www.sans.org Open in urlscan Pro
45.60.31.34  Public Scan

Submitted URL: https://click.email.sans.org/?qs=2d5060bf19825ccfbd8ea80fef3b17956c2c6c2ddfe942fad8be979d20f77ccaac3e0193a0782633f2d4b73f78b1...
Effective URL: https://www.sans.org/cyber-security-training-events/cloudsecnext-summit-2024/?utm_medium=Email&utm_source=atRisk&utm_...
Submission: On September 12 via api from US — Scanned from US

Form analysis 1 forms found in the DOM

<form id="footerNewsletterForm" autocomplete="off" data-v-64bb6155="">
  <div class="form-item" data-v-64bb6155=""><label for="subscribe-email-footerNewsletterForm" data-v-64bb6155=""></label> <input id="subscribe-email-footerNewsletterForm" type="email" name="email" autocomplete="on" placeholder="Your Email..."
      required="required" class="subscribe-email" data-v-64bb6155=""></div>
  <div class="form-item" data-v-64bb6155="">
    <div id="sidebarCountry_footer-wrapper" class="select light large" data-v-1b4c0987="" data-v-64bb6155="">
      <div class="wrp" data-v-1b4c0987=""><!---->
        <div class="combo-wrap" data-v-1b4c0987="">
          <div class="combo-wrap-inner" data-v-1b4c0987=""><input id="sidebarCountry_footer" placeholder="Select your country" autocomplete="chrome-off" class="combobox" data-v-1b4c0987="" type="text" role="combobox" aria-controls="4ox6xaDH"
              aria-autocomplete="list" aria-expanded="false">
            <div class="listbox listbox-for-sidebarCountry_footer" data-v-1b4c0987="" id="4ox6xaDH" role="listbox">
              <div data-optvalue="261" class="option" data-v-1b4c0987="" role="option" id="QYRSJ6QU"> United States </div>
              <div data-optvalue="76" class="option" data-v-1b4c0987="" role="option" id="6kxeG27P"> Canada </div>
              <div data-optvalue="260" class="option" data-v-1b4c0987="" role="option" id="9yZxCH4m"> United Kingdom </div>
              <div data-optvalue="233" class="option" data-v-1b4c0987="" role="option" id="cbYEs90C"> Spain </div>
              <div data-optvalue="59" class="option" data-v-1b4c0987="" role="option" id="9i56MtbE"> Belgium </div>
              <div data-optvalue="95" class="option" data-v-1b4c0987="" role="option" id="UUI9RKrL"> Denmark </div>
              <div data-optvalue="199" class="option" data-v-1b4c0987="" role="option" id="dNzsyZa5"> Norway </div>
              <div data-optvalue="189" class="option" data-v-1b4c0987="" role="option" id="6L1CsfM2"> Netherlands </div>
              <div data-optvalue="51" class="option" data-v-1b4c0987="" role="option" id="rdW7i6Eq"> Australia </div>
              <div data-optvalue="138" class="option" data-v-1b4c0987="" role="option" id="3X3HJ4ln"> India </div>
              <div data-optvalue="146" class="option" data-v-1b4c0987="" role="option" id="r4k0G6YN"> Japan </div>
              <div data-optvalue="227" class="option" data-v-1b4c0987="" role="option" id="pj4cXxTK"> Singapore </div>
              <div data-optvalue="39" class="option" data-v-1b4c0987="" role="option" id="rgJ7I890"> Afghanistan </div>
              <div data-optvalue="1188" class="option" data-v-1b4c0987="" role="option" id="Tv6v540a"> Aland Islands </div>
              <div data-optvalue="40" class="option" data-v-1b4c0987="" role="option" id="6s8a9iDc"> Albania </div>
              <div data-optvalue="41" class="option" data-v-1b4c0987="" role="option" id="xvadGPM5"> Algeria </div>
              <div data-optvalue="42" class="option" data-v-1b4c0987="" role="option" id="gDAvrJGD"> American Samoa </div>
              <div data-optvalue="43" class="option" data-v-1b4c0987="" role="option" id="rdSxnpJu"> Andorra </div>
              <div data-optvalue="44" class="option" data-v-1b4c0987="" role="option" id="LgNKbQn6"> Angola </div>
              <div data-optvalue="45" class="option" data-v-1b4c0987="" role="option" id="OlimPZJG"> Anguilla </div>
              <div data-optvalue="46" class="option" data-v-1b4c0987="" role="option" id="jGJ6nXSU"> Antarctica </div>
              <div data-optvalue="47" class="option" data-v-1b4c0987="" role="option" id="D3Al21aJ"> Antigua and Barbuda </div>
              <div data-optvalue="48" class="option" data-v-1b4c0987="" role="option" id="X0GHTKDL"> Argentina </div>
              <div data-optvalue="49" class="option" data-v-1b4c0987="" role="option" id="oswjXTFV"> Armenia </div>
              <div data-optvalue="50" class="option" data-v-1b4c0987="" role="option" id="LIf0hi58"> Aruba </div>
              <div data-optvalue="52" class="option" data-v-1b4c0987="" role="option" id="ybTj3FzG"> Austria </div>
              <div data-optvalue="53" class="option" data-v-1b4c0987="" role="option" id="FPZQksJv"> Azerbaijan </div>
              <div data-optvalue="54" class="option" data-v-1b4c0987="" role="option" id="7FH4sxfU"> Bahamas </div>
              <div data-optvalue="55" class="option" data-v-1b4c0987="" role="option" id="7KQaRLbc"> Bahrain </div>
              <div data-optvalue="56" class="option" data-v-1b4c0987="" role="option" id="IXnvTTlz"> Bangladesh </div>
              <div data-optvalue="57" class="option" data-v-1b4c0987="" role="option" id="gcpgvxIt"> Barbados </div>
              <div data-optvalue="58" class="option" data-v-1b4c0987="" role="option" id="mxBbVr0t"> Belarus </div>
              <div data-optvalue="60" class="option" data-v-1b4c0987="" role="option" id="s6Tn88Qr"> Belize </div>
              <div data-optvalue="61" class="option" data-v-1b4c0987="" role="option" id="S91YOUd9"> Benin </div>
              <div data-optvalue="62" class="option" data-v-1b4c0987="" role="option" id="WvfPBgSW"> Bermuda </div>
              <div data-optvalue="63" class="option" data-v-1b4c0987="" role="option" id="jN7BuutF"> Bhutan </div>
              <div data-optvalue="64" class="option" data-v-1b4c0987="" role="option" id="1ZZoVDiw"> Bolivia </div>
              <div data-optvalue="1189" class="option" data-v-1b4c0987="" role="option" id="NJIRYrWs"> Bonaire, Sint Eustatius, and Saba </div>
              <div data-optvalue="65" class="option" data-v-1b4c0987="" role="option" id="MSoUAX0P"> Bosnia And Herzegovina </div>
              <div data-optvalue="66" class="option" data-v-1b4c0987="" role="option" id="pBSpxG6V"> Botswana </div>
              <div data-optvalue="67" class="option" data-v-1b4c0987="" role="option" id="60ck5Gnq"> Bouvet Island </div>
              <div data-optvalue="68" class="option" data-v-1b4c0987="" role="option" id="30JzgztV"> Brazil </div>
              <div data-optvalue="69" class="option" data-v-1b4c0987="" role="option" id="nA551vJY"> British Indian Ocean Territory </div>
              <div data-optvalue="70" class="option" data-v-1b4c0987="" role="option" id="5yqG5bZ4"> Brunei Darussalam </div>
              <div data-optvalue="71" class="option" data-v-1b4c0987="" role="option" id="k2z1uWCL"> Bulgaria </div>
              <div data-optvalue="72" class="option" data-v-1b4c0987="" role="option" id="khFVbdDJ"> Burkina Faso </div>
              <div data-optvalue="73" class="option" data-v-1b4c0987="" role="option" id="0KRL3sT7"> Burundi </div>
              <div data-optvalue="74" class="option" data-v-1b4c0987="" role="option" id="oCFL0W38"> Cambodia </div>
              <div data-optvalue="75" class="option" data-v-1b4c0987="" role="option" id="clbNPecT"> Cameroon </div>
              <div data-optvalue="77" class="option" data-v-1b4c0987="" role="option" id="SHHRy21d"> Cape Verde </div>
              <div data-optvalue="78" class="option" data-v-1b4c0987="" role="option" id="pg3KUlKS"> Cayman Islands </div>
              <div data-optvalue="79" class="option" data-v-1b4c0987="" role="option" id="GBvO6IYA"> Central African Republic </div>
              <div data-optvalue="80" class="option" data-v-1b4c0987="" role="option" id="49F7D3zI"> Chad </div>
              <div data-optvalue="81" class="option" data-v-1b4c0987="" role="option" id="NXFnaTzH"> Chile </div>
              <div data-optvalue="82" class="option" data-v-1b4c0987="" role="option" id="7WbFFFUg"> China </div>
              <div data-optvalue="83" class="option" data-v-1b4c0987="" role="option" id="JWUe09Tk"> Christmas Island </div>
              <div data-optvalue="84" class="option" data-v-1b4c0987="" role="option" id="gIZfo83n"> Cocos (Keeling) Islands </div>
              <div data-optvalue="85" class="option" data-v-1b4c0987="" role="option" id="AglByZtM"> Colombia </div>
              <div data-optvalue="86" class="option" data-v-1b4c0987="" role="option" id="p4yUU7fs"> Comoros </div>
              <div data-optvalue="87" class="option" data-v-1b4c0987="" role="option" id="A0MqmRsm"> Congo </div>
              <div data-optvalue="88" class="option" data-v-1b4c0987="" role="option" id="d4ewYX0g"> Cook Islands </div>
              <div data-optvalue="89" class="option" data-v-1b4c0987="" role="option" id="Gqo6ikDL"> Costa Rica </div>
              <div data-optvalue="90" class="option" data-v-1b4c0987="" role="option" id="Jd1UdmHw"> Cote D'ivoire </div>
              <div data-optvalue="91" class="option" data-v-1b4c0987="" role="option" id="UkDoFL2m"> Croatia (Local Name: Hrvatska) </div>
              <div data-optvalue="1192" class="option" data-v-1b4c0987="" role="option" id="xBunsmzE"> Curacao </div>
              <div data-optvalue="93" class="option" data-v-1b4c0987="" role="option" id="ewvMRncY"> Cyprus </div>
              <div data-optvalue="94" class="option" data-v-1b4c0987="" role="option" id="6Y2Mhxgv"> Czech Republic </div>
              <div data-optvalue="1190" class="option" data-v-1b4c0987="" role="option" id="Sr8jZmpn"> Democratic Republic of the Congo </div>
              <div data-optvalue="96" class="option" data-v-1b4c0987="" role="option" id="Mo0ELq1N"> Djibouti </div>
              <div data-optvalue="97" class="option" data-v-1b4c0987="" role="option" id="KHpx9ZRf"> Dominica </div>
              <div data-optvalue="98" class="option" data-v-1b4c0987="" role="option" id="ipYknxWW"> Dominican Republic </div>
              <div data-optvalue="1198" class="option" data-v-1b4c0987="" role="option" id="f9Z2CrQw"> East Timor </div>
              <div data-optvalue="100" class="option" data-v-1b4c0987="" role="option" id="3h5NW5KY"> Ecuador </div>
              <div data-optvalue="101" class="option" data-v-1b4c0987="" role="option" id="zMEr2rrz"> Egypt </div>
              <div data-optvalue="102" class="option" data-v-1b4c0987="" role="option" id="lvw6plCu"> El Salvador </div>
              <div data-optvalue="103" class="option" data-v-1b4c0987="" role="option" id="1hLjSOFK"> Equatorial Guinea </div>
              <div data-optvalue="104" class="option" data-v-1b4c0987="" role="option" id="ucHctjjr"> Eritrea </div>
              <div data-optvalue="105" class="option" data-v-1b4c0987="" role="option" id="qHjpIJLF"> Estonia </div>
