1 Examine the cybersecurity threat landscape (8.92 MB) 1 Explore the threat of unmanaged IoT devices (13.75 MB) 2 Protect against unmanaged IoT devices (11.87 MB) 1 Explore the threat of shadow IT (13.55 MB) 2 Protect against shadow IT (11.85 MB) 1 The threat of supply chain attacks and third-party risks (15.41 MB) 2 Protect against supply chain attacks and third-party risks (10.04 MB) 1 Stay up to date on cybersecurity (11.29 MB) 1 Explore the threat of malware and ransomware (11.11 MB) 2 Protect against malware and ransomware (11.11 MB) 1 Explore the threat of phishing and smishing (10.74 MB) 2 Protect against phishing and smishing (11.46 MB) 1 Explore the threat of business email compromise (9.01 MB) 2 Protect against business email compromise (8.78 MB) 1 Explore the threat of botnets and DDoS attacks (10.61 MB) 2 Protect against botnets and DDoS threats (15.07 MB) 1 Exploring the threat of zero-day attacks (3.44 MB) 2 Mitigating zero-day attacks (4.73 MB) 1 Exploring the threat of AI-based cyberattacks (4.03 MB) 2 Protecting against AI-based cyberattacks (4.27 MB) 1 Exploring the threat of advanced persistent threats APTs (5.25 MB) 2 Protecting against advanced persistent threats APTs (4.19 MB) 1 Explore the risk of insider threats (10.35 MB) 2 Protect against insider threats (6.71 MB)