Discover Security Events This Week
All security events are automatically streamed into this table on a daily basis.
26th January 2026 | Insider Risk Management Program Evaluation & Optimization Training Course
INSIDER RISK MANAGEMENT PROGRAM (IRMP) EVALUATION & OPTIMIZATION TRAINING COURSE IRMP Evaluator & Optimization Specialist Certificate / Credential Offered By: Insider Threat Defense Group (ITDG)
LOCATION University Of Maryland, College Park 4600 River Road, College Park, Maryland, 20740
DATES / TIMES January 26-27, 2025 (8:30am-5pm)
Other Dates Offered: February 25-26, 2025 April 27-28, 2025 May 18-19, 2025 June 15-16, 2025
Training Course Brochure https://www.insiderthreatdefense.us/wp-content/uploads/2025/06/Insider-Risk-Management-Program-Evaluation-Optimization-Training-Course-Brochure-6-28-25.pdf
Cost / Registration (Discounts For 2+ Students - Money Back Training Guarantee) https://stats.slimcd.com/soft/showsession.asp?sessionid=D186C5F69E960F6D57AFD21C466B626BB3421A76
VIRTUAL ATTENDANCE OPTION Attending virtually provides the same expert instruction and training materials as the classroom experience. Course materials will be available for download ahead of time, ensuring you’re fully prepared. The training will be delivered live via Go To Meeting, allowing for real-time interaction, questions, and engagement with other students and the instructors.
TRAINING COURSE OVERVIEW Is your organization developing an Insider Risk Management (IRM) Program (IRMP), but needs additional expert guidance to further the development of the program?
Has your organization established an IRMP, but are looking to perform a gap analysis / assessment to mature and optimize it?
Who Should Attend? This highly sought after 2 day very comprehensive training course is designed for anyone managing or supporting an Insider Threat Program (ITP) or an IRMP. (ITP Manager, ITP Senior Official, Insider Risk Program Manager, Insider Threat Investigator- Analyst, FSO, CSO, CISO, Human Resources, CIO – IT, Network Security, Governance, Risk & Compliance Professionals, Counterintelligence Investigators, Mental Health / Behavioral Science Professionals, Legal Etc.),
This Training Course Provide Students With The Core & Advanced Knowledge And Resources To: ✓ Develop, Implement & Manage a robust IRMP.
✓ Evaluate the organization's security foundations / controls and maturity levels from both from a Technical and Non-Technical perspective.
✓ Evaluate an IRMP and the many critical cross departmental interconnected components, activities and business processes that support it. (IRMP Gap Analysis)
✓ Optimize the IRMP, by ensuring that key stakeholders are universally aligned from an enterprise / holistic perspective to proactively identify, prevent or mitigate employee risks / threats.
✓ Conduct Comprehensive Insider Threat Investigations & Evaluate Existing Detection Capabilities (Technical, Non-Technical)
✓ Conduct an Insider Risk / Threat Assessment to identify any weaknesses and vulnerabilities that could enable a malicious or opportunistic employee to take actions that could have a negative impact to the organization.
TRAINING COURSE BROCHURE Additional information on the training course can be found in the brochure. https://www.insiderthreatdefense.us/wp-content/uploads/2025/06/Insider-Risk-Management-Program-Evaluation-Optimization-Training-Course-Brochure-6-28-25.pdf
IRMP TOOLKIT This training provides students a hardcopy handbook and an abundance of training materials, educational resources, templates and checklists needed for IRM. This will save many hours of documentation creation and makes developing or optimizing the IRM Program almost as easy as 1,2,3. The training course materials and toolkit will be provided to the students via a USB thumb drive for the classroom training, or a download link for remote students.
The handbook provides guidance and checklists to conduct an Insider Threat Vulnerability Assessment, to review, tweak and enhance the security controls of the organization (Physical Security, Human Resources, IT-Network Security, Etc.). It will also help with identifying any vulnerabilities related to the Malicious Insider Playbook Of Tactics. (Information & Data Exfiltration As Easy As 1,2,3)
IRMP EVALUATOR & OPTIMIZATION SPECIALIST CERTIFICATE / CREDENTIAL The benefits if obtaining the IRMP Certificate / Credential are outlined in the training course brochure.
CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS Students attending this training will earn 16 CPE Credits towards CPE requirements for security certifications they have obtained.
TRAINING RECOGNITION / STUDENT SATISFACTION & COMMENTS Over 1000+ individuals have attended our training courses and received certificates / credentials as an Insider Threat Program Manager, IRMP Evaluator & Optimization Specialist and Insider Threat Investigator – Analyst.
