.

EVENTS

home.aspx
   

SPOTLIGHT

Ransomware is a fast-growing threat affecting thousands of government agencies and municipalities—and now it’s even targeting itself toward halting critical ICS/SCADA operations. This webcast will explain why and how ransomware is spreading, introduce standards and provide guidance for d

MAY 27, 2020 | 1:00 PM
IS YOUR THREAT HUNTING EFFECTIVE? A NEW SANS SURVEY
Today, many organizations around the globe struggle with getting top-tier threat hunters. Although threat hunting has become a mandatory task to establish an acceptable level of security, the demand for skilled hunters far exceeds the number of available specialists. In this new research, SANS queri...
JUN 11, 2020 | 10:00 AM
STATE OF THE CISO DURING A TURBULENT YEAR
What is keeping CISOs up at night? What isn’t these days! Hairpin turns in direction amid a global pandemic and evolving cyber-threats have caused disruption in business continuity, supply chains and infrastructure throughout 2020. This has given rise to diverse cybersecurity challenges and ri...
JUN 11, 2020 | 10:00 AM
AVOIDING THE SECURITY PITFALLS OF DIGITAL TRANSFORMATION
According to Gartner: “Digital transformation, cloud adoption, edge computing, and mobile mean that appliance-based network security models (designed originally to protect on-premises architectures) are being replaced.”In the current business landscape, there’s no doubt that the we...
JUN 18, 2020 | 10:00 am
RANSOMWARE ATTACKS, DON’T BE A VICTIM
What are the cyberattacks global IT leaders need to be aware of in our current climate? Has the frequency or profile of attacks changed as a result of a higher number of remote workers? On Thursday 18th June a, join Chris Goettl, Director, Project Management at Ivanti, to gain visibility into the la...
JUN 24, 2020 | 11:00 AM
TAKE ACTION FROM YOUR SOAR PLATFORM TO KEEP YOUR DATA SECURE
Protecting your most critical asset, your data, is a top priority. Failing to so, could lead to a data breach and bring undesired consequences such as significant costs ranging from loss of business to expensive fines. Investing in technologies that help improve the ability to rapidly contain and re...
JUN 25, 2020 | 1:00 PM
HOW SECURE IS YOUR AZURE CLOUD ENVIRONMENT?
Join Revolutionary Security cloud experts to learn how to protect your Microsoft Azure environment. We'll explore real examples of industry issues, changes in the landscape of cloud security, and the most significant dangers currently impacting Microsoft Azure. Get recommendations you can immedi...
JUN 25, 2020 | 10:00 AM
ATTACK YOURSELF BEFORE THEY DO: STRENGTHEN SECURITY THROUGH BREACH AND ATTACK SIMULATION
Data breaches and cybersecurity attacks have not reduced in recent times, and whilst you can only do so much to protect against external attacks, you can attack yourself before they do. Using breach and attack simulation (BAS), you safely run the entire kill chain of attacks against your network to ...
JUL 02, 2020 | 10:00 AM
THE CCPA ENFORCEMENT ERA BEGINS: WHAT TO EXPECT FROM CALIFORNIA’S PRIVACY ACT
Following the introduction of the EU GDPR in 2018, the state of California introduced its own data security act this year, offering privacy standards for its consumers. Officially launched in January, the CCPA has been broadly welcomed across the industry as a refreshing take on data privacy legisla...
JUL 28, 2020 | 1:00 PM
MEASURING AND IMPROVING CYBER DEFENSE USING THE MITRE ATT&CK FRAMEWORK
In this webcast, sponsor representatives and report author John Hubbard will discuss the new SANS report, “Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework.” This roundtable will explore themes from the paper, including: Why the framework is so important to secu...
JUL 29, 2020 | 1:00 PM
CLOSING THE CRITICAL SKILLS GAP FOR MODERN AND EFFECTIVE SECURITY OPERATIONS CENTERS (SOCS): SURVEY RESULTS
Any successful security operations center (SOC) will combine skilled people, effective processes and efficient technology. Previous SANS surveys have shown that the skills of the people are the prime prerequisite to enable organizations to define critical SOC processes; create use cases, hypotheses ...
AUG 04, 2020 | 10:00 AM
USING A MANAGED SECURITY SERVICE PROVIDER IN 2020: EVERYTHING YOU NEED TO KNOW
Despite the maturity of the managed security services provider (MSSP) market, security professionals and vendors often fail to sync up as true, successful partners. Whilst the role of the MSSP has been called into use in recent months as a result of managed services being required for a largely remo...
AUG 19, 2020 | 1:00 PM
REAL-WORLD USE CASES OF METRICS THAT DEMONSTRATE EFFECTIVE SECURITY PRACTICES
This webcast takes a deeper dive into the topics explored in the SANS 2020 Metrics Survey to detail real-world use case examples of businesses selecting and using security metrics. Each speaker will detail a customer example of security metrics that helped reduce the risks posed by use of new techno...
TOP SECURITY TRENDS FOR 2016-2017
During 2015, we've continued to see changes in cyber security for organizations. Threats are evolving, becoming increasingly sophisticated and more numerous. Traditional approaches to securing IT systems have expanded to include new requirements to meet the additional demands of operational tech...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
CEO'S ROLE IN THE FIGHT AGAINST FRAUD
In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to communica...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as well as discu...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold in the so...