SANS Miami 2024
Hands-On Cyber Security Training in Miami Celebrating 35 Years of Cybersecurity Excellence Dive into an immersive cyber security training experience at SANS Miami 2024 (June 3-15, ET). Led by world-renowned instructors boasting extensive industry experience, SANS Miami 2024 offers live access to top experts in the field. SANS Miami 2024 is equipped with industry-leading hands-on labs, simulations, and exercises that you can immediately apply u...
The Achilles Systems Hack Assessment Se...
Achilles Systems, a fictitious IT service provider to human resources teams in medium and large businesses, has fallen victim to an attack in which sensitive customer data and, potentially, customer networks, have been compromised. Achilles has a small security team who has historically focused on basic controls and compliance. However, it seems clear this attack was the work of a sophisticated adversary capable of circumventing the controls i...
Wings of Innovation: Transitioning to C...
Embark on a journey through the skies of Kubernetes as we navigate the fundamentals, deployment strategies, and security for a seamless transition from traditional cloud instances to containerized infrastructure. In the rapidly evolving realm of cloud technology, Aviata finds itself at a pivotal moment, ready to embark on a journey of transformation. With the pressing need to modernize their architecture looming large, the company sets its sig...
ICS Security Summit & Training 2024
The annual ICS Security Summit brings together the industry's top practitioners and leading experts from around the globe to share actionable ideas, methods, and techniques for safeguarding critical infrastructure. In-depth talks and interactive sessions will deliver proven advances and approaches that make a real difference for the individuals engaged in this fight every day. Choose Your Experience: In-Person or Live Online Whether you're pla...
June 16-24, 2024
Organizer:
SANS Institute Location:
Lake Buena Vista, FL
Industrial Control Systems Summit Solut...
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critica...
SANS Rocky Mountain Summer 2024
Hands-On Cyber Security Training in Denver Celebrating 35 Years of Cybersecurity Excellence Elevate your expertise with cyber security training at SANS Rocky Mountain Summer 2024 (June 17-22, MT). Led by industry-leading instructors renowned for their deep knowledge and practical insights, this event offers unparalleled, live access to your favorite cyber experts. Filled with hands-on labs, simulations, and exercises designed to equip you with...
Cyber Security Training at SANS San Ant...
Unlock the full potential of your career with cyber security training at SANS SANS San Antonio 2024 (June 24-29, CT). Guided by world-renowned instructors at the forefront of the field, this event provides exclusive access to live industry experts, ensuring you stay ahead of the curve. Immerse yourself in a learning environment that features industry-leading hands-on labs, simulations, and exercises, all geared towards practical application in...
2024 State of Security Automation Survey
Automation plays a vital role in improving capacity, efficiency, and performance in the SOC. Security teams spend far too much time “in the weeds,” unable to focus on solving the problems that matter. Security orchestration, automation, and response (SOAR) tools have the potential to streamline analysis, reduce response times, and improve quality. However, SOC teams often struggle to realize the full potential of this kind of autom...
Secure Your Multi-Cloud Environment fro...
Security teams today are dealing with endless lists of security issues, but lacking the necessary tools to effectively detect and mitigate the highest risks in their multi-cloud environment. In this session, we will unveil the latest security posture innovations in Microsoft Defender for Cloud, that empower security teams to identify security vulnerabilities spanning from code to cloud, to effectively prioritize the most business-critical risk...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.