3 Days left to get an iPad Pro with Smart Keyboard, Surface GO or $350 Off with Online Training

Webcasts

To attend this webcast, login to your SANS Account or create your Account.

It Starts With The Endpoint: Part 1 of the SANS 2018 Endpoint Security Survey Results

  • Wednesday, June 13th, 2018 at 1:00 PM EDT (17:00:00 UTC)
  • Lee Neely, Alissa Torres (moderator), Jackie Castelli, Charles Choe and Dana Torgersen
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.

Sponsors

  • Carbon Black
  • CrowdStrike
  • Endgame
  • ForeScout Technologies
  • Malwarebytes
  • Mcafee LLC
  • OpenText Inc.

You can now attend the webcast using your mobile device!

Overview

Endpoints almost always represent the first pawn in an attacker's malicious movements inside a victim environment: Phishing, ransomware, and other forms of email- and browser-based attacks are compromising user endpoints, then attackers are using those endpoints to pivot deeper into the network. Servers are also problematic, as the many successful attacks on Web, email, DNS, and network and security devices have proven. Even printers and newer forms of endpoints are coming under compromise, according to the 2017 SANS Endpoint Security Survey.

In this new 2018 survey, publishing in association with the SANS DFIR Summit, SANS revisits threats, protections and response capabilities impacting endpoints. Results are presented in a two-part webcast series. The whitepaper and webcast developed from this survey are intended to promote better endpoint hygiene and provide valuable thought leadership to the community.

In this webcast, the frst of two, we will reveal:

  • The different types of endpoints connecting to enterprise networks
  • What type of endpoints respondents consider most at risk
  • The types of exploits starting at endpoints 
  • Best and worst endpoint prevention and detection capabilities
  • The value of proactive prevention techniques such as hunting, intelligence/machine learning and vulnerability management
  • Integrative technologies and functions used to protect and defend the endpoint

Click here to register for the second webcast, on June 14, 2018, for results related to endpoint detection and response.

Attend this webcast and get early access to the associated survey whitepaper developed by SANS Analyst and mentor instructor, Lee Neely.

View the associated whitepaper here.

Speaker Bios

Lee Neely

Lee Neely, a SANS analyst and mentor instructor, teaches cyber security courses for SANS and serves as a NewsBites editor and OnDemand quality control tester. He worked with the SCORE (Security Consensus Operational Readiness Evaluation) project to develop the iOS Step-by-Step Configuration Guide and the Mobile Device Configuration Checklist included in the SEC575 course. Lee holds the GMOB, GPEN, GWAPT, GAWN, CISSP, CISA, CISM and CRISC certifications. He leads the cyber security new technology group at the Lawrence Livermore National Laboratory, working to develop secure implementations of new technology, including developing the secure configurations, risk assessments and policy updates required for its corporate and bring-your-own-device mobile devices.


Alissa Torres

Alissa Torres is a SANS analyst and certified SANS instructor specializing in advanced computer forensics and incident response (IR). She has extensive experience in information security in the government, academic and corporate environments. Alissa has served as an incident handler and as a digital forensic investigator on an internal security team. She has taught at the Defense Cyber Investigations Training Academy (DCITA), delivering IR and network basics to security professionals entering the forensics community. A GIAC Certified Forensic Analyst (GCFA), Alissa holds the GCFE, GPEN, CISSP, EnCE, CFCE, MCT and CTT+ certifications.


Jackie Castelli

Jackie Castelli, CISSP, has over 20 years of experience in the cybersecurity industry. She has gained practical security experience in her roles as a security architect and data center manager. As a director of product marketing for CrowdStrike, she is responsible for educating the market about the Falcon platform, CrowdStrike’s next-generation endpoint protection solution. Prior to CrowdStrike, Jackie worked in technical roles in pre-sales, IT and support. Jackie frequently speaks on cybersecurity topics at executive briefings and industry events.


Charles Choe

Charles Choe is a Senior Product Marketing Manager at Guidance Software (now OpenText) responsible for the OpenText EnCase Forensic Security suite of products. He brings almost 10 years of product management and marketing experience, with advanced degrees in both law and business, to the table. Charles provides insight about market trends, industry challenges and solutions to Guidance Software and its customers in the areas of cybersecurity, risk management and forensic investigations.


Dana Torgersen

Dana Torgersen is a senior product marketing manager with Malwarebytes. He is a veteran product marketer who cut his teeth in network and data center security while at Secure Computing, McAfee, Intel Security, Palo Alto Networks and security startup Illumio. Dana regularly addresses the security community across businesses, schools and government agencies, illustrating how they can protect their endpoints against advanced threats including exploits, malware and ransomware attacks. Dana holds a BS degree in Business Computer Systems from Bradley University and is based in the San Francisco Bay Area.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.