Criminal Minds: API Security Edition fe...
In 2021, the industry witnessed no shortage of API-related security incidents resulting from leaky APIs, vulnerable system APIs, authorization flaws, and more. Companies like Experian, Microsoft, and Peloton all made the news, and some impacts are still playing out. Data breaches aren’t the only area of concern for organizations. Account takeovers, privacy impacts, system compromises, and business logic abuse are equally damaging. Join...
SANS Cyber Security Mountain: Feb 2022
Interactive Cyber Security Training Taught by Industry ExpertsJoin us Live Online for interactive training during SANS Cyber Security Mountain 2022 (Feb 14-19, MST) to learn directly from real-world practitioners and develop invaluable cyber security skills. Choose your course and register now for immersive training with hands-on labs, plus opportunities to network with your peers. SANS Cyber Security Mountain 2022 Features Practical cyber sec...
How to Operationalize ICS Threat Intelligence
For centuries, threat intelligence has been a vital tool to guide decision making in response to conflict. As the ICS cyber threat landscape has perpetually shifted to further place private industry in the crosshairs of adversaries, the value proposition for ICS threat intelligence has increased significantly for defenders. While building out an ICS threat intelligence program can sometimes seem like it will take centuries, there are several...
Achieving Comprehensive Cloud Data Prot...
Security professionals are starting to rethink their approach to access control and monitoring for user activity. Today, many traditional static network segmentation and access controls are not capable of keeping pace with remote workers and cloud access scenarios. Zero trust is a model where data and application behavior are the central focus points of all isolation and segmentation tactics, and all users and assets in an IT operating enviro...
Emergence of a New Anti-Ransomware Tech...
Regardless of the growing investment in cybersecurity, damage from cyber attacks continues to rise at an unprecedented rate, reaching over $10T by 2025. If existing solutions are supposedly working, then why are ransomware breaches happening and inflicting so much financial devastation, brand erosion and loss of business? The problem is that today’s solutions fail to counter threat actors’ advanced attacks. Antivirus and endpoint...
SANS San Diego 2022
Practical Cyber Security Training Taught by Industry ExpertsAttend in San Diego, CA or Live Online Learn cybersecurity techniques crucial to combating today’s cyber threats. Join us for SANS San Diego 2022 (February 7-12), and experience immersive information security training you can use immediately. Choose your course and register now for hands-on training taught by top industry practitioners. SANS San Diego 2022 Features In-Person or...
Learn How to Find Security Threats Befo...
Every network has a security vulnerability. Vulnerabilities obviously lead to threats. Do you know where your vulnerabilities and any hidden threats are located? With major security breaches happening every year to businesses and government agencies of every type, don't you want to find (and fix) your network BEFORE a hacker finds and exploits the weakness? In this webinar, we explain what you need to do to actually protect yourself from vulne...
ICS Proactive Defense | Leveraging Oper...
Threat hunting in ICS environments must consider safety. IT and ICS systems have different missions, objectives, impacts during an incident, and different assets like embedded operating systems, and engineering devices speaking non-traditional industrial protocols. Adversaries targeting ICS must use different attack tactics and techniques for access, execution, collection, and persistence, etc., to degrade safety, manipulate control, damage ph...
Cyber Threat Intelligence Summit Soluti...
Threat Intelligence can be defined as the ‘Art of Taking the Adversary by Surprise’. Yes, anticipating and mitigating surprises in the form of cyberattacks is the primary mission of a practical threat intelligence program. Achieving that goal requires a proactive approach, one that provides answers to critical questions like: What threat actors are most likely to cause an impact in my organization? What are their motivation, goals,...
Cyber Threat Intelligence Summit 2022
At this year’s Cyber Threat Intelligence Summit, you’ll have the chance to learn, connect, and share with thousands of cybersecurity professionals in attendance from around the globe. No matter your background or skill level, you’ll walk away from CTI Summit with interesting perspectives and case studies that challenge CTI assumptions and result in a shift in your understanding. Register now to enjoy: Two Days of Highly Techn...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.