Effective SOC processes more badly needed than more threat sharing between SOCs.
Details on "Petronius" quote on re-orgs here.
* Indicates a required field.
Building a Home Network Configured to Collect Artifacts for Supporting Network Forensic Incident ResponseBy Gordon Fraser
Protect the Network from the Endpoint with the Critical Security ControlsBy G. W. Ray Davidson, PhD
Breach Control: Best Practices in Health Care Application SecurityBy Brian Quick
Last 25 Papers »
Non-technical staff can learn from SANS as well - learn more [...]September 24, 2016 - 7:50 PM
Don't miss our exceptional Bonus Sessions at #SANSSeattle! h [...]September 24, 2016 - 7:30 PM
Take SEC401: Security Essentials Bootcamp Style w/ @jhamcorp [...]September 24, 2016 - 7:20 PM
Mon-Fri 9am - 8pm EST/EDT
"It was a great learning experience that helped open my eyes wider. The instructor's knowledge was fantastic."- Manuja Wikesekera, Melbourne Cricket Club
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.
"SANS always provides you what you need to become a better security professional at the right price."- Rasik Vekaria, BP