Back to Search Begin New Search Save Search Auto-Notify
Cyber Solutions Fest: Level Threat Hunt...
Every year at major security conferences, you can tell the trends in security because seemingly every product and service is being positioned as look at how we make things easier/cheaper/better. A few years ago, that was cyber threat intelligence (CTI). Then, it inexplicably changed to threat hunting. But practitioners know that you cant really separate threat hunting and threat intelligence any more than you can separate logs from a SIEM. Jus...
October 21, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cyber Solutions Fest: Level Cloud Security
As more organizations shift to using a wide variety of cloud services, the nature of many security controls weve relied on is changing, and in some cases vanishing. With the new threat surface cloud brings, theres a definitive need for new, more cloud-friendly security tools and services that can help align with SaaS, PaaS, and IaaS deployments across all business cases. The focus we need to look at is what comes next in Cloud Security. Cyber...
October 21, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
A SANS 2021 Report: DFIR Cloud Report:...
This year's report, "DFIR Cloud Report: Partly Cloudy with a bUnch of DFIR," sought answers to some enduring questions, including: Why is cloud so important? Who relies on it and what do they need to consider when selecting cloud repositories? Are there security concerns What about personal vs. business cloud accounts? On this webcast, sponsor representatives will join the author to offer their answers to those questions, as well as share thei...
October 20, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Enriching Security Visibility with a Sc...
Visibility is considered the basis of progress as it enables monitoring and optimizing security improvements. However, the way most organizations currently approach visibility is insufficient. Advanced security teams are measuring visibility and predicting risks related to assets using scientific methodologies. At the base of such approach is a shift from thinking in ‘assets at risk’ to ‘attack graphs’, and from ...
October 18, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Next-Generation Cybersecurity for Buildings
Today’s buildings do more than provide a comfortable place for people to live, work, or play. To enable the occupants and owner to enjoy a safe, secure, cost-effective environment, they have become part of a new fabric that integrates people, technology, lifestyle, and sustainability. In this webcast, Michael Chipley, Tim Conway, and Fortinet’s Richard Peters explore how the rapidly changing “building” concept has ramif...
October 14, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
A SANS 2021 Report: DFIR Cloud Report:...
Cloud data is something that is always trending when it comes to data storage, privacy and access. Why is cloud so important? Who relies on it and what do they need to consider when selecting cloud repositories? Are there security concerns? What about personal vs. business cloud accounts? This webcast explores our 2021 report, "DFIR Cloud Report: Partly Cloudy with a Bunch of DFIR," which examines all you need to know about cloud data and why...
October 13, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Raspberry Pi Sensors for Home Networks
Is your IoT dryer transferring 1GB+ of traffic daily? Does your Tesla phone home to the mothership? Is your employer monitoring you at home? Learn a quick, easy, free method for using a Raspberry Pi to gain visibility into your home network with Corelight. We'll teach you to find out what your smart (and not-so-smart) devices are doing using ZeekⓇ logs and Suricata alerts ' two flagship open source technologies ' skills transferable to y...
October 12, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Real World Network Forensics Episode 2:...
In this webinar series, Jake Williams takes a hands-on approach to forensics packet analysis, using real-world examples to demonstrate how to analyze network packet data to uncover and investigate threats. The series takes a protocol-by-protocol approach. It is an ideal introduction to packet forensics for beginners and a great source of expert tips and tricks for more experienced security analysts. In this episode Jake takes a deep-dive into...
October 12, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Scale Up Threat Detection, Scale Down F...
The cloud vendors offer hundreds of cloud services your team may be using. How can you identify threats across these services without drowning in a sea of alerts? Visibility across all services is a first step, combined with a highly tuned detection engine. A small number of attack patterns are present in most breaches. For example, lateral movement is estimated to be present in 70% of cyberattacks. Cloud native intrusion detection provides a...
October 11, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
THIR Summit Solutions Track
Theres a high chance that hidden threats already exist inside your organization's networks. No matter how thorough and sophisticated an organizations security precautions may be, it cannot assume that its security measures are impenetrable. By themselves, prevention systems are insufficient to counter focused human adversaries who know how to get around today's advanced security and monitoring tools. It takes highly skilled and focused hunters...
October 8, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search