Cybrary Events & Webinars
Hear from industry experts and stay up-to-date on the latest research, training, and product developments at Cybrary, through our webinars and live online events. Get practical insights into growing and optimizing your skills and team members. Check out the calendar for upcoming FREE sessions.
Patch It with CTIG - Airline Wi-Fi & A Hacker's Toolkit
Have you tried to access Wi-Fi on a plane? Convenient, right? After hearing what Ryan Englich and David Maynor have to say about unsecured connections - you might think twice before connecting. Plus, see what awesome gadgets David has in his hacker toolkit.
Create Customized Cybersecurity L&D Programs to Develop Your Team
In early 2021, Cybrary and Degreed entered a partnership to help bridge the gap between Learning and Development (L&D) and Cybersecurity teams. In an industry like Cybersecurity, professional growth and continued skill development are some of the greatest challenges HR and L&D teams face.
Skill sets specific to the most in-demand cyber roles are highly technical and unique to the teams that organizations support, making it even more challenging to know where to start when developing a learning program to adequately address needs.
In this special live webinar, join Cybrary and Degreed to learn:
How Degreed and Cybrary are tackling this prevailing challenge of understanding development needs, through customized role-based learning
The importance of avoiding siloed learning experiences for your technical teams
Degreed team member Lee Rayl’s story about his experience using Cybrary to join the Degreed Cybersecurity team
View this session on-demand with a downloadable presentation, audio transcript, and more.
Technology Evaluations: Finding the Right Solutions for your SOC Part 3
Joining Cybrary for the continuation of his praised SOC series, SOC Expert Chris Crowley reviews the foundations of a security operations center and starts on the technology evaluation process and how to effectively build an operations center from the ground up. Chris answers top asked questions to provide context to the infrastructure and extrastructure that make up operation centers around the world. The final installment of the 3-part series covers:
Technology taxonomy
Security, Deception, and Analysis
Data Aggregation
Retention
Physical Control
Distruction
Honeypots
Forensics
Simulators
... and more
View this session on-demand with a downloadable presentation, audio transcript, and more.
Technology Evaluations: Finding the Right Solutions for your SOC Part 2
Joining Cybrary for the continuation of his praised SOC series, SOC Expert Chris Crowley reviews the foundations of a security operations center and starts on the technology evaluation process and how to effectively build an operations center from the ground up. Chris answers top asked questions to provide context to the infrastructure and extrastructure that make up operation centers around the world. This second installment of the 3-part series covers:
Overall technology taxonomy
Communications, Operations, and Detection and Prevention
How to go beyond the basics of operations and SOC responsibilities
View this session on-demand with a downloadable presentation, audio transcript, and more.
Technology Evaluations: Finding the Right Solutions for your SOC
Joining Cybrary for the continuation of his praised SOC series, SOC Expert Chris Crowley reviews the foundations of a security operations center and starts on the technology evaluation process and how to effectively build an operations center from the ground up. Chris answers top asked questions to provide context to the infrastructure and extrastructure that make up operation centers around the world. This first installment of the 3-part series covers:
How to build a SOC from the ground up
What work is required of SOC Analysts and SOC Managers
Where to start in the evaluation process for SOC members and management
View this session on-demand with a downloadable presentation.
Maximizing Security Operations: Enhance SOC Capability and Maturity
In the final installment of this 4-part series, SOC Expert Chirs Crowley and Cybrary's Amanda Davi, review topics for the first 3 sessions, answer top asked questions, and tie all the elements together to provide conclusive thoughts on how to enhance your SOC's capability and maturity.
Topics covered:
Resume advice
Staffing and Incident Handeling and Response
Managing teams
Ingetrating all aspects to make effective decisions for your SOC
View this session on-demand with a downloadable presentation and Q&A.
Maximizing Security Operations: SOC Staffing and Incident Response
In part 3 of this 4-part series, SOC Expert Chirs Crowley and Cybrary's Amanda Davi, review Security Operation Center staffing and what companies need to effectively handle and respond to incidents. Incident handling and response related to proper SOC staffing is the key focus of this session, bringing to the forefront the importance of proper SOC hiring and process management.
View this session on-demand with a downloadable presentation and Q&A.
ATT&CK® Evaluations - Understanding and Applying Results to your Operations
Carbanak and FIN7 threat actors are not always understood and are often thought of as a combined threat actor, but available threat intelligence indicates they are distinct groups leveraging the Carbanak malware. The results and emulation plan for 2020 ATT&CK® Evaluations for Enterprise, echoed behaviors that were inspired by these threat groups; with 29 vendors participating, and 17 focused on a new variant exploring how solutions block adversary activity across the adversary’s post-compromise lifecycle.
Join ATT&CK Subject Matter Experts in this educational webinar to learn to optimize ATT&CK Evaluation results for your unique security operation needs.
Viewers will walk away with:
Answers to common questions, like "How do I know who won," "Should I just pick the tool with the most coverage," or "How does ATT&CK influence endpoint detection strategy?"
