home.aspx
 
.

Webinars

2019-2020 DDoS Threat Intelligence; Know What’s Coming
2019-2020 DDOS THREAT INTELLIGENCE; KNOW WHAT’S COMING
January 29-29, 2020
DDoS attacks are evolving both in frequency and volume. Staying ahead of the evolving threat landscape requires preemptive intel and visibility into today’s threats attack vectors. Join us for an informative webinar about the upcoming threat landscape, what we have seen, what you will face and...

The Role of School Leadership in Mitigating Cybersecurity Risk
THE ROLE OF SCHOOL LEADERSHIP IN MITIGATING CYBERSECURITY RISK
January 29-29, 2020
Independent schools reported a 90% increase in negative impacts as a result of cybersecurity incidents between 2017 and 2018. While the IT department can be an important ally, this work must be managed by senior leadership and should be part of a broader risk management strategy. Hear about challeng...

Spends and Trends: Results of the SANS 2020 Cybersecurity Spending Survey
SPENDS AND TRENDS: RESULTS OF THE SANS 2020 CYBERSECURITY SPENDING SURVEY
January 29-29, 2020
CISOs and security operations managers need information on the areas of security in which their peers plan to increase or decrease their investment. Boards of directors often lack essential benchmarking data when CISOs present security status and strategic plans to them. This survey explores what or...

SANS Automation & Orchestration Solutions
SANS AUTOMATION & ORCHESTRATION SOLUTIONS
January 30-30, 2020
Security Orchestration, Automation and Response tooling is intended to increase efficiency and consistency. These tools also promise to diminish the cost of operating a Security Operations Center (SOC) for most organizations. If used properly, these tools can do all of these things. The challenge is...

Spends and Trends: SANS 2020 Cybersecurity Spending Survey Panel Discussion
SPENDS AND TRENDS: SANS 2020 CYBERSECURITY SPENDING SURVEY PANEL DISCUSSION
January 30-30, 2020
This webcast will more closely examine the results of the SANS 2020 Cybersecurity Spending Survey. A panel of sponsor representatives, led by survey author Barbara Filkins and survey advisor John Pescatore, will explore themes that emerged during the survey. Register for this webcast to be among the...

Securing ICS Using the NIST Cybersecurity Framework and Fortinet: Best Practices for the Real World
SECURING ICS USING THE NIST CYBERSECURITY FRAMEWORK AND FORTINET: BEST PRACTICES FOR THE REAL WORLD
February 05-05, 2020
Security challenges continue to mount for industrial control systems environments dealing with legacy systems scattered across remote locations, long equipment life cycles and adoption of new technologies. The integration of operational and IT networks adds to the challenge. In this new webcast, SAN...

Making a SOAR Strategy Work For You
MAKING A SOAR STRATEGY WORK FOR YOU
February 06-06, 2020
Security operations, automation and response (SOAR) has become an essential tool for security, as it reduces manual, repetitive tasks and enables analysts to have a better working process. This can be a force multiplier for your security operations center, making life better for them? In this webina...

Implementer
IMPLEMENTER'S GUIDE TO DECEPTION TECHNOLOGIES
February 06-06, 2020
In today’s digital environment, organizations tend to have difficulty detecting attackers on their networks in a reasonable time frame. The reason: Traditional detective technologies focus on finding evil, and attackers have learned to avoid looking evil to penetrate defenses. It’s time ...

2020 SANS Cyber Threat Intelligence (CTI) Survey Results
2020 SANS CYBER THREAT INTELLIGENCE (CTI) SURVEY RESULTS
February 11-11, 2020
Over the past several years, SANS has seen a gradual maturation of cyber threat intelligence (CTI) and its applications in information security. The 2019 CTI survey saw an increase in usage of and interest in CTI, along with a diversification in how the intelligence is being used by organizations. W...

Top Five Vulnerability Management Failures
TOP FIVE VULNERABILITY MANAGEMENT FAILURES
February 11-11, 2020
We have had tools and technology to help us identify vulnerabilities for over 20 years. The Nessus project began in 1998. Qualys and Rapid7 released products shortly thereafter. Tools for identifying vulnerabilities in code were made available around the same time with AppScan, Fortify, WebInspect, ...

Discover and Eliminate Cyberattack Pathways to Critical Assets with Illusive Networks Attack Surface Manager
DISCOVER AND ELIMINATE CYBERATTACK PATHWAYS TO CRITICAL ASSETS WITH ILLUSIVE NETWORKS ATTACK SURFACE MANAGER
February 12-12, 2020
As organizations work to reduce such risks from their attack surface, most have a vulnerability management program in place to proactively remediate software weaknesses and system configuration issues before attackers can exploit thembut even with such a program, security teams struggle to discover ...

How to Improve Security Visibility and Detection Response Operations in AWS
HOW TO IMPROVE SECURITY VISIBILITY AND DETECTION RESPONSE OPERATIONS IN AWS
February 12-12, 2020
Security teams often handle a large stream of alerts, creating noise and impairing their ability to determine which incidents to prioritize. By aggregating security information from various sources and automating incident response, organizations can increase visibility into their environment and foc...

Leveraging ISO 27001 to Manage Cyber & Information Security Risks
LEVERAGING ISO 27001 TO MANAGE CYBER & INFORMATION SECURITY RISKS
February 13-13, 2020
A systematic approach to protecting key information assets is a powerful weapon in combating information risks by helping determine the types of security controls needed. This is where standards of cyber and information security come in, and ISO 27001 has been one of the most popular for many years....

