Back to Search Begin New Search Save Search Auto-Notify
Learn How to Find Security Threats Befo...
Every network has a security vulnerability. Vulnerabilities obviously lead to threats. Do you know where your vulnerabilities and any hidden threats are located? With major security breaches happening every year to businesses and government agencies of every type, don't you want to find (and fix) your network BEFORE a hacker finds and exploits the weakness? In this webinar, we explain what you need to do to actually protect yourself from vulne...
February 1, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
ICS Proactive Defense | Leveraging Oper...
Threat hunting in ICS environments must consider safety. IT and ICS systems have different missions, objectives, impacts during an incident, and different assets like embedded operating systems, and engineering devices speaking non-traditional industrial protocols. Adversaries targeting ICS must use different attack tactics and techniques for access, execution, collection, and persistence, etc., to degrade safety, manipulate control, damage ph...
January 31, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Enterprise Data & AI: Lessons From the...
As machine learning expands and larger organizations begin deploying across bigger teams, the need to efficiently operationalize becomes critical for enterprises. In our discussions with leading organizations utilizing ML like The RealReal and Uber, we have compiled real-world case studies and organizational best practices for MLOps in the enterprise. Join us for a discussion where we'll explore the benefits of MLOps and discuss when and how t...
January 27, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
2022 - FAR Department Supplement - Defense
FAR Agency & Department Supplement - Webinar SeriesComplimentary & Recorded Find recordings on our website and YouTube ChannelSponsorships available at hello@jenniferschaus.com
January 26, 2022
Organizer: Jennifer Schaus & Associates
Location: Webcast
Add Favorite
AI in Government - Using AI/ML to Advan...
While NOAA has achieved local successes in applying AI, a central entity to coordinate activities across NOAA will enable it to more effectively integrate AI in all NOAA’s mission areas. Successful AI integration requires both domain knowledge and modern AI technologies. It requires careful stewardship with domain knowledge since many of the challenges NOAA faces are constrained by physical principles. The NCAI is an essential component...
January 20, 2022
Organizer: Cognilytica
Location: Webcast
Add Favorite
Streamline Your Enterprise Security wit...
Effective security requires a holistic and streamlined approach to endpoint detection and response across the entire organization. For complex enterprises with various types of assets, extended detection and response (XDR) provides comprehensive security while also delivering integrated endpoint protection. XDR unites and correlates visibility across assets, uncovers vulnerabilities, and detects threats with cross-data analytics. It takes inci...
January 20, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS 2022 ATT&CK and D3FEND Report: Inc...
For many years, organizations have relied on the MITRE ATT&CK™ framework as a valuable resource to catalog adversary tactics and techniques. The information security community has leveraged ATT&CK to help guide investigations, write robust detections, and enrich threat intelligence. In June 2021, a cooperation between the National Security Agency (NSA) and MITRE released D3FEND, a complementary framework that provides insight int...
January 19, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
How SMBs Can Benefit from the Security...
Small-to-medium businesses (SMBs) often operate with limited security budgets. Consequently, they need to take advantage of any built-in security features of programs they already use to maximize their protections. In this webcast, SANS Senior Instructor Jake Williams and a representative from Microsoft look at the core security features in the operating systems of Windows 11 and their potential benefit to SMBs. They will explore: how the plat...
January 18, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cloud Security for Dummies
Let's take a moment to break down a few things at a basic level: What is the cloud? How does it work? How do you begin to secure it? This webcast is for you if: You are just starting out in cloud More of your duties are shifting to the cloud You simply want to have a better understanding of what the cloud is and how cloud security works
January 18, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Container and Kubernetes Security Best...
Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly. On average, containers live less than 5 minutes, so having a cloud native incident response plan is critical.In this webinar we’ll cover: Detecting threats using security frameworks like MITRE Best practices to streamline your incident response workflow in container and...
January 14, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search