A SANS Survey

Endpoint Protection and Response

MLabs_logo.png
2:30pm PST
Add to Calendar
12/16
2:30pm PST
Add to Calendar

What Will I Learn?

EXAMPLE #1 OF INFORMATION

Lorem ipsum sit dolor amet con siquit epidor anomaly cheese brain situation gtl omega fatty acid.

EXAMPLE #2 OF INFORMATION

Lorem ipsum sit dolor amet con siquit epidor anomaly cheese brain situation gtl omega fatty acid.

EXAMPLE #3 OF INFORMATION

Lorem ipsum sit dolor amet con siquit epidor anomaly cheese brain situation gtl omega fatty acid.

EXAMPLE #4 OF INFORMATION

Lorem ipsum sit dolor amet con siquit epidor anomaly cheese brain situation gtl omega fatty acid.

Abstract:

Endpoints almost always represent the first pawn in an attacker's malicious movements inside a victim environment: Phishing, ransomware, and other forms of email- and browser-based attacks are compromising user endpoints, then attackers are using those endpoints to pivot deeper into the network. Servers are also problematic, as the many successful attacks on Web, email, DNS, and network and security devices have proven. Even printers and newer forms of endpoints are coming under compromise, according to the 2017 SANS Endpoint Security Survey.


In this new 2018 survey, publishing in association with the SANS DFIR Summit, SANS revisits threats, protections and response capabilities impacting endpoints. The whitepaper developed from this survey is intended to promote better endpoint hygiene and provide valuable thought leadership to the community.


Key Takeaways

  • The different types of endpoints connecting to enterprise networks
  • What type of endpoints respondents consider most at risk
  • The types of exploits starting at endpoints
  • Best and worst endpoint prevention and detection capabilities
  • The value of proactive prevention techniques such as hunting, intelligence/machine learning and vulnerability management
  • Integrative technologies and functions used to protect and defend the endpoint

Presenters

Speaker Name

Speaker Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Speaker Name

Speaker Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Speaker Name

Speaker Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Speaker Name

Speaker Title

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Where
Booth #2201

Convention Center Hall
San Luis Obispo, CA


See a floor map
Download
Agenda
2:00-2:15 Introductions
2:15-2:45 Malware overview and ransomware intro
2:45-3:00 Q&A

Speaker Name

Speaker Title

Speaker Name

Speaker Title

Speaker Name

Speaker Title

Speaker Name

Speaker Title

DON’T MISS OUT ON THIS INFORMATIONAL WEBINAR

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Sign Up Today

Register