Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

Seeing Cyber Threats Over the Horizon in 2023

More visibility. Most (if not, every?) cybersecurity professional will tell you they need more visibility into the threat landscape, but also their own security posture. Join SANS Analyst, Jake Williams and Chas Clawson, CTO for security with Sumo Logic, as they talk about the importance of correlating security alerts across your entire cloud and on-prem environment, and enriching with threat intelligence and other feeds for context and improving threat investigations.

WebinarCloud Security
Webcast Abstract Image
  • 27 Jan 2023
  • 13:00 UTC
  • Jake Williams
View details

ゼロから始めるOSINT:  Open Source Intelligence

OSINTという言葉をご存知でしょうか?OSINTとは「Open Source Intelligence」を略した用語で、主に情報セキュリティの世界で使われています。インターネットをはじめとする多くの情報源からデータを収集し、分析・精査・取捨選択を行い、特定の個人やシステム、組織などについての調査を行う手法です。今回は、OSINTの基本的な要素についてご紹介した後、いくつかのデータ収集・探索・分析手法のデモを行い、押さえておくべき技術やツール、トレーニングについてもご紹介します。

WebinarOpen-Source Intelligence
Webcast Abstract Image
  • 9 Feb 2023
  • 12:30 JST
View details

"OSINT: Open Source Intelligence" starting from scratch

Do you know what OSINT is?OSINT is an abbreviation for "Open Source Intelligence" and is mainly used in the information security world. It is a method of collecting data from many sources, including the Internet, and analyzing, scrutinizing, and discarding the data to conduct research on specific individuals, systems, or organizations.

WebinarOpen-Source Intelligence
Webcast Abstract Image
  • 9 Feb 2023
  • 12:30 JST
View details

WhatWorks in Improving End User Phishing Awareness, Recognition and Resistance

Year after year successful phishing attacks on end users and system administrators are found to be the factor that enables over 80% damaging security incidents. This points out the need for two key security initiatives: replacing reusable passwords with multifactor authentication and making users less likely to fall for fraudulent messages.

WebinarSecurity Awareness
Webcast Abstract Image
  • 9 Feb 2023
  • 13:00 UTC
  • John Pescatore & Liz Wallace
View details

A Leader's Guide to Security Operations: Improve Productivity with Threat Intelligence and Automation

In The 2021 State of Enterprise Breaches, Forrester® found that enterprises spend a median of 37 days and a mean of $2.4 million to find and recover from a breach.

WebinarCloud Security
Webcast Abstract Image
  • 14 Feb 2023
  • 13:00 UTC
View details

Getting Started with Fuzzing for Bug Discovery

A lot of offensive security professionals have experience weaponizing simple vulnerabilities, but may not have worked much with bug discovery. Join Jim Shewmaker and Stephen Sims as they talk through fuzzing concepts and methodology, and then jump into a demonstration on setting up a modern fuzzing harness. What should you fuzz for? What types of fuzzing is there? How do you know if a bug is weaponizable? We’ll aim to answer these questions and more in this one hour session.

WebinarCyber Defense
Webcast Abstract Image
  • 15 Feb 2023
  • 11:00 UTC
  • Stephen Sims & James Shewmaker
View details

バグ発見のための最新のファジング技術

Red Teamなどで働く攻撃技術の専門家の方であっても、既知の脆弱性を利用して侵入を行った経験はあるものの、自身で脆弱性の発見に取り組んだことのある方はそれほど多くありません。Jim ShewmakerとStephen Simsはファジングのコンセプトと具体的な手法について解説し、最新のファジング技術のデモを行います。何をファジングするべきか、どのような種類があるのか、どのようにそのバグを悪用するのかなどの質問を1時間のセッションでカバーしていきます。

WebinarCyber Defense
Webcast Abstract Image
  • 15 Feb 2023
  • 11:00 UTC
  • Stephen Sims & James Shewmaker
View details

The Secret to Vulnerability Management

Vulnerability management can at times seem like a problem with no solution. While there is no simple solution to vulnerability management and our work will never be done, there are solutions, and we can successfully reduce the vulnerabilities in our environment to a much more manageable level. Every week will bring new vulnerabilities, but with the right processes and procedures, out technology and development organizations will know how to respond. The biggest secret to vulnerability management is recognizing that vulnerability management isn’t the problem. Join us to discover the secret to vulnerability management.

WebinarCyber Defense
Webcast Abstract Image
  • 16 Feb 2023
  • 13:00 UTC
  • David Hazar
View details

How to Build a Risk Register That Accounts for Internal and External Risk

An organized, full-coverage risk register can maximize your cybersecurity resources while improving organizational security. Without including third-party risks, however, even the best risk register can fail to stop security incidents. Your risk framework needs to map to internal and external gaps to identify weaknesses and ensure complete coverage.

WebinarCyber Defense
Webcast Abstract Image
  • 21 Feb 2023
  • 13:00 UTC
  • Brian Ventura & Andrew Egoroff
View details

A SANS First Look at a Self-Supervised Learning Application for Anomaly Detection

Let’s face it – analysts have far too much data these days. We know how complex the modern enterprise is getting with today’s organizations needing to scale hybrid environments across the globe with a complex remote workforce. Security analysts are charged with protecting these complex environments. However, each new element brings even more data to the security team.

WebinarCloud Security
Man presenting webcast
  • 22 Feb 2023
  • 10:30 UTC
  • Matt Bromiley & Matt Shea
View details

A DNS Security Architecture as SecOps Force Multiplier

The Domain Name System (DNS) is essentially the central nervous system of the internet—everyone needs it to work because without DNS services, digital business would come to a halt. Cybercriminals know this, too, and use DNS services to launch their attacks while they simultaneously attack the DNS services of their targets.

WebinarCyber Defense
Man presenting webcast to laptop screen
  • 22 Feb 2023
  • 13:00 UTC
  • John Pescatore
View details

Maximizing Network Security with Microsegmentation to Minimize the Risk From Any Attacker

Lateral movement allows attackers to damage and steal information from an entire network once they gain access to one (usually the most vulnerable) entry point. Microsegmentation solves this problem by dividing a network into very small regions called microsegments, usually up to a segment per machine. However, if implemented incorrectly, it can be time-consuming, expensive, difficult to manage, and ineffective. Join Nicholas DiCola, VP of Customers at Zero Networks, and Aaron J. Goodwin, CISO at B. Riley Financial, as they share everything you need to know to effectively utilize microsegmentation for maximum network security and minimize the risk of attacks – including best practices, use cases, and the most easily deployable solutions to keep your organization safe.

WebinarCloud Security
Man presenting webcast
  • 23 Feb 2023
  • 10:30 UTC
  • Nicholas DiCola
View details