Hi [[ session.user.profile.firstName ]]

Key Insights from CyberEdge’s 2020 Cyberthreat Defense Report

Did you know that 81% of organizations reported that they suffered a successful cyber-attack in 2019? CyberEdge’s 2020 Cyberthreat Defense Report (CDR) has become the de facto standard for assessing organizations’ security posture, for gauging perceptions of IT security professionals, and for ascertaining current and planned investments in IT security infrastructure. The 2020 CDR assesses the views of 1,200 IT security professionals representing 17 countries and 19 industries. It’s the most geographically comprehensive view of IT security perceptions in our industry. Join (ISC)2 (a sponsor of this year’s study) and CyberEdge on May 12, 2020 at 1:00PM Eastern for highlights of the results and get key insights including:

A record 62% of organizations were compromised by ransomware last year

58% of ransomware victims paid ransoms last year, but a third failed to recover their encrypted data

Malware, spear-phishing, and ransomware cause the most headaches while zero-day attacks are of least concern

Lack of skilled personnel and low employee awareness inhibit IT security’s success

85% of organizations are experiencing a shortfall of skilled IT security personnel
Recorded May 12 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Piper, Co-Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
Presentation preview: Key Insights from CyberEdge’s 2020 Cyberthreat Defense Report
  • Channel
  • Channel profile
  • Key Insights from CyberEdge’s 2021 Cyberthreat Defense Report May 11 2021 5:00 pm UTC 60 mins
    Steve Piper, Co-Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
    Did you know that 86% of organizations experienced a successful attack in 2021? Up from 81% the prior year, the largest year-over-year increase in six years. CyberEdge’s 2021 Cyberthreat Defense Report (CDR) has become the de facto standard for assessing organizations’ security posture, for gauging perceptions of IT security professionals, and for ascertaining current and planned investments in IT security infrastructure. Now in its eighth year, the 2021 CDR assesses the views of 1,200 IT security professionals representing 17 countries and 19 industries. It’s the most geographically comprehensive view of IT security perceptions in our industry. Join (ISC)2 (a sponsor of this year’s study) and CyberEdge on May 11, 2021 at 1:00 pm ET/10 am PT for highlights of the results and get key insights including:

    - The chronic shortage of IT security skilled staff is still prevalent; hiring gaps exist across all major IT security roles
    - Lack of skilled personnel is the #2 obstacle to effective defense against cyberthreats
    - The fastest and most economical solution is to train existing IT members to fill security positions
    - IT security professionals see personal and organization-wide benefits of cybersecurity certifications, especially for cloud security, software security, security administration, and management
    - And more!
  • Protecting the Enterprise: 5 Components needed for Cybersecurity Training Recorded: Apr 13 2021 62 mins
    Spencer Wilcox, CISO, PNM; Derrick Butts, CISO, The Truth Initiative; Mirtha Collin, (ISC)2; Brandon Dunlap, Moderator
    It’s difficult to prescribe a one-size-fits-all approach to training your cybersecurity team. While cybersecurity training needs to be structured and adhere to industry standards, it also must be purposeful and tailored to your organization’s needs. No one organization has precisely the same security needs as another. However, many of the fundamentals of a training and education program apply across different organizations and sectors. Join (ISC)2 for a panel discussion on Tuesday, April 13, 2021 at 1:00PM Eastern as industry leaders share tips they’ve learned and strategies they’re working towards to conquer a secure and compliant cybersecurity training program. Areas for discussion will include:

    · Who needs training

    · Who is responsible for training

    · Determining the curriculum

    · Training and certification

    · Ensuring training effectiveness

    Be prepared for an hour well-spent and discover how to create a cybersecurity training plan that maps to your organization’s specific needs.
  • Securing Your Expanded Remote Workforce Recorded: Dec 1 2020 59 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    The COVID-19 pandemic has caused dramatic increases in remote workforces and BYOD policy adoptions, making it more challenging than ever to secure company applications and data. Now that organizations have increased their remote access capacities, it’s now time to explore ways to help secure these remote managed and unmanaged devices to help mitigate the elevated risks of ransomware, data breaches, and other cyberattacks. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he:

