Back to Search Begin New Search Save Search Auto-Notify
Seeing Cyber Threats Over the Horizon
More visibility. Most (if not, every?) cybersecurity professional will tell you they need more visibility into the threat landscape, but also their own security posture. Join SANS Analyst, Jake Williams and Chas Clawson, CTO for security with Sumo Logic, as they talk about the importance of correlating security alerts across your entire cloud and on-prem environment, and enriching with threat intelligence and other feeds for context and improv...
November 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
A Preview of Azure Hacking from SEC560:...
Modern organizations are increasingly supporting the cloud. According to Microsoft, 95% of the Fortune 500 companies are using M365. A traditional pen test is incomplete without looking for insecurities in Azure, especially when hybrid Active Directory is in use. In this webcast, Tim Medin will walk through methods to enumerate users in Azure and how to attack the users in the cloud.
November 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Integrating Software Supply Chain Secur...
Sophisticated threat actors are turning to Software Supply Chain attacks to evade today’s defenses. Tactics include inserting malicious code into open-source repositories like npm and PyPi, developing attacks leveraging new software vulnerabilities, and infiltrating vendor development environments to insert malicious packages into their software solutions. In the last year, ReversingLabs observed a 289% increase in threats involving open...
November 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Put Yourself in Your Constituents’ Shoe...
To keep up with the growing demand for seamless digital services, state and local governments have turned to modern tools like cloud technology and artificial intelligence. With so many options available for modernization, how can agencies know which tools can best address their challenges? Journey analytics is a process that leverages data to map the constituent journey and pinpoint friction that hinders positive experiences. Utilizing data...
November 8, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Bridge the Infrastructure Gap with Arti...
Public infrastructure connects communities and supply chains, creating networks that support the daily business of governments and constituents. The bipartisan infrastructure bill signed into law last year allocates billions of dollars for infrastructure projects, with a specific focus on making infrastructure more resilient and more equitable. State and local governments can use modern tools powered by artificial intelligence (AI) to ensure...
November 7, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Importance of Defining Security Functio...
For years many practitioners in the ICS security community realized that guidelines and best practices around secure PLC programming practices were lacking. To address this problem, ICS security professionals in the community pulled together to develop the Top 20 PLC controls. Beyond these controls, however, it is essential to define abnormality detections to display the information on the HMI clients. This allows operations staff to respond t...
November 7, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Shrink the Attack Surface Solutions Forum
Discovering, identifying, inventorying, and assessing all digital assets — a continuous process known as Attack Surface Management (ASM) — is essential for organizations to secure their environment. After all, you can’t protect what you don’t know about. External threats, vulnerabilities, shadow IT, and cloud misconfigurations are a few critical areas that may sneakily pose risks to organizations. The goal for IT and se...
November 4, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Security Masterclass: Privilege Without...
With great power comes great responsibility. Privileged accounts are a necessary part of everyday IT operations, but managing them to date has been complex and costly with a lot of disruption to the business, so organizations only deploy solutions when they really have to e.g. compliance drivers. Join this webinar to learn: The hidden threats of unmanaged privilege accounts How managing the problem can be done surprisingly quickly Next genera...
November 3, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
A Diamond is an Analyst's Best Friend:...
Information security teams are responsible for detecting, analyzing and defending against malign influence and outside interference from foreign bad actors. But most of their current analytic frameworks are either oversimplified or overcomplicated. To keep up with the evolving threat of influence operations, security teams must monitor emerging tactics and develop effective countermeasures. The Diamond Model for Influence Operations is a meth...
November 3, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Sustainability is More Than a Buzzword:...
When governments and their constituents develop their community’s sustainability goals, they focus on green solutions to conserve energy and curb carbon emissions. Digital modernization efforts provide paths for agencies to achieve those same sustainability outcomes while also improving efficiency, service delivery and providing the platform to ensure the community continues on its evolution to sustainment. It’s true: The same too...
November 3, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search