Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

SANS 2024 Detection & Response Survey: Transforming Cybersecurity Operations: AI, Automation, and Integration in Detection and Response

In the age of artificial intelligence (AI) and ever-evolving cyber threats, the landscape of security operations has witnessed a transformative shift. Our 2024 Detection & Response Survey delves into how organizations address critical aspects of detection, response, and the integration of these vital functions within organizations. On this webcast, SANS Certified Instructor Josh Lemon will provide insights into the prevalence of organizations maintaining separate detection and response teams, shedding light on the reasons behind such decisions and their implications for overall security posture. Register for this webcast now, and you will automatically receive the companion white paper upon publication.

WebinarSecurity Awareness
Webcast Abstract Image
  • 20 Nov 2024
  • 10:30 UTC
  • Josh Lemon, Adam Foit , Matt Hand + 3 more
View details

Clearing the Fog: Detection and Defense Against AWS Persistence Techniques

This talk will cover persistence mechanisms specific to the AWS ecosystem. The audience will learn about well established persistence techniques but also about creative new mechanisms that rely on newer cloud services. Most importantly it will cover defensive techniques and focus on the bottlenecks defenders can monitor to detect this activity.

WebinarCloud Security
Man presenting webcast to laptop screen
  • 20 Nov 2024
  • 10:30 UTC
  • Ryan Thompson
View details

Exploring the SANS Internet Storm Center

Ever wondered how the SANS Internet Storm Center will help you protect your network? This talk will not use power points but instead offer an engaging walk through recent events, how they manifested themselves in the ISC's data, how our different data feeds work, and more.

WebinarCyber Defense
Webcast Abstract Image
  • 20 Nov 2024
  • 19:30 UTC
View details

SANS SLTT Government Winter 2025 Program Overview

This webcast will provide a detailed overview of the products and pricing offered through the SANS SLTT Government partnership program.

WebinarCyber Defense
Webcast Abstract Image
  • 21 Nov 2024
  • 14:00 UTC
View details

Cloud Security: First Principles and Future Opportunities Part 2 of 5 - Secure by Design: Elevating Security Beyond Defaults

Part 2: Secure by Design: Elevating Security Beyond DefaultsIn Part 2 of this series, we focus on how Secure by Design (SbD) shifts development approaches to integrate security from the ground up, reducing risks early and creating systems that are resilient and secure by default.

WebinarCloud Security
Webcast Abstract Image
  • 22 Nov 2024
  • 11:00 UTC
  • Frank Kim, Dr. Paul Vixie & Eric Johnson
View details

Cloud Security: First Principles and Future Opportunities Part 3 of 5 - Modernizing Identity: Navigating Challenges and Embracing Cloud Solutions

Part 3: Modernizing Identity: Navigating Challenges and Embracing Cloud SolutionsIn Part 3, we tackle the pressing need for identity modernization as organizations transition from legacy systems to cloud-based applications. As outdated protocols and misconfigurations become more prevalent, this webcast will explore the benefits of modern identity solutions and their role in enhancing security through conditional access and zero trust principles.

WebinarCloud Security
Webcast Abstract Image
  • 26 Nov 2024
  • 11:00 UTC
  • Frank Kim, Angelica Faber & Simon Vernon
View details

An Intro to C for Windows - Part 10: The End

Hear ye! Hear ye! Be ye free from the CRT! What’s life like anyway without the CRT? What can a program even do without it? As the entire series comes to a close, this part will explore the CRT and how to become independent from it. This independence is critical to understand when it comes to creating binaries that are compiled as PIC; Position Independent Code.

WebinarOffensive Operations
Two people presenting a webcast
  • 2 Dec 2024
  • 15:00 UTC
  • Jonathan Reiter
View details

(APAC Focus) SANS 2024 Detection & Response Survey: Transforming Cybersecurity Operations: AI, Automation, and Integration in Detection and Response

In the age of artificial intelligence (AI) and ever-evolving cyber threats, the landscape of security operations has witnessed a transformative shift. Our 2024 Detection & Response Survey delves into how organizations address critical aspects of detection, response, and the integration of these vital functions within organizations. On this webcast, SANS Certified Instructor Josh Lemon will provide insights into the prevalence of organizations maintaining separate detection and response teams, shedding light on the reasons behind such decisions and their implications for overall security posture.

WebinarDigital Forensics and Incident Response
Man presenting webcast to laptop screen
  • 3 Dec 2024
  • 18:30 JST
  • Josh Lemon
View details

Gen-AI para DFIR en el mundo real: Casos de Uso Prácticos

En esta presentación Jess García proporciona un análisis en profundidad acerca del potencial transformador que tienen los sistemas de AI Generativa para potenciar las capacidades de detección de amenazas y de los equipos de respuesta.

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 3 Dec 2024
  • 19:15 CST
  • Jess Garcia
View details

Three Keys To Becoming a Cyber Risk Officer

Modern security leaders must deal with an endless barrage of changes to the business, technology, and threat landscape.

WebinarCybersecurity Leadership
Man presenting webcast to laptop screen
  • 4 Dec 2024
  • 13:00 UTC
  • Frank Kim
View details

DFIR実務者のためのSplunkによるデータ加工の手筋

Splunkはマシンデータ分析基盤として確固たる地位を築いています。情報セキュリティ分野でも、Splunkを活用している組織は少なくありません。シンプルなインターフェースで、Google感覚で使っても一定のサーチが遂行できるのは、すばらしいことです。

WebinarCyber Defense
Webcast Abstract Image
  • 5 Dec 2024
  • 18:30 JST
View details

Cloud Security: First Principles and Future Opportunities Part 4 of 5 - Evolving Cloud Security with a Modern Approach

Part 4: Evolving Cloud Security with a Modern ApproachIn this session, we'll explore how organizations can adapt their security practices to fit the dynamic nature of cloud infrastructure. While the cloud isn't inherently insecure, traditional on-premises security techniques often fall short. We'll dive into the shared responsibility model between cloud providers and users, the advantages of cloud-native security controls, and how AI tools can aid automation and threat detection-without losing sight of the critical role of human analysts.

WebinarCloud Security
Webcast Abstract Image
  • 6 Dec 2024
  • 11:00 UTC
  • Frank Kim, Dr. Anton Chuvakin & Brandon Evans
View details