Prevent Real Cloud Attacks with Terraform   
                      
                                                       
                            
                                Implementing cloud security controls is hard. Implementing them at scale is harder. Tools like HashiCorp Terraform and its open-source forks, such as OpenTofu, help organizations consistently enforce security and compliance using Infrastructure-as-Code. Unfortunately, not every security professional knows how to use Terraform, let alone use it securely. Join Brandon to learn all of the Terraform concepts and idiosyncrasies you need to know to...
                                                                    
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Resiliency and Business Continuity in t...   
                      
                                                       
                            
                                As more organizations leverage cloud services for critical business and security operations, many are realizing that new potential points of failure are a concern. When service providers and other cloud-based third parties experience outages or other issues, it can lead to downtime or gaps in security control coverage. With a growing movement toward cloud-based user access, zero trust, identity services hosted in the cloud, and more, it...
                                                                    
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      SANS 2025 CTI Survey Webcast & Forum: N...   
                      
                                                       
                            
                                As the cyber threat landscape continues to evolve, the past year has presented unique challenges and opportunities for cyber threat intelligence professionals. For 2025, availability has become a critical focus within the CIA triad, with ransomware and service outages high on the agenda, and network defenders and CTI analysts acutely aware of the impact of large-scale network disruptions. Additionally, AI remains a double-edged sword, with bot...
                                                                    
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Expecto Privacy: Casting Security on Data   
                      
                                                       
                            
                                In an era where data breaches and privacy concerns are increasingly prevalent, safeguarding personal and organizational information has become paramount. This presentation, “Expecto Privacy: Casting Security on Data,” delves into the critical aspects of privacy and security, exploring the intersection where they meet to protect sensitive data. We will examine key privacy items under various privacy regulations such as GDPR. Additio...
                                                                    
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      SANS Cybersecurity Leadership Summit 2025   
                      
                                                       
                            
                                Learn, share, and engage with fellow cybersecurity leaders.In a rapidly evolving threat landscape, leaders can’t just keep up—they must set the standard. The SANS Cybersecurity Leadership Summit is for industry leading CISOs, directors and managers looking to empower themselves with the knowledge and tools to not just participate, but to set the pace in cybersecurity leadership. This Summit provides invaluable insights from industr...
                                                                    
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Getting Involved in a Startup: Make a D...   
                      
                                                       
                            
                                The classic way to make a massive difference with technology, or “Dent in The Universe,” is via a startup. We can define a startup as a company with high growth possibilities that is innovative and potentially disruptive. This describes most startups in the infosec space. Also, essentially every startup has a strong technology component today and infosec concerns. This translates to lots of startup opportunities for infosec profess...
                                                                    
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Secure Your Fortress: Building Robust a...   
                      
                                                       
                            
                                Strengthen Your Cyber Defense with World-Class ExpertiseJoin us for SANS Secure Your Fortress: Building Robust and Resilient Defenses for 2025, where cutting-edge techniques meet hands-on practicality. Designed for cybersecurity professionals at all levels, this event equips you with the tools, strategies, and insights needed to overcome today’s toughest challenges and prepare for tomorrow’s emerging threats. What to Expect:Actiona...
                                                                    
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      SANS Cyber Security Training - Orlando 2025   
                      
                                                       
                            
                                Unlock the full potential of your cybersecurity career at SANS Orlando 2025 (April 13-18, ET), SANS flagship event. Guided by world-renowned instructors at the forefront of the field, this event provides exclusive access to live industry experts, ensuring you stay ahead of the curve. Immerse yourself in a learning environment that features industry-leading hands-on labs, simulations, and exercises, all geared towards practical application in y...
                                                                    
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      Demystifying BEC Threat Detection in Mi...   
                      
                                                       
                            
                                When it comes to threat detection on Business Email Compromise (BEC) in Microsoft 365, a new engineer can quickly become overwhelmed- which log sources contain the events I need? Which events do I need to look for? How do I make sure I'm getting all the events I need? Finally, how do I create good detections with the events I'm getting? This webcast familiarizes new threat detection engineers with critical log sources and provides guidance on...
                                                                    
                                                                            
                                                
                                               
                     
                   
                    	                
                    
                      
                      A CISO�s Guide to Improving Their Secur...   
                      
                                                       
                            
                                Join us for this insightful webinar tailored to CISOs and security leaders looking to build and enhance a strong security culture within their organizations. In today’s evolving threat landscape, fostering a robust security culture is essential to protect business assets and maintain customer trust. This session will provide three practical steps to align your cybersecurity strategy with your organization’s mission, vision, and val...
                                                                    
                                                                            
                                                
                                               
                     
                   
                                     
       
     
                    
          
        
     
 
	You must be logged in to view details.
	Membership is Free! 
	
	 
	
	
	
 
  
    
Please enter your email and password: 
      
  
 
  
    Please sign in with your email and password: 
    LinkedIn is experiencing technical difficulties. Please log in via email and password.  If you do not remember your password, please click "Forgot Password" to reset.