Hi [[ session.user.profile.firstName ]]

Free CISSP Training Class

Free to view CISSP Identity and Access Management training. Learn from our CISSP expert trainer and practitioner, watch how he breaks everything down into easy to understand sections. This video covers

Identity and Access Management (Controlling Access and Managing Identity)
Physical and logical assets control
Identification and authentication of people and devices
Identity as a service (e.g. cloud identity)
Third-party identity services (e.g. on-premise)
Access control attacks
Identity and access provisioning lifecycle (e.g. provisioning review)
The CISSP candidate must have at least 5 years of paid full-time experience in 2 or more of the above (ISC)² CISSP CBK® domains to be recognised as a full CISSP. Those candidates with less than 5 years experience will be able to become CISSP Associates upon passing the exam. Candidates may receive a one year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience.

What if I don't have the required experience?
If you don't have the experience you can become an Associate of (ISC)² by successfully passing the CISSP exam. You'll then have 6 years to earn your experience to become a CISSP.
Recorded Jun 23 2016 98 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Cyber Management Alliance
Presentation preview: Free CISSP Training Class

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Imminent Smart Device Mutiny Recorded: Aug 16 2017 59 mins
    Amar Singh & Chris Payne
    Are we filling our homes and carrying around in our pockets, our biggest cybersecurity vulnerabilities? Join us in a lively debate where we will discuss the increase in IoT and smart devices, some of the lesser talked about threats and what steps are being taken to reduce the risk to the imminent smart device mutiny of future.
  • Insights with Cyber Leaders - Tracy Andrew Former Infosec Manager at Freshfields Recorded: Jul 31 2017 21 mins
    Amar Singh CEO Cyber Management Alliance and Tracy Andrew CISO Freshfields
    As part of Cyber Management Alliance’s exclusive Insights With Cyber Leaders interview series, Amar Singh, CEO of Cyber Management Alliance, sat down with Tracy Andrew, former Information Security and Compliance Manager at one of the largest law firms in Europe - Fieldfisher, to gather fascinating insights into his career, his thoughts on qualifications and certifications, what attributes he looks for when recruiting, and whether, in his opinion, it is important to have a technical background to succeed in cyber security.
  • Wisdom of Crowds Virtual Roundtable - Data Security with RSA, Dell and more. Recorded: Jul 27 2017 20 mins
    Rashmi Knowles, Charles Race,William Culbert, Paul Ferron,Jason Goode and Jackson Shaw
    Participants in the Roundtable: Rashmi Knowles from RSA, Charles Race from OneLogin, William Culbert from Bomgar, Paul Ferron from CA Technologies, Jason Goode from Ping Identity and Jackson Shaw from Dell Security

    How has the adoption of ‘cloud’, including SaaS applications, changed the security landscape?

    What are the benefits of an Identity Access Management solution, why should it be implemented, and would you recommend an on-premise, cloud or hybrid solution?

    How does a single sign-on policy help to improve productivity and save costs, and what are the principle differences between SSO and federated identity?

    How should businesses and organisations leverage provisioning and deprovisioning for cloud applications, and what impact will this have?
  • An Exciting Day in the Life of a Risk Manager! - Really! Recorded: Jul 27 2017 50 mins
    Amar Singh, Chris Payne, Dom Saunders
    Policy? We have a policy? Have you read the policy? Thats right...who actually reads company policies?

    Risk and compliance managers globally have lost the fight against user policy acceptance leading to increasing organisational risk and the decreased ability to stand up and demonstrate effective compliance to regulatory bodies.

    Does it have to be this way? In this webinar, we

    * Demo what we use to transform and make mainstream what is often boring and ignored.

    * Show how you can effectively measure (yes measure and report) on how effective your policy implementation is.

    * Better engage and enforce your policies with third parties.
  • Amnon Bar-Lev - Check Point Executive Interview Recorded: Jul 21 2017 10 mins
    Amnon Bar
    We asked Amnon about the current key issues in data security and why having up-to-date threat information is becoming increasingly important, in what way malware attacks can be prevented, and how this intelligence can be harnessed and applied to the mobile and cloud environments.
    We also learn about Check Point Software’s new security architecture, Software Defined Protection, and how it can be used to control your security environment by combining intelligence with segmenting your network.
    View Amnon’s Executive Interview to learn how Check Point Software’s new architecture and other security solutions can be of benefit to your organisation.
  • Insights with Cyber Leaders with Saqib Chaudhry CISO Cleveland Clinic Recorded: Jul 17 2017 25 mins
    Amar Singh CEO Cyber Management Alliance and Saqib Chaudhry
    Amar Singh, CEO and founder of Cyber Management talked in length to Saqib Chaudry, CISO at the world-renowned Cleveland Clinic in Abu Dhabi on a range of topics including his early career in consulting, security certifications, whether the ability to hack is a step up to a security job, and the importance of threat intelligence.

