Conquering CMMC: Tackling the Most Difficult CMMC Controls
Read MoreFebruary 24, 2021
The National Institutes of Health (NIH and more specifically the National Institute of Allergies and Infectious Diseases (NIAID) is at the epicenter of research and early warnings of emerging diseases wherever they occur, which will be critical to rapid responses.…
Read MoreDecember 2, 2020
Watch this on-demand webcast to dive deeper into the themes explored in the SANS white paper “How to Address a Pervasive and Unrelenting Threat,” written by SANS instructor Justin Henderson. Along with Justin, you’ll learn from a panel of cybersecurity experts about how to protect against infection vectors, the latest trends in ransomware attacks, and how defending against ransomware changes when considering remote workforces.
Read MoreNovember 23, 2020
Ransomware is a fast-growing threat affecting thousands of government agencies and municipalities, and now it’s even targeting critical ICS/SCADA operations. Watch this on-demand webcast to learn from SANS’ Justin Henderson, who explains why and how ransomware is spreading, as well as introduces standards and provides guidance for detecting and recovering from ransomware based on US-CERT and NIST resources.
Read MoreNovember 12, 2020
Learn how to leverage best practices in DevSecOps in todays cloud-based environment and how to use the most effective tools and technologies in this webinar. This year’s survey continues to explore how organizations are extending their DevSecOps security controls beyond their on-premises environments into the public cloud to secure their cloud networks, services and applications.
Read MoreOctober 30, 2020
Now is the time to re-examine the state of security awareness so you’re better equipped to facilitate those improvements: what are the biggest gaps in awareness, what tactics can organizations implement to address these gaps, and how will security awareness evolve as the workforce evolves?
Read MoreOctober 29, 2020
Watch this on-demand webcast to learn how to make threat research an actionable part of your security operations, using recent reporting on Maze ransomware as an example.
Read MoreOctober 13, 2020
In this panel, identity and security experts will provide real-world examples about the role of attestation processes in a security risk management program, the key stakeholders involved and how it can be achieved using technologies that may already be deployed.
Read MoreOctober 9, 2020
Listen to this on-demand webcast to learn from Andrew Hollister, Head of LogRhythm Labs & Security Advisor to the CSO at LogRhythm, about why your team may be experiencing more stress than ever before, the effect executive support has on your program and some indicators on how to alleviate some of the issues your team may be facing.
Read MoreSeptember 15, 2020