Back to Search Begin New Search Save Search Auto-Notify
Cyber Threat Intelligence Summit Soluti...
Threat Intelligence can be defined as the ‘Art of Taking the Adversary by Surprise’. Yes, anticipating and mitigating surprises in the form of cyberattacks is the primary mission of a practical threat intelligence program. Achieving that goal requires a proactive approach, one that provides answers to critical questions like: What threat actors are most likely to cause an impact in my organization? What are their motivation, goals,...
January 28, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
AUSA's Noon Report | Risk: A User's Gui...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. Please join us on Tuesday, 25 January 2022, at 1200 EST, to hear a presentation by retired Army General Stanley A. McChrystal, author of Risk: A User's Guide. All leaders must know how to face...
January 25, 2022
Organizer: Association of the United States Army (AUSA)
Location: Webcast
Add Favorite
ICS Cyber Resilience, Active Defense ...
Join members of the SANS Industrial Control Systems (ICS) Team in a new ICS Webcast Series: ICS Cyber Resilience, Active Defense & Safety. Presenters will address the recent increase in attack campaigns and impacts seen across multiple sectors in the ICS space. Topics of discussion will include ransomware impacting critical infrastructure, detecting advanced adversaries inside ICS networks, and a variety of other threats and defenses. This...
December 17, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Endpoint Detection and Response—Are We...
For years, cyber criminals have been exploiting organizations across the globe, profiting from their actions while we struggle to stay one step ahead of our current defenses. To combat advanced attacks, such as ransomware, we must better understand our threat actors and how they have evolved. Hosted by SANS Instructor Chris Dale and a representative from Cisco, this webcast will explore how organizations can modernize their security postures t...
December 6, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Applying AI & Automation to Protect You...
The internet attack surface is a fast-growing, fragmented problem, making threat discovery, assessment, and remediation challenging—especially at scale. Security teams must protect brands and prevent fraud across websites, email systems, social media sites, application stores, and marketplaces. Employees, as well as supply chains, can be affected. The time for using older methods of dealing with this problem are well behind us. Join Seni...
December 2, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Preventing Pharmacy Benefit Fraud, Wast...
The National Health Care Anti-Fraud Association estimates that the U.S. health care system loses tens of billions of dollars every year to fraud, waste and abuse (FWA). A large portion of these costs are attributed to pharmacy spend, including duplicate claims, data entry errors, forged prescriptions, and intentional overcharging. Understanding how you can work with your pharmacy benefits partners will bring you the maximum benefit in discover...
December 2, 2021
Organizer: World Congress
Location: Webcast
Add Favorite
2021 Health-ISAC Fall Summit
The 2021 Health-ISAC Fall Summit will have siscussions, seminars and networking opportunities you won't want to miss! November 30, 2021 Working Group Meetings Member Meeting Lunch Roundtable Discussion: M&A Roundtable Discussion: Supply Chain Security Roundtable Discussion: Putting SBOM Into Practice Roundtable Discussion: Cloud Mitigation Lessons Roundtable Discussion: CISO Roundtable Roundtable Discussion: ISAC Exercises Roundtable Discu...
November 30 - December 2, 2021
Organizer: H-ISAC
Location: San Diego, CA
Add Favorite
Real World Network Forensics Episo4: DNS
In this webinar series, Jake Williams takes a hands-on approach to forensics packet analysis, using real-world examples to demonstrate how to analyze network packet data to uncover and investigate threats. The series takes a protocol-by-protocol approach. It is an ideal introduction to packet forensics for beginners and a great source of expert tips and tricks for more experienced security analysts. In this episode Jake takes a deep dive into DNS.
December 1, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Ransomware Alert! Why AV and EDR Are Fa...
Ransomware groups repeatedly deceive AV and EDR solutions. News stories abound of companies large and small that, regardless of their defenses, get hit by ransomware attacks. How? Threat actors take advantage of the weaknesses of mainstream AV and EDR platforms. In this webinar, Morphisec CTO Michael Gorelik will simulate a ransomware attack that bypasses detection-based defenses before reaching its goal and encrypting the entire enterprise ne...
November 17, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Unauthorized Data Access in AWS: Showca...
External threats are easy to comprehend for people outside of the security team, and therefore over-represented in business literature: a ‘hacker’ (portrayed as a dark silhouette behind a computer with a hoodie on, for some reason) bangs on the keyboard, probing your defenses until they find some sensitive info that was left public via misconfiguration. There’s sometimes sensitive data in that public bucket, but usually that...
November 17, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search