Webinars

Home » Resources » Webinars

Upcoming

Training Trends in 2026: What You Need to Know Before January

If you want your 2026 security awareness training program to lead the way, this is the session you can’t afford to miss.

Get an exclusive first look at the three training trends that are shaping next year’s most effective security awareness programs:

  • Evolving learner expectations
  • AI-powered security training
  • Threat simulations and labs

You’ll hear expert insights from VIPRE Inspired eLearning’s Chief Learning Officer, John Trest, and EDUardo CEO, Peter Szlavik, two leaders at the forefront of security awareness and simulation training.

Get clarity now.

Set your 2026 training strategy with confidence.

Rebroadcasts

  • null

    Surviving the Cyber Wilderness: Phishing 2.0 & Emerging Threats

    In a world where cyber predators are evolving faster than ever, Cybersecurity Awareness Month 2025 is your call to action. Join Inspired eLearning for an eye-opening, expert-led session that arms you with the practical tools and real-world insights to survive in today’s digital jungle.

    In this 1-Hour interactive webinar, we’ll guide you through this year’s CAM pillars and expose the sophisticated traps laid by cybercriminals using AI, voice scams, and deepfake technologies.

    You will learn:
    The Four Essentials for Cyber Survival
    Get a high-level overview of this year’s core CAM topics, strong passwords, phishing, AI threats, and incident response—with compelling, real-life examples that prove just how vulnerable businesses and individuals really are.

    Phishing 2.0: Callback Scams, TOAD, and Deepfakes in Action
    We’ll walk you through real attack examples, like TOAD (Telephone-Oriented Attack Delivery) scams, where phishing meets vishing. You’ll see how employees were duped by fake support calls, and how attackers used social engineering and AI to make it believable.

    AI Phishing & Deepfake Fraud
    Discover how attackers are using AI to tailor emails, mimic voices, and even generate fake video calls to fool your team. You’ll learn what to watch for, and how to respond fast when it happens.

    Incident Response in the Wild
    Learn the first 3 things to do after a suspected cyber attack, and how to keep your cool when predators strike.

    This isn’t your average security briefing, it’s a survival guide for safely navigating the digital frontier.

    Stay ahead. Stay sharp. Survive the Cyber Wilderness.

     

  • null

    Elevate Your Security Awareness: Next-Gen eLearning for Modern Threats

    Are your employees truly prepared for today’s sophisticated and ever-evolving cyber threats? Join Inspired eLearning for an exclusive webinar that unveils a breakthrough approach to Security Awareness Training, leveraging cutting-edge adult learning experiences that truly stick.

    In this insightful session, we’ll demonstrate how our innovative products integrate three powerful learning methodologies to build a resilient human firewall within your organization:

    • Gamified Learning: Dive into “Phishin’ Impossible,” our award-winning game that transforms phishing awareness into an engaging, interactive challenge. See how making learning fun dramatically boosts user participation and knowledge retention.
    • Adaptive Learning: Discover “Cyber Quest,” an intelligent learning experience that customizes content to each individual’s progress. This personalized approach ensures optimal skill development in identifying and mitigating phishing attempts.
    • Introducing the Brand New Simulations Lab: Get an exclusive first look at our groundbreaking new Simulations Lab! This immersive platform provides realistic, hands-on practice in recognizing and responding to multi-channel phishing, smishing, and vishing attacks in a safe, simulated environment. Prepare your team for real-world scenarios like never before.

    Learn how these advanced eLearning experiences translate into a stronger security posture, improved employee behavior, and a significantly reduced risk of cyber incidents.

  • null

    Securing Your Code Fortress: Navigating the Risks in a Post-GitHub Hack Era

    Following the significant security incident at GitHub, where an overwhelming number of malicious cloud repositories targeted the site, the software development community is increasingly vigilant. This situation holds particular relevance for both experienced developers and technology enthusiasts alike, given the widespread reliance on source code management services such as GitHub, GitLab, and BitBucket. We invite you to an enlightening webinar that aims to navigate the challenges of software development in the current digital era, highlighting effective measures to protect your coding projects.

    Key Insights to Gain:

    • Deciphering the GitHub Breach: Gain insights into the recent GitHub attack, understanding its consequences and the key takeaways.
    • Evaluating Code Security: Identify potential weaknesses within your software development practices and repository management.
    • Constructing a Solid Defense: Dive into strategic approaches and industry-leading practices for reducing risk and bolstering the security of your code.
    • Empowering Your Team with Knowledge: Emphasize the importance of education in code security and discover strategies for effective team training.
    • Taking Initiative: Learn about forward-thinking actions that can preemptively shield your software development processes from emerging threats.
  • null

    Securing the Software Supply Chain – 6 Steps to Success!

    Cybersecurity threats to supply chains are intensifying, marked by a growing array of malware, ransomware, phishing, and viruses. Join Inspired eLearning Powered by VIPRE to explore six key strategies for protecting your software supply chain. This involves safeguarding every aspect of software development and deployment, including third-party code, infrastructure, and developer tools, with organizations needing to both implement these practices and prove their security commitments to consumers.

    The 6 strategies backed by the DevSecOpps community are:

    • Ensuring the authenticity and integrity of developers.
    • Strengthening code management systems with authentication and access control.
    • Building a robust infrastructure and maintaining a Software Bill of Materials.
    • Implementing security testing through Software Composition Analysis.
    • Verifying attestations in a secure deployment infrastructure.
    • Conducting integrity checks before software usage.
  • null

    Keeping it Reel: Top Phishing Simulation Tips

    Did you know 85% of phishing emails utilized malicious links in the content of the email, and spam emails increased by 30% from Q1 to Q2 2023? If you haven’t already taken action, it’s high time to establish your own phishing simulations to safeguard yourself from becoming a potential victim.

    Phishing simulations serve as a valuable training tool to educate individuals about the various tactics employed by cybercriminals. By regularly conducting phishing simulations, organizations can assess their employees’ susceptibility to phishing attacks and identify areas of weakness in the organization’s cybersecurity posture and take steps to mitigate those risks.

    Join us for the webinar “Keeping it Reel: Top Phishing Simulation Tips” on November 15, 2023 at 10amET/3pm BST. Industry expert, John Trest, Chief Learning Officer, will share insights on why phishing simulations are an invaluable educational resource and the best practices and factors that you need to know to get the most out of your phishing simulation effort.

    The webinar will include:

    • How to use phishing simulations in security awareness training program
    • Ways to improve the results of phishing simulation campaigns
    • Provide refresher on how best to test your employees
  • null

    Defending Against the Inevitable: Layered Security and the Attack Chain

    In the second quarter of this year alone, VIPRE Security Group processed nearly 1.8 billion emails, detecting over 230 million malicious ones. These emails were stopped at the border, but even if they had slipped through VIPRE solutions would still have protected our customers’ environments. In honor of Cybersecurity Awareness Month, VIPRE Security Group is hosting an exclusive webinar to educate organizations about the various threats and risks in the digital world.

    Watch “Defending Against the Inevitable: Layered Security and the Attack Chain” as industry experts David Corlette, VP of Product Management; John Trest, Chief Learning Officer; and Oliver Patterson, Director of Product Management join forces to walk you through the typical stages of an attack chain to provide insights into the anatomy of a cyberattack. They take a deep dive into VIPRE’s layered security approach and demonstrate how the products stand as a formidable shield against these threats.

    Key highlights include:

    • Discussion on layered security concepts
    • Exploring a typical attack chain in detail
    • How VIPRE solutions implement protection measures in details
keyboard_arrow_up
Image AdChoices Do Not Sell My Personal Information