How to Attract, Hire and Retain Mid-Lev...
Come learn the outcomes of the 2024 SANS | GIAC Cyber Workforce Research Report which is based on a first-of-its-kind survey that analyzed the cybersecurity workforce with the goal of identifying the key factors to successfully build high-performing cybersecurity teams. The discussion will include top leaders from some of the largest companies and federal agencies on how they are building up their talent pipeline. Some of the items in the disc...
The Achilles Systems Hack Assessment Se...
Achilles Systems, a fictitious IT service provider to human resources teams in medium and large businesses, has fallen victim to an attack in which sensitive customer data and, potentially, customer networks, have been compromised. Achilles has a small security team who has historically focused on basic controls and compliance. However, it seems clear this attack was the work of a sophisticated adversary capable of circumventing the controls i...
Prevent Cloud Incidents from Becoming C...
The number of cloud security breaches in the headlines have been staggering lately. It seems like a week cannot go by without a massive amount of sensitive data being leaked from either AWS, Azure, or Google Cloud. One example that would be funny if it were not so sad is the September 2023 incident where the Microsoft AI team leaked 38TB of sensitive data, including employee workstation backups and 30,000 internal Teams messages, due to a misc...
SANS Baltimore Spring 2024: Keynote - S...
In the field of cybersecurity, we are failing to acknowledge that we have a big problem. Our job titles and job descriptions have the word security in it even though security isn’t our job. I have never met a security professional who claims that their organization will never be breached. Yet, we call ourselves security? When a breach does occur, it reflects poorly on us. Did it mean we did our jobs poorly that day? Let’s have the...
Do You Know Where Your Data Is
Data can end up in the unlikeliest of places, even for those organizations that have developed formal data governance policies and implemented technical controls to (try to) keep data in central data stores. Especially troublesome is data stored and worked with on user endpoints—workstations, laptops, devices—such as original unstructured files or containing data extracted from structured data sources. With this survey, SANS is see...
Securely Moving to the Government Cloud
The cloud has changed infrastructure for all organizations and Federal agencies are no exception. However, it’s not as easy as simply “flipping the switch” because there are a myriad of regulatory requirements and considerations to navigate, and it requires careful planning and implementation. Join us on April 25, 2024, at 3:30 ET where SANS analyst Matt Bromiley and Cisco’s Technical Marketing Engineer, Christian Claus...
What You Need to Know about the NIS II...
Come and learn from ENISA, the European Union's Agency for Cybersecurity), about the NIS2, the EU's cybersecurity legislation, which will come into force this year across all the EU's critical sectors. This seminar will help you get ready for the NIS2 incident reporting and security measures requirements, what NIS2 will mean for organizations doing business in the European Union, and what skills you may need to implement the NIS2. This online...
Spring Cyber Solutions Fest 2024: DevSe...
The idea of DevOps, the term the industry had initially decided on for the work between the Application and Operations teams, was coined 15 years ago. To give perspective, the iPhone 3GS came out that year. If we think of what we had to work with in 2009, we now know in hindsight that we have better options, solutions, software, and patterns. We have an iPhone 15; we no longer have BlackBerry OS or Nokia. Windows 8.1? I hope not. Here are a fe...
Spring Cyber Solutions Fest 2024: Attac...
In its fifth year, SANS Cyber Solutions Fest aims to brings together an ensemble of security professionals, solution providers, gurus and experts ready to share knowledge about the latest developments and innovative technologies in the cybersecurity industry. Join the attack surface & vulnerability management track to hear from chairperson Matt Bromiley and a host of leading cyber security experts as they walk through specific use cases an...
Spring Cyber Solutions Fest 2024: Cloud...
Today, most security professionals are actively architecting and implementing cloud security controls across SaaS, PaaS, and IaaS environments. We’ve learned that what once worked on-premises may not work quite the same in the cloud, and a wide range of new and innovative security platforms and services have emerged and evolved in recent years to address critical cloud security use cases and categories, including: Cloud security monitori...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.