2020 SANS Cyber Threat Intelligence (CTI) Survey Panel Discussion
2020 SANS CYBER THREAT INTELLIGENCE (CTI) SURVEY PANEL DISCUSSION
February 13-13, 2020
This webcast takes a deeper dive into the results of the SANS 2020 CTI Survey. SANS instructor and CTI specialist Robert M. Lee will moderate a panel that includes representatives from Anomali, DomainTools, and ThreatConnect as they explore major themes developed during the survey.

Will that be one log or two? Logging before, during, and after an attack
WILL THAT BE ONE LOG OR TWO? LOGGING BEFORE, DURING, AND AFTER AN ATTACK
February 19-19, 2020
In this webcast Craig will present pros and cons of each option and discuss some of the current standards for configuring logging on workstations, explain what types of attacks leave no, or minimal traces with regards to those configurations, and suggest additional logs to enable or collect when a h...

Automation in Data File Transfer: Improving Security and Saving You Time
AUTOMATION IN DATA FILE TRANSFER: IMPROVING SECURITY AND SAVING YOU TIME
February 20-20, 2020
Are you manually transferring numerous files in your workplace? If so, you may be opening your organization up to various security risks and threats, not to mention potentially wasting valuable time and resources. Although there are a plethora of file transfer tools available, many rely on outdated ...

Do You Need to Keep Up with the AI Trend?
DO YOU NEED TO KEEP UP WITH THE AI TREND?
February 25-25, 2020
AI has been predicted to be a future technology to keep a close eye on, bringing benefits for both a reduction in demands upon staff and better endpoint protection detection. However, is it something that your business can consider as we move into a new decade, and how can use you AI and predictive ...

Knock, Knock: Is This Security Thing Working?
KNOCK, KNOCK: IS THIS SECURITY THING WORKING?
March 11-11, 2020
Let's face facts: despite security awareness training, significant advancements in technology and increased security resources, the security problem remains unsolved. Breaches are more successful than ever. Why aren't the current solutions working? In this new webcast, SANS analyst Matt Brom...

Women in Cybersecurity: A SANS Survey
WOMEN IN CYBERSECURITY: A SANS SURVEY
March 17-17, 2020
Today, women are entering and rising through the ranks of cybersecurity experts, with more expected to join these ranks in coming years. By the end of 2019, women are expected to represent 20% of the global cybersecurity workforce, up dramatically from 2013, when only 11% of the workforce was female...

Faster, Better, AND Cheaper: Improving security operations using open source tools
FASTER, BETTER, AND CHEAPER: IMPROVING SECURITY OPERATIONS USING OPEN SOURCE TOOLS
March 18-18, 2020
Let's face it, a well-run cyber defense operation doesn't often meet the definition of inexpensive by any standards, but does it necessarily require many thousands of dollars in fancy vendor tools? With the maturation of open source tools, the answer to that question is now a definite "...

How to Become a Cyber-threat Intelligence Analyst
HOW TO BECOME A CYBER-THREAT INTELLIGENCE ANALYST
March 19-19, 2020
The U.S. Bureau of Labor Statistics projects that employment in Information Security will grow 32% from 2019 to 2028, which is swifter than the average for all professions. Cyber-threat Intelligence is a crucial part of the cybersecurity dilemma. Threat Intelligence Analysts are experts capable of f...

Women in Cybersecurity: A SANS Survey Panel Discussion
WOMEN IN CYBERSECURITY: A SANS SURVEY PANEL DISCUSSION
March 24-24, 2020
In this webcast, sponsor representatives and survey author, forensic examiner and SANS instructor Heather Mahalik will discuss results from our Women in Cybersecurity survey.

SANS Cyber Threat Intelligence Solutions Forum
SANS CYBER THREAT INTELLIGENCE SOLUTIONS FORUM
March 27-27, 2020
SANS certified instructor and author of the "ICS Active Defense and Incident Response" and "Cyber Threat Intelligence" courses, is the founder and CEO of Dragos, a critical infrastructure cybersecurity company, where he focuses on control system traffic analysis, incident respons...

Network Visibility and Threat Detection: A SANS Survey
NETWORK VISIBILITY AND THREAT DETECTION: A SANS SURVEY
April 01-01, 2020
Visibility into the entire hybrid ecosystem is essential to protecting your organization’s most critical assets. This survey is designed to understand the current state of organizations’ level of visibility and access to the data they need to understand what is connected to enable them t...

Driving Cybersecurity Change – Establishing a Culture of Protect, Detect and Respond Highlights
DRIVING CYBERSECURITY CHANGE – ESTABLISHING A CULTURE OF PROTECT, DETECT AND RESPOND HIGHLIGHTS
April 07-07, 2020
Cybersecurity is no longer just about technology it is ultimately about organizational change. Change in not only how people think about security but what they prioritize and how they act, from the Board of Directors on down. Organizational change is a field of management study that enables organiza...

AI, machine learning, behavioral analysis and blockchain: The next generation of cybersecurity
AI, MACHINE LEARNING, BEHAVIORAL ANALYSIS AND BLOCKCHAIN: THE NEXT GENERATION OF CYBERSECURITY
April 15-15, 2020
AI, machine learning, behavioral analysis, and blockchain are on the bleeding edge of security solutions technology, and may be the key to current and future threat detection and mitigation. While many companies are just beginning to explore uses for these technologies, many security technology vend...

SPOTLIGHT

DDoS attacks are evolving both in frequency and volume. Staying ahead of the evolving threat landscape requires preemptive intel and visibility into today’s threats attack vectors. Join us for an informative webinar about the upcoming threat landscape, what we have seen, what you will face and