The Cloud Won't Save You from Ransomwar...
Cloud enthusiasts often tout how using a public cloud service provider helps mitigate ransomware attacks. Unfortunately, this is not true by default. Regardless of where files are stored, an attacker can download them, make them inaccessible to the target organization, and demand a payment for restoring their mission-critical data. Why the misconception? The first time most people use "the cloud" is when they use OneDrive, Dropbox, iCloud, Goo...
2024 SANS ICS Water Cybersecurity Surve...
Join Us for a Critical Webcast on Enhancing Water and Wastewater Utility Security on Thursday, 23 Jan 2025 at 1:00 PM EST.This webcast will dive deep into key findings from the latest survey assessing safety and security challenges in the water and wastewater utility sector. With a particular focus on Industrial Control Systems (ICS), SCADA, and Distributed Control Systems (DCS) used in water treatment and distribution, we’ll explore eme...
The New Email Battlefield: Defending Ag...
Email attacks have reached a tipping point. Cybercriminals are exploiting AI to launch highly targeted and convincing threats that bypass traditional defenses. With email serving as the primary communication channel for organizations, these attacks are more than a nuisance—they’re a growing liability. Join Government Technology and Abnormal Security for a live webinar where you’ll gain an understanding of how today’s em...
The Road Ahead: 2025 Gov Tech Market Pr...
The road to success starts with a clear view of what’s ahead. Join us for an insightful session as Joe Morris, Chief Innovation Officer, and Dustin Haisler, President of Government Technology, share their bold predictions for 2025. These market visionaries will uncover the trends, technologies, and buying behaviors set to reshape the state, local, and education (SLED) landscape in the year ahead. Designed for sales and marketing professi...
Google SecOps: The SIEM's Third Act
SIEM's complicated evolution has resulted in unsustainable cost increases, scope creep, and the occasional declaration that the product space is essentially dead. Thanks to deep expertise in search and data management, access to OSINT and frontline intelligence, and AI-infused features, Google SecOps demonstrates that the SIEM still has plenty of gas in the tank. Discover how SecOps is ushering in the "SIEM's Third Act" by addressing the limit...
Introducing the 2025 Digital Counties Survey!
The momentum around artificial intelligence is undeniable—especially for public agency leaders looking to bring powerful AI development capabilities in-house. But how do you secure these cutting-edge initiatives without stalling innovation? Join Government Technology and HP for an in-depth conversation about how to make in-house AI development more secure and effective. We’ll explore the importance of safeguarding AI projects, the...
Intro to Kerberos and Common AD Privesc...
In this workshop, SANS instructor and lead author of SEC565: Red Team Operations and Adversary Emulation, Jean-Francois Maes, will walk the audience through a guided hands-on workshop where common Active Directory Privilege Escalation Attacks are going to be discussed and executed using Empire version 5. Attacks that will be conducted:KerberoastingDCSyncingHopping parent/child trust using SID historyAbusing Unconstrained DelegationAt the end o...
Twenty New Labs, Infinite Possibilities...
Get ready to deep dive into the all-new SANS SEC587 Advanced Open-Source Intelligence course, where 20 new labs and enhanced content redefine the landscape of OSINT training. This overhaul includes content on Russian and Chinese OSINT, cutting-edge audio analysis powered by AI, and timely new sections on cryptocurrency and drone detection, among others. We'll also look at how SEC587 complements SEC497 Practical OSINT, positioning you to unlock...
Building Safe and Secure Schools, Campu...
The way we work has fundamentally shifted. The need for flexible, safe and secure collaboration and communication tools has never been greater. Whether it’s a colleague joining from home, a teacher or faculty member logging in from their desk across campus, or a school safety issue needing addressing, today’s organizations demand a new approach to communication. Is your organization ready? Join Government Technology and HP for a li...
SANS@Night - Getting Involved in a Star...
The classic way to make a massive difference with technology, or “Dent in The Universe,” is via a startup. We can define a startup as a company with high growth possibilities that is innovative and potentially disruptive. This describes most startups in the infosec space. Also, essentially every startup has a strong technology component today and infosec concerns. This translates to lots of startup opportunities for infosec profess...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.