25 past events found
Back to Search Begin New Search Save Search Auto-Notify
AI in XDR: What it Means and Where it Fits
Detecting, investigating, and stopping advanced cyberattacks at speed and scale is becoming increasingly unsustainable, thanks to the complex technology SOC teams must rely on. In the face of an ever-expanding attack surface, highly evasive and emerging attacker methods, and an increasing SOC analyst workload, SOC teams are struggling—and threat detection is suffering. Join SANS Senior Instructor Dave Shackleford and Vectra AI’s CT...
December 7, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
2023 Survey Event | Vulnerability Manag...
This year’s Vulnerability Management Survey webcast event will look at how focus has improved or changed within organizations as they build out and mature more holistic vulnerability management programs. By looking at the maturity data from the last two years, we will get a better understanding of where companies are focusing and where they are struggling. These insights will help shed light on what respondents believe are the best paths...
November 15, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
Frameworks, Tools and Techniques: The J...
Just how effective or mature is your security program? Given the multitude of assessment, rating, and cybersecurity frameworks, it can be challenging to determine security operations readiness and resilience through a single measurement or framework. Is effectiveness based on defending against an attack or the ability to mitigate attacks in the first place? Should compliance drive our security strategy, or should our security strategy enable c...
November 9, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS Cyber Compliance Countdown
As we head into the last quarter of 2023, three major mandate changes are occurring, each positioned to make a large impact on how businesses, governmental bodies, and critical sector organizations operate. The goal of the SANS Cyber Compliance Countdown is to focus on what you need to know in these complicated and broad requirements and to offer solutions on how to meet these directives. Below is a quick overview of the changes and this forum...
November 2, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cyber Solutions Fest 2023: Threat Hunti...
Going from responding to incidents to actively hunting threats is a stance shift that requires maturity in your cybersecurity journey. It also requires having access to the right threat intelligence, the right visibility across your environment, as well as the right tools to do the job. Advances in data science and artificial intelligence can help organizations bridge the maturity gap, but we shouldn’t forget that it’s ultimately a...
October 27, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
No More Acronyms – Let’s Solve Problems...
It seems like a new IT or cybersecurity acronym is born every two days, but no one wakes up saying, “I need to solve my XMPFSCLR problem.” Instead, IT and security teams have to translate acute, urgent challenges into industry category-speak just to understand what tools can solve their problems. In this webinar, we’ll deconstruct two distinct and growing categories – Cyber Asset Attack Surface Management (CAASM) and Sa...
October 5, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
Hands-On Workshop: Avoiding Data Disast...
It appears that every few months, there's news of yet another cloud breach stemming from a carelessly configured cloud storage solution. While this isn't the default for most cloud vendors, some users still manage to make their cloud data publicly accessible by going out of their way - sometimes to a significant extent. Whether it's out of ignorance or convenience, it doesn't matter - this practice must come to an end. To address this issue, w...
September 6, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
The Future of Log Centralization for SI...
For many years, security professionals have advocated the approach of collecting logs from all the places where they’re generated and centralizing them into one or only a few places.But now, we have much more data and many more sources of security telemetry, including from endpoints, networks, email, IAM, SaaS applications, and cloud assets in multi-cloud infrastructures.Does centralizing log data still make sense, or should we be thinki...
August 22, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
Commonalities of Salt and Security Culture
Salt brightens food flavors and balances tastes such as sweetness, acidity, and bitterness. And like water, it is a necessity for life. However, if you went to a restaurant and they brought out your meal with a huge pile of salt on the side, it wouldn't be a great experience; especially if you had to eat all the salt at once. The salt would be unpleasant in and of itself leaving the actual meal bland and unappetising. Delicious food has the ri...
July 12, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS Security Leadership New Orleans 20...
Running a SOC is a complex combination of data sources, processes, and teamwork, and it's easy to get lost in the details. In this keynote we'll step back to think big picture about what a SOC truly needs to deliver and present some simple mental models that cyber security analysts and managers can use to abstract away complexity and gain clarity on their true priorities. We'll discuss SOC goals, workflow, how to gather those important but "ha...
May 8, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search