Mysteries in the Cloud: The Baker221b C...
Join the renowned investigators of Baker221b and step into the role of a digital detective. In this immersive workshop, participants will tackle a series of mysterious cloud breach cases—each one demanding sharp analytical thinking and technical skill. Working exclusively with popular command-line tools and cloud telemetry data, you will uncover hidden traces of attacker activity, reconstruct timelines, and piece together the story behin...
The Future of Network Security: A Thoug...
Modern application environments now extend across multi-cloud platforms, data centers, and distributed edge locations. With the rise of remote work and AI-driven applications, the attack surface is rapidly expanding. Traditional Next-Generation Firewalls (NGFWs) often fall short in securing this complex landscape or safeguarding AI models, leaving gaps that enable advanced threats. In this webinar, experts from SANS and Cisco will explore the...
Securing Branch and OT Environments wit...
Branch offices, remote campuses, and distributed OT/IoT environments have long relied on legacy VPNs, firewalls, and replicated security stacks to stay connected and secure. But these approaches introduce high costs, operational complexity, and leave dangerous gaps—especially around lateral movement within branch networks. In this SANS First Look webcast, we explore how Zscaler’s Zero Trust Branch (ZTB) introduces a new, streamline...
SANS@Night - Bootstrap: How To Start Anything
Bootstrap means to start with “existing resources,” is commonly used with startup companies, and is far more widely applicable. There are many examples of successful bootstrapping and many advantages. Tenable, Sourcefire (acquired by Cisco for $2.7 billion), Malwarebytes, and SolarWinds are all companies that were bootstrapped. Wireshark and OSSEC are open source projects that were bootstrapped. The BSides conferences were bootstra...
Securing Remote Access in OT: A Critica...
Operational Technology (OT) environments are more dependent than ever on remote access—for vendor support, troubleshooting, and data sharing—yet each connection can expand the attack surface. From disruptive ransomware to the cascading impacts seen in events like Ukraine’s 2015 grid attacks and Colonial Pipeline, the lesson is clear: Remote access is both a necessity and a potential vulnerability. This webcast distills guidan...
SANS 2026 Kubernetes & CNAPP Forum
The SANS 2026 Kubernetes and CNAPP Forum is a focused, one-day event designed for security professionals, DevOps teams, and cloud architects seeking to secure modern, containerized applications. As Kubernetes and Cloud-Native Application Protection Platforms (CNAPPs) become core to enterprise infrastructure, this forum explores the evolving threat landscape, key attack vectors, and emerging defense strategies. Through expert-led sessions, tech...
MCP and the Question of Authorization
The Model Context Protocol (MCP) is becoming increasingly important in enabling and expanding the capabilities of agents. By allowing agents to take actions on behalf of users, MCP raises critical questions around authentication and authorization. In this webcast, we will dissect the challenges of secure delegation, explore various approaches to authentication and authorization, and discuss potential security risks and best practices for mitig...
SANS Holiday Hack Challenge 2025 | Clos...
Join us for the grand finale of the Holiday Hack Challenge 2025 where we’ll reveal the names of the big winners as we bid farewell to another chapter of challenges, victories, and innovation! As we wrap up the year, we'll take you behind the scenes to explore the 2025 challenges and share a few tips and insights that will prepare you for the 2026 journey, as always, promising an even more thrilling experience. Tune in with Chief Holiday...
Securing Enterprise Data in the Age of...
The rapid adoption of artificial intelligence (AI) across enterprises is transforming decision-making and efficiency. But with these benefits come new data security risks—ranging from inadvertent exposure of sensitive PII to gaps in existing data loss prevention (DLP) programs. Traditional controls, built for data at rest and in transit, often fail to keep pace with the dynamic nature of AI deployments and the growing volume of business...
Winter Cyber Solutions Fest 2026: Healthcare
As healthcare systems become increasingly digital and interconnected, cybersecurity is now inseparable from patient safety and clinical continuity. Winter Cyber Solutions Fest 2026: Healthcare convenes cybersecurity professionals, healthcare leaders, policymakers, and innovators to strengthen the industry’s ability to anticipate, withstand, and recover from evolving cyber threats. This year’s theme—Building Cyber-Resilient He...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.