Context around the results and evaluation methodology, so you can interpret and use them.
A process of reviewing the results and assessing how vendors could meet your own specific operation's needs.
How to incorporate ATT&CK Evaluation results into your SOC Assessments
Transform New Hire Onboarding: Best Practices for Cybersecurity Leaders
six months. In today’s highly competitive job market, where qualified cybersecurity professionals are in high demand, onboarding can no longer be a compliance exercise. Security leaders are under more pressure to develop effective onboarding programs to not only get new hires operationally ready faster but to ensure these employees feel supported and want to stay with their organization.
In this on-demand webcast, we welcome Michael Anaya, Head of Cyber Risk at Palo Alto Networks, to discuss the specific challenges security leaders are facing, the key elements to driving new hire success, and simple ways to transform the onboarding experience to help retain top talent. In this 45-minute session, you’ll learn ...
How to find that person who’s the right fit for your team
How to keep new hires engaged and primed for success
How to create an environment that fosters innovation and growth
And so much more ...
Career Advice - Interviewing Skills
In our career advice series we discuss topics around recruiting and hiring on security teams, like resumes and interviewing best practices. In this session, we meet with Cybrary CEO, Kevin Hanes, to talk about the big kahuna: Interviews! Learn what to ask during the interview, how to answer common interviewing questions, and much more!
View this session on-demand!
Cybersecurity Skill Shortage
Is there really a skills shortage? The ever-present question. Between "skill gap" and "skill shortage" the information avaiable can be conflicting. In this session, hosts Chloé and David discuss the shortage of skills on security teams and what professionals in cybersecurity can do to address it.
View this session on-demand!
Cybersecurity Role Dive: SOC Analyst
Join us monthly for our Role Dive series! Each month we will examine a particular role on a security team, and uncover what’s needed to be successful in such a role and how to thrive in that position. This month we chatted with Jay Jay Davey, from Birdewell, to understand what it's like to be a SOC Analyst!
View this session on-demand!
Career Advice - Resumés
In our career advice series we discuss topics around recruiting and hiring on security teams, like resumes and interviewing best practices. In this session, we meet with CEO & Founder of CyberSN, Deidre Diamond, to talk about resumés; what you should include, what to leave out, how to stand out from other applicants, and how to get through initial screenings.
View this session on-demand!
Entry Level Roles and Hands-on Learning
Join our Head of Impact, Chloé Messdaghi, and CEO & Founder of TrustedSec & BinaryDefense, David Kennedy for a fireside chat discussing how to improve the issues that entry-level folks in cybersecurity face. Topics will range from how to acquire skills that future employers want to see on their security teams and how hiring managers can do better when it comes to entry-level roles.
Cybersecurity Role Dive: Pentester
Join us monthly for our Role Dive series! Each month we will examine a particular role on a security team, and uncover what’s needed to be successful in such a role and how to thrive in that position. This month we chatted with Phil Wylie from CyCognito to understand what it's like to be a Penetration Tester!
View this session on-demand!
Cybersecurity Role Dive: Network Engineer
Join us monthly for our Role Dive series! Each month we will examine a particular role on a security team, and uncover what’s needed to be successful in such a role and how to thrive in that position. This month we chatted with Mike Benjamin from Fastly to understand what it's like to be a Network Engineer!
View this session on-demand!
What is Purple Teaming?
What is Purple Teaming, and how does this philosophy empower teams to level up their threat-informed defense strategy? Join Cybrary and MITRE Engenuity in a fireside chat where we discuss all things Purple Teaming with MITRE ATT&CK Defender’s Director of Content, Steve Luke.
In this 45-minute session, our subject matter experts dive into:
A breakdown of Purple Teaming best practices - how does this differ from the traditional Red Team and Blue Team tactics?
What are the characteristics of a successful Purple Team engagement, and what common challenges does this approach aim to address?
First-hand accounts of running a Purple Team, lessons learned, and security teams coming together for a shared set of objectives.
View this session on-demand with a downloadable presentation, audio transcript, and more.
Overview of Top CompTIA Certifications - Live AMA With Bill Price
Is earning a CompTIA certification on your list of goals for 2023? Join Cybrary instructor Bill Price for a live event where he will break down what you need to know about some of the top CompTIA certifications, such as the A+, Net+, Sec+, and CySA+. In this session, you will learn more about these popular industry-recognized certifications and will walk away with a better understanding of which one might be the best fit for your career goals. We’ll dive into some of Bill’s tips on how to set yourself up for success and explore the hands-on resources that are available to you on your certification journey with Cybrary.
2022 Year in Review Happy Hour
Join David Maynor and Ryan English from the Cybrary Threat Intelligence Group (CTIG) as they dive into their top moments of 2022. From news breaking headlines, major cybersecurity incidents, and the return of in-person conferences, David and Ryan spend the hour reminiscing on some of the most impactful moments of 2022.