SANS 2021 Ransomware Detection and Inci...
Ransomware attacks have become some of the most prolific and public intrusions over recent years. Within a matter of hours, organizations can go from normal operations to having an inoperable network and being extorted for tens of millions of dollars. On this webcast, SANS instructor and author Matt Bromiley, as well as sponsor representatives, will share their thoughts on modern detection and response techniques for ransomware breaches.
Cyber42 Game Day: Ransomware
Join us for this NEW VERSION of Cyber42 on the hot topic of ransomware. This version of the game represents how a fictional organization responds to a ransomware event against the organization. Responses to ransomware events require not only managing the event but also the expectations of key stakeholders and external parties. Interactive. 90-minutes long. Play to win! Who Should Attend: Chief Information Security Officers Information security...
Data Security Solutions Forum
To be effective, data protection has to be everywhere, from the server to the endpoint, at the office and at home, throughout the cloud and across the web. A company's system must be able to detect data leakage from any path, quickly apply real-time data protection policies, automate incident workflows, and alert the IT team as needed for further investigation. Having an effective understanding of how and where a company's data is stored is es...
The City of the Future: Smart with Secu...
With the thousands of smart city projects underway worldwide, technology leaders, city managers, and governments have implemented, or are planning to implement, smart city solutions to enable the city of the future. Smart cities collect and process massive amounts of data from a multitude of connected Information Technology (IT) and Internet of Things (IoT) devices and sensors from across the urban cityscape. They work to conserve resources, r...
Limitless Data: Search everything, near...
It’s no surprise that security operations teams deal with tremendous amounts of data. Traditionally, storing this data in a way that will allow analysts to operationalise it, particularly over long periods of time, has proven to be costly due to the storage media required. We’ve also seen teams struggle when it comes to centralising security events across different physical locations or cloud regions/providers. In this webcast, we...
Using MDR to Improve Security and Reduc...
MDR combines software and human expertise to better respond to attacks, across endpoints and other vectors. In this webcast, join SANS Analyst Dave Shackleford and Red Canary’s Robert Adams as they explore Red Canary MDR as a solution to record alerts, detect and investigate threats, and respond quickly for effective remediation. Red Canary is an all-in-one solution that facilitates: Expanded visibility Evolving detection Alert managemen...
How to Stop Ransomware BEFORE it Starts
We’ve all seen the headlines, but why is ransomware so pervasive? And are you prepared? As it’s not really a matter of if it will happen, but when. Modern ransomware is not like ransomware of the past - it has evolved to highly targeted attacks by threat actors who are business-minded, focused solely on the big payday. In fact, it’s not even ransomware until it’s too late to prevent significant business impact. The good...
Industrial Control System Resilience
All 16 critical infrastructure sectors, including energy, critical manufacturing, water, and wastewater management facilities, and even cookie factories can benefit from a strengthened cybersecurity defense in today’s Industrial Control System (ICS) cyber threat climate. Active cyber defense starts with knowing what you have in order to apply appropriate and prioritized protections. Establishing a solid ICS asset inventory is essential t...
Cybersecurity Standards Scorecard (2021...
In the 1990s government agencies, industry groups, and cybersecurity researchers started creating cybersecurity standards and these standards led to cybersecurity regulations and laws that dictate to organizations what they must do to protect their data. Today, there are now dozens of standards that organizations can consider when building their cybersecurity plans and more are released every year. To make the problem even more challenging, no...
A SANS 2021 Survey: Vulnerability Manag...
This year's Vulnerability Management Survey highlights some of the trends in vulnerability management based on the data we have gathered over the past two years. This webcast explores the results of our 2021 Vulnerability Management Survey, which examines key issues such as: How organizations are discovering different types of vulnerabilities Who is responsible for the different processes related to vulnerability management How organizations a...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.