Increasingly, employers and enterprises are engaged in cyber investigations. Understanding the Techniques of Malicious Kernel-Mode Code, Cyber42 Game Day: Vulnerability Management, Zeek Log Reconnaissance with Network Graphs Using Maltego Casefile, Replacing WINS in an Open Environment with Policy Managed DNS Servers, Industrial Traffic Collection: Understanding the implications of Deploying visibility without impacting production, Continuous learning is the minimum requirement for success i [...], Find out how Airbus CyberSecurity @AirbusCyber stays on top [...], We often hear "follow the playbook" but what makes playbook? If you are like a lot of IT project managers, your budget and resources have not kept pace with demand. Cyber-security professionals who earn the industry's most acclaimed certification earn up to 15% more than their counterparts. You'll gain useful insights as he reviews key skills and qualities of successful project managers-like understanding how to prioritize project tasks and reduce risk to avoid project failure. Learn all about this industry-leading certification in this webcast. With the proliferation of mobile computing, cloud computing, and innovative use for the Internet, no organization should take yesterday's segmentation best practices for granted. If you are being tasked to "do more with less" or if you simply want to be more efficient and improve the success rates of your projects, this webcast is for you. SANS is the most trusted and by far the largest source for information security training in the world. It's unlikely he's calling with good news. Achieving ICS Network Security Monitoring and Visibility with Flow Data Speakers: Robert M. Lee and Chris Sanders View Webcast, Repeat after me, I will be breached. As operating environments become more global, more competitive, and more demanding, so do your projects.
Types of Webcasts: Ask The Expert Webcasts: SANS Experts bring current and timely information on relevant topics in IT Security. The foolproof way to avoid a call from Brian Krebs is to become a stalwart defender. Walk through several new and proven techniques with leading security expert John Strand. By Daniel Behrens, Continuous learning is the minimum requirement for success i [...]September 23, 2020 - 1:10 PM, Find out how Airbus CyberSecurity @AirbusCyber stays on top [...]September 23, 2020 - 11:25 AM, We often hear "follow the playbook" but what makes playbook? Sat-Sun: 9am-5pm ET (email only) This talk will help you face the problems and describe how to move your organization to a more defensible security architecture that enables continuous security monitoring. emea@sans.org, "As a security professional, this info is foundational to do a competent job, let alone be successful. cyber-defense@sans.org, How to Deploy the Critical Controls in a Windows Environment with Jason Fossen, The Crazy New World of Cyber Investigations: Law, Ethics, and Evidence, How to Avoid a Phone Call from Brian Krebs - The Basics of Intrusion Detection and Prevention with Mike Poor, Using an Open Source Threat Model for Implementing the Critical Controls, Continuous Monitoring, Real World Analysis and Strategies to Mitigate Targeted Attacks; Bonus Story Behind The Top 4 Mitigations, Continuous Monitoring and Real World Analysis, https://prezi.com/xukhuqulaqkf/continuous-monitoring-and-real-world-analysis/, Make it Hard for the Adversary: Learn Offensive Counter Measures with John Strand, How to Be More Effective and Improve the Success Rates of Your IT Projects. While the "malicious" insider will always be a concern, that is not the primary area of damage for most organizations today. The prevalence of breaches calls for stronger, more effective security measures in a rapidly evolving IT environment. Building a cybersecurity foundation for your organization is not rocket science, but building the right one could be. And that is only one of the benefits. But to be successful, you have to defend against an array of attacks. Likewise, they need advice from lawyers, auditors, and managers with expertise in cyber investigations and the development of policy on data security, computer evidence, and individual privacy. Active Defenses have been capturing a large amount of attention in the media lately. Most organizations realize this fact too late; usually after a third party informs them - months after the initial compromise. Windows Server 2016 will also soon be available, so we'll also cover what's new and interesting on the server side too, such as Virtual TPM chips in Hyper-V client VMs. SANS Information Security Webcasts are live web broadcasts combining knowledgeable speakers with presentation slides.

The speaker, Jason Fossen, is a SANS Institute Fellow and author of the SANS Securing Windows course (http://sans.org/SEC505). How To Frustrate Your Adversary: Active Defense, Offensive Countermeasures & Cyber Deception with Bryce Galbraith - Part 1, Certifications that Matter: Passing the CISSP, How to Build a Cybersecurity Platform the Easy Way, Continuous Ownage: Why you Need Continuous Monitoring, Top 3 Threats to Retail IT Security and How You Can Defend your Data, Network Segmentation Best Practices for Defense, The Critical Security Controls: From Adoption to Implementation A SANS Survey, SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART II, SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART II Afternoon Session.