Strengthening Cybersecurity with AI and ISO Standards in the Era of Digital Transformation

Back to Home Page Back to Home Page Want to Lead in AI? Find Out How CAIP Certification Can Elevate Your Skills! Pakistan English March 20, 2025 This topic dives deep into the intersection of cybersecurity, AI, and ISO standards, exploring how data science strengthens security, meets business needs, and drives future market trends. It also highlights key benefits, challenges, and considerations in an evolving digital landscape. Amongst others, the Regional Webinar session also covers: How AI strengthens cybersecurity frameworks The impact of ISO standards on business resilience and risk management Emerging trends and challenges in cybersecurity and AI adoption Dr. Shaheer is an experienced professional with over 25 years in Artificial Intelligence, Cybersecurity, Project Management, ISO, IT, Technology Management, and Training and Development. He has worked with diverse organizations across Asia, Europe, the UK, the Middle East, and the Far East, delivering global projects successfully. He had worked as Global Head at Merit Consultants UK and deployed +1500 projects worldwide in his last job. Additionally, he has trained +150,000 professionals in Information System Audit, Artificial Intelligence, Big Data, Project Management, and Risk Management. Dr. Muhammad Shaheer Waqar President of 3D Group See our latest webinars! Discover valuable insights, expert advice, and the latest trends—explore them all now! View All Webinars View All Webinars Terms, Conditions, and Policies | Privacy Statement | Cookie Preferences © Professional Evaluation and Certification Board 2025.  All rights reserved. Facebook X-twitter Linkedin Youtube Envelope Instagram

Want to Lead in AI? Find Out How CAIP Certification Can Elevate Your Skills!

Back to Home Page Back to Home Page Want to Lead in AI? Find Out How CAIP Certification Can Elevate Your Skills! NORAM English April 3, 2025 Check out this insightful session with our speaker, Carl Carpenter, as he explores how the Certified Artificial Intelligence Professional (CAIP) certification can help you excel in the evolving world of AI. In this session, Carl delves into the essential skills, knowledge, and strategies needed to stand out in the AI field and advance your career. Amongst others, the Regional Webinar covers: The role of CAIP certification in AI career growth Key skills and competencies for AI professionals How to apply AI knowledge in real-world scenarios Carl Carpenter is a highly experienced and certified cybersecurity professional with a strong background in working with federal, state, and local governments, as well as commercial entities in highly regulated environments. His expertise spans compliance frameworks such as CMMC, HIPAA, PCI, FFIEC, CCPA, and GDPR. As a certified auditor, he helps organizations maintain compliance and navigate complex cybersecurity challenges. With a deep understanding of security risks and regulatory requirements, he provides valuable insights to enhance cybersecurity resilience. Carl Carpenter Chief Executive Officer Arrakis Consulting See our latest webinars! Discover valuable insights, expert advice, and the latest trends—explore them all now! View All Webinars View All Webinars Terms, Conditions, and Policies | Privacy Statement | Cookie Preferences © Professional Evaluation and Certification Board 2025.  All rights reserved. Facebook X-twitter Linkedin Youtube Envelope Instagram

AI and Cybersecurity in Africa: Perspectives from South Africa and Ghana

Back to Home Page Back to Home Page AI and Cybersecurity in Africa: Perspectives from South Africa and Ghana Africa English February 25, 2025 We were thrilled to host AI and Cybersecurity in Africa: Perspectives from South Africa and Ghana, a webinar that brought together industry experts to discuss the evolving role of AI in cybersecurity across the continent. As AI continues to transform the digital landscape, it presents both opportunities and challenges for businesses striving to protect their data and systems. In this insightful session, Nico Snyman and Emmanuel Makafui Damalie explored key developments in AI-driven security threats, compliance requirements, and strategies for resilience. Key discussion points included: AI-driven cyber risks and emerging challenges Strategies to enhance business protection Compliance insights from South Africa and Ghana Nico Snyman, Founder and CEO of Crest Advisory Africa (CAA) and ISOLTX, is a globally recognized expert in governance, risk management, and compliance (GRC). With 40+ years of experience, he transitioned from a Brigadier in the South African Police Service to leading risk management for the $3.3 billion Gautrain project. In 2014, he founded CAA, now a global leader in ISO training, auditing, and consulting, and a PECB Platinum Partner. He also developed ISOLTX, a modular GRC-A software platform. An MBA holder and Lead Auditor in 14 ISO disciplines, Nico is committed to innovation and empowering professionals in GRC. Nico Snyman Founder and CEO of Crest Advisory Africa Emmanuel Damalie is a seasoned Cyber Security Consultant with over 13 years of experience across multiple industries in Africa. He has held key roles, including CISO at Advans Group and now leads KPMG’s Cyber Security team as a Manager. He holds an MSc in Cybersecurity (EC-Council University, USA) and a BSc in IT (Sikkim Manipal University, India), along with certifications such as CEH, CCNA, ISO/IEC 27001 Lead Implementer, and Microsoft Azure Administrator, and is a PECB Certified Trainer. His expertise includes threat assessment, security architecture, risk management, and incident response. Emmanuel Makafui Damalie Manager, KPMG Ghana See our latest webinars! Discover valuable insights, expert advice, and the latest trends—explore them all now! View All Webinars View All Webinars Terms, Conditions, and Policies | Privacy Statement | Cookie Preferences © Professional Evaluation and Certification Board 2025.  All rights reserved. Facebook X-twitter Linkedin Youtube Envelope Instagram

