Learn how to detect and respond to insider threats

SANS and AWS Marketplace webinar:

How to build a detection and response strategy for insider threats

Join this webinar to learn how to build a detection and response strategy for insider threats. 

Date: Thursday, August 19th, 2021
Time: 11:00 AM PT (2:00 PM ET)
Length: 60 minutes
 
     Register Now
 
 
 
Whether intentional or accidental, insider threats can stem from overprivileged accounts, misconfigured security controls, and many other vectors. Accordingly, building a detection and response strategy is an important element of cloud security strategies. This webinar, hosted by SANS and AWS Marketplace, will overview building a threat hunting workflow designed to help prevent insider activity. 
 
Attendees will learn how to:
 
Configure monitoring and event logging for privilege escalation, data exfiltration, permissions abuse, and other anomalous behavior
Identify common vulnerabilities with a focus on DevOps and identity and access management (IAM) vectors 
Build a detection and threat hunting workflow to respond to insider activity
Develop and implement guardrails to help reduce instances of unauthorized activity and access  

Date: Thursday, August 19th, 2021    Time: 11:00 AM PT (2:00 PM ET)    Length: 60 minutes
 
Register Now
« No More Ransom Saves Victims
TeamViewer Remote Control App Gets A Security Upgrade »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Zivver

Zivver

Zivver is the effortless, secure email platform, powering the next generation of secure communications.

CodeOne

CodeOne

CodeOne provides solutions for website and web app security.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

MENAInfoSecurity

MENAInfoSecurity

MENAInfoSecurity is a regional leader in information security solutions, assurance services and managed services.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

Accolite Digital

Accolite Digital

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

Cegeka

Cegeka

Cegeka is a family-owned IT company providing end-to-end IT solutions, services & consultancy.

Positiwise Software Pvt Ltd

Positiwise Software Pvt Ltd

Positiwise Software offers end-to-end software development solutions to accelerate the digital growth of businesses.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

Merlin Ventures

Merlin Ventures

Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential.