Email Security Buyer’s Guide
A highly vulnerable tool of any organization is also one of its most necessary communication mediums: email. Year after year, we see adversaries find success in abusing email to gain a foothold into an organization, deploy malware, or steal millions of dollars right under the company’s nose. Email threats are likely not going away for a long time. Verizon’s 2021 DBIR report holds that phishing remains one of the top actions they se...
Defending the Modern Attack Surface: Ho...
Data becomes information only when you know the right questions to ask. The Uptycs Security Analytics Platform empowers security teams to ask questions across their attack surface and uncover actionable answers to improve enterprise-wide security. Comprehensive security observability for your cloud workloads through a single pane of glass. Uptycs offers complete security observability for your cloud workloads, collecting and analyzing real-tim...
A SANS 2021 Report: Making Revolutionar...
There is an internet security truism that says, "The internet is actually pretty secure--it is all those vulnerable endpoints that are the problems." Securing user devices is a complex problem, but it is not an unsolvable problem. This webcast explores our 2021 report, "Making Revolutionary Gains in Security on Your Endpoints," which details a decision framework that security managers can use to map their existing IT management and security op...
Industry 4.0 and IT/OT Convergence
Information Technology (IT) and Operations Technology (OT) are increasingly overlapping in the electric, gas, and water utility industry. IT includes traditional computing, storage and telecommunications systems used for decades in industries such as finance, healthcare and retail. OT includes technologies that run real-time processes such as electricity distribution, manufacturing plants and transportation systems. “IT/OT Convergence...
A SANS 2021 Survey: Threat Hunting in U...
In the past year, businesses have been continually under pressure yo increase efficiency and keep costs down in the lead-up to recovering while economic conditions are still evolving. This webcast explores the results of our 2021 Threat Hunting Survey, which examined how businesses' cybersecurity defense teams are handling these changes and how organizations can defend against yet-to-be-discovered network threats
SANS Law Enforcement Appreciation Programs
SANS has plenty of programs and free resources dedicated to help and train law enforcement. For a few years now, we have helped many Law Enforcement personnel with training cuts take several DFIR courses. In this talk our speakers will explain how these programs work, who qualifies for them and what to expect when you apply. If you are a LEO wanting to take advantage of these programs you should not miss this talk!
API MythBusters Webcast: Crushing Five...
Digital transformation and application modernization are exponentially driving up the use of APIs. We’re using more APIs than ever, and they’re more functional than ever. They’re also more attractive to hackers than ever, but lots of organizations are hanging onto old ways of thinking about API security. Join our lively discussion on the top five common industry myths surrounding API security. You’ll learn the pitfalls...
Blue Team Summit: SOC Solutions Track
A security operations center (SOC) act as the centralized command center for a corporation dealing with security issues on an organizational and technical level. Responsible for protecting an organization from cyber attacks, a SOC continuously monitors network infrastructure, desktops, servers, endpoint devices, IoT devices, applications, and databases, among other systems for security threats. Modern SOCs are comprised of four components moni...
Navigating the Dark Corners of Social E...
In recent years, attackers have successfully infiltrated organizations through highly sophisticated social engineering techniques that exploit human behavior and vulnerabilities, and lead to some of the worst data breaches in history. And the primary delivery method is email. Join our panelists and they take you through some of the worst email social engineering attacks found by Tessian’s Threat Intelligence Team, including spear phishin...
Security News: Stop Modern Threats and...
Modern cloud threats, such as supply chain attacks, use TTPs involving malware and command-and-control to infiltrate your VPCs through the network and persist in managed storage such as AWS S3 to achieve their objectives later. To mitigate such threats, AWS and Blue Hexagon recently announced new services and native integrations that combine to break new ground in supercharging your ability to block these threats natively and in real-time. In...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.