الذكاء الاصطناعيّ والأمن السيبرانيّ: تعزيز المرونة التشغيليّة في منطقة الشرق الأوسط وشمال إفريقيا

Back to Home Page Back to Home Page The Future of Cyber Attacks Australia English November 20, 2024 This topic dives deep into the future of cybersecurity, exploring how cybercriminals are constantly adapting their tactics and strategies. Learn the latest trends in cyber threats, the impact on individuals and organizations globally, and what steps can be taken to stay secure. Amongst others, the Regional Webinar session covers: Ways to identify key cybersecurity threats Decision matrix and steps to take during a cyber attack plans of the Australian government Michael Connory is the CEO of Aphore, a global technology company, and also manages Security in Depth, a leading cybersecurity consultancy. With over two decades of experience, Michael is recognized as a thought leader in cybersecurity, incident response, and digital forensics. Known for his unique approach to blending technical expertise with practical business insights, Michael has worked with organizations around the world to implement robust security measures aligned with global standards such as ISO 27001 and NIST. Michael’s passion for cybersecurity extends beyond consulting; he is a sought-after speaker, trainer, and author. He has written three influential books, including Mastering Cyber Assurance, Negotiating with Hackers, and The (Almost) Definitive Guide to Managing Your IT Provider. Michael’s expertise is reflected in his role as a Certified ISO Lead Auditor, where he has designed cutting-edge training programs that make complex security concepts accessible to diverse audiences. His contributions extend to respected publications such as The Australian, The Age, Australian Financial Review, and Lawyers Weekly, solidifying his reputation as a leader in the field. Michael Connory CEO of Aphore See our latest webinars! Discover valuable insights, expert advice, and the latest trends—explore them all now! View All Webinars Terms, Conditions, and Policies | Privacy Statement | Cookie Preferences © Professional Evaluation and Certification Board 2025.  All rights reserved. Facebook X-twitter Linkedin Youtube Envelope Instagram

The Importance of Disaster Recovery for ISO IEC 27001 Compliance

Back to Home Page Back to Home Page The Importance of Disaster Recovery for ISO IEC 27001 Compliance Malaysia English December 4, 2024 In this video, we explore why disaster recovery is a crucial component of achieving and maintaining ISO/IEC 27001 compliance. Learn how an effective disaster recovery plan not only protects your organization’s critical data and systems but also ensures you’re meeting the necessary standards for information security management. Amongst others, the Regional Webinar session covers: Disaster Recovery Lifecycle “6R” & Tiers of Disaster Recovery Disaster Recover Measurement – Key Metrics Testing and Evaluating Your ISO/IEC 27001 Disaster Recovery Alan is an experienced Information Security professional, specializing in areas like Security Operations Centers, IT Cybersecurity Reviews, Penetration Testing, IT Audits, ISO 27001 implementation, SWIFT Assessments, Security Incident Response, and Business Continuity. He has extensive hands-on experience and actively researches cybersecurity topics, which he incorporates into training materials and conference talks. Alan regularly speaks at conferences on technical and governance topics. He is an accredited trainer with ISACA (CISA, CISM, CGEIT, CRISC), HRDF, PECB, and Mile2. Alan has led training sessions in Mile2 certifications, ISACA boot camps, cybersecurity fundamentals, and security awareness programs. Ts Alan Yau Ti Dun Cybersecurity Trainer & Principal Consultant at Trainocate Malaysia See our latest webinars! Discover valuable insights, expert advice, and the latest trends—explore them all now! View All Webinars Terms, Conditions, and Policies | Privacy Statement | Cookie Preferences © Professional Evaluation and Certification Board 2025.  All rights reserved. Facebook X-twitter Linkedin Youtube Envelope Instagram