              <div data-optvalue="240" class="option" data-v-1b4c0987="" role="option" id="8nDjlMYc"> Eswatini </div>
              <div data-optvalue="106" class="option" data-v-1b4c0987="" role="option" id="JxqapOLj"> Ethiopia </div>
              <div data-optvalue="108" class="option" data-v-1b4c0987="" role="option" id="pFf4dCtx"> Falkland Islands (Malvinas) </div>
              <div data-optvalue="109" class="option" data-v-1b4c0987="" role="option" id="t2mVk39f"> Faroe Islands </div>
              <div data-optvalue="110" class="option" data-v-1b4c0987="" role="option" id="T2dd5BfU"> Fiji </div>
              <div data-optvalue="111" class="option" data-v-1b4c0987="" role="option" id="Huz8TX94"> Finland </div>
              <div data-optvalue="112" class="option" data-v-1b4c0987="" role="option" id="jMzrAthI"> France </div>
              <div data-optvalue="114" class="option" data-v-1b4c0987="" role="option" id="TFtk2Txj"> French Guiana </div>
              <div data-optvalue="115" class="option" data-v-1b4c0987="" role="option" id="3BGzgqC2"> French Polynesia </div>
              <div data-optvalue="116" class="option" data-v-1b4c0987="" role="option" id="uTEuWJXP"> French Southern Territories </div>
              <div data-optvalue="117" class="option" data-v-1b4c0987="" role="option" id="NHju7vNW"> Gabon </div>
              <div data-optvalue="118" class="option" data-v-1b4c0987="" role="option" id="iYmVnxnQ"> Gambia </div>
              <div data-optvalue="119" class="option" data-v-1b4c0987="" role="option" id="lmnTcbEf"> Georgia </div>
              <div data-optvalue="120" class="option" data-v-1b4c0987="" role="option" id="CqwXud2L"> Germany </div>
              <div data-optvalue="121" class="option" data-v-1b4c0987="" role="option" id="MUdA4Xla"> Ghana </div>
              <div data-optvalue="122" class="option" data-v-1b4c0987="" role="option" id="7DUNRZuT"> Gibraltar </div>
              <div data-optvalue="123" class="option" data-v-1b4c0987="" role="option" id="MHwygjBv"> Greece </div>
              <div data-optvalue="124" class="option" data-v-1b4c0987="" role="option" id="bg9zfo15"> Greenland </div>
              <div data-optvalue="125" class="option" data-v-1b4c0987="" role="option" id="sYXITYn7"> Grenada </div>
              <div data-optvalue="126" class="option" data-v-1b4c0987="" role="option" id="7w3lfBpl"> Guadeloupe </div>
              <div data-optvalue="127" class="option" data-v-1b4c0987="" role="option" id="Chw3CC2t"> Guam </div>
              <div data-optvalue="128" class="option" data-v-1b4c0987="" role="option" id="flNycnU6"> Guatemala </div>
              <div data-optvalue="1077" class="option" data-v-1b4c0987="" role="option" id="rVD2wtww"> Guernsey </div>
              <div data-optvalue="129" class="option" data-v-1b4c0987="" role="option" id="32UK13m5"> Guinea </div>
              <div data-optvalue="130" class="option" data-v-1b4c0987="" role="option" id="JdtXKtvb"> Guinea-Bissau </div>
              <div data-optvalue="131" class="option" data-v-1b4c0987="" role="option" id="Oqnahiro"> Guyana </div>
              <div data-optvalue="132" class="option" data-v-1b4c0987="" role="option" id="otMo1PpE"> Haiti </div>
              <div data-optvalue="133" class="option" data-v-1b4c0987="" role="option" id="HR7RNxA6"> Heard And McDonald Islands </div>
              <div data-optvalue="134" class="option" data-v-1b4c0987="" role="option" id="8fjgsRL5"> Honduras </div>
              <div data-optvalue="135" class="option" data-v-1b4c0987="" role="option" id="TWQi2z9o"> Hong Kong </div>
              <div data-optvalue="136" class="option" data-v-1b4c0987="" role="option" id="8FkHQ1R3"> Hungary </div>
              <div data-optvalue="137" class="option" data-v-1b4c0987="" role="option" id="bPFYyfiC"> Iceland </div>
              <div data-optvalue="139" class="option" data-v-1b4c0987="" role="option" id="AabJEwRy"> Indonesia </div>
              <div data-optvalue="141" class="option" data-v-1b4c0987="" role="option" id="EXkFju7R"> Iraq </div>
              <div data-optvalue="142" class="option" data-v-1b4c0987="" role="option" id="zHowwdPg"> Ireland </div>
              <div data-optvalue="1079" class="option" data-v-1b4c0987="" role="option" id="cbJH1NKN"> Isle of Man </div>
              <div data-optvalue="143" class="option" data-v-1b4c0987="" role="option" id="lIINTqZg"> Israel </div>
              <div data-optvalue="144" class="option" data-v-1b4c0987="" role="option" id="MrSVJShI"> Italy </div>
              <div data-optvalue="145" class="option" data-v-1b4c0987="" role="option" id="VuBIf68l"> Jamaica </div>
              <div data-optvalue="1076" class="option" data-v-1b4c0987="" role="option" id="6PSFfOR1"> Jersey </div>
              <div data-optvalue="147" class="option" data-v-1b4c0987="" role="option" id="dUpRtARR"> Jordan </div>
              <div data-optvalue="148" class="option" data-v-1b4c0987="" role="option" id="reXjyPfC"> Kazakhstan </div>
              <div data-optvalue="149" class="option" data-v-1b4c0987="" role="option" id="OPL8B2FE"> Kenya </div>
              <div data-optvalue="150" class="option" data-v-1b4c0987="" role="option" id="Y1dRnwW2"> Kiribati </div>
              <div data-optvalue="152" class="option" data-v-1b4c0987="" role="option" id="Bf5VDKQq"> Korea, Republic Of </div>
              <div data-optvalue="1199" class="option" data-v-1b4c0987="" role="option" id="CgT3EN5S"> Kosovo </div>
              <div data-optvalue="153" class="option" data-v-1b4c0987="" role="option" id="afUIlFRo"> Kuwait </div>
              <div data-optvalue="154" class="option" data-v-1b4c0987="" role="option" id="1QKbPVuT"> Kyrgyzstan </div>
              <div data-optvalue="155" class="option" data-v-1b4c0987="" role="option" id="45f2l7mQ"> Lao People's Democratic Republic </div>
              <div data-optvalue="156" class="option" data-v-1b4c0987="" role="option" id="ZqThT2UF"> Latvia </div>
              <div data-optvalue="157" class="option" data-v-1b4c0987="" role="option" id="pGsGGuvh"> Lebanon </div>
              <div data-optvalue="158" class="option" data-v-1b4c0987="" role="option" id="2v9TIqiN"> Lesotho </div>
              <div data-optvalue="159" class="option" data-v-1b4c0987="" role="option" id="KThua0Ry"> Liberia </div>
              <div data-optvalue="161" class="option" data-v-1b4c0987="" role="option" id="mJF5CjLN"> Liechtenstein </div>
              <div data-optvalue="162" class="option" data-v-1b4c0987="" role="option" id="5DYY0mAy"> Lithuania </div>
              <div data-optvalue="163" class="option" data-v-1b4c0987="" role="option" id="ugDZIZ6j"> Luxembourg </div>
              <div data-optvalue="164" class="option" data-v-1b4c0987="" role="option" id="sEMdgxae"> Macau </div>
              <div data-optvalue="166" class="option" data-v-1b4c0987="" role="option" id="krhSFumP"> Madagascar </div>
              <div data-optvalue="167" class="option" data-v-1b4c0987="" role="option" id="bFCqVbtg"> Malawi </div>
              <div data-optvalue="168" class="option" data-v-1b4c0987="" role="option" id="vOeW4Hdy"> Malaysia </div>
              <div data-optvalue="169" class="option" data-v-1b4c0987="" role="option" id="5MUEZCJ4"> Maldives </div>
              <div data-optvalue="170" class="option" data-v-1b4c0987="" role="option" id="fqJtvLfk"> Mali </div>
              <div data-optvalue="171" class="option" data-v-1b4c0987="" role="option" id="lYRm6xu2"> Malta </div>
              <div data-optvalue="172" class="option" data-v-1b4c0987="" role="option" id="H9sfZJs7"> Marshall Islands </div>
              <div data-optvalue="173" class="option" data-v-1b4c0987="" role="option" id="wWQbRiyV"> Martinique </div>
              <div data-optvalue="174" class="option" data-v-1b4c0987="" role="option" id="0XXGnP0s"> Mauritania </div>
              <div data-optvalue="175" class="option" data-v-1b4c0987="" role="option" id="Rfpmr1ig"> Mauritius </div>
              <div data-optvalue="176" class="option" data-v-1b4c0987="" role="option" id="amYjpfWk"> Mayotte </div>
              <div data-optvalue="177" class="option" data-v-1b4c0987="" role="option" id="gX1C5LCQ"> Mexico </div>
              <div data-optvalue="178" class="option" data-v-1b4c0987="" role="option" id="qd3lja8O"> Micronesia, Federated States Of </div>
              <div data-optvalue="179" class="option" data-v-1b4c0987="" role="option" id="AXtRqpWN"> Moldova, Republic Of </div>
              <div data-optvalue="180" class="option" data-v-1b4c0987="" role="option" id="sKvBpgcE"> Monaco </div>
              <div data-optvalue="181" class="option" data-v-1b4c0987="" role="option" id="f85pM2N5"> Mongolia </div>
              <div data-optvalue="1089" class="option" data-v-1b4c0987="" role="option" id="hit31ZCL"> Montenegro </div>
              <div data-optvalue="182" class="option" data-v-1b4c0987="" role="option" id="JFFgvhlX"> Montserrat </div>
              <div data-optvalue="183" class="option" data-v-1b4c0987="" role="option" id="yfJugx6J"> Morocco </div>
              <div data-optvalue="184" class="option" data-v-1b4c0987="" role="option" id="HNpNmKm1"> Mozambique </div>
              <div data-optvalue="185" class="option" data-v-1b4c0987="" role="option" id="VnamSllW"> Myanmar </div>
              <div data-optvalue="186" class="option" data-v-1b4c0987="" role="option" id="6S1aWiMz"> Namibia </div>
              <div data-optvalue="187" class="option" data-v-1b4c0987="" role="option" id="3EwYbc4K"> Nauru </div>
              <div data-optvalue="188" class="option" data-v-1b4c0987="" role="option" id="nqMO9Wd9"> Nepal </div>
              <div data-optvalue="190" class="option" data-v-1b4c0987="" role="option" id="7JKhZZ29"> Netherlands Antilles </div>
              <div data-optvalue="191" class="option" data-v-1b4c0987="" role="option" id="r5iDmpA3"> New Caledonia </div>
              <div data-optvalue="192" class="option" data-v-1b4c0987="" role="option" id="0GqCR2O6"> New Zealand </div>
              <div data-optvalue="193" class="option" data-v-1b4c0987="" role="option" id="CPL2j4BZ"> Nicaragua </div>
              <div data-optvalue="194" class="option" data-v-1b4c0987="" role="option" id="6vcBZvG7"> Niger </div>
              <div data-optvalue="195" class="option" data-v-1b4c0987="" role="option" id="ppdyQ0bn"> Nigeria </div>
              <div data-optvalue="196" class="option" data-v-1b4c0987="" role="option" id="DVkRhjGm"> Niue </div>
              <div data-optvalue="197" class="option" data-v-1b4c0987="" role="option" id="JUGKrO7m"> Norfolk Island </div>
              <div data-optvalue="165" class="option" data-v-1b4c0987="" role="option" id="54JFwV88"> North Macedonia </div>
              <div data-optvalue="198" class="option" data-v-1b4c0987="" role="option" id="HJDaGh5j"> Northern Mariana Islands </div>
