339 past events found
+ 31 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Unauthorized Data Access in AWS: Showca...
External threats are easy to comprehend for people outside of the security team, and therefore over-represented in business literature: a ‘hacker’ (portrayed as a dark silhouette behind a computer with a hoodie on, for some reason) bangs on the keyboard, probing your defenses until they find some sensitive info that was left public via misconfiguration. There’s sometimes sensitive data in that public bucket, but usually that...
November 17, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS 2021 Ransomware Detection and Inci...
Ransomware attacks have become some of the most prolific and public intrusions over recent years. Within a matter of hours, organizations can go from normal operations to having an inoperable network and being extorted for tens of millions of dollars. On this webcast, SANS instructor and author Matt Bromiley, as well as sponsor representatives, will share their thoughts on modern detection and response techniques for ransomware breaches.
November 16, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cyber42 Game Day: Ransomware
Join us for this NEW VERSION of Cyber42 on the hot topic of ransomware. This version of the game represents how a fictional organization responds to a ransomware event against the organization. Responses to ransomware events require not only managing the event but also the expectations of key stakeholders and external parties. Interactive. 90-minutes long. Play to win! Who Should Attend: Chief Information Security Officers Information security...
November 16, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Data Security Solutions Forum
To be effective, data protection has to be everywhere, from the server to the endpoint, at the office and at home, throughout the cloud and across the web. A company's system must be able to detect data leakage from any path, quickly apply real-time data protection policies, automate incident workflows, and alert the IT team as needed for further investigation. Having an effective understanding of how and where a company's data is stored is es...
November 12, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Creating Resiliency in Third Party Risk...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. In addition to the challenge brought on by the global pandemic, civil and social unrest, and a contentious political climate, organizations are also experiencing a massive spike in cybersecurity attacks related to their use of third parties ("Solargate"). This environment is systemically increasing the level of difficulty facing cybersecurity profes...
April 13, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Taking a Behavioral Approach to Securit...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. Join LogPoint's Jake McCabe as he discusses how thinking about security from the perspective of adversary behavior can help organizations better prepare for, detect, and respond to threats. Too often, security organizations focus on signatures and IOCs to alert them to threats in their environment, however this myopic focus can often leave them blin...
April 7, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Detecting and Preventing Vulnerabilitie...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. The adoption of cloud native technologies such as containers, microservices, and immutable infrastructure requires declarative, automated security controls. To keep up with the pace of development, we need to detect and prevent platform vulnerabilities early in the development lifecycle before they can be introduced into the runtime environment. In...
April 1, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Hybrid Security: Protecting Your Supply Chain
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. Recent supply chain attacks have proven that third parties are an unexpected, yet trusted, entry vector into an organization. By utilizing legitimate methods to breach an organization, threat actors can hide under the radar with escalated privileges. Furthermore, attackers have shown that they are security-savvy, knowledgeable of enterprise defense...
March 31, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
How to Implement a DevSecOps Culture in...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. A conversation with Chaim Mazal, ActiveCampaign CISO, on his teams journey to DevSecOps Modern development practices have forced organizations to combine development and IT operations under one DevOps umbrella in order to build and release code at a faster rate than ever before. However, due to this newfound developer agility, as well as the widespr...
March 31, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
What You Don’t Know About Vendor Risk M...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. "If your company were to get breached, there is a 70% probability it will be through one of your Vendors. If it is Protected Health Information, PHI, that gets exfiltrated, the fines will run into the millions of dollars, including loss of reputation, market share, and loss of revenue. You do not want to be the person that failed in their due dilige...
March 31, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search