Pen Test HackFest Summit & Training
Learn, connect, and share with some of the most advanced cybersecurity operators in the world at this year’s Pen Test HackFest Summit. This one-of-a-kind Summit brings together all aspects of offensive operations – covering the latest research in penetration testing, exploit writing, red teaming, adversary emulation, and more. Join us at Pen Test HackFest to experience: Highly technical talks, demos, and panel discussions – P...
November 14-15, 2022
Organizer:
SANS Institute Location:
Arlington, VA
Pentera 101: Changing the Game of Offen...
This session is to walk through a demonstration of Pentera: The Automated Security Validation solution. Organizations over the years have been following a defense in depth model to protect their critical assets. While this strategy makes sense; the tools, processes, and procedures surrounding this initiative have grown significantly. How confident can organizations be that each layer and the enormous effort undertaken is working effectively? D...
Sign & Verify! How Code Signing Secures...
Some fast facts from Gartner: By 2025, 45% of organizations will have experienced attacks on their software supply chains, tripling the numbers from 2021. Half of existing supply-chain attacks are attributed to APTs or well-known attackers. Digital transformation enables enterprises of all sizes to provide value to their customers in a fast and consistent manner. One crucial consideration of that transformation is the automation and security o...
Google�s Chronicle Security Operations:...
Organizations need modern threat detection that operates at scale, and Google’s cloud-native SIEM platform, Chronicle, delivers. In our tests, we observed multiple threat detections that most organizations haven’t even pondered including in their SIEM. SIEMs in general were supposed to enable three main goals: Increase visibility Enable detection of security events Support the response of discovered security issues While those goal...
Why Malware Protection is Essential for...
In this webinar we will cover the importance of malware protection in ensuring network security for all organizations, from large enterprises to smaller companies. Key topics: The costs of not defending against malware - “being lucky is not enough” How to deploy malware protection across your organization How malware protection keeps your users/resources safe from online threats Join us for a fascinating discussion on how implement...
Data Security: Let's Talk About Cloud D...
Storing your data in cloud services doesn't always guarantee the security of it. Data loss can occur for various reasons including human errors, ransomware attacks, or other kinds of malicious deletion.It is important to understand the retention policies and data back-up strategies so we can quickly react to any threats that could lead to permanent data loss and quickly recover data. This webinar will focus on the possible external factors tha...
Seeing Cyber Threats Over the Horizon
More visibility. Most (if not, every?) cybersecurity professional will tell you they need more visibility into the threat landscape, but also their own security posture. Join SANS Analyst, Jake Williams and Chas Clawson, CTO for security with Sumo Logic, as they talk about the importance of correlating security alerts across your entire cloud and on-prem environment, and enriching with threat intelligence and other feeds for context and improv...
A Preview of Azure Hacking from SEC560:...
Modern organizations are increasingly supporting the cloud. According to Microsoft, 95% of the Fortune 500 companies are using M365. A traditional pen test is incomplete without looking for insecurities in Azure, especially when hybrid Active Directory is in use. In this webcast, Tim Medin will walk through methods to enumerate users in Azure and how to attack the users in the cloud.
Integrating Software Supply Chain Secur...
Sophisticated threat actors are turning to Software Supply Chain attacks to evade today’s defenses. Tactics include inserting malicious code into open-source repositories like npm and PyPi, developing attacks leveraging new software vulnerabilities, and infiltrating vendor development environments to insert malicious packages into their software solutions. In the last year, ReversingLabs observed a 289% increase in threats involving open...
Importance of Defining Security Functio...
For years many practitioners in the ICS security community realized that guidelines and best practices around secure PLC programming practices were lacking. To address this problem, ICS security professionals in the community pulled together to develop the Top 20 PLC controls. Beyond these controls, however, it is essential to define abnormality detections to display the information on the HMI clients. This allows operations staff to respond t...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.