Different Sides of the Same Coin: The D...
There is sometimes a difference of opinion as to where the practice of digital forensics belongs in terms of occupational domains. Some say that it is a forensic science domain, other say that it is a cybersecurity domain. I believe it can be both, depending on what the end use of the digital forensic process is. Nowhere is this truer that in incident response. Incident response is generally a well understood process where organisations respon...
Forensics and Security Investigations i...
Amazon Web Services, Microsoft Azure, and Google Cloud Platform combined currently hold a bit over 50% of the worldwide cloud market. But what about the other half? Large corporations with a global presence or a local enterprise might find that a niche cloud provider better meets their needs. Alibaba Cloud's, IBM Cloud's, and Oracle Cloud's market share are not that far behind GCP, and you might find yourself on one of these platforms while yo...
The Internet Storm Center: How to Use a...
For about 20 years, the Internet Storm Center has offered terabytes of data to the community to help you understand attacks you are seeing and assist you in augmenting your logs or, as we often put it, "add color" to your network logs. In this keynote, we will introduce some of our volunteer handlers who contribute their insight in daily diaries (you will also learn why we call it a "dairy" and not a "blog"). In addition, we will walk you thro...
Low SWAP Multifunctional Electronic War...
"With today’s increasingly sophisticated threats in the global defense battlefield and the proliferation of Anti-Access/Area Denial (A2/AD), technology must rise to meet the challenge of complex missions – particularly for those operating across the electromagnetic spectrum. These missions call for ‘smart’ systems that address multiple threats and perform simultaneous functions, meaning that they need to be adaptive, mu...
GSAXcess (Federal Surplus Property)
A great place to start looking for products is GSAXcess. GSAXcess is the civilian Federal surplus property site, Through GSAXcess.gov your organization may be able to acquire surplus property at low to no cost. For more information please contact your State Agency for Surplus Property (www.gsa.gov/sasp) or check out ourState and Local site. For information related to tribal governments please visit our Native American site.
Vulnerability Management: Finding Context
Do you ever run into problems with your vulnerability management program that you wished you had at your fingertips just one more little piece of information? To help conduct some prioritization, or to know who the business owner is, or to inform people this was an end of life system… All valuable and great to have readily available. But alas, we often are missing information, or it is not easy to access. Join Jonathan (MGT516 co-author...
Effortless IT Operations for the Modern...
Implementing a continuous monitoring strategy is critical for improving system visibility and security. However, there are challenges in achieving visibility with widely diverse environments and endpoints. Additionally, using a disparate set of tools – in on-premises and cloud environments and with remote clients – has proven enormously difficult in the past several years. Fortunately, there are many more options available today th...
Cognitive Electronic Warfare: An Artifi...
This webinar will present an overview of how AI can be used in EW. Dr. Haigh will describe opportunities for using AI in situation assessment and electronic support (ES), and decision-making techniques for electronic protect (EP), electronic attack (EA), and electronic battle management (EBM). Haigh will present AI techniques from Situation Assessment, Decision Making, and Machine Learning, and discuss tradeoffs. Haigh will describe approaches...
Cognitive Electronic Warfare and Reinfo...
Cognitive Electronic Warfare (EW) systems are of critical importance to the future of EW, but despite this the underlying technologies are poorly understood. The goal of this webinar is to outline the architecture of modern cognitive EW systems, and the relevant technologies. Specifically, how Reinforcement Learning works, using a variety of mechanisms to develop a sense, act, reward cycle to explore the solutions space. The webinar will concl...
Vulnerability Management: Leveraging Context
So you have a vulnerability management program. Great. Excellent. But are you able to let the management team know if it is being effective or not? In this final Vulnerability Management series webcast, join Jonathan (MGT516 co-author and SANS certified Instructor) as he discusses how to show your program is being effective through metrics and measures. He will discuss metrics that a new program can start creating and generating on day 1 as we...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.