              <div data-optvalue="200" class="option" data-v-1b4c0987="" role="option" id="hSafUhsj"> Oman </div>
              <div data-optvalue="201" class="option" data-v-1b4c0987="" role="option" id="mgoEJ4M5"> Pakistan </div>
              <div data-optvalue="202" class="option" data-v-1b4c0987="" role="option" id="yxKyukhK"> Palau </div>
              <div data-optvalue="1045" class="option" data-v-1b4c0987="" role="option" id="CLcCyvuC"> Palestine </div>
              <div data-optvalue="203" class="option" data-v-1b4c0987="" role="option" id="dXalMhgh"> Panama </div>
              <div data-optvalue="204" class="option" data-v-1b4c0987="" role="option" id="snuast07"> Papua New Guinea </div>
              <div data-optvalue="205" class="option" data-v-1b4c0987="" role="option" id="jZahtfSC"> Paraguay </div>
              <div data-optvalue="206" class="option" data-v-1b4c0987="" role="option" id="QOJ7LGq8"> Peru </div>
              <div data-optvalue="207" class="option" data-v-1b4c0987="" role="option" id="7Jsm1GYF"> Philippines </div>
              <div data-optvalue="208" class="option" data-v-1b4c0987="" role="option" id="TIqzllaO"> Pitcairn </div>
              <div data-optvalue="209" class="option" data-v-1b4c0987="" role="option" id="JcpTnjvs"> Poland </div>
              <div data-optvalue="210" class="option" data-v-1b4c0987="" role="option" id="NRqnJOI3"> Portugal </div>
              <div data-optvalue="211" class="option" data-v-1b4c0987="" role="option" id="HyYOfnXm"> Puerto Rico </div>
              <div data-optvalue="212" class="option" data-v-1b4c0987="" role="option" id="Xk7FG6ve"> Qatar </div>
              <div data-optvalue="213" class="option" data-v-1b4c0987="" role="option" id="y7xc8j8r"> Reunion </div>
              <div data-optvalue="214" class="option" data-v-1b4c0987="" role="option" id="Z41VsxZO"> Romania </div>
              <div data-optvalue="215" class="option" data-v-1b4c0987="" role="option" id="nz8R53yi"> Russian Federation </div>
              <div data-optvalue="216" class="option" data-v-1b4c0987="" role="option" id="2H462d3W"> Rwanda </div>
              <div data-optvalue="1088" class="option" data-v-1b4c0987="" role="option" id="Rcavgtxl"> Saint Bartholemy </div>
              <div data-optvalue="217" class="option" data-v-1b4c0987="" role="option" id="HAdocs4s"> Saint Kitts And Nevis </div>
              <div data-optvalue="218" class="option" data-v-1b4c0987="" role="option" id="xsHlY0k5"> Saint Lucia </div>
              <div data-optvalue="1195" class="option" data-v-1b4c0987="" role="option" id="wV8szPeA"> Saint Martin </div>
              <div data-optvalue="219" class="option" data-v-1b4c0987="" role="option" id="gJwC1o35"> Saint Vincent And The Grenadines </div>
              <div data-optvalue="220" class="option" data-v-1b4c0987="" role="option" id="kRPqu5ol"> Samoa </div>
              <div data-optvalue="221" class="option" data-v-1b4c0987="" role="option" id="1YAPDIyx"> San Marino </div>
              <div data-optvalue="222" class="option" data-v-1b4c0987="" role="option" id="YkZCrlRb"> Sao Tome And Principe </div>
              <div data-optvalue="223" class="option" data-v-1b4c0987="" role="option" id="d7lwTAxF"> Saudi Arabia </div>
              <div data-optvalue="224" class="option" data-v-1b4c0987="" role="option" id="5UAnyT0d"> Senegal </div>
              <div data-optvalue="993" class="option" data-v-1b4c0987="" role="option" id="hDgTlmrA"> Serbia </div>
              <div data-optvalue="225" class="option" data-v-1b4c0987="" role="option" id="plrskRzJ"> Seychelles </div>
              <div data-optvalue="226" class="option" data-v-1b4c0987="" role="option" id="Mm8W6UnY"> Sierra Leone </div>
              <div data-optvalue="1197" class="option" data-v-1b4c0987="" role="option" id="LHFygScF"> Sint Maarten </div>
              <div data-optvalue="228" class="option" data-v-1b4c0987="" role="option" id="Amc7XVqx"> Slovakia </div>
              <div data-optvalue="229" class="option" data-v-1b4c0987="" role="option" id="IhyAPGN9"> Slovenia </div>
              <div data-optvalue="230" class="option" data-v-1b4c0987="" role="option" id="KPkzP5iB"> Solomon Islands </div>
              <div data-optvalue="232" class="option" data-v-1b4c0987="" role="option" id="RmUop4ju"> South Africa </div>
              <div data-optvalue="1193" class="option" data-v-1b4c0987="" role="option" id="TlaOWur0"> South Georgia and the South Sandwich Islands </div>
              <div data-optvalue="1196" class="option" data-v-1b4c0987="" role="option" id="ywOv9z5a"> South Sudan </div>
              <div data-optvalue="234" class="option" data-v-1b4c0987="" role="option" id="4UqiPqNJ"> Sri Lanka </div>
              <div data-optvalue="235" class="option" data-v-1b4c0987="" role="option" id="9SP397Us"> St. Helena </div>
              <div data-optvalue="236" class="option" data-v-1b4c0987="" role="option" id="n5MNtRFT"> St. Pierre And Miquelon </div>
              <div data-optvalue="238" class="option" data-v-1b4c0987="" role="option" id="OkoBX9zE"> Suriname </div>
              <div data-optvalue="239" class="option" data-v-1b4c0987="" role="option" id="jeRyO4Su"> Svalbard And Jan Mayen Islands </div>
              <div data-optvalue="241" class="option" data-v-1b4c0987="" role="option" id="kkcSRTsT"> Sweden </div>
              <div data-optvalue="242" class="option" data-v-1b4c0987="" role="option" id="hJJ01iV8"> Switzerland </div>
              <div data-optvalue="244" class="option" data-v-1b4c0987="" role="option" id="0HW67qZr"> Taiwan </div>
              <div data-optvalue="245" class="option" data-v-1b4c0987="" role="option" id="s8g9Fuc8"> Tajikistan </div>
              <div data-optvalue="246" class="option" data-v-1b4c0987="" role="option" id="6FAD3ryc"> Tanzania </div>
              <div data-optvalue="247" class="option" data-v-1b4c0987="" role="option" id="aptcOj2o"> Thailand </div>
              <div data-optvalue="248" class="option" data-v-1b4c0987="" role="option" id="1FTEbYbC"> Togo </div>
              <div data-optvalue="249" class="option" data-v-1b4c0987="" role="option" id="t2uO3X9m"> Tokelau </div>
              <div data-optvalue="250" class="option" data-v-1b4c0987="" role="option" id="U4CivWHv"> Tonga </div>
              <div data-optvalue="251" class="option" data-v-1b4c0987="" role="option" id="4oKrc6ku"> Trinidad And Tobago </div>
              <div data-optvalue="252" class="option" data-v-1b4c0987="" role="option" id="Fj1hC6Bj"> Tunisia </div>
              <div data-optvalue="253" class="option" data-v-1b4c0987="" role="option" id="pp5Osm5S"> Turkey </div>
              <div data-optvalue="254" class="option" data-v-1b4c0987="" role="option" id="hNg1ROXl"> Turkmenistan </div>
              <div data-optvalue="255" class="option" data-v-1b4c0987="" role="option" id="pskR8MOE"> Turks And Caicos Islands </div>
              <div data-optvalue="256" class="option" data-v-1b4c0987="" role="option" id="AbLs2vcd"> Tuvalu </div>
              <div data-optvalue="257" class="option" data-v-1b4c0987="" role="option" id="k8zJKir4"> Uganda </div>
              <div data-optvalue="258" class="option" data-v-1b4c0987="" role="option" id="axois4Jg"> Ukraine </div>
              <div data-optvalue="259" class="option" data-v-1b4c0987="" role="option" id="Xl9X78V7"> United Arab Emirates </div>
              <div data-optvalue="262" class="option" data-v-1b4c0987="" role="option" id="tpswK0au"> United States Minor Outlying Islands </div>
              <div data-optvalue="263" class="option" data-v-1b4c0987="" role="option" id="ORrl0Xr5"> Uruguay </div>
              <div data-optvalue="264" class="option" data-v-1b4c0987="" role="option" id="exNZaMHh"> Uzbekistan </div>
              <div data-optvalue="265" class="option" data-v-1b4c0987="" role="option" id="Lh5VRiVk"> Vanuatu </div>
              <div data-optvalue="266" class="option" data-v-1b4c0987="" role="option" id="NmIxtCui"> Vatican City </div>
              <div data-optvalue="267" class="option" data-v-1b4c0987="" role="option" id="AXoAJ8ul"> Venezuela </div>
              <div data-optvalue="268" class="option" data-v-1b4c0987="" role="option" id="KRCtwHyq"> Vietnam </div>
              <div data-optvalue="269" class="option" data-v-1b4c0987="" role="option" id="HDis6hQL"> Virgin Islands (British) </div>
              <div data-optvalue="270" class="option" data-v-1b4c0987="" role="option" id="2QSCeYk3"> Virgin Islands (U.S.) </div>
              <div data-optvalue="271" class="option" data-v-1b4c0987="" role="option" id="p08FAUZy"> Wallis And Futuna Islands </div>
              <div data-optvalue="272" class="option" data-v-1b4c0987="" role="option" id="D8SIZG2W"> Western Sahara </div>
              <div data-optvalue="273" class="option" data-v-1b4c0987="" role="option" id="39RPHCiD"> Yemen </div>
              <div data-optvalue="276" class="option" data-v-1b4c0987="" role="option" id="QarYsnl6"> Zambia </div>
              <div data-optvalue="277" class="option" data-v-1b4c0987="" role="option" id="exy8CUKM"> Zimbabwe </div>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div> <!---->
  <div class="form-item" data-v-64bb6155="">
    <div class="checkbox" data-v-64bb6155="">
      <p data-v-64bb6155="">By providing this information, you agree to the processing of your personal data by SANS as described in our <a href="/legal/privacy/">Privacy Policy.</a></p>
    </div>
  </div>
  <div class="form-item" data-v-64bb6155="">
    <ul class="checkboxes__list" data-v-64bb6155="">
      <li class="checkboxes__item hidden" data-v-64bb6155="">
        <div class="checkbox" data-v-64bb6155=""><input id="newsbites" type="checkbox" name="newsbites" value="newsbites" checked="" data-v-64bb6155=""> <label for="newsbites" data-v-64bb6155="">SANS NewsBites</label></div>
      </li>
      <li class="checkboxes__item hidden" data-v-64bb6155="">
        <div class="checkbox" data-v-64bb6155=""><input id="at_risk" type="checkbox" name="at_risk" value="at_risk" checked="" data-v-64bb6155=""> <label for="at_risk" data-v-64bb6155="">@Risk: Security Alert</label></div>
      </li>
      <li class="checkboxes__item hidden" data-v-64bb6155="">
        <div class="checkbox" data-v-64bb6155=""><input id="ouch" type="checkbox" name="ouch" value="ouch" checked="" data-v-64bb6155=""> <label for="ouch" data-v-64bb6155="">OUCH! Security Awareness</label></div>
      </li>
    </ul>
  </div>
  <div class="muted" data-v-64bb6155=""> This site is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" data-v-64bb6155="">Privacy Policy</a> and
    <a href="https://policies.google.com/terms" data-v-64bb6155="">Terms of Service</a> apply. </div> <input type="submit" value="Subscribe" class="submitButton button button--large button--light button--primary" data-v-5041ef13=""
    data-v-64bb6155="">
</form>