    - Recaps key findings from a recent COVID-19 impact study
    - Examines the challenges facing today’s IT security teams
    - Suggests ways to invest more in your human firewalls
    - Explores current and emerging security technologies
  • CSSLP Webcast Series: Chapter 8 of 8 Recorded: Nov 20 2020 15 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Supply Chain (CSSLP Chapter 8 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 7 of 8 Recorded: Nov 20 2020 18 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Deployment, Operations, Maintenance (CSSLP Chapter 7 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 6 of 8 Recorded: Nov 20 2020 17 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Testing (CSSLP Chapter 6 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 5 of 8 Recorded: Nov 20 2020 21 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Implementation (CSSLP Chapter 5 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 4 of 8 Recorded: Nov 19 2020 23 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Architecture & Design (CSSLP Chapter 4 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 3 of 8 Recorded: Nov 19 2020 11 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Requirements (CSSLP Chapter 3 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 2 of 8 Recorded: Nov 19 2020 16 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Lifecycle & Risk Management (CSSLP Chapter 2 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 1 of 8 Recorded: Nov 19 2020 18 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Concepts (CSSLP Chapter 1 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • What to Expect at (ISC)² Security Congress 2020 Recorded: Nov 12 2020 25 mins
    Wesley Simpson COO, (ISC)², & Congress attendees: Brandon Dunlap, James McQuiggan, Sharon Smith
    Join (ISC)² Chief Operating Officer, Wesley Simpson for a lively and informative panel discussion on the many new features and offerings provided at the 2020 virtual Security Congress!

    Security Congress veterans and session panelists, Brandon Dunlap, James McQuiggan, & Sharon Smith will share how to leverage many of the unique features of the virtual Security Congress, guide you through the various educational, networking and engaging social activities driving the 2020 (ISC)² Security Congress experience.

    Whether it's your first Security Congress or 10th, there's something here for everyone. Key topics discussed:
    - What makes Security Congress is the marquee security conference of the year:
    - Content quality, notable speakers, & keynotes
    - Network with thousands of professionals from around the globe & career coaching opportunities
    - Ability to obtain up to 45 CPE

    Link to event page in the attachments.

    (ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 150,000 certified members strong, we empower professionals who touch every aspect of information security.

    (ISC)² Security Congress brings together industry colleagues, offers educational and thought- leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our annual global cybersecurity conference is to advance security leaders by arming them with the knowledge, tools and expertise to protect their organizations.
  • The Impact of COVID-19 on Enterprise IT Security Teams Recorded: Nov 10 2020 60 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    The pandemic and its shock to world economies have profoundly altered work environments and cybersecurity priorities. COVID-19 has prompted a massive work-from-home (WFH) movement, increased BYOD policy adoptions, and unfortunately a spike in cyberthreats, ransomware, and data breaches. To help enterprises understand the enormous impact to their IT security teams, (ISC)2 co-sponsored a study that surveyed 600 security professionals from seven countries and 19 industries. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews key insights from this study, including:
    - Challenges of supporting an expanded remote workforce
    - Mid-year changes to IT security budgets and personnel
    - Change in preferences for cloud-based security solutions
    - Security technologies best suited to address pandemic-fueled challenges
    - The positive impact of IT security professional certifications
  • Don't Miss the BIGGEST (ISC)2 Security Congress Yet! Recorded: Nov 3 2020 1 min
    (ISC)2
    Join thousands of cybersecurity professionals at all levels for three days of industry discussion, continuing education and networking, November 16 – 18. Get your passes at: https://securitycongress.brighttalk.live/passes/
  • CAP Webcast Series: Continuous Monitoring Recorded: Oct 7 2020 24 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introducing Continuous Monitoring (CAP Chapter 7 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Authorization of Information Systems Recorded: Oct 7 2020 23 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introduction to System Authorization (CAP Chapter 6 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Implementation & Assessment of Security Controls Recorded: Oct 7 2020 29 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introduction to System Implementation & Control Assessment (CAP Chapters 4 and 5 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Selection of Security Controls Recorded: Oct 6 2020 25 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introduction to Control Selection (CAP Chapter 3 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Categorization of Information Systems Recorded: Oct 6 2020 19 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introducing System Categorization (CAP Chapter 2 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Preparation - Part 2: System Recorded: Oct 6 2020 31 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introducing Preparation Tasks – Part 2: System (CAP Chapter 1 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
Information Security Certification
The (ISC)² Cert Prep channel brings the community relevant and cutting edge infosecurity discussions presented by subject matter experts. Subscribers also benefit from pre-recorded mini webcasts that give viewers a sneak peek into each of (ISC)²’s certifications' domains, including the gold standard cybersecurity certification, the CISSP, and (ISC)²’s fastest growing certification, the CCSP.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Key Insights from CyberEdge’s 2020 Cyberthreat Defense Report
  • Live at: May 12 2020 5:00 pm
  • Presented by: Steve Piper, Co-Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
  • From:
Your email has been sent.
or close