SANS 2024 Top Attacks and Threats Report
The 2024 Top Attacks and Threats Report and webcast will once again dig deep into the emerging threats discussed during the annual SANS keynote panel discussion at the RSA® Conference 2024. SANS author and chair Domenica Crognale will discuss attacker trends and mitigation strategies and provide suggestions on how organizations can better position themselves to get ahead of these attacks. Topics will focus on: Briefing of the most dangerou...
AUSA Noon Report: MHS Genesis: Record M...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. Please join us on Tuesday, 30 July, at 12:00 PM EDT, to hear a presentation by Dr. Lester Martinez-Lopez, Assistant Secretary of Defense for Health Affairs. He will give a top-to-bottom rundown...
SANS 2024 Security Awareness Report | K...
The 2024 SANS Security Awareness Report equips you with essential insights to combat top cybersecurity threats and build a strong security culture. This year's report highlights the importance of dedicated security awareness teams, the rising threat of social engineering, and overcoming challenges like lack of time and staff. With data from over 1,000 practitioners across 70 countries, you can benchmark your program against global standards, f...
Enhanced Vendor Risk Assessments: Maxim...
This webcast supports content and knowledge from SEC547: Defending Product Supply Chains. Vendor risk assessments have been a cornerstone of security for years, but how effective are they? Join us for an in-depth presentation where we dive into the intricacies of vendor risk assessments and explore strategies to enhance your process. Key Topics Covered:Effectiveness of Traditional Assessments: Evaluating the real value of current practices.Ass...
Respond to Cyber Threats Like a Pro: In...
With the average data breach surpassing $4.45 million in 2023, local governments and state agencies must prioritize the development and implementation of effective incident response procedures. Implementing comprehensive incident response plans before a threat is detected can feel daunting given the time and financial investments required, but the investment will pay off tenfold when municipalities find themselves under a real attack. Join Gov...
Is Access to Corporate Resources from a...
In today's dynamic digital landscape, the need for secure and seamless access to corporate resources from any device, anywhere is paramount. Join SANS Senior Instructor Dave Shackleford and HPE’s Darren Tidwell for an insightful webcast where we dive into the modern threats and security challenges that organizations face, and how innovative solutions like SSE from HPE address these challenges head-on. HPE Aruba Networking SSE securely co...
Driving Financial Equity: Actionable St...
A growing number of people lack access to traditional banking services. Nearly 6 million U.S. households are considered unbanked, meaning they don't have checking or savings accounts. For agencies committed to providing the best services to all constituents, there are not many more important issues than addressing this gap. Providing alternatives to traditional banking serves a dual purpose in combating this issue. Expanding disbursement optio...
SANS 2024 SOC Survey: Facing Top Challe...
In 2024, the SOC Survey continued to explore the detailed aspects of cybersecurity operations centers. The survey collected information on organizations’ capabilities, and what is outsourced. On this webcast, SANS Senior Instructor Chris Crowley examines survey results to understand how SOCs are architectured, favorite and frustrating technologies, staffing, funding, threat intel, and automation. Register for this webcast now, and you wi...
Updates to the CJIS Security Policy - W...
The FBI Criminal Justice Information Services (CJIS) Security Policy sets the baseline security standards that both criminal justice and noncriminal justice agencies must adhere to in order to access and safeguard criminal justice information. Currently, this policy is undergoing a comprehensive modernization effort, introducing significant changes that will affect the entire CJIS community and their technology partners. Join the Center for Di...
Continuous Attack Surface Discovery and...
As the nature of our technology landscape changes more and more frequently, it’s challenging for many security operations teams to keep pace with the current threat surface we have on the internet, as well as the state of vulnerabilities and risks associated with these assets. Many security teams are performing vulnerability and web application scanning in a relatively ad hoc manner, and don’t truly have a continuous view of what e...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.