Hi [[ session.user.profile.firstName ]]

CAP Webcast Series: Categorization of Information Systems

Introducing System Categorization (CAP Chapter 2 of 7)

Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

(ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
Recorded Oct 6 2020 19 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Stoffell, (ISC)² Authorized Instructor
Presentation preview: CAP Webcast Series: Categorization of Information Systems
  • Channel
  • Channel profile
  • The Cloud Gambit: Advanced Moves for a Cloud Security Career Aug 3 2021 5:00 pm UTC 60 mins
    Keatron Evans, Dave Hatter, Charlie Platt
    Taking the step toward earning the (ISC)² Certified Cloud Security Professional (CCSP) credential puts you on a path to excel as an expert in cloud security. CCSP empowers individuals and organizations with the highest level of mastery in cloud security.

    But how do you get started? How do you prepare? And why…what tangible benefits will you gain? Join (ISC)² for a panel discussion as industry professionals share their stories, experience and tips toward preparing for the Certified Cloud Security Professional certification. Areas for discussion will include:

    - Why you should consider CCSP
    - How to prepare for CCSP
    - How CCSP can accelerate your career progression
  • Key Results from the 2021 Cloud Security Report Jul 20 2021 5:00 pm UTC 60 mins
    Holger Schultz and Steve Prentice
    The 2021 Cloud Security Report, sponsored by (ISC)2, explores current cloud security trends and challenges, how organizations are responding to security threats in the cloud and reveals tools and best practices organizations are considering.

    Based on a comprehensive survey of 783 cybersecurity professionals conducted in early 2021 to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications and best practices IT cybersecurity leaders are prioritizing in their move to the cloud.

    Join (ISC)2 on July 21, 2021 at 1:00PM Eastern for highlights of the results and to get key insights including:
    •A majority of cybersecurity professionals (96%) confirm they are at least moderately concerned about public cloud security, a small increase from last year’s survey.
    •For the second year in a row, the key barrier to cloud adoption, organizations mention was a lack of qualified staff (39%) as the biggest impediment to faster adoption.
    •More than half of organizations (57%) expect their cloud budgets to increase over the next 12 months.
    •When asked how organizations rate their overall security readiness, 73% rate their team’s security readiness average or below average. Of those, 78% believe their teams would benefit from cloud security training and/or certification.
  • Key Insights from CyberEdge’s 2021 Cyberthreat Defense Report Recorded: May 11 2021 60 mins
    Steve Piper, Co-Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
    Did you know that 86% of organizations experienced a successful attack in 2021? Up from 81% the prior year, the largest year-over-year increase in six years. CyberEdge’s 2021 Cyberthreat Defense Report (CDR) has become the de facto standard for assessing organizations’ security posture, for gauging perceptions of IT security professionals, and for ascertaining current and planned investments in IT security infrastructure. Now in its eighth year, the 2021 CDR assesses the views of 1,200 IT security professionals representing 17 countries and 19 industries. It’s the most geographically comprehensive view of IT security perceptions in our industry. Join (ISC)2 (a sponsor of this year’s study) and CyberEdge on May 11, 2021 at 1:00 pm ET/10 am PT for highlights of the results and get key insights including:

    - The chronic shortage of IT security skilled staff is still prevalent; hiring gaps exist across all major IT security roles
    - Lack of skilled personnel is the #2 obstacle to effective defense against cyberthreats
    - The fastest and most economical solution is to train existing IT members to fill security positions
    - IT security professionals see personal and organization-wide benefits of cybersecurity certifications, especially for cloud security, software security, security administration, and management
    - And more!
  • Protecting the Enterprise: 5 Components needed for Cybersecurity Training Recorded: Apr 13 2021 62 mins
    Spencer Wilcox, CISO, PNM; Derrick Butts, CISO, The Truth Initiative; Mirtha Collin, (ISC)2; Brandon Dunlap, Moderator
    It’s difficult to prescribe a one-size-fits-all approach to training your cybersecurity team. While cybersecurity training needs to be structured and adhere to industry standards, it also must be purposeful and tailored to your organization’s needs. No one organization has precisely the same security needs as another. However, many of the fundamentals of a training and education program apply across different organizations and sectors. Join (ISC)2 for a panel discussion on Tuesday, April 13, 2021 at 1:00PM Eastern as industry leaders share tips they’ve learned and strategies they’re working towards to conquer a secure and compliant cybersecurity training program. Areas for discussion will include:

    · Who needs training

    · Who is responsible for training

    · Determining the curriculum

    · Training and certification

    · Ensuring training effectiveness

    Be prepared for an hour well-spent and discover how to create a cybersecurity training plan that maps to your organization’s specific needs.
  • Securing Your Expanded Remote Workforce Recorded: Dec 1 2020 59 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    The COVID-19 pandemic has caused dramatic increases in remote workforces and BYOD policy adoptions, making it more challenging than ever to secure company applications and data. Now that organizations have increased their remote access capacities, it’s now time to explore ways to help secure these remote managed and unmanaged devices to help mitigate the elevated risks of ransomware, data breaches, and other cyberattacks. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he:

