How to Develop Military-Grade Cybersecurity

Join this session to hear from Mike Walls, a US Navy officer with combat cyber operations experience, who will share insights on how to keep your organizations' data secure against the most persistent and motivated cyber adversaries.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

What Professional Services Organizations Need To Thrive in a Dynamic and Disruptive Market

Professional services (PS) organizations have their own unique set of challenges and customer requirements that aren't well served by general SaaS applications, legacy industry applications or common systems of record. Like many other sectors, the PS industry has been impacted by the trend away from general technology solutions
Watch Now

2022 SANS Survey: State of Cloud Security in the Enterprise

More and more enterprises have moved their infrastructure and operations to the cloud than ever before. Along with these changes, we have also seen a significant change in enterprise security posture and use of technology. However, what does that change look like? How have security teams kept up with the change? Just what is the state of cloud security in the enterprise?
Watch Now

3 Flaws with the Defense-in-Depth Security Model and How to Improve It

Infocyte

Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these attacks are organized and can persist in your organization’s systems and endpoints without detection for 6 months on average – sometimes years. The approach many organizations take to prevent these attacks is to simply layer on increasing numbers of defensive solutions – clearly a better approach is needed.
Watch Now

THE DIFFERENCE BETWEEN ENDPOINT PROTECTION AND TRADITIONAL ANTIVIRUS

SentinelOne

Traditional antivirus solutions require a list of virus definitions - or "signatures" to detect known viruses and malware. But with nearly 1 million new malware threats released - every day, it is no wonder traditional antivirus can no longer cope. Learn the difference between traditional AV and Endpoint Protection. Discover the difference between signature-based and behaviour-based detection, and the fundamental differences between Antivirus and Endpoint Protection.
Watch Now