Keeping Government Systems Online, Comp...
When a crisis hits -- whether it’s a cyberattack, regional outage, or national emergency -- government and public safety agencies can’t afford to go dark. Yet, many public agencies are still struggling to pass CJIS compliance checks, relying on manual reporting, disconnected tools, or fragile network infrastructure that breaks exactly when they need it most. Join Government Technology and Absolute Software for a live webinar to exp...
Modernizing Within Budget: Smart IT Pla...
Every government wants modern systems, but no one has an unlimited budget. So how do you make meaningful progress without overusing resources or stalling out? The key lies in aligning modernization initiatives with total cost of ownership (TCO) and return on investment (ROI), and knowing what to prioritize, when, and how. Join us for a practical conversation on how state and local IT leaders can make smarter decisions about modernization, infr...
SANS@Night - Pay to Play: Surviving and...
When cybercriminals hold your data hostage, do you pay the ransom or call their bluff? In 2024, only 25% of organizations paid ransoms—an all-time low—yet those who did pay still only achieved 46% full data recovery. In this talk, we'll dissect the high-stakes world of ransomware negotiations, where million-dollar decisions happen under extreme pressure. Drawing from real-world negotiation transcripts and the groundbreaking Coinbas...
Compliance in Motion: How to Adapt Quic...
New federal legislation is asking states to quickly change how they manage Medicaid eligibility and application processing. With policy still evolving and implementation required by the end of 2026, agencies face the dual challenge of acting quickly while staying flexible. In this live webinar, experts will break down three critical technology imperatives to help states meet this moment:Seamless integration using a modular, low-code platformAu...
Mysteries in the Cloud: The Baker221b C...
Join the renowned investigators of Baker221b and step into the role of a digital detective. In this immersive workshop, participants will tackle a series of mysterious cloud breach cases—each one demanding sharp analytical thinking and technical skill. Working exclusively with popular command-line tools and cloud telemetry data, you will uncover hidden traces of attacker activity, reconstruct timelines, and piece together the story behin...
The Future of Network Security: A Thoug...
Modern application environments now extend across multi-cloud platforms, data centers, and distributed edge locations. With the rise of remote work and AI-driven applications, the attack surface is rapidly expanding. Traditional Next-Generation Firewalls (NGFWs) often fall short in securing this complex landscape or safeguarding AI models, leaving gaps that enable advanced threats. In this webinar, experts from SANS and Cisco will explore the...
Securing Branch and OT Environments wit...
Branch offices, remote campuses, and distributed OT/IoT environments have long relied on legacy VPNs, firewalls, and replicated security stacks to stay connected and secure. But these approaches introduce high costs, operational complexity, and leave dangerous gaps—especially around lateral movement within branch networks. In this SANS First Look webcast, we explore how Zscaler’s Zero Trust Branch (ZTB) introduces a new, streamline...
SANS@Night - Bootstrap: How To Start Anything
Bootstrap means to start with “existing resources,” is commonly used with startup companies, and is far more widely applicable. There are many examples of successful bootstrapping and many advantages. Tenable, Sourcefire (acquired by Cisco for $2.7 billion), Malwarebytes, and SolarWinds are all companies that were bootstrapped. Wireshark and OSSEC are open source projects that were bootstrapped. The BSides conferences were bootstra...
Securing Remote Access in OT: A Critica...
Operational Technology (OT) environments are more dependent than ever on remote access—for vendor support, troubleshooting, and data sharing—yet each connection can expand the attack surface. From disruptive ransomware to the cascading impacts seen in events like Ukraine’s 2015 grid attacks and Colonial Pipeline, the lesson is clear: Remote access is both a necessity and a potential vulnerability. This webcast distills guidan...
SANS 2026 Kubernetes & CNAPP Forum
The SANS 2026 Kubernetes and CNAPP Forum is a focused, one-day event designed for security professionals, DevOps teams, and cloud architects seeking to secure modern, containerized applications. As Kubernetes and Cloud-Native Application Protection Platforms (CNAPPs) become core to enterprise infrastructure, this forum explores the evolving threat landscape, key attack vectors, and emerging defense strategies. Through expert-led sessions, tech...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.