Learn how to detect and respond to insider threats
Uploaded on 2021-08-03 in FREE TO VIEW
SANS and AWS Marketplace webinar:
How to build a detection and response strategy for insider threats
Join this webinar to learn how to build a detection and response strategy for insider threats.
Date: Thursday, August 19th, 2021
Time: 11:00 AM PT (2:00 PM ET)
Length: 60 minutes
Whether intentional or accidental, insider threats can stem from overprivileged accounts, misconfigured security controls, and many other vectors. Accordingly, building a detection and response strategy is an important element of cloud security strategies. This webinar, hosted by SANS and AWS Marketplace, will overview building a threat hunting workflow designed to help prevent insider activity.
• Configure monitoring and event logging for privilege escalation, data exfiltration, permissions abuse, and other anomalous behavior
• Identify common vulnerabilities with a focus on DevOps and identity and access management (IAM) vectors
• Build a detection and threat hunting workflow to respond to insider activity
• Develop and implement guardrails to help reduce instances of unauthorized activity and access
Date: Thursday, August 19th, 2021 Time: 11:00 AM PT (2:00 PM ET) Length: 60 minutes