The ICS Attack Map Series: Oil & Gas
In this series, Dean Parsons will review observed ICS attacks in the Oil & Gas, Electric and Water sectors and map them to the MITRE ATT&CK ICS framework. Throughout this series, Dean will review the most common attacker tactics and techniques used across commonly targeted critical infrastructure sectors. In this first part of the series, Dean will specifically speak to the Oil & Gas sector. This webcast will dive into Initial Acce...
The Rise of Terraform in Cloud Security
The Rise of Public Cloud Providers such as Amazon Web Services (AWS), Google Cloud (GCP), and Microsoft's Azure which serves the computing needs for small, medium and large businesses all over the world and there is no sign of any slowing the move to the “cloud”. These same Public Cloud providers have had at the same time become more complicated each day as we are creating more complex security holes with new cloud services, offeri...
Commonalities of Salt and Security Culture
Salt brightens food flavors and balances tastes such as sweetness, acidity, and bitterness. And like water, it is a necessity for life. However, if you went to a restaurant and they brought out your meal with a huge pile of salt on the side, it wouldn't be a great experience; especially if you had to eat all the salt at once. The salt would be unpleasant in and of itself leaving the actual meal bland and unappetising. Delicious food has the ri...
SANSFIRE 2023: Keynote - Internet Storm...
The Internet Storm Center is all about "coloring your logs". Finding out what matters and doesn't matter by adding context to otherwise abstract datapoints like IP addresses and domain names. This free data is made available via our website and easy to use APIs. During this session, we will talk about some of the changes we have made to make the data more useful and more available. We will also illustrate how you can learn about ongoing trends...
Dodge the Sliver Bullet and Find the Sm...
Sliver is rising in popularity and is thought to be taking significant market share off other well known C2 frameworks. Corelight Content can better power your Sliver detections highlighting what's on your network to build a strategic data reserve when you need to investigate an incident. Come learn about Corelight Content, insightful community developed detections, and an open NDR that puts the power in your hands.
SANS 2023 Top New Attacks and Threat Report
This webcast takes a deep dive into the threats highlighted during the annual SANS keynote panel discussion at the RSA® Conference 2023. This webcast will include insight from SANS instructors Ed Skoudis, Heather Mahalik, Dr. Johannes Ullrich, and Katie Nickels on the dangerous new attacks techniques they see emerging. You’ll get actionable advice on the critical skills, processes, and controls needed to protect enterprises from thes...
2023 SANS Survey: Breaking IT-OT Silos...
Operational technology (OT) cyber threats have evolved over the past decade. Combined with increased connectivity from digital transformation projects, it is more critical than ever to implement industrial control system (ICS)-specific visibility capabilities to quickly detect, respond, and recover from potential cyber incidents.To explore this topic, SANS conducted a survey to collect information around industry practices. In this webcast, Ce...
Docker Crash Course: How to Containeriz...
This two-hour workshop will introduce the student to Docker containers and images. During the workshop, we will create an image that contains the Command Line Interfaces for AWS, Azure, and Google Cloud as our example, but the same process would be followed for any Linux-based command line tool. During the session, we will build, test, and troubleshoot the creation of the Dockerfile and publish the image to Docker Hub. Next, we will set up Git...
Enhancing OT Security: A Dual Perspecti...
Join us for a panel discussion presented by Emerson and Dragos, as they share their insights around OT cybersecurity as partners - while also depicting the unique expertise, experience, and responsibilities that they bring to the table to defend customer installations and environments together. Although the core focus of the conversation will be on DeltaV systems, a high-level overview of OT cybersecurity and the Industrial Control Systems (IC...
2023 SANS SOC Survey
In its sixth year, the SANS 2023 SOC Survey explored SOC capabilities, deployment architecture, technology use and satisfaction, capabilities outsourced and satisfaction with outsourced providers. With survey data from active SOC managers and analysts, this webcast will cover the escalating movement to the cloud, orchestration, and tool changes. It explores the developing promise of deception, AI and machine learning. Key topics will include c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.