Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

Changing Trends in Malware Techniques to Infiltrate Target Environments

One of the first objectives in a cyber attack is to successfully infiltrate into the target environment. The initial attack payload needs to penetrate through perimeter defenses and be easy for the target users to infect themselves. Techniques that attackers use to achieve this change over time, and there have been noticeable trends in this area. This presentation reviews some of the techniques from the recent years.

WebinarCyber Defense
Webcast Abstract Image
  • 26 Apr 2023
  • 18:00 JST
View details

Hands-On Workshop: Container Security 101

This is a 2 hour hands-on workshop. Is your company adopting containers but you haven’t had a chance to figure out the best way to secure them yet?

WebinarCloud Security
Webcast Abstract Image
  • 27 Apr 2023
  • 10:00 UTC
  • Jon Zeolla
View details

2023 ICS Security Summit Solutions Track | Two Day Event May 1st & 2nd

The focus of this two day event is to illustrate the challenges, risks, impacts of incidents in control systems, as well as actionable achievable methods we can meet these challenges head-on, and show ICS-specific trained defenders can step up to protect and defense the critical infrastructure we all rely on in our daily lives.Presentations will be a combination of thought leadership and technical use-case examples with actionable takeaways facilities can start considering to immediately deploy where it suits their safety and industrial security defense goals.

WebinarCyber Defense
Webcast Abstract Image
  • 1 May 2023
  • 13:00 UTC
  • Dean Parsons, Samuel Hill, Jason Ortiz + 6 more
View details

Securing Your Cached Assets

Content delivery networks provide a valuable service and make the Internet a better place. Without them, streaming services would overwhelm entire networks. Mobile and single-paged web applications would take forever to load. But, what about sensitive data? Do we have to avoid caching sensitive data at all costs or are there ways we can secure it? Join me to learn more about origin protection and signature enforcement with custom policy in Amazon CloudFront. Get a behind-the-scenes peak at one of the labs from SEC540: Cloud Security & DevSecOps Automation.

WebinarCloud Security
Webcast Abstract Image
  • 2 May 2023
  • 10:00 UTC
  • David Hazar
View details

Promoting Your Path: From Engineer to CISO

Not sure how to make the leap from engineer to manager? Questioning whether or not you really want a leadership position? Unclear if you really have what it takes to be a CISO? Come hear real world case studies and learn tips and tools to help you on your path and take the next step in your career.

WebinarCyber Defense
Webcast Abstract Image
  • 2 May 2023
  • 13:30 UTC
  • Frank Kim
View details

Implementing Attack Surface Management

Selection of an effective Attack Surface Management (ASM) solution can help you identify and mitigate potential threats.

WebinarCyber Defense
Man presenting webcast
  • 3 May 2023
  • 13:00 UTC
  • Pierre Lidome
View details

Adopting a Unified Cyber Risk Lifecycle: Benefits Across Your Attack Surface

Over the last five years, most organizations have seen their exploitable attack surface grow dramatically as new processes — such as cloud-native software development — become mainstream. These changes have led to an explosion of new systems used to build applications and new security tools needed to scan them for vulnerabilities. Outdated approaches to vulnerability management simply can’t keep up.

WebinarOffensive Operations
Two people presenting a webcast
  • 3 May 2023
  • 15:00 UTC
  • SANS Institute
View details

Improve Your Cybersecurity Culture

Cybersecurity remains a critical aspect of every organization's operations. In many companies, cybersecurity is their top risk. As cyberattacks become more sophisticated and frequent, organizations need to develop a culture of cybersecurity to protect their assets and reputation. In this webinar, we will explore how to build a culture of cybersecurity within your organization in 4 discrete steps.

WebinarCyber Defense
Webcast Abstract Image
  • 4 May 2023
  • 10:00 UTC
  • Russell Eubanks
View details

5 Automation Trends to Scale and Modernize Your InfoSec Compliance Program

InfoSec program management is too inefficient to support the real-time needs of CISOs as they address the growing complexity of internal and external risks. The status quo - which often relies on antiquated tools, siloed processes, and over-investment in third parties - must yield to a more flexible, scalable, cost-effective approach.In this session, we'll introduce a new approach to enterprise-wide program development and automation that can meet the modern complexity of businesses today.•Understand the limitations of InfoSec practices in today’s risk landscape.•Identify five key areas of automation prime for organizations across the maturity spectrum.•Translate program efficiencies into measurable benefits and results for the business.

WebinarCloud Security
Webcast Abstract Image
  • 4 May 2023
  • 13:00 UTC
  • Tanner Boswell
View details

SANS Security Leadership New Orleans 2023 - Keynote: Top-Down Security Operations - Setting Clear SOC Metrics and Goals for Cyber Defense Success

Running a SOC is a complex combination of data sources, processes, and teamwork, and it's easy to get lost in the details. In this keynote we'll step back to think big picture about what a SOC truly needs to deliver and present some simple mental models that cyber security analysts and managers can use to abstract away complexity and gain clarity on their true priorities. We'll discuss SOC goals, workflow, how to gather those important but "hard to measure" metrics and use a top-down approach to help focus you on your path to cyber defense success.

WebinarCyber Defense
Webcast Abstract Image
  • 8 May 2023
  • 19:30 UTC
  • John Hubbard
View details

Hands-On Workshop: Building Detection in AWS

This is a 2 hour hands-on workshop. As with any enterprise environment, we can (and should) focus on hardening our defenses to keep the adversaries out, but these defenses may some day be evaded via a variety of methods.

WebinarCloud Security
Man presenting webcast to laptop screen
  • 9 May 2023
  • 10:00 UTC
  • Ryan Nicholson
View details

How to build a Security Awareness Program and Manage Human Risk

Organizations and security leaders are beginning to understand that cybersecurity is no longer just a technical challenge but also a human challenge. In fact, people are now the biggest driver of breaches, with employees involved in over 80% 1 of breaches globally. In many ways this is the result of organizations becoming so effective at using technology to secure technology that in many ways we have left the human vulnerable and are in fact driving threat actors to target people.

WebinarSecurity Awareness
Webcast Abstract Image
  • 9 May 2023
  • 14:00 UTC
View details