SANS@Night - Pay to Play: Surviving and...
When cybercriminals hold your data hostage, do you pay the ransom or call their bluff? In 2024, only 25% of organizations paid ransoms—an all-time low—yet those who did pay still only achieved 46% full data recovery. In this talk, we'll dissect the high-stakes world of ransomware negotiations, where million-dollar decisions happen under extreme pressure. Drawing from real-world negotiation transcripts and the groundbreaking Coinbas...
SANS@Night - From Servant to Surrogate:...
Organizations keep deploying AI "agents" without understanding what autonomy level they're getting or what governance it warrants. Chinese state-sponsored hackers used Claude Code to automate a cyberattack campaign across 30 organizations. Replit's AI coding agent deleted a production database, then tried to cover up its mistake. These aren't anomalies. They're predictable governance failures. The Misenar 4A Model maps AI autonomy across four...
SANS@Night - How I've Changed the Way I...
I've been a heavy user of AI since the beginning, but the way that I use AI has recently shifted. In this fast-paced, fun talk, we'll cover the top ways that I've improved my efficiency and productivity by changing the way I interact with AI in 2025 and into 2026.
SANS@Night - A Current Look at the Thre...
In this talk we will take a look at the most recent attack techniques, targets, and trends. This includes understanding what kind of malware and illicit access items are available on the dark web for sale and how it can be the first sign of a breach, social engineering attacks, and the latest on 0-day and n-day vulnerability research. Artificial Intelligence is an aggressively growing area where we can both use the technology as an attack aid...
Cybersecurity Insights - An Interactive...
As a known hub for the direction of geopolitics, sanctions, and trade, the Department of State is an attractive target for advanced nation-state threat actors motivated more by a desire for information than by greed, and as public-facing representatives of the U.S. overseas, diplomat staff and buildings don’t have the benefit of anonymity. Deputy Assistant Secretary Gharun Lacy will share Diplomatic Security's cybersecurity strategies fo...
Building Your Security Culture Strategy...
Any security team can start building and driving a strong security culture now, but you need to start first with strategy. In this short webcast, you’ll learn how to create a practical strategy and roadmap tailored for your organization. Using lessons from the SANS LDR521 course, Lance Spitzner will start with how to decipher your organizational culture and how to use that to create your guiding principles. We then will cover the four ke...
Silence of the Logs: Detecting Defense...
When attackers get their hands on privileged credentials in cloud environments, their first move is rarely the big flashy action we expect. Instead, they're quietly turning off the alarms. Defense impairment has become a go-to tactic for adversaries who want to operate undetected in AWS and Azure environments, and it's working because teams aren't watching for it. This talk will walk through real-world defense impairment techniques across AWS...
Bootstrap: How To Start Anything
Bootstrap’. A term that means starting with existing resources is often associated with startups, but its principles extend far beyond the business world. From tech companies and open-source projects to conferences and charities, countless successful initiatives began through bootstrapping. Notable examples include Tenable, Sourcefire (acquired by Cisco for $2.7 billion), Malwarebytes, and SolarWinds, all of which were bootstrapped. In t...
Securing Gen AI RAG Data using Azure AI...
Large Language Models (LLMs) and Generative AI have inherent limitations, such as outdated knowledge, lack of private data access, and the potential for hallucinations. In this session, we will introduce a strategy for overcoming these challenges: Retrieval-Augmented Generation (RAG). Attendees will see how a GenAI RAG application can provide access to real-time, private data stored in an external knowledge base without needing to fine-tune th...
Building a Safety-Aligned ICS/OT Cybers...
Many organizations still apply IT-style assumptions to industrial environments, creating blind spots that put safety and operations at risk. In this webcast, SANS Principal Instructor and ICS418 co-author Dean Parsons shares the most common leadership pitfalls he encounters across sectors like energy, manufacturing, pharmaceuticals, transportation, logistics, and food & beverage, and how to avoid them. Dean will show how to anchor governan...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.