messdaghi. View the recording today.
Part 1 of the SOC Playbook series serves as an introduction to parts 2 and 3, where you'll get interactive and hands-on with our expert Chris Crowley to work through dataset analysis together. Dive in today!
Public speaking! Wether you get butterflies in your stomach or another phyical manifestation of anxiety at the thought of speaking in front of people, there are tips you can learn to control your nerves. Learn from two experienced conference speakers, Chloé and Cathy, as they share tipcs on combatting nerves, how to prepare for talks, and how to take control of a room with confidence.
Have you tried to access Wi-Fi on a plane? Convenient, right? After hearing what Ryan Englich and David Maynor have to say about unsecured connections - you might think twice before connecting. Plus, see what awesome gadgets David has in his hacker toolkit.
Las Vegas conference week (Hacker Summer Camp) is *the spot* for tech and security swag, meetups, and getting hacked... Join the Cybrary Threat Intelligence Group as they recount what went down at Black Hat and DEF CON 2022.
Cybrary CEO, Kevin Hanes, and Sr. Director of Content, Will Carlson talk about the big kahuna: Interviews! Learn what to ask during the interview, how to answer common interviewing questions, how to conduct yourself in an interview based on the role, and much more.
Special guest, Founder & CEO of CyberSN, Deidre Diamond, joins our Cheif Impact Officer, Chloé Messdaghi to discuss best practices and tips when it comes to recruiting on security teams. Hiring managers looking for 'dos and don'ts', stick around! You'll learn how to write effective job descriptions and how to find the best candidates for your openings.
Is there really a skills shortage? In this session, hosts Chloé and David discuss the shortage of skills on security teams and what professionals in cybersecurity can do to address it.
While many industrial firms have a plan in place for how to deal with an incident in their enterprise network, industrial networks are a discrete space with different challenges. Aside from simply requiring a separate incident response plan document, several preparatory steps will greatly slow down response if not performed. Join Lesley Carhart in exploring these issues and their impact on response.
Burnout isn't the only thing on everyone's mind this year. How to you retain your team and keep them happy and engaged? Continued development. In a constantly evolving industry like cybersecurity, continued development is critical to every aspect of business. Here's how to address the issue with key stakeholders.
How do you know what job role is right for you or your company? If you're looking to be a SOC Analyst, learn from Jay Jay Davey what it takes and the career path options that could work for you.
A lot happened in July - from the Follina CVE to ZuoRAT, and the start of the Cybrary Threat Intelligence Group live series, Patch It with CTIG! This episode takes an in-depth look at how fast and easy it is to exploit Follina, with a live demonstration. [View the July recording here](https://www.cybrary.it/business/resources/CTIG/patch-it-follina/?src=events-page&camp=webinar).
Crafting a resumé is more an art than a science, but there best practices to follow to achieve optimal results. In this session, Cybrary's Head of Impact meets with Deidre Diamond, CEO & Founder of CyberSN, to discuss what every technical resumé should include, what to leave out, and how appicants can stand out from the hundreds of others applying for the same jobs. [Watch the recording here](https://www.cybrary.it/business/resources/career-advice-resume-building/?src=events-page&camp=webinar).
Gamification - it's a buzzword heard across many industries, but it can actually help your security team be more engaged with training, and better retain their skills. At it's core, the interactive elements that get your team hands-on with experience driven learning is what can take your team to their full potential. Join Chloé Messdaghi in her series as she explains how to improve security teams by addressing the issues they face.
Job seekers trying to enter into cybersecurity and hiring managers looking for new recruits – here's everything to do and look for when finding and applying for entry level cybersecurity roles.
How do you know what job role is right for you or your company? If you're looking to get into a pentesting role, or searching to fill the position on your team, here's what you should know!
It's 2022 and burnout is a plague that's been steadily sweeping across industries for decades. In cybersecurity, a "burnt-out" colleague or employee can be a liability, but that hasn't stopped people from being overworked, underpaid, and overlooked for opportunities. Enough is enough. Here's how to improve security teams by addressing the #1 issue people face today.
How do you know what job role is right for you or your company? If you're looking to get into a Network Engineer role, or searching to fill the position on your team, here's what you need to know!
How do you reduce business risk? How to do you build a cybersecurity team from the ground up? Listen to Global CISO, Jeff Schilling talk with Cybrary CEO, Kevin Hanes about ransomware attacks and how empowering security teams with knowledge and experience-led training is critical to combatting threats and building knowledgable teams. Listen to the free replay today!
In this recorded fireside chat, MITRE Engenuity's Director of Certifications and Training, Steve Luke, and Cybrary's Senior Director of Content, Will Carlson, dive into the Why, How, and What behind the concept and security philosophy that is Purple Teaming. Learn more from this replay Q&A.
