ITPG Secure Compliance
Follow
39 Followers
Follow ITPG Secure Compliance on their other social channels!
About Us
Founded:
1999
Company Size:
11-50 employees
Company Type:
Private
Location:
1964 Gallows Rd. Suite 210, Vienna VA 22182
Website:
Founded in 1999, ITPG Secure Compliance is dedicated to preventing information security breaches that put organizations at risk of noncompliance. Based in Vienna, VA, our subject matter experts are sought-after authorities on PCI DSS, HIPAA Security and Privacy Rule, FERPA and other industry securit ...
Read more
Promoted Content
WannaCry – Addressing the Unprecedented Global Ransomware Attack
Follow
19
Webinar : How Can Your Organization use Machine Learning to Secure Your Sensitive Data
Presenter : Robert Johnston, CEO & Co-Founder, Tim Stacey, Ph.D., Director of Data Science & Tim Evans, SVP & Co-Founder of Adlumin IncDate and Time : August 2nd 1pm EST. After that day, it will available as recording in BrightTalk.Free registration link : https://www.brighttalk.com/webcast/14987/327297Sophisticated, targeted attacks can take weeks, months, or longer to discover and resolve. Security teams need tools that quickly uncover the source and scope of an attack to reduce t ...
Follow
24
Webinar: Build Your Cyber Budget for 2019: Part 1
Presenter : Jerry Caponera, VP of Cyber Risk StrategyDate and Time : August 16th 1 pm EST. After that day, it will be avaliable as recording in BrightTalkFree registration link : https://www.brighttalk.com/webcast/14987/328027Choosing cyber vendors and balancing budgets can be a challenge. We want to help cut through the clutter and show how we build a cybersecurity budget and identify spending needs an organization needs to immediately address. This is a two-part webinar series where you will ...
Follow
22
Webinar : Making Cybersecurity Matter to Business – A conversation with Pete Herzog
Presenter : Pete Herzog, Managing Director at ISECOMDate and Time : July 26th 1pm EST. After that it will avaliable as recording in BrightTalkFree registration link : https://www.brighttalk.com/webcast/14987/324971In early 2000, the Open Source Security Testing Methodology Manual (OSSTMM) was released with the primary objective of improving how the enterprise conducted security testing. Key sections of this methodology include operational, human, physical, wireless, telecommunication, and data ...
Follow
52
Webinar : Artificial Intelligence – Internet of Things : Cybersecurity Perspectives
by Dr. Shawn P. Murray, President, Murray Security Services & ConsultingThis webinar will be live on Jun 14th 1:00 pm EST, after that will be available as a on demand recording.Click this link for free registration : https://www.brighttalk.com/webcast/14987/324081Artificial Intelligence (AI) is quickly gaining recognition as a viable method to increase successful problem solving, advance research in areas that exceed human capabilities and are automating menial processes to increase efficie ...
Follow
59
How Cyber (measured in dollars) Earns a Spot on the Risk Register
by Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah SecurityFree CPE/Webinar Date : May 17th, 2018 1:00 pm ESTFor registration click https://www.brighttalk.com/webcast/14987/315231Cyber has yet to be fully integrated into the suite of business functions and monitored risks within most organizations. GRC is the mechanism to align cyber and the business, but it’s current state is not sufficient. Governance hierarchy is ineffective (CISOs reporting to the CIO or COO), Risk leveraging am ...
Follow
143
The Future of Passwords by Hamza Sirag
Free Webinar/CPE March 15th 1:00 pm EST click here for registration : https://www.brighttalk.com/webcast/14987/307369This webinar will provide an overview of the future of passwords. Passwords have become very important, protecting a treasure trove of information. You will get an inside look at the techniques and tactics used conduct password attacks. We will discuss the various countermeasures available, new improvements made to the latest operating systems to prevent successful password a ...
Follow
219
Is Threat Hunting the Next Frontier: Separating the Hype from the Reality
Presenter :  Dr. James Stanger Chief Technology Evangelist, CompTIAFree CPE/Webinar. Date : May 3rd, 2018 1:00 pm EST Click here for free registration.One of the more interesting-sounding job skills today is that of the “threat hunter.” Let’s talk about the activity of “threat hunting,” and deconstruct it a little bit. The idea behind threat hunting is to proactively look for adversaries and for traces of their activity. So, is threat hunting all that it’s cracked up to be ...
Follow
340
AI and the Scientific Method for Cyber Investigation Automation
"Artificial Intelligence" is arguably one of the most over-used terms in cybersecurity today and despite the potential, most organizations are in the dark about how best to apply it -- and more importantly, how to explain the results it produces. We will discuss how encoding expert tradecraft using scientific methods and common knowledge / data models - can produce AI with explainable results for improved investigation and an active cyber defense.About the speaker :Shawn Riley, Chief Data Office ...
Follow
205
Leading through adversity and burnout to create a high performing security team
Security professionals are constantly in a state of adversity, always trying to battle the unseen advisory with little resources and lack of understanding from leadership. Often there is little to no recognition of a job well done, because no one can see the results of a good security team, no breach. It is only when there is an issue that the lights shine on the security team and that is when everyone asks why is it going wrong? This makes leadership within security that much harder, how do you ...
Follow
228
Social Engineering: Still a threat?
Next October 26th, 1pm EST, wWe will have another great webinar by a SME in Social Enginering Tarrell "Mac" McCrory, CISSP CEH. Click here to register : https://www.brighttalk.com/webcast/14987/284101When you hear the term Social Engineering, the first thing that pops into your mind will invariably be phishing emails. However, there are many aspects of social engineering that are, more often than not, completely overlooked. Identity impersonation, physical penetration, and various other means ca ...
Follow
Microsoft Issues Updates for 96 Vulnerabilities You Need to Patch this Monthhttp://thehackernews.com/2017/06/security-patch-tuesday.html?m=1

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel