Back to Search Begin New Search Save Search Auto-Notify
The Road Ahead for Biometrics and Ident...
Registration is Closed The 20th Annual FindBiometrics Year in Review comes to an end with a celebration of the hottest identity markets. Sessions are varied, with high level panels and interviews about finance, enterprise, border control, mobility, different modalities, and controversial topics like privacy.
February 15, 2023
Organizer: ChannelPro
Location: Webcast
Add Favorite
Getting Started with Fuzzing for Bug Di...
A lot of offensive security professionals have experience weaponizing simple vulnerabilities, but may not have worked much with bug discovery. Join Jim Shewmaker and Stephen Sims as they talk through fuzzing concepts and methodology, and then jump into a demonstration on setting up a modern fuzzing harness. What should you fuzz for? What types of fuzzing is there? How do you know if a bug is weaponizable? We’ll aim to answer these questi...
February 15, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
CIO's Future of Work Summit: The Employ...
Ignore Employee Experience at your Own Risk! Millennial, Gen Z and Gen X employees make up 75% of today’s workforce, and almost half don’t plan to stay more than two years at their current company. Is your business prepared to attract and retain younger workers looking for a better employee experience? Attend CIO’s Future of Work Summit to hear expert tips on creating meaningful roles, managing remote worker surveillance, aut...
February 15, 2023
Organizer: Foundry
Location: Webcast
Add Favorite
A Leader's Guide to Security Operations...
In The 2021 State of Enterprise Breaches, Forrester® found that enterprises spend a median of 37 days and a mean of $2.4 million to find and recover from a breach. Ensure your team is prepared for advanced threat actors. Join this fireside chat with Niall Browne, CISO at Palo Alto Networks, and guest speaker Allie Mellen, senior analyst at Forrester. They’ll candidly discuss digital transformation, SOC automation and tactical securit...
February 14, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS 2023 Application Security Solution...
Times are changing as we continue to innovate. We have moved from monolithic applications to microservices, APIs, serverless functions, and cloud services that are continuously changing and thus making them harder to secure.Traditional security solutions of the past have failed us and will not work with the latest technologies. During this solutions track, we will learn and focus on how to protect the next generation of applications. Presentat...
February 10, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
What Works in Improving End User Phishi...
Year after year successful phishing attacks on end users and system administrators are found to be the factor that enables over 80% damaging security incidents. This points out the need for two key security initiatives: replacing reusable passwords with multifactor authentication and making users less likely to fall for fraudulent messages. During this SANS What Works webcast,SANS Director of Emerging Security Trends John Pescatore interviews...
February 9, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS Cyber Security Leadership NOVA 202...
Security practitioners love to hear about cool new technologies, best practices, and things that work. But we often learn much more from failure than from success. With that in mind, this talk will cover my ten favorite “learning moments” from over 21 years of defending enterprise networks. I’ll cover epic fails in my time as a SOC analyst defending Pentagon networks, a project manager building 24/7 operations at the White Ho...
February 7, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
Importance of Signal Generator Phase No...
Webinar attendees will gain insights into performance required of an analog signal generator used in the three measurement applications and how to choose a signal generator with right signal purity for their needs. Webinar will show how using a signal generator with less than desired signal purity (phase noise and spurious) results in inaccurate measurement of ENOB or improper characterization of up/down converter performance. IT will also sho...
February 2, 2023
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
People First: A New Approach to Governm...
Increasingly, the threat landscape shows fewer high-volume, fully automated cyberattack campaigns and more low-volume, highly targeted attacks focused on specific people. That’s because people are the weakest link in cybersecurity, and attackers, understandably, are taking advantage. Quarter after quarter, research shows that more than 99 percent of cyberattacks are activated by the victim. Government agencies are seeing a rise in target...
February 2, 2023
Organizer: MeriTalk
Location: Webcast
Add Favorite
Cyber Threat Intelligence Summit Soluti...
Now more than ever, decision makers need actionable and contextualized threat intelligence to increase cyber resilience and to enable mission or business objectives. How can contextual threat intelligence (CTI) allow heads of cybersecurity departments, security strategists, CISOs, SOC managers, threat detection engineers, analysts, hunters, and responders, to make better strategic, operational, and tactical decisions? How can CTI allow organiz...
January 31, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search