Back to Search Begin New Search Save Search Auto-Notify
Seeing Cyber Threats Over the Horizon
More visibility. Most (if not, every?) cybersecurity professional will tell you they need more visibility into the threat landscape, but also their own security posture. Join SANS Analyst, Jake Williams and Chas Clawson, CTO for security with Sumo Logic, as they talk about the importance of correlating security alerts across your entire cloud and on-prem environment, and enriching with threat intelligence and other feeds for context and improv...
November 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Integrating Software Supply Chain Secur...
Sophisticated threat actors are turning to Software Supply Chain attacks to evade today’s defenses. Tactics include inserting malicious code into open-source repositories like npm and PyPi, developing attacks leveraging new software vulnerabilities, and infiltrating vendor development environments to insert malicious packages into their software solutions. In the last year, ReversingLabs observed a 289% increase in threats involving open...
November 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Importance of Defining Security Functio...
For years many practitioners in the ICS security community realized that guidelines and best practices around secure PLC programming practices were lacking. To address this problem, ICS security professionals in the community pulled together to develop the Top 20 PLC controls. Beyond these controls, however, it is essential to define abnormality detections to display the information on the HMI clients. This allows operations staff to respond t...
November 7, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Shrink the Attack Surface Solutions Forum
Discovering, identifying, inventorying, and assessing all digital assets — a continuous process known as Attack Surface Management (ASM) — is essential for organizations to secure their environment. After all, you can’t protect what you don’t know about. External threats, vulnerabilities, shadow IT, and cloud misconfigurations are a few critical areas that may sneakily pose risks to organizations. The goal for IT and se...
November 4, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Security Masterclass: Privilege Without...
With great power comes great responsibility. Privileged accounts are a necessary part of everyday IT operations, but managing them to date has been complex and costly with a lot of disruption to the business, so organizations only deploy solutions when they really have to e.g. compliance drivers. Join this webinar to learn: The hidden threats of unmanaged privilege accounts How managing the problem can be done surprisingly quickly Next genera...
November 3, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
DevSecOps Success: What’s Team Metrics...
Expanding on some of the key findings of the SANS DevSecOps Survey, this webcast will provide example metrics that leadership can use to gauge DevSecOps maturity. Join SANS instructor Kenneth G. Hartman and Veracode’s Product Security Director Ryan O’Boyle as they discuss the role of DevSecOps metrics in determining effective objectives and key results (OKRs) and making data-driven decisions. The webcast will cover how to: Devise...
November 2, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Zero to Hero in Managing Enterprise Clo...
As organizations actively migrate applications and computing environments to the public cloud, it is important to integrate security throughout the cloud adoption journey. SANS has developed a Cloud Maturity Model to help organizations measure their progress in the cloud security journey. In this talk, we will discuss the content of the Cloud Maturity Model, how it is suitable for organizations like yours, and the best practices on how the mo...
November 2, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
The Power of Open-Source Tools for Netw...
When conducting incident response, EDR and firewall technologies can only show you so much. The breadth of network traffic provides an unrivalled source of evidence and visibility. Open-source security technologies such as Zeek, Suricata, and Elastic can deliver powerful network detection and response capabilities, furthermore the global communities behind these tools can also serve as a force multiplier for security teams, often accelerating...
October 27, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Get the Risk Out! How to Manage Third-P...
News Flash: You’re not just responsible for your own organization’s risk anymore. You need to watch out for your friendly, and sometimes not-so-secure, business partners, too. Third-party risk assessment is crucial to the defensibility of your cyber ecosystem, yet the task can be daunting. How do you know whether a third party has been the victim of a security breach? Which ones are most likely to experience a ransomware attack? W...
October 25, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS 2022 Vulnerability Management Surv...
With rapidly changing computing platforms, a growing threat landscape, and a shift to a remote workforce, managing vulnerabilities is more challenging than ever. We are all looking for answers and we all want to know how our peers are doing in their fight and what we can learn from each other to make our systems, applications, and networks more secure and resilient. This webcast event will examine results from the SANS 2022 Vulnerability Manag...
October 19, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search