Our very high levels of client satisfaction are the result of the ITDG being experts at building IRM Programs, as we do more than just provide training. We also provide consulting services and incorporate lessons learned from our consulting engagements.
This training has been endorsed by our students as the most affordable, next generation and value packed training for IRM, that is taught from a real world, practical, strategic, operational and tactical perspective.
Our student satisfaction levels are in the EXCEPTIONAL range, which you can read on the link below. https://www.insiderthreatdefense.us/wp-content/uploads/2024/05/insider-threat-defense-group-client-evaluations-comments.pdf
COMPANY RECOGNITION The ITDG Has Provided IRMP Training / Consulting Services To An Impressive List Of 700+ Clients: White House, U.S. Government Agencies, Department Of Homeland Security, TSA, Department Of Defense (U.S. Army, Navy, Air Force & Space Force, Marines) Intelligence Community (DIA, NSA, NGA) FBI, U.S. Secret Service, DEA, Law Enforcement, Critical Infrastructure Providers, Universities, Fortune 100 / 500 companies and others; Microsoft Corporation, Walmart, Home Depot, Nike, Tesla Automotive Company, Dell Technologies, Nationwide Insurance, Discovery Channel, United Parcel Service, FedEx Custom Critical, Visa, Capital One Bank, BB&T Bank, HSBC Bank, American Express, Equifax, TransUnion, JetBlue Airways, Delta Airlines, Royal Canadian Mounted Police and many more.
Full Client Listing: https://www.insiderthreatdefense.us/wp-content/uploads/2024/05/insider-threat-defense-group-client-listing.pdf
ON-SITE TRAINING AT YOUR LOCATION Some of the most engaging and collaborative training and consulting engagements the ITDG have had, have been with companies that bring the ITP Manager / Insider Risk Program Manager and all key stakeholders to the table.
The 2 day training course and workshop can be taught at your company’s location to ensure that the everyone managing and supporting an IRMP are universally aligned from an enterprise / holistic perspective to detect, prevent and mitigate Insider Risks and Threats. This on-site training will also help with alleviating any negative or preconceived notions that some stakeholders may have about the program, to ensure all stakeholders are working together and contributing to the success of the program.
Table top exercises will be conducted using a variety of employee risk and threat scenarios. Using these employee threat scenarios will show the importance of collecting, integrating and analyzing various sources of employee risk and threat information, to detect, prevent and mitigate Insider risks and threats from a proactive perspective.
Questions? Please Contact
Questioms Jim Henderson, CISSP, CCISO CEO Insider Threat Defense Group, Inc. Insider Risk Management Program Training Course Instructor / Consultant Insider Threat Investigations & Analysis Training Course Instructor / Analyst Insider Risk / Threat Vulnerability Assessor james.henderson@insiderthreatdefense.us www.insiderthreatdefensegroup.com LinkedIn Company Profile: https://www.linkedin.com/in/insiderthreatdefense Follow Us On X / Twitter: @InsiderThreatDG Phone: 561-809-6800
Hybrid (Both) • Paid • Part of Insider Threat Defense Group
26th January 2026 | SANS Cyber Threat Intelligence Summit & Training 2026
The 14th Annual SANS Cyber Threat Intelligence Summit focuses on cyber threat analysis and intelligence, featuring insights from leading practitioners through real-world case studies, innovative techniques, and practical solutions. A key highlight is the curated networking, providing opportunities for CTI professionals to connect, share ideas, and build lasting relationships, enhancing their understanding and challenging existing assumptions in the field.
Hybrid (Both) • Paid • Part of SANS Institute
26th January 2026 | NDC Security: London 2026
NDC Security London brings developers, security engineers, and architects together to focus on secure software development. The sessions cover topics like threat modeling, identity, cloud security, and secure coding practices. Each talk is led by practitioners who share lessons learned from real-world projects. The event’s format makes it easy to learn from others without the usual sales pitch. Attendees can explore current security tools and methods that fit into day-to-day development work.
The London edition is known for its strong technical community and friendly atmosphere. Attendees get access to valuable discussions that link security with software design, testing, and operations. It’s a practical environment where developers improve their understanding of security and return to their teams with clear ideas to implement right away.
Physical • Paid • Part of NDC Conferences
26th January 2026 | Data Privacy Week 2026
Data Privacy Week 2026 encourages individuals and organizations to make data protection a daily habit. It highlights how personal information travels across the internet and why controlling it matters. The campaign focuses on practical actions, such as reviewing privacy settings, limiting data sharing, and being mindful of what is stored online. Participants are reminded that privacy is not only a personal right but also a shared responsibility among users and the companies that serve them.
