A SANS 2021 Report: Securing Cell Phones
This webcast will explore how users protect their phones at a device and/or application level and gain insights on how organizations secure their company-provided, enterprise devices. Security is more than just a simple device today, so we aim to cover the best practices for protecting your personal and company-owned data.
Federal Solutions Forum
Today, defenders have in their arsenal faster and more capable technology than ever before. We can build robust prevention, detection, and response processes that augment and empower security analysts. In this solutions forum, we’re going to look at four areas of technology that deliver these improvements and help bolster an organization’s security posture: Zero Trust Endpoint Detection and Response Identity and Access Management R...
SANS 2021 Top New Attacks and Threat Re...
In the SANS 2021 Top New Attacks and Threat Report, John Pescatore provides insight into the threats highlighted during the SANS panel discussion at the 2021 RSA Conference. On this webcast, John will take a deeper dive into the paper in a conversation with sponsor representatives.
Finding the Hidden Visitor: Persistence...
There are many stages in the attack lifecycle in which we can detect or prevent an (advanced) attacker from getting closer to their final objectives. One thing we always come across however is that the attacker likes to persist in your environment, be it for two days, two months, or two years. It is important from a blue team perspective to understand the techniques employed by the attackers to remain in your environment for a longer period of...
Combating Insider Threats with People,...
Insider threats are some of the more difficult threats to detect from both a human and technology perspective. Understanding the problem, risks, and methods to prevent insider threats is the first step in ensuring this toxic risk does not affect your organization. Join SANS Senior Instructor Heather Mahalik, and BlackBerry VPs Pooja Kohli (Product Management), and Tony Lee (Global Services Technical Operations) to learn how insider threats and...
Securing Cloud Data: The Hidden Vulnera...
Modern businesses have seen an increasing reliance on the cloud for collaboration, communication, and data storage. SaaS platforms like Microsoft 365 have hugely diminished the pain of moving to remote work, but this shift can leave significant openings for potential loss of essential data. Does your data storage and disaster recovery plan cover the hidden vulnerabilities of your SaaS platform? It is true that cloud storage is often more secur...
A SANS 2021 Report: Top New Attacks and...
In the SANS 2021 Top New Attacks and Threat Report, John Pescatore provides insight into the threats highlighted during the SANS panel discussion at the 2021 RSA Conference. This webcast will include practical advice from the paper, including insights from SANS instructors Ed Skoudis, Heather Mahalik and Johannes Ullrich on the critical skills, processes and controls needed to protect their enterprises from these advanced attacks.
Kill Chain Defenses: Thwarting exploits...
A single successful exploit is all it takes for the dominos to start falling Everyone knows we should patch. Actually doing this, however, is remarkably challenging. Especially considering that it must be done quickly, efficiently, and consistently across the entire enterprise, over time. Anyone who is even remotely involved with this critical, never-ending (and often thankless) task is keenly aware of these dynamics. But, even if youre one of...
Enterprise Protection with Virsec
Today's cyber attacks seem to be changing at breakneck speed. Attackers are ever-increasing their arsenals, quickly pivoting through environments and deploying devastating malware within a matter of minutes or hours. School districts, hospitals, and critical infrastructure pipelines are held hostage for tens of millions of dollars. One thing is clear: We must constantly find ways to shift the advantage back to the defenders. In this product re...
Threat Intelligence-Driven Security Ope...
Threat intelligence can be a powerful tool to fine tune SOCs efficiency and effectiveness in defending against cyber threats. Join this session to learn how to make the most out of threat intelligence and productively apply it to all the key functions in the SOC protection, detection, and response. Our speakers will walk you through: What companies do to reduce the gap between cyber resilience and business impact How to predict and prevent, th...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.