Select Page

Second Thursdays

on CISO Street

A Cybersecurity Webinar Series

Upcoming Webinars

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Past Webinars

The Race to Secure Your Supply Chain

The Race to Secure Your Supply Chain

Webinar Speakers:Alan Levine Chief Information Security Officer at Alcoa (retired) and AdvisorJason Lewkowicz Global Chief Information Security Officer at CognizantMatthew Butkovic Heinz College of Information Systems and Public Policy at Carnegie...

Cybercriminal Attack: Lessons Learned

Cybercriminal Attack: Lessons Learned

Webinar Speakers: Vasu Jakkal CVP Microsoft Security, Compliance & Identity at MicrosoftCharles Carmakal SVP & CTO at FireEye MandiantJonathan Yaron Chief Executive Officer at AccellionLisa Sotto Chair, Global Privacy & Cybersecurity...

Legacy Software Challenges and Risks – EMEA

Legacy Software Challenges and Risks – EMEA

Webinar Speakers: Andreas Wuchner Group Head IT and Risk Governance at Credit SuisseNeil Maher Head of IT Operations at HANDD Business SolutionsJonathan Yaron Chief Executive Officer at Accellion Join this panel discussion to learn the dramatic...

Incident Response Best Practices

Incident Response Best Practices

Webinar SummarySuccessful incident response requires much more than a CISO giving direction and leading the charge. There are many players with specific areas of expertise involved: Board of Directors, executive leadership, forensics, legal,...

Legacy Software Challenges and Risks

Legacy Software Challenges and Risks

Webinar Speakers: Andreas Wuchner Group Head IT and Risk Governance at Credit SuisseJason Lewkowicz Global Chief Information Security Officer at CognizantJonathan Yaron Chief Executive Officer at Accellion Join this panel discussion to learn the...

Securing Your Hybrid Cloud

Securing Your Hybrid Cloud

If you are wresting with securing your hybrid cloud, you are not alone. Join this webinar to learn how to securely migrate, deploy, and operate applications and data stores in a hybrid environment.

Women in Cyber: REIMAGINE

Women in Cyber: REIMAGINE

Three powerhouse women share their thoughts on everything from the latest security practice techniques to the unique challenges women face building a successful career in the cyber security space.