VXLAN Overlays Workshop for Critical Infrastructure | Get Your Ticket Today→

Cybersecurity Expertise, Delivered.

CyberEd.io delivers premium cybersecurity training and education designed for the realities of modern security. Expert-led learning, hands-on practice, and immersive simulations that strengthen performance across teams and leadership.

"Check-the-box" training doesn't cut it anymore.

At CyberEd.io, we deliver an integrated readiness system that transforms cybersecurity education into measurable organizational capability. We serve as your definitive entry point for accessing premier expertise and strategic insights. By bridging the gap between knowledge and execution, we ensure your workforce is truly prepared for real-world conditions.

Image

Multifaceted training approach

Our comprehensive cybersecurity education and training solutions ensure you cover every angle from live, interactive training to fully customizable programs, to meet your compliance goals.

Image

High caliber expertise from industry leaders

Our premier online learning platform holds exclusive content from ISMG events you won't find anywhere else. You can unlock these sessions with an annual CyberEd.io subscription.

Image

Backed by ISMG

CyberEd.io is the education division in the ISMG ecosystem. For 2 decades, ISMG has been a trusted leader in the security space.

Beyond Layer 2: VXLAN Overlays for Critical Infrastructure

March 12, 2026 | 9am-5pm | Hilton Houston Post Oak by The Galleria

Designed for: Practitioners responsible for designing, operating, and/or securing OT networks

As IT and OT networks continue to converge, some industrial environments are adopting routed underlays, including private LTE and 5G, to transport multi-service OT and IT traffic across shared infrastructure.

This workshop explores how VXLAN can be used in these scenarios to carry required Layer 2 communication over Layer 3 networks, and how VXLAN-based segmentation can be aligned with ISA/IEC 62443 zones and conduits as part of a broader converged IT/OT network architecture.

Get your ticket
Image

Sam Curry, VP & CISO at Zscaler

Preview this course, and access the full masterclass series when you upgrade to a CyberEd Pro subscription.

Sam Curry examines the dangers of generative AI in creating phishing emails and malware, while also highlighting its potential for threat hunting, hygiene automation, and compliance. Gain insights through real-world use cases and strengthen your defensive strategies.

Preview the course
Image

600+

Curated courses

300+

Role-based courses

40+

Masterclasses

Latest resources

The AI Threat Narrative Is Outrunning Reality

Headlines scream “AI-powered cyberattacks” daily. Vendors push visions of autonomous agents, adaptive malware, and self-evolving threats as the next digital apocalypse. By 2025, reports claiming AI agents were executing espionage campaigns, generating polymorphic malware, and driving “80% AI-powered ransomware” flooded the news cycle.

Autonomy Drift Is the New Configuration Drift

Security teams for decades understood configuration drift as a quiet but persistent threat. Systems are hardened, baselines are documented but over time small, untracked changes accumulate until the environment no longer reflects its original security posture.

Experience Really Matters But Now You’re Fighting AI Hacks

When Anthropic disclosed a cyberespionage campaign conducted largely through an artificial intelligence system, it provided a detailed view of how offensive operations can unfold when an autonomous tool performs most of the technical work.

‘I Quit!’ – When CISOs Need to Take Charge of Their Careers

A recent LinkedIn post has been circulating in cybersecurity circles, written as a CISO's resignation letter - "effective immediately." It resonates with security leaders who know the pattern - budget requests denied, risks that are documented and escalated, and a breach that follows a known vulnerability.

When ERP Systems Become the Attack Surface

Enterprise resource platforms such as SAP and Oracle serve as the quiet infrastructure behind an organization's financials, human resources, supply chain and administrative workflows. They are deeply embedded, highly customized and rarely replaced.

Securing the World for the Age of Quantum-Resistant Cryptography

Advancements in quantum computing are poised to reshape technology and the implications reach far beyond hardware. This powerful computing capability will require more advanced cryptography to secure systems and sensitive data.