    Starting out as an Helpdesk analyst; moving into systems and engineering, all as a consultant, allowed Saqib to choose projects to work on in between being a student. Saqib highly recommends starting a career in consulting, enabling you to gain experience in different technologies and business continuity. The role of CISO, to Saqib, is less with technology and more with understanding the processes, end to end, for an organisation.

    “Consulting firms already have a set list of clients across various industries which gives you a broad spectrum of what’s out there – makes your decision easier for the major you will work on.”
    From a personal development perspective, elaborates Saqib, is to focus on developing you as a person. Within a consulting firm, you can learn a range of different skills; from sales to dealing with executives, proposal writing, different cultures and how to market yourself.

    “You have 7 seconds to hold your senior executive’s attention so, when they ask you a question, answer it with a yes, no or I don’t know, before you launch into your explanation.”
  • Petya Ransomware Attacks: Autopsy and Lessons to Learn Recorded: Jul 13 2017 55 mins
    Josh Downs, BrightTALK; Ben Bartle,Barracuda Networks & Amar Singh, Cyber Management Alliance
    The only thing that can stop the security world discussing WannaCry was another large ransomware attack; which is exactly what happened at the end of June in the shape of Petya / notPetya / Goldeneye.

    The attacks compromised several global organisations and hit the headlines worldwide.

    In this session the moderator and panelists will cover the following:

    Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune into this session to get the lowdown on where the attacks came from; who was behind them; what they mean for the cyber security industry and how you can improve the protection for your business the next time something similar rolls along.

    PANELISTS:


    - Josh Downs, Senior Community Manager, BrightTALK (moderator)
    - Ben Bartle, Technical Engineer, Barracuda Networks
    - Amar Singh, CEO & Founder, Cyber Management Alliance
  • Insights with Cyber Leaders with Marek Pietrzyk Recorded: Jul 5 2017 20 mins
    Amar Singh CEO Cyber Management Alliance and Marek Pietrzyk
    Amar Singh, CEO and founder of Cyber Management had the pleasure of talking to Marek Pietrzyk, Director and Program Manager for Digital Data Protection at UBS on a range of topics including data classification and protection, the need for education and training, and his top three cyber security challenges for organisations today.
  • Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next Recorded: Jul 5 2017 54 mins
    Amar Singh, CEO & Founder, Cyber Management Alliance
    Media hype, so called cyber experts and the rest of the delettantes are all out in force trying to decipher what just happened with Petya. Ransomware or not? Script kiddies? Cyber warfare?

    Let's dive into behind the scenes of what may just be the turning point in targeted malware (sorry ransomware) attacks.

    Tune into this session to get the lowdown on where the attacks came from; who was behind them; what they mean for the cyber security industry and how you can improve the protection for your business the next time something similar rolls along.

    You'll also have the chance to ask Amar your Petya or ransomware questions and to get the upper hand defending your organisation.

    -----------------

    Amar Singh:

    CEO & Founder: Cyber Management Alliance & Give01Day.com - Chair of ISACA's UK Security Advisory Group.

    Experienced cyber, information security & data privacy practitioner. Senior C Level Executive, Global Chief Information Security Officer, Expert in Information Risk Management

    UK Government GCHQ Certified Trainer and creator of APMG & GCHQ Certified course CSPE (Cyber Security & Privacy Essentials)

    Creator and trainer of business focused Cyber Incident Planning & Response Course for middle to senior executives. (CIPR)

    Mentor & Trusted Advisor to FTSE 100 Firms, Start-ups & Incubator Funds

    Board Member and Consultant: MBA in Cyber Security. Chair of ISACA Security Advisory Group.

