Modern AppSec at Scale: Bridging the Ga...
Assessing applications for security risks and then remediating those risks at scale, without slowing down the development process, can be quite the challenge. Traditional security tools struggle to provide accurate and comprehensive visibility to security risks within modern application workloads, and typically weren’t built with cross-functional ownership in mind to prioritize and remediate risk findings. As a result, AWS offers a suite...
Endpoint Detection and Response—Are We...
For years, cyber criminals have been exploiting organizations across the globe, profiting from their actions while we struggle to stay one step ahead of our current defenses. To combat advanced attacks, such as ransomware, we must better understand our threat actors and how they have evolved. Hosted by SANS Instructor Chris Dale and a representative from Cisco, this webcast will explore how organizations can modernize their security postures t...
Zero Trust Architecture Solutions Forum
Security has always been one of the prime concerns for any growing business. In a world where technology is continually evolving, companies are constantly stumbling onto new vulnerabilities. One wrong move in the data management space and companies leave themselves vulnerable to shattering attacks. The increasingly multifaceted landscape means that more groups are turning towards a zero-trust security framework. This approach asks companies to...
Applying AI & Automation to Protect You...
The internet attack surface is a fast-growing, fragmented problem, making threat discovery, assessment, and remediation challenging—especially at scale. Security teams must protect brands and prevent fraud across websites, email systems, social media sites, application stores, and marketplaces. Employees, as well as supply chains, can be affected. The time for using older methods of dealing with this problem are well behind us. Join Seni...
Secure DevOps Best Practices for Multic...
Multicloud is inevitable. In fact, it’s likely you’re already using different clouds like AWS, Google Cloud, and Azure for various functions. But, how do you address risk and ensure proper security practices across all of your cloud accounts and deployments? In this session, we’ll look at best practices for secure DevOps across multiple clouds. We’ll take a comprehensive look at your lifecycle from authentication and in...
Real World Network Forensics Episo4: DNS
In this webinar series, Jake Williams takes a hands-on approach to forensics packet analysis, using real-world examples to demonstrate how to analyze network packet data to uncover and investigate threats. The series takes a protocol-by-protocol approach. It is an ideal introduction to packet forensics for beginners and a great source of expert tips and tricks for more experienced security analysts. In this episode Jake takes a deep dive into DNS.
Optimizing Security Operations Programs...
The goal of SecOps teams is to monitor, detect, investigate, and respond to suspicious activity and events. This often leaves them in a reactive state — with minimal opportunity to reduce false-positives and innovate. It doesn’t have to be this way, though. One key aspect of forward-looking, mature SecOps programs is the ability to gather context from data sources to inform — and expedite — investigations. In this sessi...
A SANS 2021 Survey: Vulnerability Manag...
In addition to highlighting trends in vulnerability management, this year's survey digs a little deeper into how cloud and the expanding remote workforce affected the ways in which organizations handle reporting and remediation. On this webcast, sponsor representatives will join the survey author for an analysis of the survey, and share their thoughts on emerging vulnerability management trends. Click the Get Registered button to sign up for t...
Ransomware Alert! Why AV and EDR Are Fa...
Ransomware groups repeatedly deceive AV and EDR solutions. News stories abound of companies large and small that, regardless of their defenses, get hit by ransomware attacks. How? Threat actors take advantage of the weaknesses of mainstream AV and EDR platforms. In this webinar, Morphisec CTO Michael Gorelik will simulate a ransomware attack that bypasses detection-based defenses before reaching its goal and encrypting the entire enterprise ne...
Unauthorized Data Access in AWS: Showca...
External threats are easy to comprehend for people outside of the security team, and therefore over-represented in business literature: a ‘hacker’ (portrayed as a dark silhouette behind a computer with a hoodie on, for some reason) bangs on the keyboard, probing your defenses until they find some sensitive info that was left public via misconfiguration. There’s sometimes sensitive data in that public bucket, but usually that...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.