Text Content

homepage
Open menu
Contact Sales
Go one level top

 * Train and Certify
   
   FREE COURSE DEMOS
   
   Free course demos allow you to see course content, watch world-class
   instructors in action, and evaluate course difficulty.
   
   TRAIN AND CERTIFY
   
   Immediately apply the skills and techniques learned in SANS courses, ranges,
   and summits
   
   Learn More
    * Overview
    * Courses
      * Overview
      * Full Course List
      * By Focus Areas
        * Artificial Intelligence
        * Cloud Security
        * Cyber Defense
        * Cybersecurity and IT Essentials
        * Cybersecurity Leadership
        * DFIR
        * Industrial Control Systems
        * Offensive Operations
        * Open-Source Intelligence
      * By Skill Levels
        * New to Cyber
        * Essentials
        * Advanced
        * Expert
      * Training Formats
        * OnDemand
        * In-Person
        * Live Online
      * Free Course Demos
    * Training Roadmaps
      * Skills Roadmap
      * Focus Area Job Roles
        * Cyber Defense Job Roles
        * Offensive Operations Job Roles
        * DFIR Job Roles
        * Cloud Job Roles
        * ICS Job Roles
        * Leadership Job Roles
      * NICE Framework
        * Oversight and Governance
        * Design and Development
        * Implementation and Operation
        * Protection and Defense
        * Investigation
        * Cyberspace Intelligence
        * Cyberspace Effects
        * Industrial Control Systems
      * European Skills Framework
    * GIAC Certifications
    * Training Events & Summits
      * Events Overview
      * In-Person Event Locations
        * Asia
        * Australia & New Zealand
        * Latin America
        * Mainland Europe
        * Middle East & Africa
        * Scandinavia
        * United Kingdom & Ireland
        * United States & Canada
      * Live Online Events List
      * Summits
    * OnDemand
    * Get Started in Cyber
      * Overview
      * Degree and Certificate Programs
      * Scholarships
      * Free Training & Resources
    * Cyber Ranges

 * For Organizations
   
   SANS CISO PRIMER: 4 CYBER TRENDS
   
   This CISO Primer highlights four major cybersecurity trends SANS experts
   believe will move the needle for CISOs in 2024.
   
   
   FOR ORGANIZATIONS
   
   Build a world-class cyber team with our workforce development programs.
   
   Learn More
    * Overview
    * Group Purchasing
    * Build Your Team
      * Assessments
      * Private Training
      * By Industry
        * Health Care
        * Industrial Control Systems Security
        * Military
    * Leadership Training
      * Leadership Courses
      * Executive Cybersecurity Exercises
      * Leadership Simulation Game

 * Security Awareness
   
   2024 SECURITY AWARENESS REPORT
   
   Embedding a Strong Security Culture
   
   SECURITY AWARENESS
   
   Increase your staff’s cyber awareness, help them change their behaviors, and
   reduce your organizational risk
   
   Learn More
    * Overview
    * Products & Services
      * Security Awareness Training
        * EndUser Training
        * Phishing Platform
      * Specialized
        * Developer Training
        * ICS Engineer Training
        * IT Administrator
        * NERC CIP Training
        * Role-based PCI DSS Compliance Training
        * Security Essentials for Business Leaders and Managers
        * Workforce Risk Management Fundamentals for AI
      * Risk Assessments
        * Knowledge Assessment
        * Culture Assessment
    * OUCH! Newsletter
    * Career Development
      * Overview
      * Training & Courses
      * Professional Credential
    * Blog
    * Partners
    * Reports & Case Studies

 * Resources
   
   SECURITY POLICY TEMPLATES
   
   In collaboration with security subject-matter experts, SANS has developed a
   set of security policy templates for your use.
   
   RESOURCES
   
   Enhance your skills with access to thousands of free resources, 150+
   instructor-developed tools, and the latest cybersecurity news and analysis
   Browse Here
    * Overview
    * Webcasts
      * Webinars
      * Live Streams
        * Wait Just An Infosec
        * Cybersecurity Leadership
        * SANS Threat Analysis Rundown (STAR)
    * Free Cybersecurity Events
      * Free Events Overview
      * Summits
      * Solutions Forums
      * Community Nights
      * Workshops
    * Content
      * Newsletters
        * NewsBites
        * @RISK
        * OUCH! Newsletter
      * Blog
      * Podcasts
        * Blueprint
        * Trust Me, I'm Certified
        * Cloud Ace
        * Wait Just an Infosec
      * Summit Presentations
      * Posters & Cheat Sheets
    * Internet Storm Center
    * Research
      * White Papers
      * Security Policies
    * Tools
    * Focus Areas
      * Artificial Intelligence
      * Cloud Security
      * Cyber Defense
      * Cybersecurity Leadership
      * Digital Forensics & Incident Response
      * Industrial Control Systems
      * Offensive Operations
      * Open-Source Intelligence (OSINT)

 * Get Involved
   
   JOIN THE COMMUNITY
   
   Membership of the SANS.org Community grants you access to cutting edge cyber
   security news, training, and free tools that can't be found elsewhere.
   
   GET INVOLVED
   
   Help keep the cyber community one step ahead of threats. Join the SANS
   community or begin your journey of becoming a SANS Certified Instructor
   today.
   