This annual initiative unites cybersecurity professionals, educators, and citizens in promoting safer digital practices. By raising awareness and offering clear guidance, it helps people understand how their online behavior shapes their privacy footprint. Organizations are also encouraged to respect user data and strengthen transparency. Data Privacy Week 2026 serves as a timely reminder that protecting personal information starts with small, consistent choices made by everyone.
Hybrid (Both) • Free • Part of National Cybersecurity Alliance
26th January 2026 | CYBERTECH Global Tel Aviv 2026
CYBERTECH Global Tel Aviv 2026 is a leading international cybersecurity conference that brings together the global cyber ecosystem in one of the world’s most active technology hubs. The event attracts government officials, security leaders, researchers, startups, and enterprise decision makers, creating a high-level environment for collaboration and knowledge sharing. Its scale and international reach make it a central meeting point for discussing the evolving cyber threat landscape.
The conference program focuses on real-world cybersecurity challenges, emerging technologies, and strategic defense approaches across both public and private sectors. Attendees gain exposure to expert-led discussions, advanced solutions showcased in the exhibition area, and meaningful networking with global peers. With its strong emphasis on innovation, policy, and applied security practices, CYBERTECH Global Tel Aviv remains a key destination for professionals shaping the future of cybersecurity.
Physical • Paid • Part of Cybertech
26th January 2026 | The Future of Privileged Access: Universal Authorization for Any Identity
Join Nishad Sankaranarayanan, Head of IAM at Genuine Parts Company (GPC), and StrongDM to discuss why static credentials can’t survive cloud speed, and how the control plane you build for developers today becomes the security foundation for Agentic AI tomorrow.
Why Join: The "Front Door" is Broken: Discover why modern breaches bypass static credentials and "login-based" security, and why the math of cloud access demands a shift to continuous Runtime Authorization.
Zero Standing Privilege is Possible: See how to eliminate the trade-off between speed and security by authorizing actions in real-time, enforcing policies at the query level rather than the network level.
Prepare for the Agentic Future: Learn why non-deterministic AI agents will break traditional access models, and how to future-proof your architecture to handle machine-speed authorization securely.
When: Monday, January 26, 2026 | 9:00 am PT
Company_Webinar • Part of StrongDM
26th January 2026 | CU Intersect Conference 2026
CU Intersect 2026 brings together credit union leaders, IT staff, and security experts to address the growing challenges in cybersecurity, resiliency, and technology for the credit union sector. The conference offers keynote sessions, panel discussions, and breakout tracks focused on risk management, IT, security, and CISO-level concerns. Attendees learn about defending member data, managing third-party risk, deploying secure IT infrastructure, and adopting emerging technologies like AI while preserving security and compliance. The event gives institutions actionable strategies to stay ahead of threats and build robust security programs.
This conference is strongly relevant for professionals working in credit unions, especially those responsible for security and risk, offering practical insights, peer discussion, and exposure to vendor security solutions that can improve resilience and protect members.
Physical • Paid • Part of CU Intersect Conference
26th January 2026 | Application management with Targeted Application Install for Victoria Experience
This session focuses on how Targeted Application Install improves application management within Splunk Cloud Platform Victoria Experience. It explains how teams can now control which search head groups run specific apps, instead of deploying apps across every search head by default. This change allows better isolation of workloads and more precise alignment of apps with user groups and use cases.
The webinar also covers why this enhancement was highly requested by customers and how it brings Splunk Cloud Platform Victoria Experience closer to feature parity with Splunk Enterprise and Classic Experiences. Attendees will gain a clear understanding of how targeted installs simplify operations, reduce unnecessary exposure and improve overall platform efficiency.
Company_Webinar • Part of Splunk
26th January 2026 | Forecasting Future Fortifications: Leadership Insights on Cyber-Physical Systems Security in 2026
Cyber physical systems security is entering a period of rapid change as economic pressure, geopolitics, nation state activity and accelerated AI adoption reshape risk across critical operations. This executive webinar focuses on how these forces intersect and why security and operations leaders must adjust strategy now to avoid defending outdated threats with misaligned resources.
The fireside discussion brings together senior leadership perspectives on preparing CPS environments for 2026 and beyond. Attendees will gain forward looking insight into AI driven risk, supply chain shifts and practical approaches for balancing security staffing, processes and technology investments. The session is designed for CISOs and business leaders who need clarity to make high impact decisions that protect operations, sustain resilience and preserve competitive advantage.
Company_Webinar • Part of Claroty
26th January 2026 | High Performance, Edge And Cloud Computing (HiPEAC) 2026
HiPEAC 2026 brings together researchers, engineers, and industry professionals working on the future of high-performance and edge computing. The event explores how hardware, software, and system design converge to deliver scalable, efficient, and secure solutions. Sessions and papers cover computer architecture, programming models, compilers, and operating systems that power both embedded and large-scale computing environments.
