One of the biggest challenges awareness officers struggle with is we have so little data to make decisions. The 3rd annual SANS Security Awareness Report changes that. With feedback from over 1,000 awareness professionals, we provide you data driven action items you can take to build, maintain and measure a high-impact program
Do you know someone who uses the same username across multiple social media sites? What about friends that share their personal information with anyone in the world by not securing their online profiles? Attackers commonly gather data from victim profiles prior to attacking them with phishing emails, identity theft attempts and other cyber attacks.
Criminals are after valuable data in your computers physical memory. Credit card numbers, banking credentials, encryption keys, even your company's intellectual property can all be found in memory even if it is encrypted on your hard drive. What can we do to protect this information from theft? Alissa Torres, SANS lead author of FOR526 Memory Forensics In-Depth, reveals just what can be recovered from memory by todays malware and best practices for keeping the criminals at bay.
After working with over 1,000 organizations on building, maintaining and measuring their awareness program, we have found a common theme. In this webcast we cover how organizations can address these issues by focusing on the 3 Cs of awareness: Communications, Collaboration and Culture.
How do organizations take control of their application security? Chances are, at any given moment, your organization's applications are under attack. The bad guys see your applications as the front door, and a single bad line of code allows them entry. Through a mobile app, web application, or REST API, attackers can pivot to a backend database, your business partner's workstation, or even a payment processing vendor. As development teams continue to push new applications to web, mobile, and cloud environments, the need for an application security program is at an all-time high.