Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

産業用制御システム(ICS)におけるサイバーセキュリティCritical Controls5選

産業用制御システム(ICS)や運用技術(OT)に関するセキュリティにおいては、改善すべきセキュリティ上の課題が無限に存在します。多くの産業系の組織やIT/OTに携わる方は、こうした課題に対してどこから手を付ければいいのか迷ってしまいがちです。

WebinarCyber Defense
Man presenting webcast
  • 17 May 2023
  • 13:00 JST
  • Peter Jackson
View details

Bridging the Gap: Securing Your Digital Transformation Journey

Are you grappling with the fear of data exposure, conflicting process control and IT/security teams, and limited problem-solving for individual plants? These challenges can lead to considerable security risks and impede your digital transformation journey. In this session, dive into the negative consequences of neglecting these challenges, and learn from Armis Field CTO, Steve Gyurindak, how your organization can overcome these hurdles without compromising critical infrastructure or existing security solutions.

WebinarIndustrial Control Systems Security
Man presenting webcast
  • 18 May 2023
  • 13:00 UTC
  • Jeffrey Shearer & Steve Gyurindak
View details

Fantastic caches and what you can find in them

Windows puts a lot into logs, but it puts even more into forensic artefacts you may not be aware of. This talk will explore some of the artefacts that, without the knowledge of the user, records more than just metadata. I think it's pretty cool, maybe after this talk you will do....or disable it all...or both?

WebinarCyber Defense
Webcast Abstract Image
  • 18 May 2023
  • 19:00 UTC
  • Phill Moore
View details

3 Crucial Cloud Security Changes to Hackproof your Cloud

Cloud environments are attractive targets for hackers due to their complexity, which can make them difficult to defend. This presentation will cover three crucial details of cloud setup that can greatly impact your cloud's security posture. We'll kick off by exposing common vulnerabilities that hackers exploit to compromise cloud environments. Then, we'll dive into effective mitigation strategies in three areas and show you how to implement them in a practical and hands-on manner. Our insights on mitigations will apply to typical enterprise cloud setups.

WebinarCloud Security
Man presenting webcast
  • 23 May 2023
  • 19:00 UTC
  • Jason Lam
View details

I have Trust Issues and So Does My CISO--How NDR can help identify issues in your ZTA

As federal agencies and private organizations continue the push to Zero Trust deadlines, we’ve all got some some Trust issues to work on. The best thing to do is get it all out in the open and don’t let your relationship with your networks get toxic. Moving to Zero Trust requires a good foundation that your organization can build trust on. In this Webinar, experts from Corelight’s Public Sector team will discuss how security teams can use network visibility to resolve trust issues in Zero Trust deployment and lay the groundwork for the future.

WebinarCyber Defense
Man presenting webcast
  • 25 May 2023
  • 13:00 UTC
  • Matt Bromiley, Tim Nolen & Jean Schaffer
View details

Cybersecurity in the Age of LLM: Risks, Opportunities, and the Future of AI-Driven Information Security

With the rapid development of large language models (LLM) and generative AI, the landscape of cybersecurity has experienced a paradigm shift. In this one-hour webcast, we will delve into the emerging information security risks and opportunities associated with LLM and cyber deception operations. As these technologies become increasingly sophisticated, it is imperative for organizations to stay informed about potential threats and best practices in order to maintain a strong security posture.

WebinarCyber Defense
Man presenting webcast
  • 25 May 2023
  • 19:00 UTC
  • SANS Institute
View details

LLM時代のサイバーセキュリティ:リスク、機会、AIを活用した情報セキュリティの将来性

大規模言語モデル(LLM)と生成AIの急速な発展に伴い、サイバーセキュリティの世界はパラダイムシフトを経験しています。これらの技術がますます高度化する中、組織は強固なセキュリティ体制を維持するためには、潜在的な脅威とベストプラクティスについて常に情報を得ることが不可欠となります。

WebinarCyber Defense
Webcast Abstract Image
  • 25 May 2023
  • 19:00 UTC
  • SANS Institute
View details

Using Intelligent Data as a Force Multiplier for Security and IT Ops

Managing security and digital operations has become far more challenging due to increasing threats and increasing infrastructure complexity. How can enterprises effectively manage security for their large and dynamic infrastructures? Despite a plethora of security products, most enterprises struggle to minimize breaches, control costs, and avoid analyst burnout.

WebinarCloud Security
Webcast Abstract Image
  • 30 May 2023
  • 13:00 UTC
  • Matt Bromiley & John Pirc
View details

OSINT次の一歩:実用的な画像・映像の解析・検証テクニック

OSINTという言葉をご存知でしょうか? OSINTとは「Open Source Intelligence」を略した用語で、主に情報セキュリティの世界で使われています。インターネットをはじめとする多くの情報源からデータを収集し、分析・精査・取捨選択を行い、特定の個人やシステム、組織などについての調査を行う手法です。

WebinarOpen-Source Intelligence
Webcast Abstract Image
  • 30 May 2023
  • 18:00 JST
View details

NeXTSTEP of OSINT: Practical Image and Video verification techniques

Do you know what OSINT is? OSINT is an abbreviation for "Open Source Intelligence" and is mainly used in the information security world.

WebinarOpen-Source Intelligence
Webcast Abstract Image
  • 30 May 2023
  • 18:00 JST
View details

2023 Survey Event | Visibility and Attack Surface

Functionality is mission-critical to all organizations. It is also the critical element to anyone seeking to do harm to that mission. For an organization and its partners to make use of functionality, it must be visible to both. Organizations face uncertainty, because with increasing visibility comes an increased attack surface, and therefore increased risk. Or does it? This webcast looks at the correlation between the two, and how we can use factors of each to impact the other. This research will attempt to define best practices as well as understanding how organizations understand the two issues to be linked, and how that may inform their response.

WebinarSecurity Awareness
Two people presenting a webcast
  • 31 May 2023
  • 10:30 UTC
View details

SANS AI Cybersecurity Summit: The Dark Side of AI and the Questions You Should Be Asking

Call for Presentations Now Open | Deadline: Monday, May 1Learn More and Submit Your Proposal“Can we use AI in our workplace?” — This question is being asked of every CISO and technical leader worldwide. The answers are not easy.

WebinarCyber Defense
Webcast Abstract Image
  • 31 May 2023
  • 11:00 UTC
  • Rob Lee
View details