   Learn More
    * Overview
    * Join the Community
    * Work Study
    * Teach for SANS
    * CISO Network
    * Partnerships
    * Sponsorship Opportunities
    * Partner Portal

 * About
   
   OUR MISSION
   
   To empower current and future cybersecurity practitioners around the world
   with immediately useful knowledge and capabilities, we deliver
   industry-leading community programs, resources and training.
   
   ABOUT
   
   Learn more about how SANS empowers and educates current and future
   cybersecurity practitioners with knowledge and skills.
   
   Learn More
    * SANS
      * Overview
      * Our Founder
      * Awards
      * Customer Reviews
      * Trade Events
      * Press
      * Policies and Procedures
    * Instructors
      * Our Instructors
      * Full Instructor List
    * Mission
      * Our Mission
      * Diversity
      * Scholarships
    * Contact
      * Contact Customer Service
      * Contact Sales
      * Press & Media Enquiries
    * Frequent Asked Questions
    * Careers

 * 
 * SANS Sites
   * Australia
   * Belgium
   * Brazil
   * France
   * India
   * Japan
   * Middle East & Africa
   * Netherlands
   * Singapore
   * Switzerland
   * United Kingdom
 * Log In
 * Join
 * * Account Dashboard
   * Log Out
 * Contact Sales

 1. Home >
 2. Cyber Security Events >
 3. CloudSecNext Summit & Training 2024


CLOUDSECNEXT SUMMIT & TRAINING 2024

Sheraton Denver Downtown
Denver, CO, US and Virtual - MT
Mon, Sep 30 - Mon, Oct 7, 2024
Summit Agenda Register for Course Register For Summit
OverviewSummit AgendaAdvisory BoardSummit OptionsAvailable CoursesCyber
RangesBonus SessionsImportant DatesLocation


WHAT'S NEXT IN CLOUD SECURITY

Summit: Sept 30 - Oct 1 | 13 Courses: Oct 2-7 | Denver, CO & Live Online
Summit CPE Credits: 12

Cloud-based services are becoming increasingly more attractive to organizations
as they offer flexibility, increased operational efficiency, and improve the
time to market products. However, protecting systems, applications, and data in
the cloud presents a new set of challenges for organizations to overcome.

This two-day Summit covers all aspects of the cloud security side of
cybersecurity and will bring together a unique combination of real-world user
experiences and case studies, as well as practical, technical training focused
on specific approaches and skills for building and maintaining a secure cloud
infrastructure.

Don't miss this chance to connect with some of the top minds in cloud security.

"I found the real-life experiences and lessons-learned to be extremely
valuable."
- Roger A. Wajda, Secure Cloud LLC 


CHOOSE YOUR EXPERIENCE: IN-PERSON OR LIVE ONLINE

Whether you're planning to dive into the full CloudSecNext experience in Denver,
or the free, curated content offered Live Online, you'll walk away with new
tools, techniques, and connections that will have a lasting impact on your
career.

IN-PERSON: ALL ACCESS SUMMIT EXPERIENCE IN DENVER, CO

The In-Person Summit includes exclusive access to:

 * Two Full Days of Highly Technical Content: In-Person attendees get access to
   all Keynotes, Summit talks, breakout sessions and workshops. CloudSecNext
   Summit presentations are curated and designed around specific analytical
   techniques and capabilities, through case studies and firsthand experience,
   that can be utilized to properly create and maintain cloud security in your
   organization. We've got several opportunities for incredible interactive
   learning experiences to transform your skills and take you to the next level.
 * Exclusive Networking Opportunities with the Top-minds in Cloud Security:
   You'll have the chance to engage with leading experts, SANS instructors, and
   your peers in the community. Attendees tell us time and again that one of the
   greatest takeaways from SANS Summits is the many industry connections they
   forge or deepen during their time with us.
 * Night out in Denver, CO at the Museum of Illusions: Experience an event venue
   that defies the laws of physics and challenges your senses. Enter the
   fascinating world of illusions where nothing is ever quite as it seems. Visit
   us at Museum of Illusions Denver and see WOW! Food and drinks will be
   provided.
 * Exclusive Access to Interactive Workshops
 * Access to Exhibit Hall: Meet with cloud security solution and tool providers
   throughout the Summit and learn how to leverage their products within your
   organization.
 * First-Access to Recordings and Presentations: You'll receive exclusive access
   to approved recordings and presentations post-Summit.
 * SANS Cloud Security Merchandise and Posters
 * 2 Full Breakfasts & Lunches, and Breaks with Snacks and Drinks

LIVE ONLINE: CURATED TALKS STREAMED FROM DENVER TO YOU

 * Select talks and content
 * CloudSecNext Summit Solutions Track | Register Here
 * Interactive chat on Slack — connect with your Cloud Security community
 * First access to recordings and presentations


WHO SHOULD ATTEND:


 * Security personnel who are tasked with securing virtualization and private
   cloud infrastructure
 * Network and systems administrators who need to understand how to architect,
   secure and maintain virtualization and cloud technologies
 * Technical auditors and consultants who need to gain a deeper understanding of
   cloud computing and security concerns
 * Security and IT leaders who need to understand the risks of cloud computing
   and advise business management of the risks and various approaches involved


WHAT ATTENDEES SAY

"Great way to step back from day-to-day security controls to see the
transformational themes our industry is facing. There was a good combination of
technical talks with actionable tips for the next 30 days, mixed with themes our
org will see over the next 30 days, mixed with themes our org will see over the
next 3-5 years." - Will Casey, Optum

"Summits are a great way to meet and talk to the trail blazers; the individuals
who each in their own way help shine a light for the rest of the community." -
Michael Decker, ViaSat, Inc.


BUNDLE YOUR SUMMIT EXPERIENCE WITH SANS TRAINING

AN IMMERSIVE TRAINING EXPERIENCE — YOUR WAY. JOIN US IN-PERSON AWAY FROM HOME OR
OFFICE DISTRACTIONS, OR LIVE ONLINE FROM ANYWHERE

In addition to the Summit, world-class SANS courses are being offered to help
you expand your information security expertise. SANS instructors are experienced
industry practitioners considered to be among the best cybersecurity instructors
in the world. They will provide you and your community with the expert guidance
and skills you need to stop cyber-attacks against your organizations. Bundle a
course with your Summit to maximize your CloudSecNext Summit experience!

CloudSecNext Solutions Track
Tuesday, October 1 | Free Virtual Event Free Virtual Event | Join SANS cloud
expert AJ Yawn and guest speakers for a day full of cloud security solutions,
techniques and trends. Register for Free
CloudSecNext Summit Solutions Track

InterfACE Denver
Tuesday, October 1 | 4 – 5:30pm MT Enjoy networking, food, drinks, giveaways,
and insightful Cloud Security discussions, all totally free.
Learn more and Register


SUMMIT AGENDA

Summit Chairs: Eric Johnson & Frank Kim | Summit CPE Credits: 12





Mon, September 30 Tue, October 1

Time Description
9:00 am - 9:15 am MT
3:00 pm - 3:15 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

OPENING REMARKS

Frank Kim, Fellow, SANS Institute
Eric Johnson, Senior Instructor, SANS Institute

9:15 am - 10:00 am MT
3:15 pm - 4:00 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

KEYNOTE: SECURITY JOURNEY AT ELASTIC

Mandy Andress, CISO, Elastic

Walk with Mandy as she takes you through her journey from her first days of
joining Elastic and her continued commitment to creating and maintaining a
secure environment through self-defending environments using AI.

Show More
10:00 am - 10:15 am MT
4:00 pm - 4:15 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

BREAK


10:15 am - 10:50 am MT
4:15 pm - 4:50 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

WHEN CLOUD ENCRYPTION MATTERS: FROM ANOTHER LAYER OF ACCESS CONTROL TO A FALSE
SENSE OF SECURITY

Jason Kao, Founder, Fog Security

Cloud Encryption is seen as a valuable component of a robust data security
strategy. But what does cloud encryption actually offer in terms of security?
Cloud Encryption has multiple different types including Cloud Service Provider
Managed and Customer Managed. Depending on the type - the security offered can
range from another robust layer of access control to a false sense of security.

In this talk, we’ll cover the following: - Types of encryption (such as CSP
Managed, Customer Managed) - Default encryption for services in cloud. - How
cloud encryption impacts data perimeters. - How cloud encryption translates into
and impacts cloud identity and access management. - Best practices and
considerations for how to implement cloud encryption and data security in cloud.



Show More
10:15 am - 10:50 am MT
4:15 pm - 4:50 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
Virtual Track

EKS SECURITY SAFARI: HUNTING THREATS IN THE WILD WILD CLOUD

Ariel Szarf, Senior Cloud Security Researcher , Mitiga
Stav Ochakovski, DevOps Tech Lead, Mitiga

Kubernetes is spreading through the world faster than a viral dance challenge on
social media. As the K8S ecosystem on the cloud gains more attention and
spotlight, hackers actively seek ways to bounce between clusters and clouds,
aiming for unauthorized access.

Join us to delve deep into the K8S security fundamentals on AWS (EKS) and their
logging system. Explore K8S TTPs, K8S to AWS attack vectors and IAM role abuse.
Gain a comprehensive understanding of conducting threat hunting on EKS,
utilizing AWS and K8S logs to identify threat actors, particularly related to
lateral movement and privilege escalation methods within the K8S
environment.You’ll come away with practical knowledge about the relevant logs
and how to use them to investigate potentials attacks on K8S and EKS. Moreover,
you’ll become familiar with mitigation recommendations to prevent future
cyber-attacks. 









Show More
10:15 am - 12:15 pm MT
4:15 pm - 6:15 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
In-Person Only

WORKSHOP: A SECURITY RESEARCHER’S VIEW OF GCP

Dave Bogle, Principal Threat Researcher, Red Canary

In this workshop participants will learn about how GCP is structured and
organized. They will learn how IAM works in GCP and how it is utilized to grant
users access to various resources.

Participants have the option of following along or setting up their own GCP
environment and recreating the techniques we are covering in the workshop in
their own environment.

After this workshop, participants should be able to comfortably navigate the
gcloud cli as well as the GCP console. They will also have experience analyzing
log events in GCP and identifying relevant data

Prerequisites

 1. Laptop Required
 2. Access to a Google Account - preferably with Google Cloud Platform and
    gcloud CLI
    
    1. Google Cloud Platform - 90-day, $300 free trial to get you started.
       
       1. If you want to follow along in your own environment, it is recommended
          that you download about a week beforehand and setup.
          
