Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

SANS 5 ICS Critical Controls for Oil and Natural Energy - Control 2 - Defensible Control System Network Architecture

Nearly 40% of ICS environment compromises come from the IT business network that allows a threat into the ICS environment. So, it’s more important to focus on the ICS perimeter defenses first, followed closely by the additional required segmentation within the ICS network itself. This control involves ICS-aware network architectures that support effective segmentation, visibility of control system traffic for analysis, log collection, asset identification, industrial DMZs, and enforcement for process communication integrity and reliability.

WebinarIndustrial Control Systems Security
Man presenting webcast
  • 1 Jun 2025
  • 13:00 UTC
  • Dean Parsons
View details

SANS 5 ICS Critical Controls for Oil and Natural Energy - Control 3 - ICS Network Visibility and Monitoring

Module 3 of the training relates to continuous network security monitoringof the ICS networked environment, with protocol-aware tool sets andsystem-to system interaction analysis capabilities used to informengineering of potential risks to the control, view, and safety of operations.

WebinarIndustrial Control Systems Security
Webcast Abstract Image
  • 1 Jun 2025
  • 13:00 UTC
  • Dean Parsons
View details

Getting Started in Infosec Consulting

Becoming a successful consultant seems like a dream: high pay, freedom, and fascinating work. These can all be true yet there is more to the reality: as a consultant you are running a business, and you need clients!

WebinarCyber Defense
Webcast Abstract Image
  • 2 Jun 2025
  • 14:00 UTC
  • Ted Demopoulos
View details

Adopting an Offensive Security Posture: Strategies and Best Practices

Today’s cyber threats move fast—and the only way to stay ahead is to think like an attacker. A reactive approach is no longer enough. Organizations need to adopt a proactive, offensive security posture to uncover vulnerabilities before adversaries do.

WebinarCyber Defense
Two people presenting a webcast
  • 3 Jun 2025
  • 13:00 EDT
  • Jorge Orchilles
View details

Rethinking Oversharing Risk and Knowledge Segmentation in the Age of AI

As large language models (LLMs) like Microsoft Copilot become embedded in enterprise workflows—from search and summarization to project tracking—they introduce a new frontier of risk: the inadvertent oversharing of sensitive information. Traditional data governance approaches, built around static controls and classification, are no longer sufficient when AI can infer sensitive insights from benign data. .Join this webcast to explore how Knostic is redefining access and identity management for the AI era with a knowledge-centric approach that emphasizes not just who has access, but who needs access. Discover how their innovative methodology—grounded in need-to-know principles, role-based knowledge segmentation, and intent-aware access policies—creates an intelligent, scalable framework for controlling AI-generated knowledge sharing.

WebinarCloud Security
Two people presenting a webcast
  • 3 Jun 2025
  • 12:00 UTC
  • Kevin Garvey & Sounil Yu
View details

Decoding the Shared Responsibility Model: Securing Cloud Environments Together

As organizations move to the cloud, understanding the division of security responsibilities between cloud service providers (CSPs) and customers is critical. In this talk, we will dive deep into the Shared Responsibility Model, exploring how cloud security is a collaborative effort.

WebinarCloud Security
Man presenting webcast
  • 3 Jun 2025
  • 14:00 UTC
  • Serge Borso
View details

Be a DLP Hero: How to Quickly Deliver Value from Your DLP Program and Set It Up for Future Success

Data loss prevention (DLP) is a cornerstone of modern cybersecurity—but building a program that delivers fast, visible impact and scales for the future can feel overwhelming. Between evolving data threats, mounting pressure from leadership, and the complexity of tools like AI, it’s tough to know where to begin.

WebinarSecurity Awareness
Webcast Abstract Image
  • 4 Jun 2025
  • 13:00 UTC
  • Kevin Garvey & Prateek Temkar
View details

Uncover the Truth: Digging into Windows Hidden 30-Day Forensic Timeline

Picture this: you approach a machine where you know an incident has occurred, but all traditional logs are missing or wiped leaving you with no clear starting point.

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 5 Jun 2025
  • 11:00 AEST
  • Mark Baggett
View details

Scaling Compliance: GRC Engineering and Policy as Code

Learn the core concepts of GRC Engineering and explore how Policy as Code can bridge the gap between regulatory demands and the flexibility required in cloud-native environments

WebinarCloud Security
Webcast
  • 10 Jun 2025
  • 11:00 EDT
  • Jon Zeolla & AJ Yawn
View details

Beyond the Patch: Measuring the Unknown in Vulnerability Management

Vulnerability management is no longer just about finding CVEs and deploying patches—it's about closing the gap between what you know and what you don’t see coming.

WebinarCybersecurity Leadership
Man presenting webcast
  • 11 Jun 2025
  • 13:30 UTC
  • Jonathan Risto
View details

SANS ICS Summit Solutions Track 2025

Attackers are increasingly targeting critical infrastructure — including power grids, water systems, heavy manufacturing, and oil and gas — with a deep and sophisticated knowledge of ICS components, industrial protocols, and engineering processes. Employing advanced techniques like Living Off The Land (LOTL) strategies, they repurpose legitimate ICS software for malicious purposes. These tactics, when combined with ransomware and ICS-specific attacks, significantly escalate the risks to both human lives and essential infrastructure, especially in times of warfare.To counter these threats, ICS/OT environments need specialized technology solutions and highly trained ICS defenders. The ICS Active Cyber Defense model emphasizes “skilled human analysts capable of monitoring and responding to adversaries within the ICS/OT network.” Defending against LOTL and similar threats demands cybersecurity teams with a blend of specific expertise in control systems, IT security knowledge and a prioritization of safety.Is your ICS/OT cybersecurity program equipped with the appropriate technology and expertise? The ICS Summit Solutions Track 2025 will present cutting-edge solutions, live demonstrations, and strategies for tackling today’s ICS security challenges. Presentations and panels will align with industry frameworks, such as the SANS ICS Cybersecurity Critical Controls, demonstrating how expertly trained ICS defenders, armed with ICS-specific solutions, can safeguard the vital infrastructure we all depend on.

WebinarIndustrial Control Systems Security
Webcast Abstract Image
  • 16 Jun 2025
  • 10:00 UTC
  • Dean Parsons
View details

Dancing with Cloud CLIs: Mastering AWS, Azure, and GCP from the Command Line

Graphical interfaces are great for quick tasks, but real cloud power users know that mastery of command-line interfaces (CLIs) unlock unparalleled efficiency, automation, and precision.

WebinarCloud Security
Webcast Abstract Image
  • 17 Jun 2025
  • 14:00 UTC
  • Kenneth G. Hartman
View details