Understanding NIS2: Key Impacts and What Your Organization Needs to Know

Back to Home Page Back to Home Page Understanding NIS2: Key Impacts and What Your Organization Needs to Know Nordic English December 4, 2024 We’re pleased to share insights from the recent Regional Webinar in the Nordics, focusing on NIS2 and its critical implications for organizations. This session offered valuable perspectives on the key impacts of NIS2 and how organizations can prepare to meet its requirements and strengthen their cybersecurity posture. During the webinar, Gry Evita Sivertsen and Namrah Azam provided expert insights on navigating regulatory changes and implementing effective cybersecurity strategies in response to NIS2. Amongst others, the Regional Webinar session covers: Understanding the key changes introduced by NIS2 Preparing your organization for compliance with NIS2 requirements Practical strategies for implementing cybersecurity measures The role of leadership and technical expertise in addressing NIS2 Gry is a dedicated information security professional with extensive experience across multiple industries. As a former Head of Information Security and senior advisor, she specializes in ISO/IEC 27001 implementation and regulatory compliance. Gry is passionate about raising industry awareness on cybersecurity topics, boasting over 10,000 LinkedIn followers. Her advocacy efforts highlight her commitment to mentorship and promoting diversity within the cybersecurity and information security fields. Gry Evita Sivertsen COO at Gritera Security, Norway Namrah is a cybersecurity expert specializing in digital forensics. She has held key roles in national security, focusing on malware analysis, digital investigations, and countering threats. Namrah has also worked with the Norwegian Water Resources and Energy Directorate (NVE) to assess cybersecurity risks in Norway’s power supply system. In addition to her practical expertise, she lectures at the University of Oslo, bridging academic research with real-world application. Namrah is deeply committed to promoting diversity and knowledge-sharing in the field of cybersecurity. Namrah Azam Cybersecurity Expert at Gritera, Norway See our latest webinars! Discover valuable insights, expert advice, and the latest trends—explore them all now! View All Webinars Terms, Conditions, and Policies | Privacy Statement | Cookie Preferences © Professional Evaluation and Certification Board 2025.  All rights reserved. Facebook X-twitter Linkedin Youtube Envelope Instagram

Balancing Innovation and Compliance: How to Implement AI in Alignment with GDPR?

Back to Home Page Back to Home Page Balancing Innovation and Compliance: How to Implement AI in Alignment with GDPR? Dach English December 11, 2024 We’re excited to share our latest regional webinar on the topic: Balancing Innovation and Compliance: How to Implement AI in Alignment with GDPR. In this insightful session, we explore the challenges of integrating AI technologies into product development while ensuring compliance with GDPR. The session covers practical strategies for balancing AI innovation with compliance, providing guidance on how to implement AI responsibly within the constraints of GDPR. Amongst others, the Regional Webinar session covers: Understanding data security and data protection in AI development Clarifying GDPR applicability to AI technologies Defining data protection roles and responsibilities  Aligning data protection principles with AI implementation  Best practices for training and reusing data under GDPR · Steps to get GDPR-ready for AI development Alex is a Compliance Consulting Manager with over 10 years of experience in IT security and GDPR compliance. He helps tech companies navigate complex regulations, ensuring product teams can deliver GDPR-compliant solutions. Alex specializes in privacy by design, AI integration, and providing practical guidance to align innovation with legal requirements. His expertise empower businesses to meet compliance standards while driving growth and technological advancement. Alex Carroll Compliance Consulting Manager – Germany See our latest webinars! Discover valuable insights, expert advice, and the latest trends—explore them all now! View All Webinars Terms, Conditions, and Policies | Privacy Statement | Cookie Preferences © Professional Evaluation and Certification Board 2024.  All rights reserved. Facebook X-twitter Linkedin Youtube Envelope Instagram

Experiences with DORA Implementations in the Nordic Region

Back to Home Page Back to Home Page Experiences with DORA Implementations in the Nordic Region Nordic English September 3, 2024 Check out the insightful session featuring speaker Jakob Seierø as we explore experiences with DORA implementations in the Nordic region. In this session, Jakob discusses the key challenges and successes encountered during DORA adoption, sharing insights on best practices, and highlighting lessons learned from various organizations in the region. Amongst others, the Regional Webinar session covers: Understanding DORA: Its Purpose and Importance Compliance vs. Maturity: Navigating the Differences Approaching DORA: Breaking Down the Process An experienced Program Manager and SAFe Professional Consultant (SPC) with a robust background in cybersecurity, governance, risk, and compliance. Specializing in frameworks such as ISO/IEC 2700X, NIS2, DORA, GDPR, and CIS 20/18, he has successfully implemented best practices across complex critical infrastructure organizations. As the founder of CyberSundhed and Cyber Security Innovation, Jakob is dedicated to mentoring and fostering innovative approaches in the cyber realm. He has led numerous GRC and cybersecurity transformation projects, guiding strategic decisions, investment programs, and change management initiatives. As a certified training partner and instructor in SAFe and PECB, Jakob is passionate about empowering teams and driving operational excellence, with key skills in cybersecurity strategy and risk analysis, governance, risk, and compliance (GRC), agile transformation, and stakeholder management. Jakob Seierø Founder of Cyber Security Innovation ApS, CyberSundhed and CyberEd See our latest webinars! Discover valuable insights, expert advice, and the latest trends—explore them all now! View All Webinars Terms, Conditions, and Policies | Privacy Statement | Cookie Preferences © Professional Evaluation and Certification Board 2025.  All rights reserved. Facebook X-twitter Linkedin Youtube Envelope Instagram

