home.aspx
 
.

Webinars

The CCPA Enforcement Era Begins: What to Expect from California’s Privacy Act
THE CCPA ENFORCEMENT ERA BEGINS: WHAT TO EXPECT FROM CALIFORNIA’S PRIVACY ACT
July 02-02, 2020
Following the introduction of the EU GDPR in 2018, the state of California introduced its own data security act this year, offering privacy standards for its consumers. Officially launched in January, the CCPA has been broadly welcomed across the industry as a refreshing take on data privacy legisla...

Attacking and Defending Cloud Native Infrastructure
ATTACKING AND DEFENDING CLOUD NATIVE INFRASTRUCTURE
July 16-16, 2020
Andy has made mistakes. He's seen even more. And in this talk he details the best and the worst of the container and Kubernetes security problems he's experienced, exploited, and remediated. This talk details low level exploitable issues with container and Kubernetes deployments. We focus on...

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
MEASURING AND IMPROVING CYBER DEFENSE USING THE MITRE ATT&CK FRAMEWORK
July 21-21, 2020
Through the ATT&CK framework, MITRE has generated a gold mine of information about the most important tactics and techniques used by attackers and how the blue team can detect and prevent these actions. Blocking atomic attack indicators such as domain names and IP addresses might work in the sho...

Taming the IT Infrastructure Monster in 5G Networks
TAMING THE IT INFRASTRUCTURE MONSTER IN 5G NETWORKS
July 24-24, 2020
As communications service providers (CSPs) begin deploying 5G, they will leverage Network Functions Virtualization (NFV) where software is disaggregated from hardware. However, NFV implies a shift in end-to-end validation responsibility from equipment vendors to system integrators or CSPs themselves...

Real-World Use Cases of Metrics That Demonstrate Effective Security Practices
REAL-WORLD USE CASES OF METRICS THAT DEMONSTRATE EFFECTIVE SECURITY PRACTICES
August 19-19, 2020
This webcast takes a deeper dive into the topics explored in the SANS 2020 Metrics Survey to detail real-world use case examples of businesses selecting and using security metrics. Each speaker will detail a customer example of security metrics that helped reduce the risks posed by use of new techno...

Threat Horizon 2022: Digital and physical worlds collide
THREAT HORIZON 2022: DIGITAL AND PHYSICAL WORLDS COLLIDE
September 02-02, 2020
The digital and physical worlds are on an irreversible collision course. By 2022, organisations will be plunged into crisis as ruthless attackers exploit weaknesses in immature technologies and take advantage of an unprepared workforce. At the same time, natural forces will ravage infrastructure. In...

Getting Ready for DOCSIS 4.0
GETTING READY FOR DOCSIS 4.0
September 17-17, 2020
Now that DOCSIS 3.1 is almost universally deployed, cable technologists are rolling up their sleeves again to craft yet another next-gen version of DOCSIS. Known as DOCSIS 4.0, this emerging set of specs will incorporate the features of both Full Duplex DOCSIS (FDX) and Extended Spectrum DOCSIS (ESD...

Live Learning Webinar Series: Virtualizing the Cable Access Network
LIVE LEARNING WEBINAR SERIES: VIRTUALIZING THE CABLE ACCESS NETWORK
October 22-22, 2020
Following a relatively late start, the cable industry is now staking out its own turf in the network virtualization space. Led by such major MSOs as Comcast, Liberty Global and Cox, cable operators and their technology partners are particularly moving ahead with the virtualization of the cable acces...

Virtualizing the Cable Access Network
VIRTUALIZING THE CABLE ACCESS NETWORK
October 22-22, 2020
Following a relatively late start, the cable industry is now staking out its own turf in the network virtualization space. Led by such major MSOs as Comcast, Liberty Global and Cox, cable operators and their technology partners are particularly moving ahead with the virtualization of the cable acces...

Extending DevSecOps Security Controls into the Cloud
EXTENDING DEVSECOPS SECURITY CONTROLS INTO THE CLOUD
October 28-28, 2020
In previous years, SANS research has examined how security and risk management leaders are leveraging modern technologies, such as infrastructure as code, containerization and security automation, to manage security in fast-paced Agile and DevOps environments. In this years survey, authors Jim Bird ...

Ransomware Prevention Special Report: How to Address a Pervasive and Unrelenting Threat
RANSOMWARE PREVENTION SPECIAL REPORT: HOW TO ADDRESS A PERVASIVE AND UNRELENTING THREAT
November 19-19, 2020
Ransomware is a fast-growing threat affecting thousands of government agencies and municipalities—and now it’s even targeting itself toward halting critical ICS/SCADA operations. This webcast will explain why and how ransomware is spreading, introduce standards and provide guidance for d...

Testing the Next-Gen Cable Network
TESTING THE NEXT-GEN CABLE NETWORK
November 19-19, 2020
Cable technologists love to expound about the potential of DOCSIS 4.0, Distributed Access Architecture (DAA), Fiber Deep, network virtualization and the like. But, even as cable operators and their tech partners push ahead with HFC network upgrades and deployments of new technologies, they are also ...

SPOTLIGHT

Andy has made mistakes. He's seen even more. And in this talk he details the best and the worst of the container and Kubernetes security problems he's experienced, exploited, and remediated. This talk details low level exploitable issues with container and Kubernetes deployments. We focus on