Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

SANS 2024 Top Attacks and Threats Report

The dust has begun to settle on another successful RSA® Conference where SANS continued its 15-year tradition of highlighting some of the year's most concerning emerging threats.This year’s Top New Attacks & Threats Report and virtual event will take a deeper dive into the emerging threats discussed during the annual SANS keynote at RSA® Conference and look at numerous other noteworthy attacker trends. SANS Certified Instructor and event chair, Lee Crognale will provide mitigation strategies and actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks.Topics will include:The Security Cost of Technical DebtVerifying Identity in the Age of AILLMs Hyper-Accelerate the Exploitation LifecycleThe Use of AI to Defeat Novel MalwareThe Organizational Risks associated with Generative AIDeveloping Detection Mechanisms for Detecting Deepfakes & Gaining Digital Trust.Register for this virtual event now, and you will automatically receive the companion white paper upon publication.GET THE FULL EXPERIENCE - Join the SANS interactive Slack workspace for this event and you can connect live with SANS authors and speakers, have a chance to win prizes, and network with fellow attendees.

WebinarSecurity Awareness
Webcast Abstract Image
  • 31 Jul 2024
  • 10:30 UTC
  • Domenica Lee Crognale, Pedro Drimel & Phil Owens
View details

Cryptographic Signatures: To Sign or Not To Sign...That is the Question

In this workshop we will begin with a presentation of the cryptographic systems that can be leveraged to create digital signatures and why we want to use these signatures (their importance). We will discuss the more common use cases for signatures (such as digitally signed email) and then move into more recent examples such as DKIM (DomainKeys Identified Mail), as well as their use for incident detection and response.

WebinarCyber Defense
Webcast Abstract Image
  • 1 Aug 2024
  • 13:00 UTC
  • Bryan Simon
View details

Hands-on Digital Forensics: Exploring Evidence with Mounted Images

This hands-on workshop equips you with a key skill in digital forensics: mounting and exploring forensic disk images. Uncover the secrets hidden within digital evidence!

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 2 Aug 2024
  • 13:00 UTC
  • Kathryn Hedley
View details

Part 2 - Ctrl+Alt+Comply: NERC CIP in the Cloud - Regulated Electric Utility Perspective

The rapid adoption and growth of cloud computing solutions across industry sectors and application families is driven by the many advantages of cloud computing technologies. These include faster deployments, better scalability, improved vendor support and faster security patching, access to newer technology, better resilience, fault tolerance, and recovery options – all at a lower cost.

WebinarIndustrial Control Systems Security
Man presenting webcast to laptop screen
  • 7 Aug 2024
  • 13:00 UTC
  • Tim Conway
View details

Demystifying Base64: A Detailed Beginner's Guide to Encoding and Decoding

Those bizarre strings of letters and numbers you encounter during investigations? They might just be Base64 in disguise! This in-depth workshop is your chance to crack the code and unlock the secrets of Base64 through hands-on exercises, to learn how data – from text and images to crucial evidence – is encoded and decoded using this format.

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 13 Aug 2024
  • 13:00 UTC
  • Kathryn Hedley
View details

Elevating Your Audit Strategy: Insights from the CRF Audit Framework

In an age where cybersecurity threats are ever-present and the regulatory environment is constantly shifting, establishing robust and strategic audit practices is crucial for safeguarding organizational integrity.

WebinarCybersecurity Leadership
Webcast Abstract Image
  • 13 Aug 2024
  • 13:00 UTC
  • James Tarala
View details

SANS Chicago 2024: SANS@Night - How to Perform Effective OT Cyber Security Risk Assessments

Being able to perform OT Cyber Security Risk Assessments is becoming more essential with each passing year. Drivers to perform a risk assessment vary, it might be a regulatory requirement, internal justification for investment or simply to better understand your operational risk. Finding skilled resources to be able to perform a risk assessment and running one in your busy operational environment can be extremely challenging. This presentation will explore how to prepare, execute and report out an effective OT Cyber Security Risk Assessment following the IEC 62443-3-2 Methodology; best practices and examples will be provided from completed risk assessments.

WebinarCybersecurity Leadership
Webcast Abstract Image
  • 14 Aug 2024
  • 18:30 UTC
  • Paul Piotrowski
View details

SANS Chicago 2024: SANS@Night - Cybersecurity Controls For ICS and Critical Infrastructure in Times of Warfare

As physical and cyber attacks on critical infrastructure and industrial control systems (ICS) have become increasingly brazen, ICS defenses must go beyond just preventative security. ICS defenses must be ICS-specific, teams need to be proactive and have ICS cyber specific knowledge and skills. This is because traditional IT security controls applied to ICS are ineffective, cause disruptions and safety interferences. ICS cyber defense is doable and necessary to protect the critical systems that support our modern way of life. These systems make, move and power our world - power grids, water management systems, critical manufacturing, etc. Join Dean Parsons as he walks through recent critical infrastructure incidents, and the related ICS defense controls to defend our critical engineering environments in times of warfare where cyber attacks and physical attacks are combined. AND 1 FREE ICS GIVEWAY at the talk.

WebinarIndustrial Control Systems Security
Two people presenting a webcast
  • 14 Aug 2024
  • 20:15 UTC
  • Dean Parsons
View details

Linux環境における永続性メカニズム

この講演では、攻撃者が攻撃対象のLinuxシステム上で永続性を確立するための様々な方法について説明します。Windowsシステムにおいて永続性を確立する方法として、Run/RunOnceレジストリキーやタスクスケジューラなどを悪用する手法が広く知られていますが、Linux上で攻撃者がどこに隠れているかをご存知ですか?

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 20 Aug 2024
  • 10:00 JST
  • Jim Clausing
View details

Linux Persistence

This talk will discuss the various ways that attackers try to maintain persistence on victim systems.

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 20 Aug 2024
  • 10:00 JST
  • Jim Clausing
View details

Empowering a Modern SOC With AI: Practical Use Cases

This presentation explores the transformative role of Artificial Intelligence (AI) in modern SOCs, focusing on its application to improve threat detection, automate incident responses, and enable predictive analytics for a proactive defense strategy.

WebinarArtificial Intelligence
Webcast Abstract Image
  • 20 Aug 2024
  • 17:30 AST
  • Maxim Deweerdt
View details

Human-Powered Security with HackerOne

Human-powered security—aka community-driven bug bounties—can be a game changer for your offensive security strategy. Complementary to red teaming and penetration testing, bug bounties can help organizations enhance their security posture, protect customer data, and ensure business continuity. In this webcast, we’ll examine the unique advantages of these programs, from advanced threat detection to continuous security improvements.

WebinarSecurity Awareness
Webcast Abstract Image
  • 21 Aug 2024
  • 13:00 UTC
  • Matt Bromiley & Michiel Prins
View details