3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools

Infocyte

In this webinar, we compare Forensic State Analysis (FSA) cyber threat hunting against three traditional methods of cyber threat hunting… Expert threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.
Watch Now

Spotlight

Herbert Lin, a senior research scholar for cyber policy and security at the Center for International Security and Cooperation and a research fellow at the Hoover Institution, both at Stanford University; and John Villasenor, a national fellow at Hoover and a professor of electrical engineering and public policy at the University of California at Los Angeles, discuss emerging technologies and the challenges of cybersecurity. They ask whether the private sector can react more proactively to prevent hacking. They say two types of companies exist in the United States: those that have been hacked and those who don’t know they have been hacked. Lin and Villasenor go on to discuss strategies to prevent or reduce or both the pain of cyberattacks.

OTHER ON-DEMAND WEBINARS

The State of Cloud Security: Results of the SANS 2019 Cloud Security Survey

Sysdig

Cloud is part of today's infrastructures, and infrastructures are part of clouds. Are security infrastructures maturing to support the business and improve risk management in the cloud model? How are organizations using the public cloud to meet their business needs? This webcast will explore the results of the SANS 2019 Cloud Security Survey, conducted in cooperation with the Cloud Security Alliance, concerning organizations' use of the public cloud and will provide actionable advice for attendees to improve their cloud security. Attendees will learn about the: Types of applications that are implemented most frequently through the cloud. Number of public cloud providers most organizations use.
Watch Now

Register for the Nautilus cyber-security webinar

Nautilus

Cyber-security is an increasing challenge for the shipping industry and Nautilus is stepping in to help members by co-hosting a special training webinar for seafarers in September. With high profile ransomware attacks on shipping companies such as Maersk and COSCO, operators are under pressure to improve their cyber-security and to develop improved measures to protect their systems from attack. However, there is evidence that many companies are not doing enough to educate seafarers about the risks of cyber-attacks or how to avoid them. Research by Nautilus showed that 86% of crew had never received any cyber security training from their employers. The Union is teaming up with security experts Appsecco and their specialist maritime division ShipSecure, to hold a webinar to raise awareness of cyber security issues onboard.
Watch Now

Ask the experts: What’s the worst web application security issue?

Synopsys

We know. It’s an impossible question to answer. There’s no such thing as a “worst web application security issue,” because every app and every organization has its own unique set of issues. But if you’re a development organization with limited resources, how do you know where to start? Which issues appear over and over in data breaches, exploits, and top N lists such as the OWASP Top 10? We asked some experts—and Twitter—to give us their opinions.
Watch Now

Combat Supply Chain Enterprise and Ecosystem Cybersecurity Threats

As cyber attacks pose a growing, more serious threat to supply chain operations, our supply chains are not as secure as they should be. Supply chain leaders are not experts in cybersecurity, and they need to establish tight governance approaches with IT and security counterparts across the enterprise to protect supply chain IT, cyber-physical systems, and products. The threat vectors extend well beyond the enterprise, reaching into the third-party supply chain ecosystems. This complimentary webinar explores the cyber risks that supply chains face, and the steps supply chain leaders can take to manage those risks, including talent, collaboration and transparency approaches.
Watch Now

Spotlight

Herbert Lin, a senior research scholar for cyber policy and security at the Center for International Security and Cooperation and a research fellow at the Hoover Institution, both at Stanford University; and John Villasenor, a national fellow at Hoover and a professor of electrical engineering and public policy at the University of California at Los Angeles, discuss emerging technologies and the challenges of cybersecurity. They ask whether the private sector can react more proactively to prevent hacking. They say two types of companies exist in the United States: those that have been hacked and those who don’t know they have been hacked. Lin and Villasenor go on to discuss strategies to prevent or reduce or both the pain of cyberattacks.

resources