Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

Third-Party API Security with Vorlon

Modern organizations are often complex ecosystems of multiple systems. With increased usage of cloud-based Applications as a Service, more and more organizations are making use of third-party services to provide specific functionality to support their overall information systems architecture. In this SANS First Look webcast, we examine Vorlon, a platform that enables proactive security of your third-party application ecosystem; the ability to detect and respond to third-party application security incidents; and to ensure compliance with laws, regulations, and rules when it comes to third-party API risks.

WebinarSecurity Awareness
Webcast Abstract Image
  • 13 Jun 2024
  • 13:00 UTC
  • Jason Jordaan & Amir Khayat
View details

AI&DFIR: サイバー天国・デジタル地獄、どちらを選ぶ?

デジタルフォレンジック&インシデントレスポンス(DFIR)の素晴らしい新世界へようこそ! 人工知能(AI)は私たちの町に新しく配属された保安官であり、ハッカソン中のカフェイン中毒のプログラマーのようにいろいろなことをスピードアップさせることができます。

WebinarCybersecurity and IT Essentials
Webcast Abstract Image
  • 14 Jun 2024
  • 08:00 UTC
  • Josh Lemon
View details

AI and DFIR: A Match Made in Cyber Heaven or a Recipe for Digital Disaster?

Welcome to the brave new world of Digital Forensics and Incident Response (DFIR), where Artificial Intelligence (AI) is the new sheriff in town, ready to speed things up like a caffeine-addicted programmer during a hackathon.

WebinarArtificial Intelligence
Man presenting webcast
  • 14 Jun 2024
  • 19:00 JST
  • Josh Lemon
View details

Industrial Control Systems Summit Solutions Track 2024

Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critical infrastructure. In doing so, they knowingly put human life and physical devices at risk.

WebinarIndustrial Control Systems Security
Webcast Abstract Image
  • 17 Jun 2024
  • 10:00 UTC
  • Dean Parsons
View details

SANS Rocky Mountain Summer 2024: SANS@Night - Leveraging AI to Solve Real Problems

In many ways, AI seems to be a solution in search of a problem. Every executive knows they need it, but what do they expect it to do? In this talk and demonstration David Hoelzer, author of SEC595 (Applied AI and Machine Learning for Cybersecurity Professionals) will discuss the realities of AI, explain how it really works, and implement code (live!) to leverage a large language model (LLM) like ChatGPT to solve useful problems in an enterprise.

WebinarArtificial Intelligence
Webcast Abstract Image
  • 18 Jun 2024
  • 20:30 UTC
  • David Hoelzer
View details

Demystifying Data: Hands-on Data Conversion Between Binary, Hexadecimal, Decimal, and ASCII

This hands-on series cracks the code on digital evidence. Designed for beginners, you'll unlock the secrets hidden within devices, from understanding data storage to interpreting timestamps. Learn to extract critical evidence, navigate forensic images, and convert between data formats.

WebinarDigital Forensics and Incident Response
Two people presenting a webcast
  • 21 Jun 2024
  • 13:00 UTC
  • Kathryn Hedley & Mark Hallman
View details

Cyber Wars: The Legal Force Awakens

Wondering in the middle of a major incident how you engage with your local Law Enforcement or even your DR/Insurance provided external Counsel is not a good position to be in.

WebinarCybersecurity Leadership
Webcast Abstract Image
  • 25 Jun 2024
  • 11:00 UTC
  • Steve Armstrong-Godwin
View details

2024 State of Security Automation

Get ready for an exclusive event where we dive into the latest insights from our survey followed by an exclusive hands-on experience with Palo Alto’s Cortex XSOAR platform. This two-part forum will uncover what drives automation in security teams and how advanced SOAR tools can revolutionize SOC operations.

WebinarCyber Defense
Webcast Abstract Image
  • 25 Jun 2024
  • 13:00 UTC
  • Matt Bromiley, Mark Orlando, Jane Goh + 1 more
View details

Secure Your Multicloud Environment from Code to Cloud with Microsoft Defender for Cloud

Security teams today are dealing with endless lists of security issues, but lacking the necessary tools to effectively detect and mitigate the highest risks in their multi-cloud environment. In this session, we will unveil the latest security posture innovations in Microsoft Defender for Cloud, that empower security teams to identify security vulnerabilities spanning from code to cloud, to effectively prioritize the most business-critical risks by leveraging attack path analysis and integrated insights, and to drive large-scale remediation efforts across the entire organization.

WebinarCloud Security
Man presenting webcast
  • 26 Jun 2024
  • 10:30 UTC
  • Matt Bromiley & Tal Rosler
View details

Advanced Network Defenses for Today’s Federal Government Enterprise

The modern enterprise, characterized by hybrid and mobile workforces supported by a hybrid cloud IT environment, brings many security challenges to the federal government, its agencies, entities, and sites.  They face multi-faceted cybersecurity concerns due to the sensitive nature of their data, the critical infrastructure, and regulatory mandates involved. The distributed nature of operations, with numerous contractors and providers, introduces further complexities in securing endpoints, networks, and data, further amplifying the risks of nation-state cyber-attacks, phishing, malware, and data breaches. Secure Access Service Edge (SASE)/Security Services Edge (SSE) solutions, like Cisco Umbrella, offer comprehensive protection that meets the unique needs and compliance requirements of government organizations and others that depend upon FedRAMP.

WebinarCloud Security
Webcast Abstract Image
  • 26 Jun 2024
  • 15:30 UTC
  • My-Ngoc Nguyen & Christian Clasen
View details

Cracking the Code: The Role of Programming in Information Security and Why Do We Do What We Do? A Motivational Talk

Cracking the Code: The Role of Programming in Information Security by SANS Fellow Instructor Mark Baggett and Why Do We Do What We Do? A Motivational Talk by Certified Instructor Candidate Justin Parker

WebinarCyber Defense
Webcast Abstract Image
  • 27 Jun 2024
  • 18:00 AEST
  • Mark Baggett
View details

Beyond File Names: Decoding the Secrets of Files with Signatures & Metadata

Don't be fooled by file extensions! This workshop delves deeper, equipping you to identify a file's true type using file signatures.

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 2 Jul 2024
  • 13:00 UTC
  • Kathryn Hedley
View details