1,046 past events found
+ 37 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Preventing Runtime Exploits: The SANS I...
Runtime exploits continue to create major issues for security practitioners, especially in long-life systems. How are these attacks deployed? What can you do to prevent them? In this new SANS webcast, senior SANS instructor Chris Crowley will provide recommendations and guidance and relate his experiences using the RunSafe Security’s Alkemist. The guide will address: An example of a kill-chain in a predominantly interpreted-code environm...
August 18, 2020
Organizer: SANS
Location: Webcast
Add Favorite
Stranger Things in the Cloud: How Do We...
The race to the cloud is on full force. As enterprises fast-track their cloud adoption, strange things keep happening that undermine security and put data at risk. This session explores the state of security in the cloud, from the real meaning of shared responsibility to the lessons learned from recent breaches. The focus is on actionable content that you can take back to your day job and start enhancing cloud security. Key items: What are the...
August 14, 2020
Organizer: SANS
Location: Webcast
Add Favorite
What’s In Your FinServe Software?
Tracking the software and software components an organization uses in its products and its operations is crucial for responding to emergency threats. However, building and maintaining these Software Bills of Materials (SBOMs) is very challenging, especially across large enterprises. In this session, Alyssa Miller discusses the hidden threats in the Software Supply Chain, and analyzes some of the unique challenges of open source software in fin...
August 13, 2020
Organizer: SANS
Location: Webcast
Add Favorite
Threat Intelligence Solutions: A SANS R...
Cyber threat data from multiple sources overwhelm today’s Security Operations Centers (SOCs) without a centralized method to aggregate it. Many organizations have immature threat intelligence programs that rely on select external threat feeds, which users struggle to analyze. A cyber threat intelligence program requires people, processes, and technology to process, exploit, and disseminate threat data. Threat intelligence is “evide...
August 11, 2020
Organizer: SANS
Location: Webcast
Add Favorite
How to Show Business Benefit by Moving...
Vulnerabilities are relentless and exploited by targeted attacks faster than ever with damaging results to business. Study after study shows that most successful attacks exploit well known vulnerabilities with existing patches. Most businesses already do some form of vulnerability scanning but for many, time to remediate has not gone down. Yet some organization have broken out of this pattern—how have they done it? One of the key differe...
August 11, 2020
Organizer: SANS
Location: Webcast
Add Favorite
SANS@MIC - Remote Forensic Investigatio...
Many of us are confined at home due to the COVID-19 pandemic. But, business as usual, many organizations are still facing security incidents (related to the virus or not). Let's imagine the following scenario: Your phone rings because a customer detected some suspicious activity on a server or a workstation. Of course, it must be investigated "as soon as possible". The server is physically located 500km away and you're stuck at home... How to...
August 10, 2020
Organizer: SANS
Location: Webcast
Add Favorite
SANS@MIC -Large Scale Honeypotting: The...
Honeypots have always been a favorite of researchers. But making them scale and automating the operation of large "fleet" of honeypots operated by volunteers has been challenging. In this talk, you will get a brief tour of the infrastructure behind the SANS Internet Storm Center. You will learn how some of the recent attacks we detected and wrote about were picked up and analyzed by this global network of honeypots. We will look at live data,...
August 10, 2020
Organizer: SANS
Location: Webcast
Add Favorite
In the Cloud. We don't need roads.
In the world of "Cloud" we have an entirely new landscape of services, vendors, and functionality. The growth of Cloud is being driven from all sizes of organizations, from 2 person start-ups to Fortune 10 companies. But what can we do to understand these Services better so that when we move to the Cloud its a successful shift, and doesnt introduce unnecessary risk? Theres plenty of room for error, but also plenty of room for success. Were goi...
August 7, 2020
Organizer: SANS
Location: Webcast
Add Favorite
Cleaning Up Our Cyber Hygiene
Successful attacks almost always take advantage of conditions that could reasonably be described as poor cyber hygiene including the failure to patch known vulnerabilities, poor configuration management, and poor management of administrative privilege. In this session, well dig a little deeper into the idea. Well discuss the importance of cyber hygiene as a root cause issue for attacks, and as a defensive strategy. We look at various attempts...
August 7, 2020
Organizer: SANS
Location: Webcast
Add Favorite
Understanding and Leveraging the MITRE...
In this webcast, sponsor representatives and report author John Hubbard will discuss the new SANS report, "Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework." The discussion will explore themes from the paper, including: What the MITRE ATT&CK Framework is Where ATT&CK is going Best practices for using ATT&CK information Register today and learn how to leverage the information and ecosystem of tools surround...
August 6, 2020
Organizer: SANS
Location: Webcast
Add Favorite
Back to Search Begin New Search