          
    2. How to install the gcloud CLI







Show More
10:55 am - 11:30 am MT
4:55 pm - 5:30 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

FROM AFT TO ATO, AWS NATIVE FEDRAMP THROUGH TERRAFORM

Michael Greenlaw, Co-Founder & Senior Consultant, HanaByte

The process of obtaining a FedRAMP ATO in the AWS cloud, often begins with a
separation of federal and commercial resources. This separation, or sometimes a
move to a new AWS account, is a long and tedious process when starting from
zero. We can simplify and automate this process using Terraform with AWS Control
Tower via AFT.

In this talk we'll look at how Terraform, AFT, and Control tower can be used to
create an AWS Native, FedRAMP moderate landing zone. We'll then use the AFT
managed pipeline to satisfy a NIST 800-53 control, demonstrating Terraform's
FedRAMP automation capabilities.







Show More
10:55 am - 11:30 am MT
4:55 pm - 5:30 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
Virtual Track

OPEN-SOURCE SERVERLESS CLOUD CERTIFICATE AUTHORITY

Paul Schwarzenberger, Cloud Security Engineer, Q-Solution

In this talk, we’ll provide details of our recently released open-source
project. After a technical overview, you’ll see a hands-on live demonstration of
the CA and an example mTLS use case. 

You’ll learn how you could use this solution for your own applications and
systems, to provide a secure and cost-effective certificate authority
infrastructure.

Documentation: serverlessca.com Blog post:
https://medium.com/@paulschwarzenberger/open-source-cloud-certificate-authority-75609439dfe7































Show More
11:35 am - 12:10 pm MT
5:35 pm - 6:10 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

BREAKING COPILOTS FOR FUN AND PROFIT

Adir Gruss, Co-Founder and CTO, Aim Security

Every organization recognizes the substantial productivity enhancements provided
by AI assistants. Microsoft 365 Copilot, GitHub Copilot, and similar tools are
prime examples of the benefits derived from using a Retrieval-Augmented
Generation (RAG) architecture in enterprise settings. However, these AI
solutions are often developed and deployed rapidly by vendors and organizations,
which can lead to significant vulnerabilities.

In this talk, we will explore the threat model associated with these Copilots,
demonstrate their internal mechanics, and discuss real-world examples of
vulnerabilities, attack scenarios, and mitigation strategies.

Show More
11:35 am - 12:10 pm MT
5:35 pm - 6:10 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
Virtual Track

THREAT HUNTING WITH KUSTO - THE QUERY LANGUAGE TO UNCOVERING THE UNKNOWN

Mattias Borg , Trusted Cyber Security Advisor, Onevinn AB
Stefan Schörling, CTO | Head of MDR , Onevinn AB

Join us for an illuminating session on leveraging Kusto, Microsoft's powerful
query language, for effective threat hunting. Kusto, offers unparalleled
capabilities for analyzing large volumes of data with lightning speed and
precision.

In this session, we'll dive into the fundamentals of Kusto and explore how it
can be used to detect and investigate security threats within your
organization's data ecosystem. From crafting complex queries to interpreting
query results, attendees will learn practical tips and best practices for
harnessing the full potential of Kusto in threat hunting scenarios. Whether
you're new to Kusto or seeking to deepen your expertise, this session promises
valuable insights to empower you in the ongoing battle against cyber
adversaries.





Show More
12:10 pm - 1:30 pm MT
6:10 pm - 7:30 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

LUNCH


1:30 pm - 2:05 pm MT
7:30 pm - 8:05 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

LET’S DO DEVOPS: WRITING A NEW TERRAFORM /TOFU AZURERM DATA SOURCE — ALL STEPS!

Kyler Middleton, Cloud Security Chick, Veradigm

Writing Terraform is so fun, surely writing some functionality for the
provider's that underpin Terraform must be easy, right?

Let's walk all the way through confirming some functionality that was missing
from the AzureRM Provider, to poking around at the provider source code, to
writing, testing, and opening a PR to add the functionality we need, and how you
can do so too!

Show More
1:30 pm - 2:05 pm MT
7:30 pm - 8:05 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
Virtual Track

KEEP CALM & HOW TO DEPLOY SAFELY AT BILLION EVENT SCALE

Eran Bibi, Co-Founder & Chief Product Officer, Firefly

In today's high-scale and high-velocity complex operations, the process and
culture are as important as the technology that supports it.

In this talk, end-user unicorn AppsFlyer will talk about their journey to
building a platform-as-a-product to achieve the velocity, predictability, and
self-serve using GitOps to the massive scale their system today requires. We'll
look at considerations like building trust into the dev process, correct PR
etiquette, codification of resources for agility and automation, and better
safety guardrails baked in, all powered by open source and CNCF technology -
K8s, flux, Streamzi and OPA. 

This talk will examine how a real-world high-scale end-user company does this
built on an open source and cloud native stack.









Show More
1:30 pm - 3:30 pm MT
7:30 pm - 9:30 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
In-Person Only

WORKSHOP: PUT DETECTION AND REMEDIATION ENGINEERING TO WORK WITH OPEN SOURCE: A
PRACTITIONER PERSPECTIVE

Toni de la Fuente, Creator of Prowler and CEO, Prowler
Pedro Martin, Cloud Security Engineer , Prowler

Whether you are a long time cloud security practitioner or if you are just
getting started, this workshop will give you the tools to get cloud security up
and running and under control at your organization. 

With millions of downloads and a large community of users, Prowler is one of the
most used tools when it comes to cloud security assessments, hardening, incident
response and security posture monitoring.Prowler has some new features and
important changes in v4.

This includes multi-cloud architecture, python detections and remediations, and
a load of new checks for compliance. We will teach how to get the most from
Prowler and adapt it to your requirements.

Prerequisites - Laptop with the following:

 1. Python 3.11

 2. pip for Python
 3. Git
 4. IDE Code editor like VSCode installed in the operating system.

 5. Enough credentials for their own AWS, GCP or Azure infrastructure to create
    users and/or roles.

 6. If willing to do the K8s labs, have permissions to create Kubernetes manage
    service in their cloud or Docker Desktop installed.

Show More
2:10 pm - 2:45 pm MT
8:10 pm - 8:45 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

BEST PRACTICES FOR HOW TO MANAGE ALL YOUR ACCESS FROM THE CLOUD: THE NEXT
FRONTIER IN YOUR SECURITY JOURNEY

Bailey Bercik, Senior Product Manager, Microsoft
Jef Kazimer, Principal Product Manager , Microsoft

Driving your organization toward least privilege involves more than just
monitoring administrative access. Access to business data can be as critical as
administrative access to systems, particularly in highly regulated industries.
With the rise of AI capabilities - discovery, ransomware, and data leakage and
exfiltration are bigger threats than before.

In this talk, we'll cover how to define controls and their use cases, as well as
how to identify common resources utilized by the business. We'll highlight the
parallels between managing administrative systems and business data and provide
frameworks for governing privileged user access like privileged admin access.
You'll leave with a practical list of go-do's and quick wins to embark on the
next phase of your journey toward least privilege.

Show More
2:10 pm - 2:45 pm MT
8:10 pm - 8:45 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
Virtual Track

THE RED PILL: UNPACKING THE PSYCHO-CYBER IAM KILL CHAIN

Ron Nissim, CEO and Co-founder, Entitle

It's funny how some of the most common patterns in engineering organizations are
essentially anti-patterns when it comes to access control and safety. 

In this talk, we'll take you down the rabbit hole of bad access control
practices we've witnessed firsthand at clients and partners, that you should
definitely rethink. This includes everything from shared admin accounts, shared
passwords, over-privileged and long-lasting highly privileged accounts.We'll
show how these bad practices can ultimately result in significant harm to your
organization––everything from the obvious hijacking of accounts, through social
engineering tactics and techniques these practices open the doors wide open to,
and how with access to sensitive IT systems, you can put your company and client
data at serious risk. We'll walk through real live scenarios of adversarial
attacks using the most common methods that are still prevalent in the
wild––along with a real world HUMINT (AKA social engineering) and PsyOps that
are the backbone to psycho-cyber kill chains. We'll provide practical tips for
how to prevent these types of attacks both on a human level and technical level.
You'll come away with better security hygiene for your organization, and
vigilance as the gatekeeper and guardians.









Show More
2:50 pm - 3:10 pm MT
8:50 pm - 9:10 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

BREAK


3:10 pm - 3:45 pm MT
9:10 pm - 9:45 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

CONNECTING THE BROKEN LINKS - EXPLORING IDENTITY INTEGRATIONS BETWEEN THE THREE
CSPS AND THEIR MANAGED KUBERNETES OFFERINGS

Dakota Riley, Principal Security Engineer, Aquia, Inc

AWS, Azure, and GCP all offer a managed Kubernetes service. In addition, all
three also offer integration with their IAM backbone to allow both
authentication into the cluster from a cloud identity, and providing of IAM
credentials to workloads on the cluster to allow secure access to the cloud
provider APIs. While this is a valuable feature for securing managed Kubernetes
clusters without adding additional identity mechanisms, it's yet another feature
for Cloud Security teams to understand and secure.

This talk will explore the identity integrations between each of the Cloud
Providers and their managed Kubernetes flavors, at a code level to dispel any
ambiguity on where the Cloud Provider APIs work with the managed clusters to
provide authentication. We will explore how access is granted to cloud
identities, and what boundaries can be crossed (eg - cross account access, etc),
as well as potential abuse cases. For the defender, we will also specifically
talk about how these identities tie into cluster logging, and to trace the full
range of events even when someone is authenticating into a cluster using their
cloud credentials



Show More
3:10 pm - 3:45 pm MT
9:10 pm - 9:45 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
Virtual Track

WHO POLICES THE POLICIES? PRIVILEGE ESCALATION & PERSISTENCE WITH AZURE POLICY

Alexander Mackie, Detection Engineer, Datadog

The Microsoft Azure threat matrix contains a mysterious and almost empty item:
AZT508 - Azure Policy, which suggests this service can break bad but gives
almost no details as to how. To quote Microsoft: “Azure Policy helps to enforce
organizational standards and to assess compliance at-scale.“ How does this banal
sounding service come to be used for attacking Azure users?

