Hi [[ session.user.profile.firstName ]]

Key Insights from CyberEdge’s 2020 Cyberthreat Defense Report

Did you know that 81% of organizations reported that they suffered a successful cyber-attack in 2019? CyberEdge’s 2020 Cyberthreat Defense Report (CDR) has become the de facto standard for assessing organizations’ security posture, for gauging perceptions of IT security professionals, and for ascertaining current and planned investments in IT security infrastructure. The 2020 CDR assesses the views of 1,200 IT security professionals representing 17 countries and 19 industries. It’s the most geographically comprehensive view of IT security perceptions in our industry. Join (ISC)2 (a sponsor of this year’s study) and CyberEdge on May 12, 2020 at 1:00PM Eastern for highlights of the results and get key insights including:

A record 62% of organizations were compromised by ransomware last year

58% of ransomware victims paid ransoms last year, but a third failed to recover their encrypted data

Malware, spear-phishing, and ransomware cause the most headaches while zero-day attacks are of least concern

Lack of skilled personnel and low employee awareness inhibit IT security’s success

85% of organizations are experiencing a shortfall of skilled IT security personnel
Recorded May 12 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Piper, Co-Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
Presentation preview: Key Insights from CyberEdge’s 2020 Cyberthreat Defense Report
  • Channel
  • Channel profile
  • Securing Your Expanded Remote Workforce Dec 1 2020 6:00 pm UTC 60 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    The COVID-19 pandemic has caused dramatic increases in remote workforces and BYOD policy adoptions, making it more challenging than ever to secure company applications and data. Now that organizations have increased their remote access capacities, it’s now time to explore ways to help secure these remote managed and unmanaged devices to help mitigate the elevated risks of ransomware, data breaches, and other cyberattacks. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he:

    - Recaps key findings from a recent COVID-19 impact study
    - Examines the challenges facing today’s IT security teams
    - Suggests ways to invest more in your human firewalls
    - Explores current and emerging security technologies
  • What to Expect at (ISC)² Security Congress 2020 Recorded: Nov 12 2020 25 mins
    Wesley Simpson COO, (ISC)², & Congress attendees: Brandon Dunlap, James McQuiggan, Sharon Smith
    Join (ISC)² Chief Operating Officer, Wesley Simpson for a lively and informative panel discussion on the many new features and offerings provided at the 2020 virtual Security Congress!

    Security Congress veterans and session panelists, Brandon Dunlap, James McQuiggan, & Sharon Smith will share how to leverage many of the unique features of the virtual Security Congress, guide you through the various educational, networking and engaging social activities driving the 2020 (ISC)² Security Congress experience.

    Whether it's your first Security Congress or 10th, there's something here for everyone. Key topics discussed:
    - What makes Security Congress is the marquee security conference of the year:
    - Content quality, notable speakers, & keynotes
    - Network with thousands of professionals from around the globe & career coaching opportunities
    - Ability to obtain up to 45 CPE

    Link to event page in the attachments.

    (ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 150,000 certified members strong, we empower professionals who touch every aspect of information security.