In this on-demand webinar, Cybrary and Degreed discuss: - How Degreed and Cybrary are tackling the prevailing challenge of understanding development needs, through customized role-based learning - The importance of avoiding siloed learning experiences for your technical teams - Lee Rayl’s story to learn about his experience using Cybrary to join the Degreed Cybersecurity team
Joining Cybrary for the continuation of his praised SOC series, SOC Expert Chris Crowley reviews the foundations of a security operations center and starts on the technology evaluation process and how to effectively build an operations center from the ground up. The final installment of the 3-part series, "Storage, Deception, and Analysis," covers the security, destruction, and analysis portions of the SOC technology taxonomy. View the recording today.
Like the current threat landscape, the way we learn and develop cybersecurity skills continues to evolve. The emergence of virtual labs and cyber ranges that amplify remote learning is now a necessity to effectively apply knowledge and learn technologies for real-world application. View this recorded webcast to get an inside look at how you can leverage these experiences to grow in your cybersecurity career.
Joining Cybrary for the continuation of his praised SOC series, SOC Expert Chris Crowley reviews the foundations of a security operations center and starts on the technology evaluation process and how to effectively build an operations center from the ground up. The second installment of the 3-part series, "Communications, Ops, and Detection & Prevention," covers the communication, operations, and detection and prevention portions of the SOC technology taxonomy. View the recording today.
Democratizing Cybersecurity: Free MITRE ATT&CK based tools from the Center for Threat-Informed Defense
In this exclusive MITRE partnership event, our subject matter experts will present free ATT&CK-based resources, the problems they solve; the new ATT&CK Workbench project that helps explore, create, annotate, and share extensions of ATT&CK; an inside look at 6 new projects in development, and the Adversary Emulation MITRE ATT&CK Defender certification. Gain access to the recorded webcast and the free MITRE resources.
Joining Cybrary for the continuation of his praised SOC series, SOC Expert Chris Crowley reviews the foundations of a security operations center and starts on the technology evaluation process and how to effectively build an operations center from the ground up. Chris answers top asked questions to provide context to the infrastructure and extrastructure that make up operation centers around the world. This first installment of the 3-part series covers how to build a SOC, and what's required of those that work in it and manage it.
In the final installment of this 4-part series, SOC Expert Chirs Crowley and Cybrary's Amanda Davi, review topics for the first 3 sessions, answer top asked questions, and tie all the elements together to provide conclusive thoughts on how to enhance your SOC's capability and maturity.
In part 3 of this 4-part series, SOC Expert Chirs Crowley and Cybrary's Amanda Davi, review Security Operation Center staffing and what companies need to effectively handle and respond to incidents. Incident handling and response related to proper SOC staffing is the key focus of this session, bringing to the forefront the importance of proper SOC hiring and process management.
Join ATT&CK Subject Matter Experts in this educational webinar to learn to optimize ATT&CK Evaluation results for your unique security operation needs.
In part 2 of this 4-part series, SOC Expert Chris Crowley and reviews the role Security Operations Centers play in cybersecurity and builds on the foundations to help growing professionals understand what goes into building a modern SOC. Architecture and Management are the key focus of this session, bringing to the forefront the importance of proper SOC infrastructure and system management, as well as staffing best practices.
In this on-demand webcast, we welcome Chris Crowley, consultant and author of SOC-Class.com @Montance® LLC, to discuss the purpose of a SOC and its importance to the greater picture of cybersecurity such as the impact on companies and the importance for the development of cybersecurity professionals and their career development.
In this on-demand webcast, we welcome Michael Anaya, Head of Cyber Risk at Palo Alto Networks, to discuss the specific challenges security leaders are facing, the key elements to driving new hire success, and simple ways to transform the onboarding experience to help retain top talent.
This session focuses on building a skilled cybersecurity team. The benefits of developing your team’s skills are clear, but nearly 80% of IT and Security leaders say they don't yet have a way to ensure team knowledge and skills are up-to-date.
In this session, Ruta Bhatt reviews the top common challenges for businesses today and explains the important role industry certifications (and how to attain them) play in solving those issues.
In this walkthrough, Ruta explores the common pitfalls of onboarding and shares Cybrary's view on how to optimize the process to drive meaningful outcomes for your organization.
In this session, Angela Wood covers career pathing options on the Cybrary for Team's platform and the impact you'll notice within your organization, immediately.
In this 30-minute session, Soren Berglund covers creating a consistent and scalable onboarding process through utilizing Cybrary’s comprehensive Teams platform.
In this webinar, Angela explains the root causes skills gap and provides a targeted approach to scaling effective certification preparation to teams, how to approach supplemental prep materials, and how to know when teams are ready to pass the exams.