Content Type
Date Range
Event | Sep/30/2025
In the past ten years, many organizations have found themselves with deployments in a number of leading cloud service provider (CSP) environments. In the early years of multicloud, most security teams struggled to determine the right controls and practices to effectively protect their organizations. While this is sometimes still the case today, we’ve learned a lot about what works and what doesn’t in multicloud security architecture, policy and operations.
Tools & Guides | Jul/17/2025
Access a summary of our July 17th Tech Briefing that dives into three major developments shaking up the security landscape. Download now for expert insights, actionable next steps, and a deeper dive into each story—all in one concise PDF.
Blog | Jul/17/2025
To strengthen its cybersecurity posture and reduce risk exposure, a client organization engaged in a comprehensive cybersecurity risk assessment—that yielded cost savings.
Tools & Guides | Jul/15/2025
This guide is a sample from the IANS Vendor Assessment Community that outlines when and why security leaders should consider consolidating tools onto the CrowdStrike Falcon® Platform. Learn how consolidation can simplify operations, reduce vendor fatigue, and enhance visibility without sacrificing protection.
Blog | Jul/15/2025
Learn how to enable and tune a wide variety of Microsoft Defender for Endpoint settings for Windows workstations and servers using this handy checklist.
Faculty
Chad Holmes is a cybersecurity strategist with over 20 years of experience helping organizations protect critical systems, enable secure development, and build resilient teams. With deep expertise in healthcare security, application security, and hands-on training, he combines technical insight with business acumen to drive meaningful outcomes. Whether guiding CISOs through strategic decisions or mentoring the next generation of security professionals, Chad is passionate about developing talent and making security a catalyst for innovation.
Blog | Jul/10/2025
Gain an understanding of the key components of an effective executive-level InfoSec dashboard along with tips for including concrete actionable data.
Event | Aug/26/2025
AI is putting legacy data governance processes under a microscope. In response, a number of key frameworks are emerging to provide a foundation for orgs to use as a starting point. This session dives into the strategic and tactical steps to take to improve AI governance, regardless of which framework you choose, and provides a rundown of some of the most prominent AI governance frameworks.
Tools & Guides | Jul/8/2025
Agentic AI, autonomous AI that performs tasks and makes decisions independently, can drastically increase operational efficiencies but significantly complicates security and compliance. This guide outlines a clear roadmap and practical guardrails to help CISOs and security leaders as they plan for adoption of Agentic AI.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.