Hands-On Workshop: Building Better Dete...
This is a 2 hour hands-on workshop. As with any enterprise environment, we can (and should) focus on hardening our defenses to keep the adversaries out, but these defenses may some day be evaded via a variety of methods. Cloud is no different. In this workshop, which is a follow-on from the talk “Building Better Cloud Detections... By Hacking? (Azure Edition)“, we will work through the process of creating a detection that we can us...
2023 Cyber Solutions Fest | Spring: Zer...
Zero trust is a cybersecurity concept, and implementation architecture, that emphasizes the need for strict verification of all devices, users, and networks before granting access to sensitive data and systems. Security teams love the idea of zero trust, but what goes behind implementing and successfully maintaining zero trust architecture? During this event, we'll bring together experts and industry leaders to discuss the latest developments...
2023 Cyber Solutions Fest | Spring: Ins...
The castle model is dead, it's time to move on. Protecting our corporations primarily from the outside looking in is a naive and inefficient approach. Prevention is great, but inevitably the defenses will fail, and the attackers are on the inside. Threats attacking us from the inside are real, and we can neither avoid it nor can we "trust our employees". While it would be nice to trust employees, and we can trust most of them, we need to be vi...
2023 SANS SOC Survey
In its sixth year, the SANS 2023 SOC Survey explored SOC capabilities, deployment architecture, technology use and satisfaction, capabilities outsourced and satisfaction with outsourced providers. With survey data from active SOC managers and analysts, this webcast will cover the escalating movement to the cloud, orchestration, and tool changes. It explores the developing promise of deception, AI and machine learning. Key topics will include c...
Enhancing OT Security: A Dual Perspecti...
Join us for a panel discussion presented by Emerson and Dragos, as they share their insights around OT cybersecurity as partners - while also depicting the unique expertise, experience, and responsibilities that they bring to the table to defend customer installations and environments together. Although the core focus of the conversation will be on DeltaV systems, a high-level overview of OT cybersecurity and the Industrial Control Systems (IC...
Docker Crash Course: How to Containeriz...
This two-hour workshop will introduce the student to Docker containers and images. During the workshop, we will create an image that contains the Command Line Interfaces for AWS, Azure, and Google Cloud as our example, but the same process would be followed for any Linux-based command line tool. During the session, we will build, test, and troubleshoot the creation of the Dockerfile and publish the image to Docker Hub. Next, we will set up Git...
2023 SANS SOC Survey
In its sixth year, the SANS 2023 SOC Survey explored SOC capabilities, deployment architecture, technology use and satisfaction, capabilities outsourced and satisfaction with outsourced providers. With survey data from active SOC managers and analysts, this webcast will cover the escalating movement to the cloud, orchestration, and tool changes. It explores the developing promise of deception, AI and machine learning. Key topics will include c...
2023 Architecting a Cloud Security Guar...
Security teams need to build consistent, reusable design patterns for cloud security controls that can be automated and maintained readily over time. Within cloud infrastructure, many controls can be provisioned and enabled ahead of time and operate autonomously in any deployment scenario. Commonly termed “guardrails,” these controls ensure that security capabilities are always enabled and operate within the context of deployments...
2023 SANS Survey: Breaking IT-OT Silos...
Operational technology (OT) cyber threats have evolved over the past decade. Combined with increased connectivity from digital transformation projects, it is more critical than ever to implement industrial control system (ICS)-specific visibility capabilities to quickly detect, respond, and recover from potential cyber incidents.To explore this topic, SANS conducted a survey to collect information around industry practices. In this webcast, Ce...
SANS 2023 Top New Attacks and Threat Report
This webcast takes a deep dive into the threats highlighted during the annual SANS keynote panel discussion at the RSA® Conference 2023. This webcast will include insight from SANS instructors Ed Skoudis, Heather Mahalik, Dr. Johannes Ullrich, and Katie Nickels on the dangerous new attacks techniques they see emerging. You’ll get actionable advice on the critical skills, processes, and controls needed to protect enterprises from thes...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.