Back to Search Begin New Search Save Search Auto-Notify
Keeping Government Systems Online, Comp...
When a crisis hits -- whether it’s a cyberattack, regional outage, or national emergency -- government and public safety agencies can’t afford to go dark. Yet, many public agencies are still struggling to pass CJIS compliance checks, relying on manual reporting, disconnected tools, or fragile network infrastructure that breaks exactly when they need it most. Join Government Technology and Absolute Software for a live webinar to exp...
December 15, 2025
Organizer: Government Technology
Location: Webcast
Add Favorite
Modernizing Within Budget: Smart IT Pla...
Every government wants modern systems, but no one has an unlimited budget. So how do you make meaningful progress without overusing resources or stalling out? The key lies in aligning modernization initiatives with total cost of ownership (TCO) and return on investment (ROI), and knowing what to prioritize, when, and how. Join us for a practical conversation on how state and local IT leaders can make smarter decisions about modernization, infr...
December 16, 2025
Organizer: Government Technology
Location: Webcast
Add Favorite
SANS@Night - Pay to Play: Surviving and...
When cybercriminals hold your data hostage, do you pay the ransom or call their bluff? In 2024, only 25% of organizations paid ransoms—an all-time low—yet those who did pay still only achieved 46% full data recovery. In this talk, we'll dissect the high-stakes world of ransomware negotiations, where million-dollar decisions happen under extreme pressure. Drawing from real-world negotiation transcripts and the groundbreaking Coinbas...
December 16, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
Compliance in Motion: How to Adapt Quic...
New federal legislation is asking states to quickly change how they manage Medicaid eligibility and application processing. With policy still evolving and implementation required by the end of 2026, agencies face the dual challenge of acting quickly while staying flexible. In this live webinar, experts will break down three critical technology imperatives to help states meet this moment:Seamless integration using a modular, low-code platformAu...
December 18, 2025
Organizer: Government Technology
Location: Webcast
Add Favorite
Mysteries in the Cloud: The Baker221b C...
Join the renowned investigators of Baker221b and step into the role of a digital detective. In this immersive workshop, participants will tackle a series of mysterious cloud breach cases—each one demanding sharp analytical thinking and technical skill. Working exclusively with popular command-line tools and cloud telemetry data, you will uncover hidden traces of attacker activity, reconstruct timelines, and piece together the story behin...
January 8, 2026
Organizer: SANS Institute
Location: Webcast
Add Favorite
The Future of Network Security: A Thoug...
Modern application environments now extend across multi-cloud platforms, data centers, and distributed edge locations. With the rise of remote work and AI-driven applications, the attack surface is rapidly expanding. Traditional Next-Generation Firewalls (NGFWs) often fall short in securing this complex landscape or safeguarding AI models, leaving gaps that enable advanced threats. In this webinar, experts from SANS and Cisco will explore the...
January 9, 2026
Organizer: SANS Institute
Location: Webcast
Add Favorite
Securing Branch and OT Environments wit...
Branch offices, remote campuses, and distributed OT/IoT environments have long relied on legacy VPNs, firewalls, and replicated security stacks to stay connected and secure. But these approaches introduce high costs, operational complexity, and leave dangerous gaps—especially around lateral movement within branch networks. In this SANS First Look webcast, we explore how Zscaler’s Zero Trust Branch (ZTB) introduces a new, streamline...
January 13, 2026
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS@Night - Bootstrap: How To Start Anything
Bootstrap means to start with “existing resources,” is commonly used with startup companies, and is far more widely applicable. There are many examples of successful bootstrapping and many advantages. Tenable, Sourcefire (acquired by Cisco for $2.7 billion), Malwarebytes, and SolarWinds are all companies that were bootstrapped. Wireshark and OSSEC are open source projects that were bootstrapped. The BSides conferences were bootstra...
January 13, 2026
Organizer: SANS Institute
Location: Webcast
Add Favorite
Securing Remote Access in OT: A Critica...
Operational Technology (OT) environments are more dependent than ever on remote access—for vendor support, troubleshooting, and data sharing—yet each connection can expand the attack surface. From disruptive ransomware to the cascading impacts seen in events like Ukraine’s 2015 grid attacks and Colonial Pipeline, the lesson is clear: Remote access is both a necessity and a potential vulnerability. This webcast distills guidan...
January 14, 2026
Organizer: SANS Institute
Location: Webcast
Add Favorite
SANS 2026 Kubernetes & CNAPP Forum
The SANS 2026 Kubernetes and CNAPP Forum is a focused, one-day event designed for security professionals, DevOps teams, and cloud architects seeking to secure modern, containerized applications. As Kubernetes and Cloud-Native Application Protection Platforms (CNAPPs) become core to enterprise infrastructure, this forum explores the evolving threat landscape, key attack vectors, and emerging defense strategies. Through expert-led sessions, tech...
January 15, 2026
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search