Cybrary Events & Webinars
Hear from industry experts and stay up-to-date on the latest research, training, and product developments at Cybrary, through our webinars and live online events. Get practical insights into growing and optimizing your skills and team members. Check out the calendar for upcoming FREE sessions.
Patch It with CTIG - Airline Wi-Fi & A Hacker's Toolkit
Have you tried to access Wi-Fi on a plane? Convenient, right? After hearing what Ryan Englich and David Maynor have to say about unsecured connections - you might think twice before connecting. Plus, see what awesome gadgets David has in his hacker toolkit.
Create Customized Cybersecurity L&D Programs to Develop Your Team
In early 2021, Cybrary and Degreed entered a partnership to help bridge the gap between Learning and Development (L&D) and Cybersecurity teams. In an industry like Cybersecurity, professional growth and continued skill development are some of the greatest challenges HR and L&D teams face.
Skill sets specific to the most in-demand cyber roles are highly technical and unique to the teams that organizations support, making it even more challenging to know where to start when developing a learning program to adequately address needs.
In this special live webinar, join Cybrary and Degreed to learn:
How Degreed and Cybrary are tackling this prevailing challenge of understanding development needs, through customized role-based learning
The importance of avoiding siloed learning experiences for your technical teams
Degreed team member Lee Rayl’s story about his experience using Cybrary to join the Degreed Cybersecurity team
View this session on-demand with a downloadable presentation, audio transcript, and more.
Technology Evaluations: Finding the Right Solutions for your SOC Part 3
Joining Cybrary for the continuation of his praised SOC series, SOC Expert Chris Crowley reviews the foundations of a security operations center and starts on the technology evaluation process and how to effectively build an operations center from the ground up. Chris answers top asked questions to provide context to the infrastructure and extrastructure that make up operation centers around the world. The final installment of the 3-part series covers:
Technology taxonomy
Security, Deception, and Analysis
Data Aggregation
Retention
Physical Control
Distruction
Honeypots
Forensics
Simulators
... and more
View this session on-demand with a downloadable presentation, audio transcript, and more.
Technology Evaluations: Finding the Right Solutions for your SOC Part 2
Joining Cybrary for the continuation of his praised SOC series, SOC Expert Chris Crowley reviews the foundations of a security operations center and starts on the technology evaluation process and how to effectively build an operations center from the ground up. Chris answers top asked questions to provide context to the infrastructure and extrastructure that make up operation centers around the world. This second installment of the 3-part series covers:
Overall technology taxonomy
Communications, Operations, and Detection and Prevention
How to go beyond the basics of operations and SOC responsibilities
View this session on-demand with a downloadable presentation, audio transcript, and more.
Technology Evaluations: Finding the Right Solutions for your SOC
Joining Cybrary for the continuation of his praised SOC series, SOC Expert Chris Crowley reviews the foundations of a security operations center and starts on the technology evaluation process and how to effectively build an operations center from the ground up. Chris answers top asked questions to provide context to the infrastructure and extrastructure that make up operation centers around the world. This first installment of the 3-part series covers:
How to build a SOC from the ground up
What work is required of SOC Analysts and SOC Managers
Where to start in the evaluation process for SOC members and management
View this session on-demand with a downloadable presentation.
Maximizing Security Operations: Enhance SOC Capability and Maturity
In the final installment of this 4-part series, SOC Expert Chirs Crowley and Cybrary's Amanda Davi, review topics for the first 3 sessions, answer top asked questions, and tie all the elements together to provide conclusive thoughts on how to enhance your SOC's capability and maturity.
Topics covered:
Resume advice
Staffing and Incident Handeling and Response
Managing teams
Ingetrating all aspects to make effective decisions for your SOC
View this session on-demand with a downloadable presentation and Q&A.
Maximizing Security Operations: SOC Staffing and Incident Response
In part 3 of this 4-part series, SOC Expert Chirs Crowley and Cybrary's Amanda Davi, review Security Operation Center staffing and what companies need to effectively handle and respond to incidents. Incident handling and response related to proper SOC staffing is the key focus of this session, bringing to the forefront the importance of proper SOC hiring and process management.
View this session on-demand with a downloadable presentation and Q&A.
ATT&CK® Evaluations - Understanding and Applying Results to your Operations
Carbanak and FIN7 threat actors are not always understood and are often thought of as a combined threat actor, but available threat intelligence indicates they are distinct groups leveraging the Carbanak malware. The results and emulation plan for 2020 ATT&CK® Evaluations for Enterprise, echoed behaviors that were inspired by these threat groups; with 29 vendors participating, and 17 focused on a new variant exploring how solutions block adversary activity across the adversary’s post-compromise lifecycle.
