Spring Cyber Solutions Fest 2024: DevSe...
The idea of DevOps, the term the industry had initially decided on for the work between the Application and Operations teams, was coined 15 years ago. To give perspective, the iPhone 3GS came out that year. If we think of what we had to work with in 2009, we now know in hindsight that we have better options, solutions, software, and patterns. We have an iPhone 15; we no longer have BlackBerry OS or Nokia. Windows 8.1? I hope not. Here are a fe...
Spring Cyber Solutions Fest 2024: Attac...
In its fifth year, SANS Cyber Solutions Fest aims to brings together an ensemble of security professionals, solution providers, gurus and experts ready to share knowledge about the latest developments and innovative technologies in the cybersecurity industry. Join the attack surface & vulnerability management track to hear from chairperson Matt Bromiley and a host of leading cyber security experts as they walk through specific use cases an...
What You Need to Know about the NIS II...
Come and learn from ENISA, the European Union's Agency for Cybersecurity), about the NIS2, the EU's cybersecurity legislation, which will come into force this year across all the EU's critical sectors. This seminar will help you get ready for the NIS2 incident reporting and security measures requirements, what NIS2 will mean for organizations doing business in the European Union, and what skills you may need to implement the NIS2. This online...
Conquer Any Cybersecurity Challenge: Th...
The public sector faces unique challenges around enhancing security and streamlining operations – and it can be difficult to address these issues due to resource constraints, increasingly complex environments, a rise in cyberattacks and data overload. Luckily, emerging technologies are helping to change this. Explore the tools that can help organizations improve attack surface visibility, automate repetitive manual tasks and provide anal...
SANS AI Cybersecurity Forum: Insights f...
The SANS Faculty, experts and practitioners in cybersecurity, have been working to build and enhance the AI-driven cybersecurity landscape. In this forum, you will get a unique opportunity to hear firsthand accounts of how they utilize the power of Artificial Intelligence and Machine Learning to make significant advancements in cybersecurity. Our experienced experts will provide valuable insights, strategies, and practical solutions to help yo...
Do You Know Where Your Data Is
Data can end up in the unlikeliest of places, even for those organizations that have developed formal data governance policies and implemented technical controls to (try to) keep data in central data stores. Especially troublesome is data stored and worked with on user endpoints—workstations, laptops, devices—such as original unstructured files or containing data extracted from structured data sources. With this survey, SANS is see...
Securely Moving to the Government Cloud
The cloud has changed infrastructure for all organizations and Federal agencies are no exception. However, it’s not as easy as simply “flipping the switch” because there are a myriad of regulatory requirements and considerations to navigate, and it requires careful planning and implementation. Join us on April 25, 2024, at 3:30 ET where SANS analyst Matt Bromiley and Cisco’s Technical Marketing Engineer, Christian Claus...
Cyber Resiliency for Critical Infrastru...
The nation’s critical infrastructure is more connected and automated than ever before – and cyberattacks continue to rise. One recent study showed a 140% increase in cyberattacks on critical infrastructure in 2022. State and local cybersecurity leaders must be prepared. These attacks don’t just threaten security and data privacy – they can impact the economy, transportation networks, crucial government facilities and ut...
SANS Baltimore Spring 2024: Keynote - S...
In the field of cybersecurity, we are failing to acknowledge that we have a big problem. Our job titles and job descriptions have the word security in it even though security isn’t our job. I have never met a security professional who claims that their organization will never be breached. Yet, we call ourselves security? When a breach does occur, it reflects poorly on us. Did it mean we did our jobs poorly that day? Let’s have the...
What Tech Does Your Data Science Team N...
When it comes to data modeling and analysis, a professional data science workstation is a world away from the standard PC. Today’s data scientists need the latest technology to work faster and smarter to maximize the extraordinary potential of machine learning. Join Government Technology and HP for a live webinar exploring how to equip data science teams with the technology they need to accelerate data analytics and machine learning. You...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.