This webinar is offered free of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your registration details with sponsor(s), a recorded webinar will be available approximately 30 days after its initial release through the SANS archive. To access the recording, you will need to create a SANS account, but your information will not be shared with the sponsor(s).
Agenda | March 20, 2025 | 8:30AM - 3:20PM EDT
Timeline (EDT) | Session Details |
---|---|
8:30 AM | Welcome & Opening RemarksKevin Garvey, SANS Certified Instructor |
8:45 AM | Session One | Title Coming Soon!Session Details Coming Soon! Censys |
9:25 AM | Session Two | Navigating the NVD slowdown: Using OSINT and AI to monitor critical CVEsStaying on top of vulnerabilities is challenging, and with the National Vulnerability Database (NVD) slowdown, it’s even trickier. What if those delays could spark innovation? While NIST works to address the backlog of unprocessed vulnerabilities, there are methods to track, assess, and prioritize CVEs effectively. Join us to see how Feedly Threat Intelligence is using OSINT and AI to simplify vulnerability prioritization. Bonus: Attendees will leave with a free resource to make Patch Tuesdays more manageable. Josh Darby MacLellan, Staff Threat Intelligence Advisor, Customer Success, Feedly |
10:05 AM | Break |
10:20 AM | Session Three | Pentera 101: Build Up Your Security ReadinessThis session will walk through a demonstration of Pentera: The Automated Security Validation solution. Security professionals have been following a defense in depth model for years. The ongoing challenge however, is the dynamic nature of the attack surface. Security teams are now overwhelmed with the the variables of changing internal, external, and cloud workload infrastructure. While toolsets are deployed to help mitigate some of this, process and controls need to be validated in order to understand true risk as well as whether the strategies architected are working effectively and as intended. Join Jay Mar-Tang, Field CISO, Pentera as he demonstrates how to leverage Pentera to give you the attacker’s viewpoint to validate your people, processes, and technology. Leave assumptions behind, and start validating! Jay Mar-Tang, Field CISO, Pentera |
10:50 AM | Session Four | Dark Side of Vulnerability ManagementIn today’s rapidly evolving digital landscape, organizations face an unprecedented level of exposure to cyber threats. Traditional approaches to vulnerability management often fall short, focusing solely on critical vulnerabilities while ignoring context and neglected assets. This presentation explores the "Dark Side of the Cloud" and highlights the risks posed by forgotten assets, mismanaged cloud configurations, and legacy systems that attackers actively exploit. We challenge the critical/high-only mindset by demonstrating how context transforms vulnerability urgency. For example, the same CVE can represent vastly different levels of risk depending on exposure and compensating controls. The session will discuss practical strategies to shift from vulnerability-centric management to exposure-based prioritization, focusing on actionable insights derived from real-world scenarios. We’ll also explore the pivotal role of External Attack Surface Management (EASM) in creating a comprehensive inventory of internet-facing assets, IoT, OT, and cloud environments. This new inventory approach provides the visibility organizations need to identify and mitigate risks proactively. Join us to learn how to navigate the complexities of a reactive world with a proactive strategy that addresses today’s most pressing cybersecurity challenges. Amit Sheps, Director of Product Marketing, IONIX |
11:20 AM | Session Five | Building a Continuous Threat Exposure Management (CTEM) ProgramAs organizations struggle to keep pace with an expanding attack surface, adopting a Continuous Threat Exposure Management (CTEM) program is essential for identifying, prioritizing, and mitigating risks effectively. CTEM is more than just a technology—it’s a proactive approach that integrates people, processes, and tools to continuously assess security gaps, prioritize vulnerabilities, and reduce exposure to cyber threats. Join Rapid7’s panel of experts to explore how to implement a structured CTEM program and ensure full-spectrum visibility, risk-based prioritization, and automation-driven remediation. We’ll cover critical CTEM-driven use cases, including: - Identifying security coverage gaps and ensuring compliance. - Detecting and managing Shadow IT and ungoverned assets. - Prioritizing vulnerabilities using risk intelligence and business context. - Enhancing Incident Response with enriched exposure insights. Learn how Rapid7 provides the foundation for a mature, risk-driven security program, helping organizations anticipate, pinpoint, and act on threats before they escalate. Craig Roberts, Principal Software Engineer, Rapid7 Jamie Cowper, Director of Product Marketing, Rapid7 |
11:50 AM | Break |