Join ATT&CK Subject Matter Experts in this educational webinar to learn to optimize ATT&CK Evaluation results for your unique security operation needs.
Viewers will walk away with:
Answers to common questions, like "How do I know who won," "Should I just pick the tool with the most coverage," or "How does ATT&CK influence endpoint detection strategy?"
Context around the results and evaluation methodology, so you can interpret and use them.
A process of reviewing the results and assessing how vendors could meet your own specific operation's needs.
How to incorporate ATT&CK Evaluation results into your SOC Assessments
Transform New Hire Onboarding: Best Practices for Cybersecurity Leaders
six months. In today’s highly competitive job market, where qualified cybersecurity professionals are in high demand, onboarding can no longer be a compliance exercise. Security leaders are under more pressure to develop effective onboarding programs to not only get new hires operationally ready faster but to ensure these employees feel supported and want to stay with their organization.
In this on-demand webcast, we welcome Michael Anaya, Head of Cyber Risk at Palo Alto Networks, to discuss the specific challenges security leaders are facing, the key elements to driving new hire success, and simple ways to transform the onboarding experience to help retain top talent. In this 45-minute session, you’ll learn ...
How to find that person who’s the right fit for your team
How to keep new hires engaged and primed for success
How to create an environment that fosters innovation and growth
And so much more ...
The Evolution and Impact of Hands-On Learning in Cybersecurity
Like the current threat landscape, the way we learn and develop cybersecurity skills continues to evolve. The emergence of virtual labs and cyber ranges that amplify remote learning is now a necessity to effectively apply knowledge and learn technologies for real-world application. But how can you leverage these experiences to grow in a cybersecurity career?
We invite you to join our special guest, Jim Kowatch, President of Infosec Learning, as he discusses the latest trends and best practices in hands-on learning, and shares some exciting details on what to expect from our new partnership with Infosec Learning.
In our 45-minute webinar, you’ll gain a clear understanding of:
Why hands-on learning is critical in cybersecurity
How organizations use hands-on experiences to build effective cybersecurity teams
How to leverage virtual labs to prepare for a career in cybersecurity
And so much more…
View this session on-demand with a downloadable presentation.
Democratizing Cybersecurity: Free MITRE ATT&CK based tools from the Center for Threat-Informed Defense
What happens when cybersecurity leaders from the world’s most sophisticated security teams collaborate to overcome the community’s toughest challenges?
Get access to free ATT&CK-based tools to help the community adopt a threat-informed defense approach to security and get ahead of agile adversaries!
Join the nearly 24,000 member MITRE ATT&CK Defender community, Cybrary, and the Center for Threat-Informed Defense (CTID) in celebrating the charge to democratize cyber security. In this on demand event, our subject matter experts will present:
ATT&CK-based resources- where to get them, and what problems they solve
The new ATT&CK Workbench project that helps explore, create, annotate, and share extensions of ATT&CK
A sneak peek of the new projects in development
The Adversary Emulation MITRE ATT&CK Defender certification
View this session on-demand with a downloadable presentation and resources.
Maximizing Security Operations: SOC Architecture and Management
In part 2 of this 4-part series, SOC Expert Chris Crowley and reviews the role Security Operations Centers play in cybersecurity and builds on the foundations to help growing professionals understand what goes into building a modern SOC. Architecture and Management are the key focus of this session, bringing to the forefront the importance of proper SOC infrastructure and system management, as well as staffing best practices.
View this session on-demand with a downloadable presentation and Q&A.
Maximizing Security Operations: The Role of a SOC
Purpose of a SOC and its importance to the greater picture of cybersecurity
Impact on companies - How MSSPs help organizations
Importance for the development of cybersecurity professionals and their career development
Small - Internal, bigger internal, and MSSP
Overview of Top CompTIA Certifications - Live AMA With Bill Price
Is earning a CompTIA certification on your list of goals for 2023? Join Cybrary instructor Bill Price for a live event where he will break down what you need to know about some of the top CompTIA certifications, such as the A+, Net+, Sec+, and CySA+. In this session, you will learn more about these popular industry-recognized certifications and will walk away with a better understanding of which one might be the best fit for your career goals. We’ll dive into some of Bill’s tips on how to set yourself up for success and explore the hands-on resources that are available to you on your certification journey with Cybrary.
2022 Year in Review Happy Hour
Join David Maynor and Ryan English from the Cybrary Threat Intelligence Group (CTIG) as they dive into their top moments of 2022. From news breaking headlines, major cybersecurity incidents, and the return of in-person conferences, David and Ryan spend the hour reminiscing on some of the most impactful moments of 2022.