Optimizing Security Operations Programs...
The goal of SecOps teams is to monitor, detect, investigate, and respond to suspicious activity and events. This often leaves them in a reactive state — with minimal opportunity to reduce false-positives and innovate. It doesn’t have to be this way, though. One key aspect of forward-looking, mature SecOps programs is the ability to gather context from data sources to inform — and expedite — investigations. In this sessi...
Limitless Data: Search everything, near...
It’s no surprise that security operations teams deal with tremendous amounts of data. Traditionally, storing this data in a way that will allow analysts to operationalise it, particularly over long periods of time, has proven to be costly due to the storage media required. We’ve also seen teams struggle when it comes to centralising security events across different physical locations or cloud regions/providers. In this webcast, we...
A SANS 2021 Report: DFIR Cloud Report:...
Cloud data is something that is always trending when it comes to data storage, privacy and access. Why is cloud so important? Who relies on it and what do they need to consider when selecting cloud repositories? Are there security concerns? What about personal vs. business cloud accounts? This webcast explores our 2021 report, "DFIR Cloud Report: Partly Cloudy with a Bunch of DFIR," which examines all you need to know about cloud data and why...
Google Cloud + CrowdStrike: Transformin...
In modern times companies face modern challenges, especially cybersecurity threats. To manage these threats, it is critical to ensure you have the right data. To get the right data your security technology needs to be optimized, giving you visibility into the right data. Join this webinar to understand how adapting a cloud-scale cybersecurity solution will accelerate your investigation and response capabilities. Hear from security experts, Dr....
Advance Your Security Posture with Comp...
On-premises, hybrid, and cloud operations have complicated the ongoing pursuit of network visibility, security, and incident response. Defense in depth or modularity of edge services and resiliency at the edge is reshaping the new remote workforce as companies deal with the changes in how network traffic flows and the increasing demands on the infrastructure. Although network visibility may be necessary for threat detection and investigation,...
Data First: Protect Your Organization F...
Your organization’s data represents both risk and reward. Data is necessary for business operations, but data is also easily susceptible to attacks. And unfortunately, protecting access to and integrity of their data is something organizations do not correctly prioritize. When implementing security controls, data security may not be the first place your security team considers. But you can bet adversaries will. Join SANS Instructor Matt...
Bridging the OT Data to Visibility Divide
Asset visibility, threat detection, and investigative playbooks are critical ICS/OT technologies in your defense against industrial adversaries. However, accessing the information that these technologies need can be a significant challenge for asset owners and operators, as this information is often located throughout your OT environment, including the lower layers of the OT architecture. To solve this problem, Network Visibility tools are use...
Achieving Data Privacy via Data Security
Data privacy is critical for every organization today Its a key component in many strict regulatory mandates, and also a subject of increasing attention from the public at large. Simply put, to avoid steep fines and attract and retain customers, organizations must ensure the privacy of all the sensitive data they process and store. But whats the best path to achieving that goal? Join this webcast with Jake Williams, Senior Instructor at SANS,...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.