OSINT Summit 2022
Connect the dots with OSINT The Open-Source Intelligence (OSINT) Summit will bring together OSINT practitioners, investigators, and enthusiasts alike to share their OSINT techniques and tools. As an attendee, you will learn current, real-world methods from others in the OSINT community who collect information across the Internet, analyze the results, and utilize key data to reach their objectives. The OSINT Summit will explore the following to...
April 7, 2022
Organizer:
SANS Location:
Webcast
SANS Pen Test Austin 2022
Cutting-Edge Offensive Operations Training Attend in Austin, TX or Live OnlineSANS Pen Test Austin 2022 is six days of in-depth, hands-on penetration testing, red teaming, purple teaming, and exploit development training for professionals who need to know how to find vulnerabilities within their organizations, understand risk, and prioritize resources based on potential real-world attacks.This event isn't just for penetration testers or red te...
March 28 - April 2, 2022
Organizer:
SANS Institute Location:
Austin, TX
SANS San Francisco Spring 2022
Hands-On Cyber Security Training Taught by Real-World PractitionersAttend in San Francisco, CA or Live OnlineExperience immersive cyber security training relevant to today’s top cyber threats. Join us in San Francisco or Live Online for SANS San Francisco Spring 2022 (March 21-26), and learn from experienced industry practitioners.SANS San Francisco Spring 2022 Features In-Person or Live Online training (see Available Courses for details...
March 21-26, 2022
Organizer:
SANS Institute Location:
San Francisco, CA
New2Cyber Summit 2022
New to cybersecurity, looking for a career change, or just want to enhance your skillset? We can help! Cybersecurity offers some of the most challenging and well-paying careers around, and by some estimates, up to 35% of cybersecurity jobs openings go unfilled. The SANS New2Cyber Summit will get you started with the skills you need to succeed in the industry. This free online event brings together leading experts eager to share the fundamental...
March 23-24, 2022
Organizer:
SANS Location:
Webcast
ICS Proactive Defense: Leveraging Opera...
Threat hunting in ICS environments must consider safety. IT and ICS systems have different missions, objectives, impacts during an incident, and different assets like embedded operating systems, and engineering devices speaking non-traditional industrial protocols. Adversaries targeting ICS must use different attack tactics and techniques for access, execution, collection, and persistence, etc., to degrade safety, manipulate control, damage ph...
SANS 2022 Cloud Security Survey
The state of cloud security is evolving. Many organizations are implementing new and more advanced cloud security services that offer cloud-focused controls and capabilities, including services and tools that provide network connectivity and security for end users and office locations, security monitoring and policy controls, and identity services, among others. The SANS 2022 Cloud Security Survey explores the types of services organizations a...
Threat-informed Operational Technology...
Protecting critical infrastructure through Operational Technology (OT)/Industrial Control System (ICS) cyber defense is an ever-changing and evolving field required to continually adapt cybersecurity strategics to meet new challenges and threats—all while maintaining the safety and reliability of facilities and production operations. The purpose of this survey is to poll organizations that operate OT systems– this includes ICS, OT,...
2022 SANS Survey: Securing Infrastructu...
Our 2022 Survey on infrastructure operations is designed to explore how organizations are utilizing cloud-native applications and integrating those applications within their security monitoring and response capabilities. We continue to see growth of adopting of cloud-native applications, but larger issues always remain. As we adopt and utilize more and more cloud-native applications, is the security team able to keep up with newer forms of tel...
ICS Proactive Defense - Leveraging Oper...
Threat hunting in ICS environments must consider safety. IT and ICS systems have different missions, objectives, impacts during an incident, and different assets like embedded operating systems, and engineering devices speaking non-traditional industrial protocols. Adversaries targeting ICS must use different attack tactics and techniques for access, execution, collection, and persistence, etc., to degrade safety, manipulate control, damage ph...
SANS 2022 Cyber Threat Intelligence Survey
Over the past year, the world continued to shift—remote work was extended, sometimes permanently, the workforce expanded in some places and contracted in others, and the concepts of essential work and services were redefined. Throughout all this change, cyber threat intelligence professionals needed to adapt, stay focused, and watch for similar changes in the threat landscape. The 2022 CTI Survey webcast tracks the changes in both the wo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.