This talk aims to fill in the picture. We will explore the Azure Policy service
and how it can be used for badness: punching holes in ACLs, creating persistent
backdoors on virtual machines, assigning attacker controlled roles to resources,
modifying database encryption, etc. I will demo an abuse scenario, and discuss
others that can be used for privilege escalation and persistence. I will also
discuss a confused deputy attack on this service. Finally, I will share
detection and control recommendations.









Show More
3:50 pm - 4:25 pm MT
9:50 pm - 10:25 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

THE YIN AND YANG OF GENERATIVE AI IN CYBERSECURITY: OPPORTUNITIES AND CHALLENGES

Vaibhav (VB) Malik, Global Partner Solutions Architect, CloudFlare

The rapid advancements in Generative AI have opened up a new frontier in
cybersecurity, presenting both unprecedented opportunities and daunting
challenges. This presentation aims to equip attendees with the critical
knowledge and tools needed to navigate the evolving threat landscape shaped by
the rise of AI-powered cyber attacks.

The session will delve into the dark side of Generative AI, showcasing how
malicious actors are weaponizing this technology to create highly sophisticated
phishing campaigns, develop advanced malware, and introduce novel attack methods
such as LLM supply chain poisoning. Through real-world examples, participants
will gain a comprehensive understanding of the emerging risks associated with
Generative AI in the context of cybersecurity. However, the presentation will
also emphasize the importance of harnessing the potential of Generative AI
responsibly to strengthen organizational defenses.

Attendees will learn essential security strategies and best practices to fortify
their systems against AI-driven threats, as well as techniques to identify and
neutralize these evolving attacks proactively. By striking a balance between
exploring the dark side of Generative AI and empowering participants to adapt
their defenses accordingly, this session aims to foster a more secure and
resilient cybersecurity landscape in the face of this transformative technology.





Show More
4:30 pm - 4:45 pm MT
10:30 pm - 10:45 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

DAY 1 WRAP-UP

Frank Kim, Fellow, SANS Institute
Eric Johnson, Senior Instructor, SANS Institute

5:30 pm - 8:30 pm MT
11:30 pm - 2:30 am UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
In-Person Only

NIGHT OUT IN DENVER, CO AT THE MUSEUM OF ILLUSIONS

Experience an event venue that defies the laws of physics and challenges your
senses. Enter the fascinating world of illusions where nothing is ever quite as
it seems. Visit us at Museum of Illusions Denver and see WOW! Entry, food and
drinks will be provided.
Show More

Time Description
9:00 am - 9:15 am MT
3:00 pm - 3:15 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

OPENING REMARKS

Frank Kim, Fellow, SANS Institute
Eric Johnson, Senior Instructor, SANS Institute

9:15 am - 10:00 am MT
3:15 pm - 4:00 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

KEYNOTE PANEL

Kevin Tyers, Associate Instructor
Frank Kim, Fellow, SANS Institute
Casey Essary, Deputy CISO, BILL
Eric Johnson, Senior Instructor, SANS Institute

10:00 am - 10:15 am MT
4:00 pm - 4:15 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

BREAK


10:15 am - 10:50 am MT
4:15 pm - 4:50 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

THINKING INSIDE THE BOX: EFFECTIVE DEVSECOPS FOR CONTAINERS

Christopher Pope, DevSecOps Manager, ExxonMobil

Containers can be a powerful DevOps tool to greatly improve the consistency and
scalability of your environment. But how do we establish visibility and security
in our containers without excessive overhead?

We’ll start with an overview of the security challenges posed by containers, and
how those can be magnified if we aren’t doing DevOps right. Next, we’ll go over
DevSecOps best practices for harnessing the power of containers - starting with
the image itself. We’ll look at how “shifting security left” applies
specifically to containers, from the container pipeline itself, to secrets
management and protecting your container registry itself. Lastly, we’ll conclude
with a simple framework that will help your teams assess your DevSecOps maturity
in relation to containers and identify action steps going forward.



Show More
10:15 am - 12:10 pm MT
4:15 pm - 6:10 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
In-Person Only

WORKSHOP: SECURITY CONFIGURATION MANAGEMENT IN THE CLOUD: POLICY AS CODE FOR
CI/CD GATING

Thomas Tusia, Principal Security Engineer, Cisco
Bola Shosanya, Security Engineer, Cisco

Organizations can use defense in depth to enhance their security configuration
management capabilities. Adopting defense in depth in this domain produces a
mature, multi-layered strategy in which the organization establishes
configuration baselines, defines those baselines in code, implements gating
during code deployment processes, and monitors the environment for ongoing
compliance.

In this discussion, we begin by describing the general approach to security
configuration management within Cisco. We then dive into the details, exploring
Open Policy Agent (OPA) as a tool for gating with policy as code during the
Terraform build process.

This presentation includes a workshop that shows attendees how to write an OPA
policy and use it within GitHub Actions.

Prerequisites

 1. Github account
 2. Git installed locally
 3. IDE Code editor like VSCode installed in the operating system.

 4. Docker or Podman (optional)





Show More
10:55 am - 11:30 am MT
4:55 pm - 5:30 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

CLOUDY WITH A CHANCE OF MEATBALLS: HANDLING THE UNEXPECTED IN CLOUD THREAT
DETECTION

Lydia Graslie, Threat Detection Engineer, Edward Jones

Threat Detection is hard- it requires deep knowledge about the platform you're
detecting on, knowledge of how that platform is attacked, and the technical
savvy to interpret logs and write code that detects on those attacks. So what do
we do in the case of cloud platforms, where the platform and the logs are
constantly changing?

This presentation will cover lessons learned in cloud threat detection, and
present ways to build resiliency into the threat detection engineer's code and
mindset.



Show More
11:35 am - 12:10 pm MT
5:35 pm - 6:10 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

PROVABLE SECURITY: BUILDING AUTOMATED VALIDATION OF YOUR CLOUD SECURITY CONTROLS

David Levitsky, Principal Infrastructure Security Engineer, Roblox
Georgios Kapoglis, Senior Detection and Response Engineer, Roblox

How well are your security controls working in your cloud environment? Would you
know if they had gaps an attacker could exploit? Could you prove it? Cloud
service providers ship new features at breakneck speed. Currently, AWS has over
15,000 APIs and 16,000 permissions. At this scale, it can be difficult to define
proper security controls for your organization, verify they’re working as
intended, and catch regressions or gaps over time.

This presentation will discuss different implementations to validate preventive
and detective controls in cloud environments. This talk focuses on AWS to
provide concrete examples, but the concepts extend to any cloud environment. It
will define provable security and explain how to achieve it with a framework
that continuously assesses security controls to ensure functionality and find
holes. We’ll walk through real-world examples of security controls with
unexpected edge cases that cause failure conditions in the control, which can be
proactively caught through automation. This presentation will provide examples
and tangible guidance on how to automatically verify cloud security controls at
scale and identify security gaps before attackers do.

Takeaways: Validating security controls is especially important in cloud
environments due to the amount of different permissions and service
configurations and how quickly they evolve. Doing this manually is not scalable
or sustainable and automation must be leveraged. Attendees will learn how to
build automation to validate their controls and how to look for edge cases in
common security controls. They’ll learn successful strategies, patterns to
avoid, and how to handle testing complicated controls - all of which come from
real experience in building and managing these systems. Attendees will learn how
to validate their cloud security posture against techniques seen by threat
actors targeting cloud environments.





Show More
12:15 pm - 1:30 pm MT
6:15 pm - 7:30 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

LUNCH


1:30 pm - 2:05 pm MT
7:30 pm - 8:05 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

A NEEDLE IN A HAYSTACK: HOW TO FIND A THREAT HIDDEN IN OVER 6 BILLION LOGS PER
DAY

Brian Davis, Principal Software Engineer, Red Canary

Detecting threats in the cloud is a huge challenge. All cloud platforms offer
audit logs of their cloud control planes (e.g., AWS CloudTrail, Google Cloud
Platform Audit Logs, Azure Activity Logs) but these generate such a high volume
of logs that wading through them to find indications of a threat can be
overwhelming.

In this talk, I’ll explain how you can create your own detection platform and
build custom analytics to search for whatever needle you want to find in the
haystack of logs by taking this massive stream of data and breaking it down into
manageable chunks using basic cloud building blocks like S3 buckets and SQS
queues, or more sophisticated tools like OpenSearch and Kubernetes.



Show More
1:30 pm - 3:30 pm MT
7:30 pm - 9:30 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
In-Person Only

WORKSHOP: AVOIDING DATA DISASTERS: TECHNIQUES TO IDENTIFY AND ADDRESS CLOUD
STORAGE MISCONFIGURATIONS

Serge Borso, Certified Instructor

It appears that every few months, there's news of yet another cloud breach
stemming from a carelessly configured cloud storage solution. While this isn't
the default for most cloud vendors, some users still manage to make their cloud
data publicly accessible by going out of their way - sometimes to a significant
extent. Whether it's out of ignorance or convenience, it doesn't matter - this
practice must come to an end.

To address this issue, we've developed a workshop that equips attendees with
various techniques and methods to identify and rectify cloud storage
misconfigurations in their own cloud accounts. We'll even demonstrate some ways
to prevent these misconfigurations from happening in the first place. Although
the chosen vendor for this workshop is AWS, due to its Simple Storage Service
(S3) being the one making headlines, misconfigurations could occur in any cloud
environment. Hence, the techniques discussed in this workshop will be applicable
to all cloud vendor environments, including Azure, Google Cloud Platform, and
Oracle.

LEARNING OBJECTIVES:

 * Discover all-too-common cloud storage security deficiencies present as either
   insecure vendor defaults or careless mistakes

 * Correct these issues using a variety of means (e.g., cloud management
   console, command line tools, and Infrastructure-as-Code)

PREREQUISITE KNOWLEDGE:
None.

SYSTEM REQUIREMENTS:

 * Laptop with a modern web browser

 * AWS account with root access or an IAM user with Administrator Access
   permissions
   
   * If you need an AWS account, you can create a free tier account with root
     access at https://aws.amazon.com/free/. The cost will be minimal (pennies)
     to complete the workshop

This workshop supports both SEC388: Introduction to Cloud Computing and Security
and SEC488: Cloud Security Essentials.

