Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

IoTフォレンジック: CCTV捜査における未解明の証拠を探る

CCTV(Closed Circuit Television:監視カメラ)システムはユビキタスなIoTソリューションであり、犯罪の証拠として利用されることも多いです。

WebinarCyber Defense
Man presenting webcast to laptop screen
  • 9 Sep 2023
  • 11:00 JST
  • Evangelos Dragonas
View details

Are You Really Getting the Benefits of Unified Logs?

This presentation will provide an overview of Unified Logs, how to acquire artifacts, and tools to parse them. It will also explain the various methods of analyzing Unified Logs and touch on automating the analyzing process.

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 9 Sep 2023
  • 11:00 UTC
  • Minoru Kobayashi | 小林稔
View details

The Arms Race of Evasion: Examining Evolving Evasion Techniques in Incident Response (Japanese)

攻撃者による悪意のある行為の多くは、最新のセキュリティツールを用いることでセキュリティアナリストが検知することが可能です。こうした早期発見を避けるため、高度な攻撃者グループは常に独創的な方法を用いて、ツールやアナリストによる検知を回避、無効化、混乱させてきました。

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 9 Sep 2023
  • 12:00 UTC
  • Partha Alwar & Mahmoud El Halabi
View details

Wisdom from the Cyber Security Battlefield - Lessons from Leading Incident Response Teams in APJ

Mark Goudieは、APAC諸国や日本における情報漏えいの調査を20年近く行っており、過去5年間はクラウドストライクのインシデントレスポンスとサービスチームを率いてきました。

WebinarCyber Defense
Webcast Abstract Image
  • 9 Sep 2023
  • 12:00 JST
  • Mark Goudie
View details

The Essentials of Information Gathering and Analysis Required of CSIRTs

In order for an organization's CSIRT to prevent or minimize damage caused by cyber attacks, it is essential to collect and analyze information on a daily basis and take appropriate actions based on impact assessment.

WebinarCyber Defense
Webcast Abstract Image
  • 9 Sep 2023
  • 14:00 JST
  • Masafumi Negishi | 根岸征史
View details

The Rise of Malicious MSIX File

This session will first introduce basic information on MSIX file, such as the file format, basic behavior, and the creation method, followed by attack cases of MSIX file abuse. Specifically, we will detail attacks conducted by a financially motivated threat group called SteelClover.

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 9 Sep 2023
  • 14:00 UTC
  • Rintaro Koike | 小池 倫太郎 & Shogo Hayashi | 林 匠悟
View details

Self-Improvement of Security Hands-On Skills for DFIR

In 20-years of cyber security career, I've been thinking it's very important to hands-on skills and try & error experience of security. I'd like to introduce some technical research topics from DFIR, RedTeam, vulnerability and malware analysis categories. Also, introduce a use case of used hands-on skills to identify the root cause of incident.

WebinarCyber Defense
Webcast Abstract Image
  • 9 Sep 2023
  • 15:00 JST
  • Masashi Fujiwara | 藤原将志
View details

Practical MSTICPY Use - Rainbow Bridge to SIEM for Advanced Threat Hunting

I will introduce the mutual use of msticpy and SIEM, and emphasize the unique features of msticpy. After this talk, you will surely want to do analysis freely using msticpy!

WebinarDigital Forensics and Incident Response
Man presenting webcast
  • 9 Sep 2023
  • 16:00 UTC
  • Tatsuya Hasegawa|長谷川達也
View details

Kerberos and Kerberoasting

In this webcast, Tim will explain Kerberos, the authentication protocol used in the Windows Domain.

WebinarCyber Defense
Webcast Abstract Image
  • 13 Sep 2023
  • 10:00 ICT
View details

You came with that plan? You’re braver than I thought!

How often do you practice or exercise your major cyber incident plans? How often do involve your execs? Most people when asked said they'd love to cyber exercise more but don't know how.

WebinarCyber Defense
Webcast Abstract Image
  • 13 Sep 2023
  • 10:00 UTC
  • Steve Armstrong-Godwin
View details

Combating Supply Chain Attacks with Product Security Testing

Supply chain attacks go unnoticed on average for 235 days and do more damage as a result of us not having a deep understanding of the products being used on a network. Product security testing helps obtain a comprehensive understanding of how choosing to use a particular product in your organization can affect your threat model and risk posture.

WebinarCyber Defense
Webcast Abstract Image
  • 13 Sep 2023
  • 11:00 UTC
  • Douglas McKee & Ismael Valenzuela
View details

Filling the Human Gap with Technology - Artificial Intelligence May Know You Better Than You Know Yourself

“People have become the primary attack vector for cyber-attackers around the world,” said Lance Spitzner, SANS Security Awareness Director and co-author of the report, SANS 2022 Security Awareness Report. “Humans rather than technology represent the greatest risk to organizations, and the professionals who oversee security awareness programs are the key to effectively managing that risk.”

WebinarCloud Security
Webcast Abstract Image
  • 14 Sep 2023
  • 13:00 UTC
  • Matt Bromiley & Christopher Beier
View details