    (ISC)² Security Congress brings together industry colleagues, offers educational and thought- leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our annual global cybersecurity conference is to advance security leaders by arming them with the knowledge, tools and expertise to protect their organizations.
  • The Impact of COVID-19 on Enterprise IT Security Teams Recorded: Nov 10 2020 60 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    The pandemic and its shock to world economies have profoundly altered work environments and cybersecurity priorities. COVID-19 has prompted a massive work-from-home (WFH) movement, increased BYOD policy adoptions, and unfortunately a spike in cyberthreats, ransomware, and data breaches. To help enterprises understand the enormous impact to their IT security teams, (ISC)2 co-sponsored a study that surveyed 600 security professionals from seven countries and 19 industries. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews key insights from this study, including:
    - Challenges of supporting an expanded remote workforce
    - Mid-year changes to IT security budgets and personnel
    - Change in preferences for cloud-based security solutions
    - Security technologies best suited to address pandemic-fueled challenges
    - The positive impact of IT security professional certifications
  • Don't Miss the BIGGEST (ISC)2 Security Congress Yet! Recorded: Nov 3 2020 1 min
    (ISC)2
    Join thousands of cybersecurity professionals at all levels for three days of industry discussion, continuing education and networking, November 16 – 18. Get your passes at: https://securitycongress.brighttalk.live/passes/
  • CAP Webcast Series: Continuous Monitoring Recorded: Oct 7 2020 24 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introducing Continuous Monitoring (CAP Chapter 7 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Authorization of Information Systems Recorded: Oct 7 2020 23 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introduction to System Authorization (CAP Chapter 6 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Implementation & Assessment of Security Controls Recorded: Oct 7 2020 29 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introduction to System Implementation & Control Assessment (CAP Chapters 4 and 5 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Selection of Security Controls Recorded: Oct 6 2020 25 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introduction to Control Selection (CAP Chapter 3 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Categorization of Information Systems Recorded: Oct 6 2020 19 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introducing System Categorization (CAP Chapter 2 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Preparation - Part 2: System Recorded: Oct 6 2020 31 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introducing Preparation Tasks – Part 2: System (CAP Chapter 1 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Preparation - Part 1: Organization Recorded: Oct 6 2020 28 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introducing Preparation Tasks – Part 1: Organization (CAP Chapter 1 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • Ransomware Deep Dive: Examining Disturbing Ransomware Trends Recorded: Sep 29 2020 59 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    Successful ransomware attacks are at an all-time high. And so is the number of organizations paying ransoms to recover their data. But why? And what can smart IT security teams do to mitigate the risks of falling victim? Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews key findings from CyberEdge’s 2020 Cyberthreat Defense Report. In this webinar, we’ll:

    - Examine disturbing ransomware trends, by country and by industry
    - Postulate why more organizations are paying ransoms
    - Underscore the importance of investing in your company’s “human firewall”
    - Review technologies to help give security teams the upper hand
  • Think Outside the Box: Mitigating the IT Security Skills Shortage Recorded: Aug 25 2020 60 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    Nearly nine in 10 organizations are experiencing a shortfall of skilled IT security personnel, according to CyberEdge’s 2020 Cyberthreat Defense Report. That’s up from eight in 10 organizations just two years ago. This weighs heavily on the minds of IT security professionals as ‘lack of skilled personnel’ is rated as the #1 inhibitor to successfully defending against cyberthreats. So, what can organizations do to mitigate the effects of this crisis? Well, if you’re willing to ‘think outside the box,’ there is hope. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he:

    - Examines the shortage of IT security personnel by job role
    - Proposes creative ways for recruiting new security talent
    - Suggests clever ways for retaining the talent you already have
    - Identifies technologies that enable security teams to do more with less
  • The 'Hottest' IT Security Technologies in 2020 Recorded: Jul 28 2020 59 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
    Want to know which IT security technologies are hot and which ones are not? 2020 has thrown many purchasing and deployment plans into a state of flux and your organization has probably been caught up in this. Join Steve Piper, Founder & CEO of CyberEdge (and a proud CISSP) and (ISC)2 on Tuesday, July 28, 2020 at 1:00PM Eastern as Steve reviews key purchase insights from the 2020 Cyberthreat Defense Report. Specifically, this webcast will examine which security technologies are most widely deployed and most planned for acquisition in 2020 so you can benchmark your company’s current and planned investments against your peers. Purchase intent across five key security technology categories will be focused on including:

    •Network security
    •Endpoint security
    •Application and data security
    •Security management and operations
    •Identity and access management
  • Navigating the Career Maze—Where Do I Go Next? Recorded: Jul 21 2020 64 mins
    Rob Ayoub, Sharon Smith, Deidre Diamond, Erik Von Geldern, John Esparza
    This webinar will feature several industry professionals within the information security industry who've held a variety of roles ranging from security architect, consultant and sales engineer to marketer to recruiter and CISO. The panel will discuss career direction and offer attendees new ideas and provocative thoughts on the various roles available throughout a security career. Join (ISC)2 on July 21, 2020 at 1:00PM Eastern for a discussion of the daily tasks involved in each respective area, the joys and the pitfalls, the qualifications typically necessary, and ways to go about getting different positions.
  • Up Your IT Security Knowledge For Yourself & Your Company Recorded: Jun 11 2020 60 mins
    Ross Moore, Passageways; Melissa T. Parsons, KPMG; Justin Ong, Spiceworks - Moderator
    The immediate future of emerging technologies looks exciting and promising. And the job opportunities in the cybersecurity sector seem unlimited. But despite the benefits technology brings, it has also created many cybersecurity and privacy challenges.