    Author, writer, Industry speaker & presenter
  • Dario Forte CEO of DFLabs explains Incident Response Automation and Orchestratio Recorded: Jul 4 2017 11 mins
    Dario Forte CEO DFLabs
    We had the opportunity to interview DFLabs, Founder and CEO, Dario Forte. Dario shared his insights on how to build an effective SOC utilising incident response automation and orchestration.
  • GDPR Mini-Webinar Series - Episode 8 - Working with Third-Parties Recorded: Jun 23 2017 13 mins
    Amar Singh & Chris Payne
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss working with third-parties
  • GDPR Mini-Webinar Series - Episode 7 - Incident Response Recorded: Jun 14 2017 11 mins
    Amar Singh & Chris Payne
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss the fines and penalties available to the supervisory authority in the event of a breach.
  • GDPR Mini-Webinar Series - Episode 6 - The Data Protection Officer Recorded: Jun 14 2017 17 mins
    Amar Singh & Chris Payne
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss the fines and penalties available to the supervisory authority in the event of a breach.
  • Abdullah Al Barwani Director General ICT OMAN- Insights with Cyber Leaders Recorded: Jun 12 2017 18 mins
    Amar Singh Cyber Management Alliance
    Cyber Management Alliance CEO Amar Singh interviews Abdullah Al Barwani, Director General, Infrastructure Division at Information Technology Authority - Oman
  • GDPR Mini-Webinar Series - Episode 5 - Fines & Penalties Recorded: May 30 2017 13 mins
    Amar Singh & Chris Payne
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss the fines and penalties available to the supervisory authority in the event of a breach.
  • GDPR Mini-Webinar Series - Episode 4 - Security by Design Recorded: May 30 2017 12 mins
    Amar Singh & Chris Payne
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss the principle of security by design and how you will be expected to bake security into your solutions an projects from their very inception.
  • Stop Blaming Russia & China for all Cyber Attacks Recorded: May 23 2017 59 mins
    Amar Singh, Joseph Carson
    Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger on either "sophisticated attackers" or, more blatantly, naming and blaming nation-states like Russia, China and now North Korea (alright, maybe even Iran).

    The truth about attribution (who is the attacker) is often overlooked for something more dramatic, especially in situations where sensitive information or brand reputation is at risk.

    The tactic is simple. Switch the focus from internal bad practices and shift the blame to “sophisticated, nation states and or criminal gangs.” Lazy, but effective.

    Join Amar Singh and Joseph Carson, from Thycotic, as they both discuss the real reason behind why cyber attacks succeed (no - not because of Russia or China)and the steps you can take to make the job of hackers, both sophisticated and otherwise, much harder.
  • The Cloud Executive Interview Paul Ferron Recorded: May 12 2017 4 mins
    Paul Ferron - CA Technologies
    We asked to Paul about CA Technologies’ focus on identity access management in the consumer marketplace and how it helps the end user, and find out more about the term Eco System which they believe extends across the whole enterprise and drives business processes.
    We learn why the increase in the use of personal mobile devices and the security of content/data has impacted enterprises, and Paul divulges his recommendations for filling the security gaps created by the use of cloud.
    View Paul’s Executive Interview to learn how CA Technologies’ offerings can help you.
  • GDPR Mini-Webinar Series - Episode 3 - Data Subject's Rights Recorded: Apr 5 2017 13 mins
    Amar Singh & Chris Payne
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar, we will discuss the rights of data subjects and what to do when they summon you to enact them.
  • GDPR Mini-Webinar Series - Episode 2 - Collecting Personal Information Recorded: Apr 4 2017 12 mins
    Amar Singh & Chris Payne
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss the six core principles of the GDPR and how it affects how you collect and process personal information.
View our exclusive "Insights with Cyber Leaders Series" and webinars
Cyber Management Alliance presents an exciting series of interviews with International Cyber Security Leaders. Want to know what they look for when hiring for their teams? Want to know the secrets to their success and what keeps them awake at night? Theses exclusive interviews are presented by industry thought leader and Chair of ISACA's UK Security Advisory Group and Global CISO Amar Singh. Series but humours and light hearted interviews. See the leading figures in Cyber Security like you've never seen them before. From Eugene Kaspersky to CTO HP Enterprise and CTO of Intel Security we have an amazing line up. Subscribe for updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Free CISSP Training Class
  • Live at: Jun 23 2016 11:05 am
  • Presented by: Cyber Management Alliance
  • From:
Your email has been sent.
or close