While the focus spans many technical domains, cybersecurity and safety remain core themes. Discussions address how to build dependable systems that maintain performance without compromising protection or energy efficiency. Alongside workshops, tutorials, and poster sessions, HiPEAC serves as a collaborative space for academics and practitioners shaping the next generation of computing technologies.
Physical • Paid • Part of HiPEAC
26th January 2026 | Dynatrace Perform 2026
Dynatrace Perform 2026 is an annual global technology conference that highlights the intersection of observability, security, and AI-driven innovation. Hosted at The Venetian in Las Vegas, it brings together IT leaders, engineers, and cybersecurity professionals from around the world to explore how AI and automation can simplify complexity and enhance digital performance. Attendees will gain actionable insights from top industry experts, learn new methods to secure cloud environments, and discover how agentic AI can be harnessed to drive smarter, more resilient operations. The event emphasizes hands-on learning, featuring deep technical workshops and live platform demonstrations that showcase practical approaches to optimizing digital ecosystems.
Known for its dynamic sessions and high-level networking opportunities, Dynatrace Perform 2026 offers a mix of keynote addresses, breakout sessions, and certification training through Dynatrace University. Participants can expect thought-provoking discussions on emerging cybersecurity challenges, scalable cloud management, and the future of AI observability. With thousands of professionals from DevOps, IT, and cybersecurity in attendance, the event provides an ideal space to exchange expertise and shape the next era of intelligent digital transformation.
Physical • Paid • Part of Dynatrace
26th January 2026 | G[P]RC Summit Riyadh 2026
The G[P]RC Summit Riyadh 2026 explores how governance, risk, and compliance intersect with performance and strategy. The event gathers leaders who shape policies and frameworks that sustain long-term business health. Sessions examine the pressures of new regulations, digital disruption, and sustainability, while focusing on how integrated GRC can improve decision-making and strengthen organisational culture. Attendees gain clear, actionable insights from experts driving transformation in both private and public sectors.
This year’s theme, “Driving Success: Integrating GRC with Strategy Execution in a Hyperconnected World,” highlights the growing need for alignment between compliance and innovation. With sustainability and ESG now central to many regional strategies, the summit encourages collaboration between regulators, boards, and industry innovators. Riyadh provides a fitting backdrop for these conversations, as the region advances its vision for accountable, resilient, and future-ready governance.
Physical • Paid • Part of Ejtemaat Events MENA
27th January 2026 | Threat Intelligence Update: What's Been Working for Hackers and What Have the Good Guys Been Doing?
Get a focused update on what is currently working for attackers and how security teams are responding. This webinar delivers a concise overview of recent attack techniques, newly discovered vulnerabilities, and defensive trends shaping today’s threat landscape. Insights are drawn from findings by OX Security and the broader research community to highlight risks that matter right now.
The discussion looks at how adversaries are evolving their methods, what has proven effective for defenders, and which areas deserve immediate attention in security strategies. The session concludes with a live Q and A, giving attendees a chance to clarify priorities and take away practical guidance for strengthening defenses.
Company_Webinar • Part of OX Security
27th January 2026 | Fast-Track and Future-Proof NIS2 Compliance
Security leaders navigating NIS2 enforcement will get a clear, practical view of how to accelerate compliance while preparing for future regulatory demands. This webinar focuses on the controls that matter most under NIS2 and explains how organizations can show measurable progress without overcomplicating their security programs. The discussion cuts through regulatory complexity and centers on scalable approaches that support long term resilience.
The session highlights how microsegmentation and identity based access controls help deliver the containment and visibility required for NIS2 compliance. It also looks ahead to expected regulatory evolution and explains why some organizations are already preparing for NIS3. Attendees will leave with a realistic blueprint for strengthening compliance, prioritizing critical controls, and building a security architecture that can adapt to future requirements without major rework.
Company_Webinar • Part of Zero Networks
27th January 2026 | Start Selling Open MDR with Confidence
This webinar focuses on how partners can position and sell WatchGuard Open MDR as a managed detection and response service built for mixed security environments. The session explains how Open MDR delivers 24/7 detection and response using existing tools such as endpoint, identity, network, and cloud data sources, without forcing customers to migrate platforms.
Participants will see how the service operates, what partners and customers experience in the portal, and how onboarding works from start to go live. The discussion also covers how to communicate value to SMB and midmarket buyers, identify new revenue opportunities, and confidently introduce Open MDR to current customers.
Company_Webinar • Part of WatchGuard