Back to Search Begin New Search Save Search Auto-Notify
Emergence of a New Anti-Ransomware Tech...
Regardless of the growing investment in cybersecurity, damage from cyber attacks continues to rise at an unprecedented rate, reaching over $10T by 2025. If existing solutions are supposedly working, then why are ransomware breaches happening and inflicting so much financial devastation, brand erosion and loss of business? The problem is that today’s solutions fail to counter threat actors’ advanced attacks. Antivirus and endpoint...
February 15, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS San Diego 2022
Practical Cyber Security Training Taught by Industry ExpertsAttend in San Diego, CA or Live Online Learn cybersecurity techniques crucial to combating today’s cyber threats. Join us for SANS San Diego 2022 (February 7-12), and experience immersive information security training you can use immediately. Choose your course and register now for hands-on training taught by top industry practitioners. SANS San Diego 2022 Features In-Person or...
February 7-12, 2022
Organizer: SANS Institute
Location: San Diego, CA
Add Favorite
Learn How to Find Security Threats Befo...
Every network has a security vulnerability. Vulnerabilities obviously lead to threats. Do you know where your vulnerabilities and any hidden threats are located? With major security breaches happening every year to businesses and government agencies of every type, don't you want to find (and fix) your network BEFORE a hacker finds and exploits the weakness? In this webinar, we explain what you need to do to actually protect yourself from vulne...
February 1, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
ICS Proactive Defense | Leveraging Oper...
Threat hunting in ICS environments must consider safety. IT and ICS systems have different missions, objectives, impacts during an incident, and different assets like embedded operating systems, and engineering devices speaking non-traditional industrial protocols. Adversaries targeting ICS must use different attack tactics and techniques for access, execution, collection, and persistence, etc., to degrade safety, manipulate control, damage ph...
January 31, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cyber Threat Intelligence Summit Soluti...
Threat Intelligence can be defined as the ‘Art of Taking the Adversary by Surprise’. Yes, anticipating and mitigating surprises in the form of cyberattacks is the primary mission of a practical threat intelligence program. Achieving that goal requires a proactive approach, one that provides answers to critical questions like: What threat actors are most likely to cause an impact in my organization? What are their motivation, goals,...
January 28, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cyber Threat Intelligence Summit 2022
At this year’s Cyber Threat Intelligence Summit, you’ll have the chance to learn, connect, and share with thousands of cybersecurity professionals in attendance from around the globe. No matter your background or skill level, you’ll walk away from CTI Summit with interesting perspectives and case studies that challenge CTI assumptions and result in a shift in your understanding. Register now to enjoy: Two Days of Highly Techn...
January 27-28, 2022
Organizer: SANS Institute
Location: Virtual
Add Favorite
Modernizing Security Operations Survey
Security operations are the epicenter of the cybersecurity industry. SecOps is where the metaphorical rubber meets the road for organizations defending their enterprises. Security Governance Risk & Compliance (SGRC), Security Application Development, Security Engineering, and all respective cybersecurity functions overlap to enable Security Operations Centers to respond to the threat. These teams hold the line, 24/7 through nights, weekend...
January 26, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Streamline Your Enterprise Security wit...
Effective security requires a holistic and streamlined approach to endpoint detection and response across the entire organization. For complex enterprises with various types of assets, extended detection and response (XDR) provides comprehensive security while also delivering integrated endpoint protection. XDR unites and correlates visibility across assets, uncovers vulnerabilities, and detects threats with cross-data analytics. It takes inci...
January 20, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS 2022 ATT&CK and D3FEND Report: Inc...
For many years, organizations have relied on the MITRE ATT&CK™ framework as a valuable resource to catalog adversary tactics and techniques. The information security community has leveraged ATT&CK to help guide investigations, write robust detections, and enrich threat intelligence. In June 2021, a cooperation between the National Security Agency (NSA) and MITRE released D3FEND, a complementary framework that provides insight int...
January 19, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
How SMBs Can Benefit from the Security...
Small-to-medium businesses (SMBs) often operate with limited security budgets. Consequently, they need to take advantage of any built-in security features of programs they already use to maximize their protections. In this webcast, SANS Senior Instructor Jake Williams and a representative from Microsoft look at the core security features in the operating systems of Windows 11 and their potential benefit to SMBs. They will explore: how the plat...
January 18, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search