Streamlining Education: How Two K-12 Sc...
In the dynamic landscape of education, operational efficiency is key to providing quality learning experiences. Dive into the digital journeys of two school districts, the Boulder Valley School District in Colorado and Hillsborough County Public Schools in Florida, and hear how they leveraged multitenant cloud solutions to drive efficiencies, optimize resource allocation, and enhance overall productivity. Attendees will: Gain valuable insights...
SANS Leadership & Cloud Security - Crys...
Are you struggling to get both your leadership and workforce to buy into cybersecurity? Do you feel overwhelmed and need to scale the impact of your security team? Learn how to engage and transform your organization into the biggest believers and supporters of cybersecurity by institutionalizing a strong security culture. What is a strong security culture and how it helps you Indicators of a strong security culture Top three drivers of a stron...
Prevent Cloud Incidents from Becoming C...
The number of cloud security breaches in the headlines have been staggering lately. It seems like a week cannot go by without a massive amount of sensitive data being leaked from either AWS, Azure, or Google Cloud. One example that would be funny if it were not so sad is the September 2023 incident where the Microsoft AI team leaked 38TB of sensitive data, including employee workstation backups and 30,000 internal Teams messages, due to a misc...
Securely Moving to the Government Cloud
The cloud has changed infrastructure for all organizations and Federal agencies are no exception. However, it’s not as easy as simply “flipping the switch” because there are a myriad of regulatory requirements and considerations to navigate, and it requires careful planning and implementation. Join us on April 25, 2024, at 3:30 ET where SANS analyst Matt Bromiley and Cisco’s Technical Marketing Engineer, Christian Claus...
Making Mistakes Publicly: Cloud Edition...
Public Cloud Environments can make things, well, rather public. While there are ways to prevent this, and the cloud providers have made strides, retroactive changes are not a thing. As such, we still find very poorly configured environments today. Join us for this first of eight workshops in the Aviata Solo Flight Challenge Workshop series. We will show you how to look at a target organization's misconfigured public items. This lab will begin...
Does Network Telemetry Still Matter in...
As the Internet celebrates 31 years, Identity, Zero Trust, Cloud, and AI currently have all the attention. Defenders face numerous challenges and headwinds in this complex, ever-expanding interconnected ecosystem of commerce, information exchange and cyber warfare. Endpoint, IDS and SIEM are so yesterday. Is network detection even worth mentioning? In this talk, Corelight will explain how elite cyber defenders are updating architecture and cap...
Securing the Cloud
Government-wide pressure to improve service to citizens, incorporate telework, and optimize IT operations has led many agencies to further embrace cloud computing. Despite the improved efficiencies, securing the cloud remains a top priority. Cloud Computing Security can be defined as defending the confidentiality, integrity, and availability of agency assets (data, applications, infrastructure) using cloud services from both outside and inside...
Modern Data Center to Enable AI and Qua...
Modern applications are transforming government agencies. From Artificial Intelligence for better customer engagement, to data analytics for forecasting, the need for accelerated computing is rapidly increasing. But enterprises face challenges with using existing infrastructure to power these applications. By evolving enterprise IT infrastructure into a unified architecture, all applications, modern and traditional, can run optimally on a shar...
Cloud Flight Simulator Part 4: Least Pr...
In the final part of the Cloud Security Flight Simulator series, join SEC540 lead author and instructor Eric Johnson to learn how to enable workload identity for AWS Elastic Kubernetes Service (EKS) and Azure Kubernetes Service (AKS). Rather than issuing long-lived credentials to individual pods or inheriting excessive permissions from the node, Kubernetes service accounts can use an internal OpenID Connect (OIDC) provider to obtain a signed i...
Cloud Flight Simulator Part 3: Safeguar...
Part 3: Continuing the Cloud Security Flight Simulator series, join SEC540 Cloud Security & DevSecOps Automation instructor Jon Zeolla for a webcast on software supply chain security. In a recent Sonatype State of the Supply Chain report, a 750% year-over-year increase in supply chain attacks was observed. In response to the increase in supply chain attacks, an Executive Order led to the development of supply chain security guidance includ...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.