Back to Search Begin New Search Save Search Auto-Notify
Simplify Cloud Shift with a Next-Gen SIEM
As organizations shift to the cloud, teams grapple with legacy security tools incapable of ingesting and combining data from hybrid environments for analysis. The result? Threat visibility gaps and lower SOC performance. Join this Devo lunch and learn session as we discuss: Ensuring analysts have visibility into the entire attack surface Keeping detections relevant during cloud shift and how access to all data sources provides relevant context...
March 23, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cybersecurity Metrics: The What, Why, a...
When it comes to security metrics, there are lots of variables. The company. The size and scale of that company. Measuring where things are at today and where you hope things will be in the future. Theres a lot at play, but one things for certain: Theres a laundry list of security metrics you could be measuring. So how do you know where to start? And once you have your foundation, whats next? Join Jake Munroe of Axonius for Cybersecurity Metri...
March 22, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Prevention of Phishing and Malware Dist...
Todays security operations centers (SOCs) do not have the time, energy, or resources to keep pace with the evolving threat landscape. Security teams need to be able to secure their organizations by doing more with less. This can be achieved with security orchestration, automation, and response (SOAR). Rather than being bogged down by arduous manual tasks, SOAR empowers your SOC by leveraging your existing people, processes, and technology to i...
March 22, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
How to Hunt with Zeek using Sigma Rules...
All facts are theory generated, and "truth" depends on what people collectively believe the truth to be. The prevalence of deception in human affairs is facilitated by an innate human desire for order, predictability, structure, and control. It is this tendency that makes us vulnerable to accepting vendor truths. By perpetuating vendor "truths", vendors assert their control over buyers and beyond. And unwittingly, folks are locked into paradig...
March 18, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Ransomware in Focus: How AI Stays One S...
As the world continues to endure ongoing global disruption, cyber-attackers have been constantly updating their tactics in light of emerging trends. According to MIT Technology Review, 121 million ransomware attacks were recorded in the first half of 2020, each one attempting to encrypt private data and extort payment for its release. The automated elements of these attacks, malware that moves faster than security teams can respond, is one of...
March 17, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
What If Security Vendors Told the Truth?
All facts are theory generated, and "truth" depends on what people collectively believe the truth to be. The prevalence of deception in human affairs is facilitated by an innate human desire for order, predictability, structure, and control. It is this tendency that makes us vulnerable to accepting vendor truths. By perpetuating vendor "truths", vendors assert their control over buyers and beyond. And unwittingly, folks are locked into paradig...
March 17, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search