Expecto Privacy: Casting Security on Data
In an era where data breaches and privacy concerns are increasingly prevalent, safeguarding personal and organizational information has become paramount. This presentation, “Expecto Privacy: Casting Security on Data,” delves into the critical aspects of privacy and security, exploring the intersection where they meet to protect sensitive data. We will examine key privacy items under various privacy regulations such as GDPR. Additio...
SANS 2025 CTI Survey Webcast & Forum: N...
As the cyber threat landscape continues to evolve, the past year has presented unique challenges and opportunities for cyber threat intelligence professionals. For 2025, availability has become a critical focus within the CIA triad, with ransomware and service outages high on the agenda, and network defenders and CTI analysts acutely aware of the impact of large-scale network disruptions. Additionally, AI remains a double-edged sword, with bot...
Resiliency and Business Continuity in t...
As more organizations leverage cloud services for critical business and security operations, many are realizing that new potential points of failure are a concern. When service providers and other cloud-based third parties experience outages or other issues, it can lead to downtime or gaps in security control coverage. With a growing movement toward cloud-based user access, zero trust, identity services hosted in the cloud, and more, it...
SANS Ransomware Summit 2025
Ransomware attacks are widespread because they are highly profitable and effective for cybercriminals. Many organizations are unprepared for such attacks, leading to serious financial and operational damage. The SANS Ransomware Summit brings together cybersecurity professionals to share insights on preventing, detecting, and recovering from ransomware. The Ransomware Summit will explore these topics:Ransomware intrusion emulationRansomware ini...
Getting Started in Infosec Consulting
Becoming a successful consultant seems like a dream: high pay, freedom, and fascinating work. These can all be true yet there is more to the reality: as a consultant you are running a business, and you need clients! This talk covers what those considering consulting need to know, including getting clients, setting pricing and much more. Whether you aspire to consulting full time or you want to keep your job and consult on the side, we cover th...
ICS Security Summit & Training 2025
The annual ICS Security Summit brings together the industry's top practitioners and leading experts from around the globe to share actionable ideas, methods, and techniques for safeguarding critical infrastructure. In-depth talks and interactive sessions will deliver proven advances and approaches that make a real difference for the individuals engaged in this fight every day. Choose Your Experience: In-Person or Live OnlineWhether you're plan...
June 15-23, 2025
Organizer:
SANS Institute Location:
Lake Buena Vista, FL
ICS Summit Solutions Track 2025
Attackers are increasingly targeting critical infrastructure — including power grids, water systems, heavy manufacturing, and oil and gas — with a deep and sophisticated knowledge of ICS components, industrial protocols, and engineering processes. Employing advanced techniques like Living Off The Land (LOTL) strategies, they repurpose legitimate ICS software for malicious purposes. These tactics, when combined with ransomware and I...
Dancing with Cloud CLIs: Mastering AWS,...
Graphical interfaces are great for quick tasks, but real cloud power users know that mastery of command-line interfaces (CLIs) unlock unparalleled efficiency, automation, and precision. Whether working with AWS CLI, Azure CLI, or Google Cloud CLI, having command-line expertise accelerates cloud operations and gives security professionals, developers, and sysadmins a competitive edge. In this webinar, we’ll demystify cloud CLIs and showca...
SANS 2025 SOC Survey Webcast & Forum
In 2025, the SANS SOC Survey will extend its detailed inspection of cybersecurity operations centers. By exploring the capabilities and outsourcing; architectures and cloud use; technologies; hiring and staffing; metrics and funding; threat intel; and automation we develop a global picture of the state of SOCs. Key topics examined on this webcast will include:Capabilities that comprise a SOC and what is outsourcedTechnology deployment and sati...
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.