ITPG Secure Compliance
Follow
39 Followers
Follow ITPG Secure Compliance on their other social channels!
About Us
Founded:
1999
Company Size:
11-50 employees
Company Type:
Private
Location:
1964 Gallows Rd. Suite 210, Vienna VA 22182
Website:
Founded in 1999, ITPG Secure Compliance is dedicated to preventing information security breaches that put organizations at risk of noncompliance. Based in Vienna, VA, our subject matter experts are sought-after authorities on PCI DSS, HIPAA Security and Privacy Rule, FERPA and other industry securit ...
Read more
Promoted Content
WannaCry – Addressing the Unprecedented Global Ransomware Attack
Follow
11
Webinar : Artificial Intelligence – Internet of Things : Cybersecurity Perspectives
by Dr. Shawn P. Murray, President, Murray Security Services & ConsultingThis webinar will be live on Jun 14th 1:00 pm EST, after that will be available as a on demand recording.Click this link for free registration : https://www.brighttalk.com/webcast/14987/324081Artificial Intelligence (AI) is quickly gaining recognition as a viable method to increase successful problem solving, advance research in areas that exceed human capabilities and are automating menial processes to increase efficie ...
Follow
39
How Cyber (measured in dollars) Earns a Spot on the Risk Register
by Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah SecurityFree CPE/Webinar Date : May 17th, 2018 1:00 pm ESTFor registration click https://www.brighttalk.com/webcast/14987/315231Cyber has yet to be fully integrated into the suite of business functions and monitored risks within most organizations. GRC is the mechanism to align cyber and the business, but it’s current state is not sufficient. Governance hierarchy is ineffective (CISOs reporting to the CIO or COO), Risk leveraging am ...
Follow
108
The Future of Passwords by Hamza Sirag
Free Webinar/CPE March 15th 1:00 pm EST click here for registration : https://www.brighttalk.com/webcast/14987/307369This webinar will provide an overview of the future of passwords. Passwords have become very important, protecting a treasure trove of information. You will get an inside look at the techniques and tactics used conduct password attacks. We will discuss the various countermeasures available, new improvements made to the latest operating systems to prevent successful password a ...
Follow
184
Is Threat Hunting the Next Frontier: Separating the Hype from the Reality
Presenter :  Dr. James Stanger Chief Technology Evangelist, CompTIAFree CPE/Webinar. Date : May 3rd, 2018 1:00 pm EST Click here for free registration.One of the more interesting-sounding job skills today is that of the “threat hunter.” Let’s talk about the activity of “threat hunting,” and deconstruct it a little bit. The idea behind threat hunting is to proactively look for adversaries and for traces of their activity. So, is threat hunting all that it’s cracked up to be ...
Follow
301
AI and the Scientific Method for Cyber Investigation Automation
"Artificial Intelligence" is arguably one of the most over-used terms in cybersecurity today and despite the potential, most organizations are in the dark about how best to apply it -- and more importantly, how to explain the results it produces. We will discuss how encoding expert tradecraft using scientific methods and common knowledge / data models - can produce AI with explainable results for improved investigation and an active cyber defense.About the speaker :Shawn Riley, Chief Data Office ...
Follow
170
Leading through adversity and burnout to create a high performing security team
Security professionals are constantly in a state of adversity, always trying to battle the unseen advisory with little resources and lack of understanding from leadership. Often there is little to no recognition of a job well done, because no one can see the results of a good security team, no breach. It is only when there is an issue that the lights shine on the security team and that is when everyone asks why is it going wrong? This makes leadership within security that much harder, how do you ...
Follow
183
Social Engineering: Still a threat?
Next October 26th, 1pm EST, wWe will have another great webinar by a SME in Social Enginering Tarrell "Mac" McCrory, CISSP CEH. Click here to register : https://www.brighttalk.com/webcast/14987/284101When you hear the term Social Engineering, the first thing that pops into your mind will invariably be phishing emails. However, there are many aspects of social engineering that are, more often than not, completely overlooked. Identity impersonation, physical penetration, and various other means ca ...
Follow
192
Free Webinar : Virtual Chief Information Security Officer (VCISO)
Not all organizations have or can afford a full-time Chief Information Security Officer (CISO) to address regulatory compliance, security, and privacy and its impact on the IT infrastructure. Then again, many organizations don’t need a CISO full time, but rather on a more limited basis.For these businesses, a Virtual CISO (VCISO) is the most cost-effective approach to manage critical compliance and security programs. An ITPG VCISO is an extension of your leadership team. A highly experienced s ...
Follow
232
Free Webinar : NIST 800-171 Protect CUI or Risk Losing Federal Business
Federal contractors that process, store or transmit what’s called Controlled Unclassified Information have until December to implement new, more stringent security guidelines to protect that information. Chances are your organization already meets some of the requirements, but it’s unlikely that you meet them all. Join us to identify what’s new, what’s not, what you have to do and how to assess the impact.Presenter : Kelly Handerhan, CISSP, PMP, CASP, CEH, Cybrary.it SMEOct 12 2017 1:00 ...
Follow
248
Free Webinar : Risk-Cloud-Crypto
The three emerging pillars of cybersecurity include Risk Management, Cloud Security, and Cryptography. Cybersecurity can't be implemented efficiently without risk management. The cloud is taking over and here to stay. Cryptography is the clue that holds it all together. Donald Parker, CISSP, CCSK, ITIL, MCSE As a Sergeant in the US Army, cybersecurity instructor, inventor, author, and consultant to the Federal Government, Donald Parker has dedicated his entire career of over 23 years to the In ...
Follow
Microsoft Issues Updates for 96 Vulnerabilities You Need to Patch this Monthhttp://thehackernews.com/2017/06/security-patch-tuesday.html?m=1

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel