129 past events found
+ 1 upcoming event found
Back to Search Begin New Search Save Search Auto-Notify

View Full Calendar

Upcoming Events

Location + Refine Your Search

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

Blue Team Summit & Training 2021
Defending against attacks is an ongoing challenge with new threats emerging all the time. Do you want to enhance your current skill set and become even better at defending your organization? Are you looking for the latest ways to mitigate the most recent attacks? The blue team represents information security professionals on the front line of defending anorganization’s critical assets and systems against attacks and threats from adversar...
September 9-18, 2021
Organizer: SANS
Location: Virtual
Add Favorite
Creating Resiliency in Third Party Risk...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. In addition to the challenge brought on by the global pandemic, civil and social unrest, and a contentious political climate, organizations are also experiencing a massive spike in cybersecurity attacks related to their use of third parties ("Solargate"). This environment is systemically increasing the level of difficulty facing cybersecurity profes...
April 13, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Taking a Behavioral Approach to Securit...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. Join LogPoint's Jake McCabe as he discusses how thinking about security from the perspective of adversary behavior can help organizations better prepare for, detect, and respond to threats. Too often, security organizations focus on signatures and IOCs to alert them to threats in their environment, however this myopic focus can often leave them blin...
April 7, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Detecting and Preventing Vulnerabilitie...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. The adoption of cloud native technologies such as containers, microservices, and immutable infrastructure requires declarative, automated security controls. To keep up with the pace of development, we need to detect and prevent platform vulnerabilities early in the development lifecycle before they can be introduced into the runtime environment. In...
April 1, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Hybrid Security: Protecting Your Supply Chain
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. Recent supply chain attacks have proven that third parties are an unexpected, yet trusted, entry vector into an organization. By utilizing legitimate methods to breach an organization, threat actors can hide under the radar with escalated privileges. Furthermore, attackers have shown that they are security-savvy, knowledgeable of enterprise defense...
March 31, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
How to Implement a DevSecOps Culture in...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. A conversation with Chaim Mazal, ActiveCampaign CISO, on his teams journey to DevSecOps Modern development practices have forced organizations to combine development and IT operations under one DevOps umbrella in order to build and release code at a faster rate than ever before. However, due to this newfound developer agility, as well as the widespr...
March 31, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
What You Donít Know About Vendor Risk M...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. "If your company were to get breached, there is a 70% probability it will be through one of your Vendors. If it is Protected Health Information, PHI, that gets exfiltrated, the fines will run into the millions of dollars, including loss of reputation, market share, and loss of revenue. You do not want to be the person that failed in their due dilige...
March 31, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Supercharge your SIEM Capabilities with...
Log data is critical for understanding how systems are operating and for monitoring malicious activity with the IT environment. This is particularly true for traditional systems as well as modern systems in the midst of a digital transformation that lack an audit trail, such as multi-cloud and DevOps environments, microservices, and containers. The technologies and trends organizations embrace as they accelerate their transformation all increa...
March 26, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Neutralizing Breach Paths with Cyber Th...
Nearly 2 billion records were exfiltrated in recent cloud breaches. Can breach paths be detected even before clouds are built? Learn how DevSecOps processes can predict breach paths programmatically using threat models derived from cyber threat intelligence, MITREs ATT&CK framework, and Infrastructure as Code. This session includes specific code examples for common IaC technologies. *To attend this webcast, login to your SANS Account or cr...
March 24, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
From EDR to XDR: How to Drive Faster Th...
The increasing complexity of the threat landscape means we can no longer depend on a "business as usual" approach to endpoint security. Antivirus or EDR (Endpoint Detection and Response) used in isolation may not be the most efficient recourse to protect against today's sophisticated attacks. The good news is that there is a way to get more from our endpoint security with less effort, it's called eXtended Detection and Response (XDR). XDR reco...
March 24, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search