Back to Search Begin New Search Save Search Auto-Notify
Different Sides of the Same Coin: The D...
There is sometimes a difference of opinion as to where the practice of digital forensics belongs in terms of occupational domains. Some say that it is a forensic science domain, other say that it is a cybersecurity domain. I believe it can be both, depending on what the end use of the digital forensic process is. Nowhere is this truer that in incident response. Incident response is generally a well understood process where organisations respon...
July 11, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Forensics and Security Investigations i...
Amazon Web Services, Microsoft Azure, and Google Cloud Platform combined currently hold a bit over 50% of the worldwide cloud market. But what about the other half? Large corporations with a global presence or a local enterprise might find that a niche cloud provider better meets their needs. Alibaba Cloud's, IBM Cloud's, and Oracle Cloud's market share are not that far behind GCP, and you might find yourself on one of these platforms while yo...
July 11, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
The Internet Storm Center: How to Use a...
For about 20 years, the Internet Storm Center has offered terabytes of data to the community to help you understand attacks you are seeing and assist you in augmenting your logs or, as we often put it, "add color" to your network logs. In this keynote, we will introduce some of our volunteer handlers who contribute their insight in daily diaries (you will also learn why we call it a "dairy" and not a "blog"). In addition, we will walk you thro...
July 12, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Low SWAP Multifunctional Electronic War...
"With today’s increasingly sophisticated threats in the global defense battlefield and the proliferation of Anti-Access/Area Denial (A2/AD), technology must rise to meet the challenge of complex missions – particularly for those operating across the electromagnetic spectrum. These missions call for ‘smart’ systems that address multiple threats and perform simultaneous functions, meaning that they need to be adaptive, mu...
July 14, 2022
Organizer: Association of Old Crows (AOC)
Location: Webcast
Add Favorite
GSAXcess (Federal Surplus Property)
A great place to start looking for products is GSAXcess. GSAXcess is the civilian Federal surplus property site, Through GSAXcess.gov your organization may be able to acquire surplus property at low to no cost. For more information please contact your State Agency for Surplus Property (www.gsa.gov/sasp) or check out ourState and Local site. For information related to tribal governments please visit our Native American site.
July 14, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Vulnerability Management: Finding Context
Do you ever run into problems with your vulnerability management program that you wished you had at your fingertips just one more little piece of information? To help conduct some prioritization, or to know who the business owner is, or to inform people this was an end of life system… All valuable and great to have readily available. But alas, we often are missing information, or it is not easy to access. Join Jonathan (MGT516 co-author...
July 20, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Effortless IT Operations for the Modern...
Implementing a continuous monitoring strategy is critical for improving system visibility and security. However, there are challenges in achieving visibility with widely diverse environments and endpoints. Additionally, using a disparate set of tools – in on-premises and cloud environments and with remote clients – has proven enormously difficult in the past several years. Fortunately, there are many more options available today th...
July 26, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cognitive Electronic Warfare: An Artifi...
This webinar will present an overview of how AI can be used in EW. Dr. Haigh will describe opportunities for using AI in situation assessment and electronic support (ES), and decision-making techniques for electronic protect (EP), electronic attack (EA), and electronic battle management (EBM). Haigh will present AI techniques from Situation Assessment, Decision Making, and Machine Learning, and discuss tradeoffs. Haigh will describe approaches...
July 28, 2022
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Cognitive Electronic Warfare and Reinfo...
Cognitive Electronic Warfare (EW) systems are of critical importance to the future of EW, but despite this the underlying technologies are poorly understood. The goal of this webinar is to outline the architecture of modern cognitive EW systems, and the relevant technologies. Specifically, how Reinforcement Learning works, using a variety of mechanisms to develop a sense, act, reward cycle to explore the solutions space. The webinar will concl...
September 8, 2022
Organizer: Association of Old Crows (AOC)
Location: Webcast
Add Favorite
Vulnerability Management: Leveraging Context
So you have a vulnerability management program. Great. Excellent. But are you able to let the management team know if it is being effective or not? In this final Vulnerability Management series webcast, join Jonathan (MGT516 co-author and SANS certified Instructor) as he discusses how to show your program is being effective through metrics and measures. He will discuss metrics that a new program can start creating and generating on day 1 as we...
September 14, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search