Learn how to detect and respond to insider threats

SANS and AWS Marketplace webinar:

How to build a detection and response strategy for insider threats

Join this webinar to learn how to build a detection and response strategy for insider threats. 

Date: Thursday, August 19th, 2021
Time: 11:00 AM PT (2:00 PM ET)
Length: 60 minutes
 
     Register Now
 
 
 
Whether intentional or accidental, insider threats can stem from overprivileged accounts, misconfigured security controls, and many other vectors. Accordingly, building a detection and response strategy is an important element of cloud security strategies. This webinar, hosted by SANS and AWS Marketplace, will overview building a threat hunting workflow designed to help prevent insider activity. 
 
Attendees will learn how to:
 
Configure monitoring and event logging for privilege escalation, data exfiltration, permissions abuse, and other anomalous behavior
Identify common vulnerabilities with a focus on DevOps and identity and access management (IAM) vectors 
Build a detection and threat hunting workflow to respond to insider activity
Develop and implement guardrails to help reduce instances of unauthorized activity and access  

Date: Thursday, August 19th, 2021    Time: 11:00 AM PT (2:00 PM ET)    Length: 60 minutes
 
Register Now
« No More Ransom Saves Victims
TeamViewer Remote Control App Gets A Security Upgrade »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Open Information Security Foundation (OISF)

Open Information Security Foundation (OISF)

OISF is a non-profit organization led by world-class security experts, programmers, and others dedicated to open source security technologies.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

Onesecure Asia

Onesecure Asia

ONESECURE Asia’s expertise and services are built around its mission to provide reliable, robust and scalable technology solutions to cater for its customers’ needs.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

Secfix

Secfix

Secfix helps companies get secure and compliant in weeks instead of months. We are on a mission to automate security and compliance for small and medium-sized businesses.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.

SecureDApp

SecureDApp

SecureDApp is a blockchain security company that specialises in offering comprehensive security solutions to companies operating in the web3 space.