12:05 PM | Session Six | Be the first to know about threats with Feedly Threat IntelligenceFeedly Threat Intelligence helps cybersecurity teams collect, analyze, and share actionable open-source intelligence faster. How? Feedly scans millions of open sources for threat intelligence content, enriches the data to extract objects and entities, and helps teams prepare and share reports with their stakeholders and tools. Learn how Feedly Threat Intelligence can help you monitor changes to vulnerabilities, cyber-attacks, and threat actor TTPs. Feedly reduces the time spent collecting and reading reports, allowing you to prioritize vulnerabilities and threats faster. * Vulnerability dashboard with context including exploits, threat actors * Customized AI Feeds tailored to your risk needs * AI-powered analysis and report generation with citations * Newsletters and integrations for automated dissemination Aaron O'Maley, Customer Success Manager, Feedly |
12:25 PM | Session Seven | Title Coming Soon!Session Details Coming Soon! Censys |
12:45 PM | Session Eight | Taking Your DevSecOps to 11You’ve been tasked with ‘doing DevSecOps’ for your company and you’ve got more apps and issues than you know how to deal with. How do you make sense of the different tools' and their outputs from all your different apps? In this webinar, we’ll discuss some strategies for taking control of your vulnerability management and how you can use a tool like DefectDojo to optimize your AppSec program. Join us as we cover: -Best practices to consolidating vulnerability findings across your security tech stack -How to build automation and deduplicate repetitive findings from scans -How to use a tool like DefectDojo to take your program to the next level Matt Tesauro, CTO & Co-Founder, DefectDojo |
1:15 PM | Break |
1:30 PM | Session Nine | Title Coming Soon!Session Details Coming Soon! Esentire |
2:00 PM | Session Ten | Title Coming Soon!Session Details Coming Soon! Eclypsium |
2:30 PM | Session Eleven | Panel DiscussionSession Details Coming Soon! Censys & Feedly |
3:15 PM | Closing RemarksKevin Garvey, SANS Certified Instructor |
Frequently Asked Questions (FAQs)
Q: What is Spring Cyber Fest?
A: Spring Cyber Fest is a multi-day virtual event hosted by SANS, bringing together cybersecurity experts and practitioners to share insights, best practices, and actionable strategies across various tracks like threat hunting, cloud security, ransomware, and more. Attendees can expect expert-led sessions, hands-on demos, emerging threat insights, and networking opportunities—all at no cost.
Q: How many CPE credits can I earn?
A: You will earn 1 CPE credit for every hour you attend live or on-demand. For example, a 120-minute session earns you 2 CPE credits. This is a great opportunity to advance your professional development while learning from industry leaders.
Q: Do I need a SANS account to register?
A: Yes, a free SANS account is required to register. If you don’t already have one, creating an account is quick and easy during the registration process.
Q: What can I expect from the event if I’m new to SANS?
A: Expect high-quality, expert-led content tailored for cybersecurity professionals. Each track features sessions designed to provide practical knowledge, innovative solutions, and insights into the latest threats. You’ll also have the opportunity to ask questions and interact with presenters during live sessions.
Q: Do I need to register for reach track separately?
A: Yes, registration is required for each track you’d like to attend. With five distinct tracks, you can customize your experience by choosing the topics most relevant to you. Don’t worry—registering for multiple tracks is quick and easy!
Q: When will more details about the event be available?
A: Detailed agendas and speaker lineups will be released closer to the event date. By registering, you’ll receive updates and announcements directly in your inbox, so you’re always in the loop.
Q: Can I attend if I have a busy schedule?
A: Absolutely! Sessions are designed to be flexible, and recordings will be available on-demand after the event. You can attend live sessions whenever possible and catch up on the rest at your convenience.
Q: Is Spring Cyber Fest free to attend?
A: Yes, Spring Cyber Fest is completely free! There’s no cost to register or attend any of the sessions.
Q: Who should attend Spring Cyber Fest?
A: Spring Cyber Fest is designed for both cybersecurity practitioners and executives. The event offers a variety of sessions covering an array of topics, ensuring relevant insights for professionals across different roles, industries, and experience levels.
Q: Is the event global?
A: Yes! Spring Cyber Fest is a global event, accessible to attendees worldwide. The virtual format ensures you can join from anywhere to explore cutting-edge content and connect with the cybersecurity community.
Q: Will recordings be available?
A: Absolutely. All sessions will be recorded and made available on demand for registered attendees. You’ll have the flexibility to revisit sessions at your convenience or catch up on those you couldn’t attend live.
Q: Will there be opportunities for networking?
A: Yes, Spring Cyber Fest includes opportunities to engage with fellow attendees and speakers through live Q&A sessions and interactive chats.
Q: How do I ask questions during sessions?
A: During live sessions, you’ll have access to a Q&A chat feature where you can submit questions directly to the speakers.
Q: I’ve registered—what happens next?
A: Once registered, you’ll receive email updates with details about the event agenda, session links, and any additional information you need to make the most of Spring Cyber Fest.