525 past events found
+ 30 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
PowerShell for Audit, Compliance and Se...
ZIP file full of CSVs. In this session, we will explore how to use data extracted from our environments to present tactical and strategic visualizations to the organization. Beginning with ad-hoc, tactical, automated import into Microsoft Excel for use in pivot tables and charts, we will then move on to using dashboard tools like Grafana to visualize trends in measurements over time. The session will focus on demonstrations of the techniques d...
January 21, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
3-part series: PowerShell for Audit, Co...
Equipped with a knowledge of how to use PowerShell, the audit/compliance/security professional can start gathering measurements of systems and networks. In this session, we use PowerShell to extract data from Windows systems, Active Directory domains, VMWare infrastructure and even Linux systems. We will also explore how to extract data from APIs provided by our security tools. Demonstrations will be used to reinforce the concepts. Objectives...
January 14, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Most Used AWS Services & How to Use The...
Review of the top used AWS services and which security features you dont want to forget about. Highlighting applicable CIS AWS Foundations Benchmark recommendations And calling out any other security controls that should not be overlooked
January 14, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Multiple Clouds Require Multiple Soluti...
Organizations in every sector are increasingly adopting cloud offerings to build their online presence. However, although cloud providers are responsible for the security of the cloud, their customers are responsible for what they do in the cloud. Unfortunately, the providers have made the customer's job difficult by offering many services that are insecure by default. Worse yet, with each provider offering hundreds of different services and w...
January 13, 2021
Organizer: SANS
Location: Webcast
Add Favorite
Introduction to Purple Teaming - SANS@M...
Does your organization have penetration testers and a red team? Do they work closely with those performing defensive roles to improve the overall security? Far too often, pen tests and red team engagements are performed, leaving only a list of discovered vulnerabilities with no instructions on how to mitigate the findings. This is where purple teaming can be of great value to an organization. It's not a new team, rather, it's an organized effo...
January 13, 2021
Organizer: SANS
Location: Webcast
Add Favorite
Automated Testing Against an Ever-Chang...
A top-notch security platform requires a significant investment of money, time, and resources, so it's essential to know it's doing its job. Instead of waiting for an attack to test your security controls, on-demand, proactive testing allows you to validate that controls are acting as expected. That means you need a solution that enables you to emulate true threat actors within your environment, making penetration testing more effective and re...
January 12, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
PowerShell for Audit, Compliance and Se...
As the velocity of IT operations increases, automation is becoming critical for auditors and compliance professionals. In this session, we will cover the basics of using PowerShell for common infosec, compliance and audit tasks. We will make heavy use of demonstrations to explore the object-oriented nature of the shell, important commands for getting help, and how to select, sort, filter and transform results from native Windows tools. We will...
January 7, 2021
Organizer: SANS
Location: Webcast
Add Favorite
Zero Trust must Include the Workforce,...
Zero trust has become one of the hottest topics in IT and cybersecurity especially in light of the global pandemic and related work-from-home (WFH) momentum. Zero trust is garnering plenty of headlines but do users really understand zero trust technologies and where they fit? And is now the time to move zero trust from a tactical to a strategic approach that aligns to business initiatives? Join us for our webinar with ESG and Cisco as we take...
January 7, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Tech Tuesday Workshop - So. Much. Data....

CANCELED

Smartphone data can be confusing. There are so many locations, timestamps, and synched data that it may be more difficult than you think to put a person at the scene of a crime or behind an activity. For this Tech Tuesday Workshop we'll walk you through a scenario where the data is confusing. We'll show you how to create your own test data, extract it, and most importantly - validate it! System Requirements: A Mac or PC with permissions to ins...
January 5, 2021
Organizer: SANS
Location: Webcast
Add Favorite
SANS Zero Trust Solutions Forum 2020
Traditional methods of cyber defense, like perimeter-based network security, have always emphasized the need of keeping adversaries out of our networks, building a fortress that would stop attackers while allowing secure access to legitimate users. In such a model, trust is typically binary: either the user is authenticated (trusted) or not. Once access is granted to a user, that level of trust is hardly re-evaluated, and when it is, it is usu...
August 28, 2020
Organizer: SANS
Location: Webcast
Add Favorite
Back to Search Begin New Search