Many Varonis employees have obtained (ISC) certifications. Heck, our Chief Marketing Officer is a CISSP. So it’s no surprise that we’re all keenly interested in keeping our certifications up, which means earning Continual Professional Education credits.

The list below focuses on Group A CPE requirements. Group A requirements are on topics closely associated with IT and Infosec topics. Group B activities are professional, but not in the security domain (ex: Business classes).

Before getting started you should review the official CPE Guidelines for your specific certification.

Additional resource include:

Varonis Learn & Earn Email Series:

Earn 2 CPE credits per month, learn from top industry experts, and get real world security content to take your skills to the next level. Enrollment is free – and so is all our great CPE content!

This program includes:

  • On demand webinars that fit your busy schedule
  • Podcasts from top influencers in security and privacy
  • Video tutorials with relevant, real world security content to take your skills next level
  • and more!

Security Podcasts

Podcasts fall under the “self-study” category of CPE requirements. One hour of study (listening to the podcast) is considered one CPE. We’d recommend keeping a document recording when you listened to each podcast episode, it’s length and potentially even a short (approx 25 word) summary. Like any form of media, the actual content of a podcast can vary from lightly entertaining to incredibly educational and sometimes both at the same time.

Our general recommendation is to take your continuing education seriously and seek out the podcasts that you find are best at expanding your knowledge.

Discussion of the security topics of the day and how they fit into the larger IT ecosystem.

Talking about security, privacy, legal, and compliance topics.

A cyber security podcast covering breaches and strategies for defense.

Developing Security Awareness.

Security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.

A business perspective on the often insane world of information security.

Everything from network security, open source and forensics, to DIY modding and the homebrew scene.

Highlights from the Open Web Application Security Project community.

The Business take on InfoSec.

Latest information security news, research, hacker techniques, vulnerabilities, and technical how-to’s.

Covers important issues of personal computer security.

A brief daily summary of what is important in cyber security.

Infosec news and analysis in just a few minutes, all in one take.

Security Seminars

Seminars from one of the world’s leading centers for research and education in areas of information security that are crucial to the protection of critical computing and communication infrastructure.


Focus on securing systems using approaches that have declarative policies that factor in dynamically evolving context. Downloadable versions of the seminars are posted a few days after each session in the archive. You can also subscribe to the video podcast feed or YouTube channel.

CERT Software Engineering Institute at Carnegie Mellon University

Presentations from the Carnegie Mellon University Computer Emergency Response Team.

Podcast Series:
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.

Webinar Recordings:
Whether you’re interested in cybersecurity, upcoming mobile computing trends, or cutting-edge workforce development practices, the SEI webinar series has you covered.

Online Videos

Online videos fulfill “self-study” requirements for earning CPEs.

Protecting against insider threats, whether malicious or accidental, is extremely difficult, especially when 71% of employees say that have access to information they aren’t supposed to see.

Learn what CryptoLocker does on your network and steps to limit the impact.


Self paced training courses count 1 to 1 hours to earned CPE.

If you’re in any way responsible for information systems that touch the web, this course will give you an in-depth look at the top 5 risks you should be aware of and how to combat them.

Comprehensive Security Training for Developers.