Taking a Behavioral Approach to Securit...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. Join LogPoint's Jake McCabe as he discusses how thinking about security from the perspective of adversary behavior can help organizations better prepare for, detect, and respond to threats. Too often, security organizations focus on signatures and IOCs to alert them to threats in their environment, however this myopic focus can often leave them blin...
Detecting and Preventing Vulnerabilitie...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. The adoption of cloud native technologies such as containers, microservices, and immutable infrastructure requires declarative, automated security controls. To keep up with the pace of development, we need to detect and prevent platform vulnerabilities early in the development lifecycle before they can be introduced into the runtime environment. In...
Hybrid Security: Protecting Your Supply Chain
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. Recent supply chain attacks have proven that third parties are an unexpected, yet trusted, entry vector into an organization. By utilizing legitimate methods to breach an organization, threat actors can hide under the radar with escalated privileges. Furthermore, attackers have shown that they are security-savvy, knowledgeable of enterprise defense...
How to Implement a DevSecOps Culture in...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. A conversation with Chaim Mazal, ActiveCampaign CISO, on his teams journey to DevSecOps Modern development practices have forced organizations to combine development and IT operations under one DevOps umbrella in order to build and release code at a faster rate than ever before. However, due to this newfound developer agility, as well as the widespr...
What You Don’t Know About Vendor Risk M...
*To attend this webcast, login to your SANS Account or create your Account on the SANS website. "If your company were to get breached, there is a 70% probability it will be through one of your Vendors. If it is Protected Health Information, PHI, that gets exfiltrated, the fines will run into the millions of dollars, including loss of reputation, market share, and loss of revenue. You do not want to be the person that failed in their due dilige...
SANS 2021 - Live Online
SANS is committed to delivering high-quality cyber security training so you can keep your skills sharp and stay ahead of cyber threats. Join us for interactive training during SANS 2021 - Live Online (March 22-27, EST), and receive relevant, applicable training from wherever you are. Choose from over 30 interactive courses, plus three NetWars Tournaments delivered Live Online. SANS Live Online events offer live-stream, instructor-led cyber sec...
Supercharge your SIEM Capabilities with...
Log data is critical for understanding how systems are operating and for monitoring malicious activity with the IT environment. This is particularly true for traditional systems as well as modern systems in the midst of a digital transformation that lack an audit trail, such as multi-cloud and DevOps environments, microservices, and containers. The technologies and trends organizations embrace as they accelerate their transformation all increa...
Neutralizing Breach Paths with Cyber Th...
Nearly 2 billion records were exfiltrated in recent cloud breaches. Can breach paths be detected even before clouds are built? Learn how DevSecOps processes can predict breach paths programmatically using threat models derived from cyber threat intelligence, MITREs ATT&CK framework, and Infrastructure as Code. This session includes specific code examples for common IaC technologies. *To attend this webcast, login to your SANS Account or cr...
From EDR to XDR: How to Drive Faster Th...
The increasing complexity of the threat landscape means we can no longer depend on a "business as usual" approach to endpoint security. Antivirus or EDR (Endpoint Detection and Response) used in isolation may not be the most efficient recourse to protect against today's sophisticated attacks. The good news is that there is a way to get more from our endpoint security with less effort, it's called eXtended Detection and Response (XDR). XDR reco...
Simplify Cloud Shift with a Next-Gen SIEM
As organizations shift to the cloud, teams grapple with legacy security tools incapable of ingesting and combining data from hybrid environments for analysis. The result? Threat visibility gaps and lower SOC performance. Join this Devo lunch and learn session as we discuss: Ensuring analysts have visibility into the entire attack surface Keeping detections relevant during cloud shift and how access to all data sources provides relevant context...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.