Dashboard
Track your progress and navigate your learning.
My Schedule
Your confirmed upcoming workshopsLatest from X-Core
Programme updates and what's newNext Generation Security Practitioner Video Lessons
40 powerful lessons across 6 tiers. Watch at your pace and earn Continuing Professional Education Credits (CPE) as you go.
How Your Video Lessons Work
Workshop Bookings
Plan your live workshop sessions across your Elite allowance. Lock in your selection to receive your Teams joining link.
CPE Tracker
Every lesson and workshop tracked automatically. Each completed lesson issues a CPE certificate you can download and submit to ISACA.
Progress to Annual Requirement
Target: 42 CPE per year
Your Learning Record
Next Generation Security Practitioner Live Workshops
Your X-Core workshop experiences — overview, session structure, and CPE submission in one place.
How Your Workshops Work
Loading workshops…
Welcome to the NGSP Events
One-hour live seminars — one per NGSP tier. Attend, earn 1.0 CPE, and discover what X-Core can do for your practice.
How Our Events Work
Loading…
Tier 1 · Event
—
—
In this Event, you will:
- Hear a sharp, practitioner-focused perspective on a real GRC challenge
- Engage with peers facing the same pressures in their organisations
- Leave with at least one idea you can act on immediately
Who this is for
GRC and security practitioners who want a sharp, peer-led perspective on one of the six core challenges in the NGSP framework — and 1.0 CPE to show for it.
Tier 1 — Profiling Risk · Lesson 1.6
The THOR Risk Lens
—
By the end of this lesson, you will learn:
- Video 1 — coming soon
- Video 2 — coming soon
- Video 3 — coming soon
The THOR Risk Lens
Four lenses applied in sequence — together they describe the real risk surface of any system, change or decision.
Framework
T·H·O·R
Examine the systems, tools, architecture and technical controls that underpin your risk posture.
Scrutinise
- Systems, integrations and data flows in scope
- Trust boundaries and how they're enforced
- Attack surface, hardening posture, exposure
- Inherited dependencies you don't control
Watch for
- Shadow IT and undocumented integrations
- Legacy systems with no clear owner
- Vendor changes that quietly shift the risk profile
Assess the people, behaviours, culture and capability that shape how risk is created and managed.
Scrutinise
- Who has access — and whether they understand why
- Behaviours that create risk, behaviours that reduce it
- Where culture supports secure decisions, where it doesn't
- Risk ownership — assigned, accepted, evidenced
Watch for
- "Not my job" gaps between teams
- Privileged users with stale or unreviewed access
- Pressure to ship overriding security as a default
Review the processes, procedures, workflows and day-to-day practices that govern execution.
Scrutinise
- Processes that assume security — and the ones that bypass it
- Handoffs between teams, systems and shifts
- What this looks like at 3am with one person on call
- Recovery and detection capability that's real, not theoretical
Watch for
- Single points of failure: one person, one tool, one process
- Manual workarounds that quietly became permanent
- Change windows where controls relax "just for now"
Scrutinise the compliance obligations, legal exposure and regulatory landscape that frame your risk.
Scrutinise
- Laws, standards and contractual obligations in play
- Where you're audited — and where you could be
- Evidence you're required to produce, and whether you can
- Upstream change (DORA, NIS2, sector rules) on the horizon
Watch for
- Cross-border data flows triggering jurisdictional questions
- Obligations buried in client master agreements
- Compliance treated as the goal, not the floor
Battle Cards stay in your X-Core Collection — view any time, no download. Earn cards as you complete each lesson.
Reflect on this lesson. Your responses become the supporting evidence on your CPE certificate. Every field has a guideline word count — write enough to demonstrate your professional judgement.
Watch 90% of the video to unlock the worksheet.
Tier 1 — Profiling Risk
Workshop
A hands-on practitioner workshop combining expert-led learning with live simulation. Designed to build real-world capability you can apply from the moment you leave.
In this workshop, you will:
- Apply core frameworks in a live simulation environment
- Work through real-world risk scenarios with practitioner peers
- Leave with a concrete action for your organisation
Workshop Flow
Reflect on your workshop experience. Your responses form the supporting evidence on your CPE certificate.
Complete all four questions to submit.
My Battlecards
Your library of practitioner battlecards.
Your battlecard library is on its way
As you complete lessons across the six NGSP tiers, your earned battlecards will appear here — ready to reference, search, and apply directly to your practice. Battlecards earned to date are accessible from inside their parent lessons.
My Account
Your X-Core profile and preferences.
Account management is being built
Profile editing, preferences, and notification settings will live here. For now, contact support if you need to update your account details.
Billing
Your payment history and subscription details.
Billing details will appear here shortly
Payment method on file, billing history, invoice downloads, and any sponsoring organisation will appear here once we've finished the secure billing experience. In the meantime, all subscription enquiries can be sent to support.