1,020 past events found
+ 35 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Sign & Verify! How Code Signing Secures...
Some fast facts from Gartner: By 2025, 45% of organizations will have experienced attacks on their software supply chains, tripling the numbers from 2021. Half of existing supply-chain attacks are attributed to APTs or well-known attackers. Digital transformation enables enterprises of all sizes to provide value to their customers in a fast and consistent manner. One crucial consideration of that transformation is the automation and security o...
November 11, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Google’s Chronicle Security Operations:...
Organizations need modern threat detection that operates at scale, and Google’s cloud-native SIEM platform, Chronicle, delivers. In our tests, we observed multiple threat detections that most organizations haven’t even pondered including in their SIEM. SIEMs in general were supposed to enable three main goals: Increase visibility Enable detection of security events Support the response of discovered security issues While those goal...
November 10, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Why Malware Protection is Essential for...
In this webinar we will cover the importance of malware protection in ensuring network security for all organizations, from large enterprises to smaller companies. Key topics: The costs of not defending against malware - “being lucky is not enough” How to deploy malware protection across your organization How malware protection keeps your users/resources safe from online threats Join us for a fascinating discussion on how implement...
November 9, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Data Security: Let's Talk About Cloud D...
Storing your data in cloud services doesn't always guarantee the security of it. Data loss can occur for various reasons including human errors, ransomware attacks, or other kinds of malicious deletion.It is important to understand the retention policies and data back-up strategies so we can quickly react to any threats that could lead to permanent data loss and quickly recover data. This webinar will focus on the possible external factors tha...
November 9, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Seeing Cyber Threats Over the Horizon
More visibility. Most (if not, every?) cybersecurity professional will tell you they need more visibility into the threat landscape, but also their own security posture. Join SANS Analyst, Jake Williams and Chas Clawson, CTO for security with Sumo Logic, as they talk about the importance of correlating security alerts across your entire cloud and on-prem environment, and enriching with threat intelligence and other feeds for context and improv...
November 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
A Preview of Azure Hacking from SEC560:...
Modern organizations are increasingly supporting the cloud. According to Microsoft, 95% of the Fortune 500 companies are using M365. A traditional pen test is incomplete without looking for insecurities in Azure, especially when hybrid Active Directory is in use. In this webcast, Tim Medin will walk through methods to enumerate users in Azure and how to attack the users in the cloud.
November 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Integrating Software Supply Chain Secur...
Sophisticated threat actors are turning to Software Supply Chain attacks to evade today’s defenses. Tactics include inserting malicious code into open-source repositories like npm and PyPi, developing attacks leveraging new software vulnerabilities, and infiltrating vendor development environments to insert malicious packages into their software solutions. In the last year, ReversingLabs observed a 289% increase in threats involving open...
November 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Importance of Defining Security Functio...
For years many practitioners in the ICS security community realized that guidelines and best practices around secure PLC programming practices were lacking. To address this problem, ICS security professionals in the community pulled together to develop the Top 20 PLC controls. Beyond these controls, however, it is essential to define abnormality detections to display the information on the HMI clients. This allows operations staff to respond t...
November 7, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Shrink the Attack Surface Solutions Forum
Discovering, identifying, inventorying, and assessing all digital assets — a continuous process known as Attack Surface Management (ASM) — is essential for organizations to secure their environment. After all, you can’t protect what you don’t know about. External threats, vulnerabilities, shadow IT, and cloud misconfigurations are a few critical areas that may sneakily pose risks to organizations. The goal for IT and se...
November 4, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS Government Cybersecurity Solutions...
Threat actors continue to make government agencies – at the federal, state and local levels – one of their most important targets. A series of Presidential Executive Orders and DHS CISA Binding Operational Directives have been issued in response, often with specific cybersecurity control and technology requirements. Government agencies need to address both these pressures, and do it with limited resources, prioritizing their action...
November 3, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search