    Organizations in all sectors are all seeking skilled security staff. Yet the industry suffers from a lack of skilled personnel. As an IT pro, you are primed to step into this field. Do you have what it takes to be a cybersecurity hero?

    On this video meetup we discuss what you need to know if you are considering a career change to cybersecurity. We talk with an IT pro from the Spiceworks Community, as well as certified members from (ISC)².
  • Key Insights from CyberEdge’s 2020 Cyberthreat Defense Report Recorded: May 12 2020 61 mins
    Steve Piper, Co-Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
    Did you know that 81% of organizations reported that they suffered a successful cyber-attack in 2019? CyberEdge’s 2020 Cyberthreat Defense Report (CDR) has become the de facto standard for assessing organizations’ security posture, for gauging perceptions of IT security professionals, and for ascertaining current and planned investments in IT security infrastructure. The 2020 CDR assesses the views of 1,200 IT security professionals representing 17 countries and 19 industries. It’s the most geographically comprehensive view of IT security perceptions in our industry. Join (ISC)2 (a sponsor of this year’s study) and CyberEdge on May 12, 2020 at 1:00PM Eastern for highlights of the results and get key insights including:

    A record 62% of organizations were compromised by ransomware last year

    58% of ransomware victims paid ransoms last year, but a third failed to recover their encrypted data

    Malware, spear-phishing, and ransomware cause the most headaches while zero-day attacks are of least concern

    Lack of skilled personnel and low employee awareness inhibit IT security’s success

    85% of organizations are experiencing a shortfall of skilled IT security personnel
  • HCISPP Webcast Series: Chapter 7 of 7 Recorded: Jan 22 2020 16 mins
    John Warsinske, HCISPP, CISSP, CCSP, (ISC)² Authorized Instructor
    Introducing Privacy & Security in Healthcare (HCISPP Chapter 7 of 7)

    Get a taste of the HealthCare Information Security and Privacy Practitioner (HCISPP) official training course and walk away with a solid understanding of the topics covered in the HCISPP CBK (Common Body of Knowledge) with the HCISPP Webcast Series. The series is comprised of six 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • HCISPP Webcast Series: Chapter 6 of 7 Recorded: Jan 22 2020 17 mins
    John Warsinske, HCISPP, CISSP, CCSP, (ISC)² Authorized Instructor
    Introducing Information Technologies in Healthcare (HCISPP Chapter 6 of 7)

    Get a taste of the HealthCare Information Security and Privacy Practitioner (HCISPP) official training course and walk away with a solid understanding of the topics covered in the HCISPP CBK (Common Body of Knowledge) with the HCISPP Webcast Series. The series is comprised of six 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • HCISPP Webcast Series: Chapter 5 of 7 Recorded: Jan 17 2020 18 mins
    John Warsinske, HCISPP, CISSP, CCSP, (ISC)² Authorized Instructor
    Introducing Information Governance – Legal, Risk & Compliance (HCISPP Chapter 5 of 7)

    Get a taste of the HealthCare Information Security and Privacy Practitioner (HCISPP) official training course and walk away with a solid understanding of the topics covered in the HCISPP CBK (Common Body of Knowledge) with the HCISPP Webcast Series. The series is comprised of six 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
Information Security Certification
The (ISC)² Cert Prep channel brings the community relevant and cutting edge infosecurity discussions presented by subject matter experts. Subscribers also benefit from pre-recorded mini webcasts that give viewers a sneak peek into each of (ISC)²’s certifications' domains, including the gold standard cybersecurity certification, the CISSP, and (ISC)²’s fastest growing certification, the CCSP.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Key Insights from CyberEdge’s 2020 Cyberthreat Defense Report
  • Live at: May 12 2020 5:00 pm
  • Presented by: Steve Piper, Co-Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
  • From:
Your email has been sent.
or close