Vulnerability Management: Leveraging Context
So you have a vulnerability management program. Great. Excellent. But are you able to let the management team know if it is being effective or not? In this final Vulnerability Management series webcast, join Jonathan (MGT516 co-author and SANS certified Instructor) as he discusses how to show your program is being effective through metrics and measures. He will discuss metrics that a new program can start creating and generating on day 1 as we...
Government Innovation Pennsylvania
Transforming Government Through Technology-Driven Initiatives In the midst of historic unpredictability, the Commonwealth of Pennsylvania faces yet another significant disruption: the election of its first new governor in eight years. Rapid, large-scale change presents challenges—but also opportunities to take stock of innovative systems and ideas that have modernized the Commonwealth over the past eight years. By improving collaboration...
Fed Gov Sub-Contracting - Department Of...
Join us in this complimentary webinar series of 2022 covering SUBCONTRACTING. We will uncover the top Large Businesses within the 15 Federal Departments as well as contracting trends for small businesses. This series is complimentary and recorded. Please find our recordings on YOUTUBE and the slides on SLIDESHARE. Sponsorship opportunities are available. Please contact
[email protected] Thank You!
ElevateIT: Houston Technology Summit 2022
Optimizing Intelligent Change for the Future How do I help my company keep and grow market base within this most disruptive chaotic time in history? Can I capitalize on the disruption to create a competitive advantage? How do I create value while maintaining digital trust? Once you have created a flexible strategic business model both on paper and in practice that answers these 3 questions, you will be in prime position for 2022 and beyond. Ma...
Common Persistence Strategies - Emulati...
Get a preview of material directly from SANS SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses. There are many stages in the attack lifecycle in which we can detect or prevent an (advanced) attacker from getting closer to their final objectives. One thing we always come across however is that the attacker likes to persist in your environment, be it for two days, two months, or two years. It is important fro...
Securing Digital Supply Chains? Start w...
Securing digital supply chains is of paramount importance to enterprises and government agencies: executive orders demand this security, boards are asking for it, and markets are reacting to it. But with today’s large, comlex, multinational, multi-threaded supply chains, where do we start? Securing the firmware in these supply chains – the embedded code that comes with nearly every device, chip, component or “thing” ...
Middle TN Cyber Conference
The Tennessee Department of Safety & Homeland Security and the conference committee are proud to once again bring together individuals from business, industry, and government on September 13th and 14th. We are committed to showcasing the latest information, strategies, best practices, and innovative solutions to address today’s challenges in cybersecurity with speakers from businesses, industries, and government. Our 'real world' Cap...
Disaster Recovery Journal (DRJ) Fall 2022
The Evolution of Resilience | Join us in Phoenix as we will provide you with all the tools and knowledge to respond to today’s disruptions and tomorrow’s emerging threats! We invite you to join us and enjoy all the programming, the networking, the exhibitor demos and more at DRJ Fall 2022 – The Evolution of Resilience. We have designed our 67th conference to meet the needs of you, our valued attendees. This conference guide i...
A Bright Future or the Perfect Storm? N...
There are many business challenges affecting Network Operations and Security teams. CIOs and CISOs alike are finding it more and more difficult to keep up with the sophistication and increasing frequency of modern-day and zero-day threats, while also building a highly collaborative and effective IT team. As businesses today focus more and more on security, there is a need to think outside the box in order to properly mitigate risks and drive n...
SANS 2022 Top New Attacks and Threat Report
This webcast will provide deeper insight into the threats highlighted during the annual SANS keynote panel discussion at the RSA® Conference 2022. The webcast will include insight from SANS instructors Ed Skoudis, Heather Mahalik, Johannes Ullrich, and Katie Nickels on the dangerous new attacks techniques they see emerging. We will also include actionable advice on the critical skills, processes, and controls needed to protect enterprises...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.