Achieving CMMC 2.0 Compliance: Best Practices for Small and Medium-Sized Businesses

Back to Home Page Back to Home Page Achieving CMMC 2.0 Compliance: Best Practices for Small and Medium-Sized Businesses United States English December 03, 2024 Check out the insightful session with our speakers Jacob Hill and Derrich Phillips focusing on how to achieve CMMC 2.0 compliance and best practices for small and medium-sized businesses. In this session, Jacob and Derrich explore how to navigate the complexities of the Cybersecurity Maturity Model Certification and ensure your organization meets essential security standards. Amongst others, the Regional Webinar session covers: Safeguarding sensitive information Streamlining compliance processes Enhancing your organization’s cybersecurity defense Jacob Hill has over 15 years of experience in technical and leadership roles, with a master’s degree in Cybersecurity and certifications like CISSP-ISSEP and CEH. As Executive Vice President of Cybersecurity, Compliance, and Technology, he has built security programs and architected corporate IT infrastructures. Jacob is the founder of GRCAcademy.io and the GRC Academy podcast, offering CMMC and NIST training. He also owns a small business specializing in website design and hosting. Jacob Hill Founder and CEO at GRC Academy Derrich Phillips is the President and Founder of Aspire Cyber, a consulting firm that provides fast, effective cybersecurity compliance solutions for small and medium-sized businesses. Aspire Cyber was built on the belief that every business deserves access to world-class cybersecurity talent, regardless of budget. With over 20 years of experience, Derrich has managed information security projects and implemented strategic cybersecurity controls for the U.S. Army, Bank of America, and several Fortune 100 companies. Derrich Phillips CMMC Certified Assessor See our latest webinars! Discover valuable insights, expert advice, and the latest trends—explore them all now! View All Webinars Terms, Conditions, and Policies | Privacy Statement | Cookie Preferences © Professional Evaluation and Certification Board 2025.  All rights reserved. Facebook X-twitter Linkedin Youtube Envelope Instagram

ISO/IEC 42001 Compliance Key Considerations for U.S. Businesses

Back to Home Page Back to Home Page ISO/IEC 42001 Compliance Key Considerations for U.S. Businesses United States English September 12, 2024 Check out the insightful session with our speakers Jeffrey Bankard and Adam Perella as we delve into the key considerations and strategies for implementing ISO/IEC 42001 in US business. In this session, Jeffrey and Adam explore how the standard complements initiatives like the National Artificial Intelligence Initiative Act and the proposed Algorithmic Accountability Act. Assess compatibility with state-level AI regulations, cover security considerations, new EU regulations, proposed regulations, and the essential steps organizations should take before implementing or outsourcing AI. Amongst others, the Regional Webinar session covers: Alignment with Existing Regulations Integration with Existing Management Systems Resource Allocation Risk Assessment and Mitigation Stakeholder Engagement Competitive Advantage Compliance and Auditing Jeffrey Bankard is a cyber security leader with 25+ years of experience. He has led teams of cyber professionals who provide threat detection and response services to clients across various industries and regions. He holds the CISSP credential and is a doctoral candidate in information assurance and cybersecurity at Capella University, researching zero-trust security in cloud environments. Jeffrey Bankard Chief Product Officer at WhitegloveAI Adam Perella has a variety of experience in credit card security, forensics, networking, data analysis, security protocols, encryption, and applications. Balances business processes and technical requirements from project inception to implementation. Specialties: • Payment standards (P2PE, PIN, 3DS, SSF) • Process analysis and management • Data discovery and management, etc. Adam Perella Technical Director at Schellman See our latest webinars! Discover valuable insights, expert advice, and the latest trends—explore them all now! View All Webinars Terms, Conditions, and Policies | Privacy Statement | Cookie Preferences © Professional Evaluation and Certification Board 2025.  All rights reserved. Facebook X-twitter Linkedin Youtube Envelope Instagram

登録ありがとうございます!

Add Your Heading Text Here

Thank you for subscribing!