SANS Institute spells out security in multiple languages • The Register

SANS Institute spells out security in multiple languages • The Register


Sponsored Post If any industry has sought to squeeze the most out of globalisation, it’s cybercrime. If technology is a universal language, it stands to reason that hackers’ techniques will apply to victims anywhere, regardless of geography, language, or culture.

Which is why SANS Institute endeavours to get its top class cybersecurity training out to as many people as possible.

So, if you or your team work in Bahasa Indonesian, Japanese, Korean, Thai, or Vietnamese, you’ll be pleased to know that there are two top notch sessions coming up over the next couple of months.

On July 21, at 11.30 SST (03.30 UTC), SANS senior instructor Tim Medin will be delivering a webcast on Assumed Breach – A Better Model.

This in-depth session starts with the premise that the key question for security teams is not whether a breach will occur, but when. It offers a new take on pen testing, by setting the goal of simulating a compromised system or a rogue trusted insider. This means the testers are not focused on technical wins and initial access, but on how they can impact the organization’s data and processes once they’re in.

On August 10, at 11.30 SST (03.30 UTC), SANS’s curriculum lead for SANS Cyber Defense and SANS Penetration Testing, Simon Sims, will be presenting A Dive into Windows User and Kernel Mode Exploit Mitigations.

This session will explain the in depth mitigations used to protect both Windows user mode and, increasingly, the Windows Kernel. This will include “mature mitigations” such as Address Space Layout Randomisation, and Control Flow Guard, as well as Kernel mitigations such as Virtualisation Based Security. These make it a must attend event for penetration testers, red teamers or exploit developers wanting to understand the strategies.

These are issues that affect security pros worldwide, but whatever your geography, you can ensure that you’ve got an edge over potential attackers by joining these in-depth sessions.

Just head here to register for the July WebCast and here for the event in August. And if you’re a new user, you can also register for your free SANS account, giving you access to free resources include further webcasts, white papers, research, cheat sheets and free-open source tools. Which is a great deal, in any language.

Sponsored by SANS.

You May Also Like…