982 past events found
Back to Search Begin New Search Save Search Auto-Notify
A SANS 2021 Survey: Threat Hunting in U...
In the past year, businesses have been continually under pressure yo increase efficiency and keep costs down in the lead-up to recovering while economic conditions are still evolving. This webcast explores the results of our 2021 Threat Hunting Survey, which examined how businesses' cybersecurity defense teams are handling these changes and how organizations can defend against yet-to-be-discovered network threats
September 15, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS Law Enforcement Appreciation Programs
SANS has plenty of programs and free resources dedicated to help and train law enforcement. For a few years now, we have helped many Law Enforcement personnel with training cuts take several DFIR courses. In this talk our speakers will explain how these programs work, who qualifies for them and what to expect when you apply. If you are a LEO wanting to take advantage of these programs you should not miss this talk!
September 14, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
API MythBusters Webcast: Crushing Five...
Digital transformation and application modernization are exponentially driving up the use of APIs. We’re using more APIs than ever, and they’re more functional than ever. They’re also more attractive to hackers than ever, but lots of organizations are hanging onto old ways of thinking about API security. Join our lively discussion on the top five common industry myths surrounding API security. You’ll learn the pitfalls...
September 14, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Blue Team Summit: SOC Solutions Track
A security operations center (SOC) act as the centralized command center for a corporation dealing with security issues on an organizational and technical level. Responsible for protecting an organization from cyber attacks, a SOC continuously monitors network infrastructure, desktops, servers, endpoint devices, IoT devices, applications, and databases, among other systems for security threats. Modern SOCs are comprised of four components moni...
September 10, 2021
Organizer: SANS Institute
Location: Virtual
Add Favorite
Navigating the Dark Corners of Social E...
In recent years, attackers have successfully infiltrated organizations through highly sophisticated social engineering techniques that exploit human behavior and vulnerabilities, and lead to some of the worst data breaches in history. And the primary delivery method is email. Join our panelists and they take you through some of the worst email social engineering attacks found by Tessian’s Threat Intelligence Team, including spear phishin...
September 9, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Security News: Stop Modern Threats and...
Modern cloud threats, such as supply chain attacks, use TTPs involving malware and command-and-control to infiltrate your VPCs through the network and persist in managed storage such as AWS S3 to achieve their objectives later. To mitigate such threats, AWS and Blue Hexagon recently announced new services and native integrations that combine to break new ground in supercharging your ability to block these threats natively and in real-time. In...
September 8, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Real World Network Forensics Episode 1:...
In this webinar series, Jake Williams takes a hands-on approach to forensics packet analysis, using real-world examples to demonstrate how to analyze network packet data to uncover and investigate threats. The series takes a protocol-by-protocol approach. It is an ideal introduction to packet forensics for beginners and a great source of expert tips and tricks for more experienced security analysts. In this episode Jake takes a deep-dive into...
September 8, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Drive SOC Efficiency with Network Evide...
Automation via machine learning can help your SOC staff handle the endless crush of alerts. However, without the right data sources and analytic capabilities, you risk further straining workloads with additional noise and complexity. Corelight & Elastic Security, both rooted in open source, together go above and beyond to maximize operational efficiency. The integrated solution combines high-fidelity alerts and data from Suricata and Zeek...
September 7, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Making the Return to Work Secure, Resil...
At the start of the pandemic-there was a rush to support 100% work-from-home-operations, SANS presented the highly viewed “Making and Keeping Work at Home Operations Safe and Productive” webcast and put together a free Security Awareness Work-from-Home Deployment Kit that provided a step-by-step plan to quickly execute an awareness initiative and other key steps to secure remote workforces. Now, enterprises need to securely handle...
September 7, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
WhatWorks in Reducing Time to Detect Th...
The financial impact of ransomware attacks has increased the need for security operations to reduce time to detect, mitigate and restore. Financial pressures as the world emerges from the pandemic are driving efforts that can quickly show positive return on investment without increasing staffing requirements or capital expenditures. Raising the level of security awareness and preparedness of users and applications developers has proven to be t...
September 2, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search