Back to Search Begin New Search Save Search Auto-Notify
Know Your Attack Surface From the Outside In
An attacker needs very little other than open source intelligence (OSINT) to profile an organization or individual successfully. But OSINT can also be used to protect against social engineering. In this webcast, SANS Instructor Jeff Lomas and Picnic’s CEO Matt Polak take a look at how enterprises can neutralize vulnerabilities, reduce their attack surface, and automate continuous risk detection. Register today and be among the first to...
September 20, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Emulating, Detecting, and Responding to...
Join SANS Certified Instructor Jean-François Maes as he previews new material directly from the updated SANS SEC699: Purple Team Tactics - Adversary Emulation for Breach Prevention & Detection. Once attackers have gained initial access, they do not want to get caught by the suite of security tools on modern Windows systems. To stay under the radar, attackers leverage Living Off the Land Binaries and Scripts (LOLBAS). These are signe...
September 20, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
September 20, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
The Story of Instructure: How AWS Cloud...
From almost day one, edtech company Instructure has leveraged the cloud from Amazon Web Services (AWS) on its way to becoming the biggest learning management system (LMS) provider in the country. After successfully scaling up its main platform Canvas, Instructure faced the new hurdle of integrating various acquisitions and growing into different business lines. Collaborating with AWS, the company overcame these challenges and established a bur...
September 20, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Advancing Ontario’s Public Sector Throu...
As the Ontario public sector continues to innovate, improve and deliver government programs and policies across the province, data analytics continues to play a vital role in accelerating this mission. From evaluating education and managing public health, to running the engines of the economy and protecting the environment, the Ontario government deals with massive amounts of data. Regardless of their specific mission, these organizations have...
September 20, 2022
Organizer: Newcomp Analytics
Location: Webcast
Add Favorite
Using Service Desk to Speed Up Ticket R...
With so many ticketing systems available today, they can start to feel redundant. SolarWinds® Service Desk has unique capabilities you can utilize to help provide a higher return on investment by minimizing the iterations between customers and the company's support staff. By implementing some simple processes and Service Desk configurations, you can reduce mean time to resolution (MTTR) and ultimately increase ROI. Join Scott Pross, vice p...
September 20, 2022
Organizer: SolarWinds Government Team at Carahsoft
Location: Webcast
Add Favorite
Making E-Discovery Easier to Improve Li...
Responding to e-discovery requests or internal investigations can be difficult. It comes as no surprise that research from Enterprise Strategy Group (ESG) highlights how nearly 40% of organizations say “satisfying e-discovery requests is harder now than it was two years ago.” But it doesn’t have to be, if you have the right e-discovery technology, with features that can help speed performance, streamline workflows and reduce...
September 20, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Outwit. Outmaneuver. Outmatch.
Ransomware attacks make the news headlines almost daily. Your best defense against ransomware? Attention to tactics much earlier in the MITRE ATT&CK® lifecycle. Come watch us “outwit, outmaneuver, and outmatch,” a trap set by modern adversaries. We’ll help you face off against these adversaries and navigate which MITRE ATT&CK TTPs you should give priority. Leave this event with: An understanding of MITRE ATT...
September 20, 2022
Organizer: Palo Alto Networks
Location: Virtual
Add Favorite
Lessons Learned on the Zero Trust Journey
In May of 2021, the White House issued the Executive Order on Improving the Nation’s Cybersecurity, mandating that federal agencies begin taking decisive steps to modernize their approach to cybersecurity, with zero trust as the foundation. In that time, federal agencies have been diligently working to meet the Executive Order’s mandates. Last month, the Office of Management and Budget released M-22-16 Administration Cybersecurity...
September 20, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Safe House Global: Multi-Modal Warfare
Who Should Attend: Due to the sensitive nature of the material presented during this event, we are restricting attendance and imposing the Chatham House Rule. CISOs from industries such as Aerospace, Computer and Technology, Defense, Energy, Finance, Healthcare, Mining, Robotics, Telecommunications, and Transportation Military and Government employees (US, UK, and EU) whose work involves the current conflict and/or national security issues ge...
September 20, 2022
Organizer: Reel Holdings, LLC
Location: Arlington, VA
Add Favorite
Back to Search Begin New Search