SANS 2021 Cloud Security Survey: A Roun...
This SANS survey investigated how organizations are shifting their IT strategies to a cloud-based infrastructure - and how security teams are also evolving to use cloud security services that offer more effective controls and capabilities. In this webcast, SANS analyst and survey author Dave Shakleford will join a Gigamon representative for a deep-dive discussion and analysis of survey results. Register for this webcast to be among the first t...
SANS 2021 Password Management and Two-F...
Passwords are a hassle, and they're expensive to manage. They're also inherently insecure. Are organizations still required forced resets and enforcing complex passwords and other inconveniences that users tend to resist? Would organizations, if they could, get rid of passwords and use other forms of authentication (for example, multifactor options embedded in Windows 10)? This webcast will explore the results of the SANS 2021Password Survey,...
The Cloud Conundrum: Parsing the Cloud...
Cloud adoption was already well underway when the pandemic accelerated the need for faster adoption than anyone could have anticipated. Organizations of all sizes were forced to confront an abrupt shift to remote work for the majority of their staff. Today, cloud and DevOps leaders do not have centralized, actionable visibility into their clouds state and security, which greatly increases risk. Plain and simple, you cant afford to neglect clou...
Not in Cyber Security? No Problem! Crea...
No experience in the industry? No problem! In this webcast, we will be talking about what you can do in your current role and outside your organization to showcase yourself as a budding cyber star. Don't wait! Register now for the other webcasts in the HR + Cybersecurity! Skilling the Gap: Creative Ways to Recruit Top Cyber Talent Knowing Your Applicants: How to Stay Current to Best Assess Your Cyber Applicants Slow the Revolving Door of Talen...
SANS 2021 Cloud Security Survey: A Roun...
This SANS survey explored the types of services organizations are using, what types of controls and tools provide the most value, and how effective cloud security brokering is for a range of use cases. In this webcast, SANS analyst and survey author Dave Shakelford will join a Fortanix representative for the deep-dive discussion and analysis of survey results. Register for this webcast and be among the first to receive the associated whitepape...
How to Engage Line of Business In Data...
Effective data governance is integral to information security, but getting organizational buy-in is a common stumbling block for most new initiatives. For example, Security teams are usually unaccustomed to managing collaboration solutions, and their end-users can mistakenly view security protections as productivity inhibitors. Meanwhile, executive management can view data governance as a series of bureaucratic projects rather than a means to...
Scoping an Intrusion using Identity, Ho...
Second webcast of a two-part series, this webcast covers post identification activities. The techniques covered here could also be used for initial identification, but theyre discussed here as though there is already an initial identification which can be used. The effort discussed herein, then, is to effectively determine the scope of an intrusion. Defenders fail to discover the full extent of adversary infrastructure. Defenders claim contain...
A SANS 2021 Report: Top Skills Analysts...
As one of the highest-paid jobs in the field, security analysts must become masters of all trades, becoming "all-around defenders," highly competent in threat detection, while maintaining excellent analytical and communication skills. But what are the technical and nontechnical skills required to acquire mastery in this role? And how can industry security solutions augment analysts' capabilities to become more effective? In this webcast, SANS...
Belkasoft X—A New Computer and Mobile F...
Belkasoft X is a new digital forensics and incident investigations product by Belkasoft. Belkasoft X combines computer and mobile forensics in single tool, additionally providing cloud and memory forensics. During the presentation, you will learn how to effectively use the tool on each stage of your investigation: starting with mobile and computer acquisition, followed by low level file system and memory analysis, automated artifact extraction...
Game Day Cyber42: CISO For A Day
In this Game Day42: CISO For A Day, players work for a fictional company building and leading its security program. The goal is to align security capabilities to strategic objectives in order to ensure the security program is helping to meet business goals. in this 90-minute game day you will play individually yet have open communication with other players and SANS staff through a Slack channel to promote discussion and support, as needed. Dur...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.