SANS@Night - How I've Changed the Way I...
I've been a heavy user of AI since the beginning, but the way that I use AI has recently shifted. In this fast-paced, fun talk, we'll cover the top ways that I've improved my efficiency and productivity by changing the way I interact with AI in 2025 and into 2026.
SANS@Night - A Current Look at the Thre...
In this talk we will take a look at the most recent attack techniques, targets, and trends. This includes understanding what kind of malware and illicit access items are available on the dark web for sale and how it can be the first sign of a breach, social engineering attacks, and the latest on 0-day and n-day vulnerability research. Artificial Intelligence is an aggressively growing area where we can both use the technology as an attack aid...
SANS@Night - From Servant to Surrogate:...
Organizations keep deploying AI "agents" without understanding what autonomy level they're getting or what governance it warrants. Chinese state-sponsored hackers used Claude Code to automate a cyberattack campaign across 30 organizations. Replit's AI coding agent deleted a production database, then tried to cover up its mistake. These aren't anomalies. They're predictable governance failures. The Misenar 4A Model maps AI autonomy across four...
Build Smarter SOCs with AI and Automation
If your security operations center is overwhelmed and understaffed, you’re not alone. Many organizations are grappling with fragmented systems, alert fatigue and rising cyber risks while working with lean teams and tight budgets. Today’s AI and automation tools are built to ease the load in these situations by taking over routine tasks and enabling better decision-making. Join us for a live webinar on how AI-driven automation is tr...
Keeping Government Systems Online, Comp...
When a crisis hits -- whether it’s a cyberattack, regional outage, or national emergency -- government and public safety agencies can’t afford to go dark. Yet, many public agencies are still struggling to pass CJIS compliance checks, relying on manual reporting, disconnected tools, or fragile network infrastructure that breaks exactly when they need it most. Join Government Technology and Absolute Software for a live webinar to exp...
Modernizing Within Budget: Smart IT Pla...
Every government wants modern systems, but no one has an unlimited budget. So how do you make meaningful progress without overusing resources or stalling out? The key lies in aligning modernization initiatives with total cost of ownership (TCO) and return on investment (ROI), and knowing what to prioritize, when, and how. Join us for a practical conversation on how state and local IT leaders can make smarter decisions about modernization, infr...
SANS@Night - Pay to Play: Surviving and...
When cybercriminals hold your data hostage, do you pay the ransom or call their bluff? In 2024, only 25% of organizations paid ransoms—an all-time low—yet those who did pay still only achieved 46% full data recovery. In this talk, we'll dissect the high-stakes world of ransomware negotiations, where million-dollar decisions happen under extreme pressure. Drawing from real-world negotiation transcripts and the groundbreaking Coinbas...
How the Public Sector is Modernizing Op...
Every government agency is wrestling with the same mandate: deliver essential public services, protect communities, and stretch every taxpayer dollar further. Managing vast fleets, disparate assets, and critical infrastructure has become a complex, high-stakes challenge that demands a strategic leap beyond legacy systems. This isn't just about adopting new technology; it’s about connecting operations across departments to build an intell...
Compliance in Motion: How to Adapt Quic...
New federal legislation is asking states to quickly change how they manage Medicaid eligibility and application processing. With policy still evolving and implementation required by the end of 2026, agencies face the dual challenge of acting quickly while staying flexible. In this live webinar, experts will break down three critical technology imperatives to help states meet this moment:Seamless integration using a modular, low-code platformAu...
Mysteries in the Cloud: The Baker221b C...
Join the renowned investigators of Baker221b and step into the role of a digital detective. In this immersive workshop, participants will tackle a series of mysterious cloud breach cases—each one demanding sharp analytical thinking and technical skill. Working exclusively with popular command-line tools and cloud telemetry data, you will uncover hidden traces of attacker activity, reconstruct timelines, and piece together the story behin...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.