    - Recaps key findings from a recent COVID-19 impact study
    - Examines the challenges facing today’s IT security teams
    - Suggests ways to invest more in your human firewalls
    - Explores current and emerging security technologies
  • CSSLP Webcast Series: Chapter 8 of 8 Recorded: Nov 20 2020 15 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Supply Chain (CSSLP Chapter 8 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 7 of 8 Recorded: Nov 20 2020 18 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Deployment, Operations, Maintenance (CSSLP Chapter 7 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 6 of 8 Recorded: Nov 20 2020 17 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Testing (CSSLP Chapter 6 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 5 of 8 Recorded: Nov 20 2020 21 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Implementation (CSSLP Chapter 5 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 4 of 8 Recorded: Nov 19 2020 23 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Architecture & Design (CSSLP Chapter 4 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 3 of 8 Recorded: Nov 19 2020 11 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Requirements (CSSLP Chapter 3 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 2 of 8 Recorded: Nov 19 2020 16 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Lifecycle & Risk Management (CSSLP Chapter 2 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CSSLP Webcast Series: Chapter 1 of 8 Recorded: Nov 19 2020 18 mins
    Frank Shirmo, (ISC)² Authorized Instructor
    Introducing Secure Software Concepts (CSSLP Chapter 1 of 8)

    Get a taste of the Certified Secure Software Lifecycle Professional (CSSLP) official training course and walk away with an understanding of the topics covered in the CSSLP CBK (Common Body of Knowledge) with the CSSLP Webcast Series. The series is comprised of eight 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • What to Expect at (ISC)² Security Congress 2020 Recorded: Nov 12 2020 25 mins
    Wesley Simpson COO, (ISC)², & Congress attendees: Brandon Dunlap, James McQuiggan, Sharon Smith
    Join (ISC)² Chief Operating Officer, Wesley Simpson for a lively and informative panel discussion on the many new features and offerings provided at the 2020 virtual Security Congress!

    Security Congress veterans and session panelists, Brandon Dunlap, James McQuiggan, & Sharon Smith will share how to leverage many of the unique features of the virtual Security Congress, guide you through the various educational, networking and engaging social activities driving the 2020 (ISC)² Security Congress experience.

    Whether it's your first Security Congress or 10th, there's something here for everyone. Key topics discussed:
    - What makes Security Congress is the marquee security conference of the year:
    - Content quality, notable speakers, & keynotes
    - Network with thousands of professionals from around the globe & career coaching opportunities
    - Ability to obtain up to 45 CPE

    Link to event page in the attachments.

    (ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 150,000 certified members strong, we empower professionals who touch every aspect of information security.

    (ISC)² Security Congress brings together industry colleagues, offers educational and thought- leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our annual global cybersecurity conference is to advance security leaders by arming them with the knowledge, tools and expertise to protect their organizations.
  • The Impact of COVID-19 on Enterprise IT Security Teams Recorded: Nov 10 2020 60 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    The pandemic and its shock to world economies have profoundly altered work environments and cybersecurity priorities. COVID-19 has prompted a massive work-from-home (WFH) movement, increased BYOD policy adoptions, and unfortunately a spike in cyberthreats, ransomware, and data breaches. To help enterprises understand the enormous impact to their IT security teams, (ISC)2 co-sponsored a study that surveyed 600 security professionals from seven countries and 19 industries. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews key insights from this study, including:
    - Challenges of supporting an expanded remote workforce
    - Mid-year changes to IT security budgets and personnel
    - Change in preferences for cloud-based security solutions
    - Security technologies best suited to address pandemic-fueled challenges
    - The positive impact of IT security professional certifications
  • Don't Miss the BIGGEST (ISC)2 Security Congress Yet! Recorded: Nov 3 2020 1 min
    (ISC)2
    Join thousands of cybersecurity professionals at all levels for three days of industry discussion, continuing education and networking, November 16 – 18. Get your passes at: https://securitycongress.brighttalk.live/passes/
  • CAP Webcast Series: Continuous Monitoring Recorded: Oct 7 2020 24 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introducing Continuous Monitoring (CAP Chapter 7 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Authorization of Information Systems Recorded: Oct 7 2020 23 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introduction to System Authorization (CAP Chapter 6 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Implementation & Assessment of Security Controls Recorded: Oct 7 2020 29 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introduction to System Implementation & Control Assessment (CAP Chapters 4 and 5 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
  • CAP Webcast Series: Selection of Security Controls Recorded: Oct 6 2020 25 mins
    Kevin Stoffell, (ISC)² Authorized Instructor
    Introduction to Control Selection (CAP Chapter 3 of 7)

    Get a taste of the Certified Authorization Professional (CAP) official training course and walk away with an understanding of the topics covered in the CAP CBK (Common Body of Knowledge) with the CAP Webcast Series. The series is comprised of seven 15–20-minute webcasts covering each of the certification's domains.

    (ISC)² Members: these webcasts do not qualify for CPEs as they do not meet the 1-hour requirement per CPE credit.
Information Security Certification
The (ISC)² Knowledge Vault brings the community relevant and cutting edge infosecurity discussions presented by subject matter experts. Subscribers also benefit from pre-recorded mini webcasts that give viewers a sneak peek into each of (ISC)²’s certifications' domains, including the gold standard cybersecurity certification, the CISSP, and (ISC)²’s fastest growing certification, the CCSP.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CAP Webcast Series: Categorization of Information Systems
  • Live at: Oct 6 2020 6:30 pm
  • Presented by: Kevin Stoffell, (ISC)² Authorized Instructor
  • From:
Your email has been sent.
or close