ITPG Secure Compliance
Follow ITPG Secure Compliance on their other social channels!
About Us
Company Size:
11-50 employees
Company Type:
1964 Gallows Rd. Suite 210, Vienna VA 22182
Founded in 1999, ITPG Secure Compliance is dedicated to preventing information security breaches that put organizations at risk of noncompliance. Based in Vienna, VA, our subject matter experts are sought-after authorities on PCI DSS, HIPAA Security and Privacy Rule, FERPA and other industry securit ...
Read more
Promoted Content
ITPG Certification Training
Let's talk about Cyber-security Standards of Practice with Fred Cohen
Free Webinar / CPE Date : October 18th, 1 PM ESTRegistration Link (an available as recording after live presentation) : : Fred Cohen, PhD. CEO of Management Analytics.This webinar, hosted by ITPG Secure Compliance and Certification Training, will be a practitioner oriented conversation about the latest Cyber-Security Standards of Practice and adoption models for CEOs and Information Security professionals . We will be joined by our gues ...
Webinar : Cracking the Human Factor problem: Sims, games & data
Date: Sep 27th Time : 1pm ESTRegistration link (and after live presentation, available as recording) : Data-driven integration between Phishing Sims and game-based information security awareness training.In this webinar you will learn:•Why Phishing Sims didn’t turn out to be the silver bullet to bring down the Human Factor problem in Information Security.•Root cause analysis: Why people fail, and how cognitive neuroscience of learning ca ...
Webinar : How Can Your Organization use Machine Learning to Secure Your Sensitive Data
Presenter : Robert Johnston, CEO & Co-Founder, Tim Stacey, Ph.D., Director of Data Science & Tim Evans, SVP & Co-Founder of Adlumin IncDate and Time : August 2nd 1pm EST. After that day, it will available as recording in BrightTalk.Free registration link :, targeted attacks can take weeks, months, or longer to discover and resolve. Security teams need tools that quickly uncover the source and scope of an attack to reduce t ...
Webinar: Build Your Cyber Budget for 2019: Part 1
Presenter : Jerry Caponera, VP of Cyber Risk StrategyDate and Time : August 16th 1 pm EST. After that day, it will be avaliable as recording in BrightTalkFree registration link : cyber vendors and balancing budgets can be a challenge. We want to help cut through the clutter and show how we build a cybersecurity budget and identify spending needs an organization needs to immediately address. This is a two-part webinar series where you will ...
Webinar : Making Cybersecurity Matter to Business – A conversation with Pete Herzog
Presenter : Pete Herzog, Managing Director at ISECOMDate and Time : July 26th 1pm EST. After that it will avaliable as recording in BrightTalkFree registration link : early 2000, the Open Source Security Testing Methodology Manual (OSSTMM) was released with the primary objective of improving how the enterprise conducted security testing. Key sections of this methodology include operational, human, physical, wireless, telecommunication, and data ...
Webinar : Artificial Intelligence – Internet of Things : Cybersecurity Perspectives
by Dr. Shawn P. Murray, President, Murray Security Services & ConsultingThis webinar will be live on Jun 14th 1:00 pm EST, after that will be available as a on demand recording.Click this link for free registration : Intelligence (AI) is quickly gaining recognition as a viable method to increase successful problem solving, advance research in areas that exceed human capabilities and are automating menial processes to increase efficie ...
How Cyber (measured in dollars) Earns a Spot on the Risk Register
by Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah SecurityFree CPE/Webinar Date : May 17th, 2018 1:00 pm ESTFor registration click has yet to be fully integrated into the suite of business functions and monitored risks within most organizations. GRC is the mechanism to align cyber and the business, but it’s current state is not sufficient. Governance hierarchy is ineffective (CISOs reporting to the CIO or COO), Risk leveraging am ...
The Future of Passwords by Hamza Sirag
Free Webinar/CPE March 15th 1:00 pm EST click here for registration : webinar will provide an overview of the future of passwords. Passwords have become very important, protecting a treasure trove of information. You will get an inside look at the techniques and tactics used conduct password attacks. We will discuss the various countermeasures available, new improvements made to the latest operating systems to prevent successful password a ...
Is Threat Hunting the Next Frontier: Separating the Hype from the Reality
Presenter :  Dr. James Stanger Chief Technology Evangelist, CompTIAFree CPE/Webinar. Date : May 3rd, 2018 1:00 pm EST Click here for free registration.One of the more interesting-sounding job skills today is that of the “threat hunter.” Let’s talk about the activity of “threat hunting,” and deconstruct it a little bit. The idea behind threat hunting is to proactively look for adversaries and for traces of their activity. So, is threat hunting all that it’s cracked up to be ...
AI and the Scientific Method for Cyber Investigation Automation
"Artificial Intelligence" is arguably one of the most over-used terms in cybersecurity today and despite the potential, most organizations are in the dark about how best to apply it -- and more importantly, how to explain the results it produces. We will discuss how encoding expert tradecraft using scientific methods and common knowledge / data models - can produce AI with explainable results for improved investigation and an active cyber defense.About the speaker :Shawn Riley, Chief Data Office ...
Microsoft Issues Updates for 96 Vulnerabilities You Need to Patch this Month

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?