SANS Top New Attacks and Threat Report

Anomali

Each year, the annual RSA Conference in San Francisco features top SANS instructors presenting their look at the new attack techniques currently in use and their projections for future exploits. This fast-paced panel--moderated by Alan Paller and featuring Heather Mahalik, Ed Skoudis and Johannes Ullrich--is one of the highest-rated keynote sessions at the conference. In this webcast, SANS Director of Emerging Technologies John Pescatore will highlight: The top new attacks and threats as defined in that presentation.
Watch Now

Spotlight

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations. With this evolving infrastructure also come security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired DI outcomes while effectively managing risks and minimizing complexities, organizations need to adopt a cybersecurity platform that provides visibility across their environment and a means to manage both security and network operations easily.

OTHER ON-DEMAND WEBINARS

Understand and Protect the Modern Attack Surface

Cylance

Join Cylance® as we discuss effective methods of risk management across three main components of the modern attack surface – endpoints, applications, and users. Each component brings with it varying methods of attack and strategies for threat mitigation. In this webinar, Cylance will discuss best practices for minimizing and protecting these critical aspects of your attack surface.
Watch Now

Live Broadcast: Be Empowered to Threat Hunt in 2019

Carbon Black

New research from Carbon Black shows that cyberattacks are becoming more frequent and more sophisticated, as nation state actors and crime syndicates continue to leverage fileless attacks, lateral movement, island hopping and counter incident response in an effort to remain undetected. This issue is compounded by resources and budgeting. Not only is there a major talent deficit in cybersecurity, there is also a major spending delta. What’s more, according to Carbon Black’s research, businesses are largely unaware about the scale, scope, and sophistication of modern attacks.
Watch Now

Cybersecurity: Prime and Subcontractor Responsibilities

Cyber security On-Demand Webinar, cyber-attack On-Demand Webinar, malware On-Demand Webinar

It’s no longer a question of if your cybersecurity will be compromised, but when. Government contractors—both prime contractors and their subcontractors—must understand the federal cybersecurity landscape to ensure compliance with its numerous (and sometimes confusing) requirements.
Watch Now

Overcoming Cloud & Security Challenges

Synoptek

74% of Healthcare organizations report leveraging the Cloud to achieve financial savings and operational efficiencies. However, recent findings show over 60% of these organizations are experiencing Cloud adoption challenges and Security anxiety. It is essential for Healthcare organizations to overcome these challenges as there is a much larger digital transformational trend ahead, where Cloud will become a crucial component of patient care innovation. Join Healthcare IT veterans from Microsoft & Synoptek, as they discuss the future of Cloud for Healthcare and best practices to help you overcome Cloud challenges and achieve higher levels of operational efficiency, security, and HIPAA compliance in the Cloud.
Watch Now

Spotlight

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations. With this evolving infrastructure also come security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired DI outcomes while effectively managing risks and minimizing complexities, organizations need to adopt a cybersecurity platform that provides visibility across their environment and a means to manage both security and network operations easily.

resources