Show More
2:10 pm - 2:45 pm MT
8:10 pm - 8:45 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

IDENTITY CRISIS: NAVIGATING CLOUD IDENTITY CHALLENGES AND IMPLEMENTING ROBUST
SOLUTIONS

Iris Yuning Ye, Product Manager, Microsoft

In today's rapidly evolving cloud landscape, managing identities effectively is
paramount to maintaining a secure and compliant environment. However, as
organizations embrace multi-cloud strategies and adopt diverse cloud-native
technologies, they often face an "identity crisis" characterized by complex
access management, fragmented user identities, and inconsistent authentication
mechanisms.

This presentation delves into the heart of cloud identity challenges, offering
insights gleaned from real-world implementations and hard-won lessons. Drawing
from experiences across various industries, we'll explore the common pitfalls
and stumbling blocks encountered when navigating cloud identity, including:
Fragmented Identity Landscapes: Understanding the complexities of managing
identities across multiple cloud providers, SaaS applications, and on-premises
systems. Authentication Dilemmas: Balancing usability and security in
authentication methods, including single sign-on (SSO), multi-factor
authentication (MFA), and biometric authentication. Authorization Conundrums:
Tackling the nuances of fine-grained access control and permissions management
in cloud environments, including role-based access control (RBAC) and
attribute-based access control (ABAC). Identity Federation Challenges:
Overcoming interoperability hurdles and establishing trust between identity
providers in federated identity scenarios. Having navigated through these
challenges firsthand, we'll share practical strategies and best practices for
implementing robust identity solutions in the cloud. From establishing a
cohesive identity governance framework to leveraging identity as a security
perimeter, attendees will gain actionable insights to strengthen their
organization's identity posture and mitigate security risks.

Key Takeaways: Gain a deeper understanding of the unique identity challenges
inherent in cloud environments. Learn from real-world case studies and best
practices for overcoming cloud identity obstacles. Discover strategies for
implementing robust and scalable identity solutions across multi-cloud
architectures. Acquire actionable insights to enhance identity governance and
strengthen security posture in the cloud.



Show More
2:50 pm - 3:10 pm MT
8:50 pm - 9:10 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

BREAK


3:10 pm - 3:45 pm MT
9:10 pm - 9:45 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

FLOOD THE ZONE WITH FAKES: CATCHING ADVERSARIES WITH AI-GENERATED CLOUD
DECEPTION ENVIRONMENTS

Jonathan Looi, Security Engineer, Google

Cyber deception enables defenders to impose costs on threat actors, better
understand adversary TTPs, and provide high-fidelity detection. Yet, most
enterprises don’t deploy deception environments due to the complexity and
upfront costs of designing and deploying realistic, high-interaction honeypots.
Drawing from real-world experience as a Security Engineer specializing in Threat
Intelligence at Google, Jonathan will discuss how to catch hackers in the act
with deception as well as how GenAI can be used to lower the barrier of entry
for creating realistic cloud deception environments.

This talk will cover lessons learned at Google Cloud and help make deception
more approachable for enterprises of all sizes. Cybersecurity professionals will
learn why deception environments are valuable, how to design a realistic
environment, and common pitfalls to avoid.









Show More
3:50 pm - 4:00 pm MT
9:50 pm - 10:00 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar

CLOSING REMARKS

Frank Kim, Fellow, SANS Institute
Eric Johnson, Senior Instructor, SANS Institute

4:00 pm - 5:30 pm MT
10:00 pm - 11:30 pm UTC
Add to Calendar
Add to Calendar Google Calendar iCal Calendar Outlook Calendar
In-Person Only

INTERFACE AFTER-PARTY

SANS Cloud Security Alum community event - The SANS Cloud Security team wants to
meet you face-to-face and give you an opportunity to meet other SANS Cloud Aces!
Show More




SUMMIT OPTIONS

Those choosing to attend in Denver will have full access to the Summit, which
includes access to ALL talks and content, hands-on workshops, candid discussions
with leading experts, SANS instructors, and your peers in the community, an
evening social event, and so much more.

Live Online Summit attendees will have access to select talks and content, and
the event Slack workspace.


CLOUDSECNEXT SUMMIT & TRAINING 2024 LIVE ONLINE

FREE
Register for Live Online Summit


CLOUDSECNEXT SUMMIT & TRAINING 2024 IN PERSON

*Prices exclude applicable local taxes
$425 USD
FREE when added to your 4-6 day course purchase
Summit attendance requires registration
Register for In Person Summit
Course List (11)
Focus Areas
All
 * All
 * Cloud Security
 * Cybersecurity Leadership
 * Cybersecurity and IT Essentials
 * Offensive Operations, Pen Testing, and Red Teaming

 * SEC504: Hacker Tools, Techniques, and Incident Handling
   GCIH: GIAC Certified Incident Handler
   
   $8,525 USD
   GCIH Certification +$979
   OnDemand Bundle +$979
   *Prices exclude applicable local taxes
   View Syllabus
   In Person
   Kevin Tyers
   Starts 2 Oct 2024 at 8:30 AM MT (6 days)
   Register for
   In Person
   Live Online
   Kevin Tyers
   Starts 2 Oct 2024 at 8:30 AM MT (6 days)
   Register for
   Live Online
 * SEC488: Cloud Security Essentials
   GCLD: GIAC Cloud Security Essentials
   
   $8,525 USD
   GCLD Certification +$979
   OnDemand Bundle +$979
   *Prices exclude applicable local taxes
   View Syllabus
   In Person
   Kenneth G. Hartman
   Starts 2 Oct 2024 at 8:30 AM MT (6 days)
   Register for
   In Person
   Live Online
   Kenneth G. Hartman
   Starts 2 Oct 2024 at 8:30 AM MT (6 days)
   Register for
   Live Online
 * LDR512: Security Leadership Essentials for Managers
   GSLC: GIAC Security Leadership
   
   $8,020 USD
   GSLC Certification +$979
   OnDemand Bundle +$949
   *Prices exclude applicable local taxes
   View Syllabus
   In Person
   Frank Kim
   Starts 2 Oct 2024 at 8:30 AM MT (5 days)
   Register for
   In Person
   Live Online
   Frank Kim
   Starts 2 Oct 2024 at 8:30 AM MT (5 days)
   Register for
   Live Online
 * Major Update
   SEC541: Cloud Security Threat Detection
   GCTD: GIAC Cloud Threat Detection
   
   $8,020 USD
   GCTD Certification +$979
   OnDemand Bundle +$979
   *Prices exclude applicable local taxes
   View Syllabus
   In Person
   Ryan Thompson
   Starts 2 Oct 2024 at 8:30 AM MT (5 days)
   Register for
   In Person
   Live Online
   Ryan Thompson
   Starts 2 Oct 2024 at 8:30 AM MT (5 days)
   Register for
   Live Online
 * SEC588: Cloud Penetration Testing
   GCPN: GIAC Cloud Penetration Tester
   
   $8,525 USD
   GCPN Certification +$979
   OnDemand Bundle +$979
   *Prices exclude applicable local taxes
   View Syllabus
   In Person
   Aaron Cure
   Starts 2 Oct 2024 at 8:30 AM MT (6 days)
   Register for
   In Person
   Live Online
   Aaron Cure
   Starts 2 Oct 2024 at 8:30 AM MT (6 days)
   Register for
   Live Online
 * SEC522: Application Security: Securing Web Applications, APIs, and
   Microservices
   GWEB: GIAC Certified Web Application Defender
   
   $8,525 USD
   GWEB Certification +$979
   OnDemand Bundle +$979
   *Prices exclude applicable local taxes
   View Syllabus
   In Person
   Joshua Barone
   Starts 2 Oct 2024 at 8:30 AM MT (6 days)
   Register for
   In Person
   Live Online
   Joshua Barone
   Starts 2 Oct 2024 at 8:30 AM MT (6 days)
   Register for
   Live Online
 * Major Update
   SEC549: Cloud Security Architecture
   
   
   $8,020 USD
   OnDemand Bundle +$979
   *Prices exclude applicable local taxes
   View Syllabus
   In Person
   David Hazar
   Starts 2 Oct 2024 at 8:30 AM MT (5 days)
   Register for
   In Person
   Live Online
   David Hazar
   Starts 2 Oct 2024 at 8:30 AM MT (5 days)
   Register for
   Live Online
 * LDR516: Building and Leading Vulnerability Management Programs
   
   
   $8,020 USD
   OnDemand Bundle +$979
   *Prices exclude applicable local taxes
   View Syllabus
   In Person
   Jonathan Risto
   Starts 2 Oct 2024 at 8:30 AM MT (5 days)
   Register for
   In Person
   Live Online
   Jonathan Risto
   Starts 2 Oct 2024 at 8:30 AM MT (5 days)
   Register for
   Live Online
 * Major Update
   SEC510: Cloud Security Controls and Mitigations
   GPCS: GIAC Public Cloud Security
   
   $8,525 USD
   GPCS Certification +$979
   OnDemand Bundle +$979
   *Prices exclude applicable local taxes
   View Syllabus
   In Person
   Brandon Evans
   Starts 2 Oct 2024 at 8:30 AM MT (5 days)
   Register for
   In Person
   Live Online
   Brandon Evans
   Starts 2 Oct 2024 at 8:30 AM MT (5 days)
   Register for
   Live Online
 * SEC388: Introduction to Cloud Computing and Security
   
   
   $3,405 USD
   OnDemand Bundle +$380
   *Prices exclude applicable local taxes
   View Syllabus
   Live Online
   Serge Borso
   Starts 2 Oct 2024 at 8:30 AM MT (3 days)
   Register for
   Live Online
 * New
   SEC598: Security Automation for Offense, Defense, and Cloud
   
   
   $8,525 USD
   OnDemand Bundle +$979
   *Prices exclude applicable local taxes
   View Syllabus
   In Person
   Jason Ostrom
   Starts 2 Oct 2024 at 8:30 AM MT (6 days)
   Register for
   In Person
   Live Online
   Jason Ostrom
   Starts 2 Oct 2024 at 8:30 AM MT (6 days)
   Register for
   Live Online



Thank You to Our Sponsors



IMPORTANT DATES

Refund Date Hotel Group Discount Deadline September 13, 2024 September 9, 2024


LOCATION


SHERATON DENVER DOWNTOWN HOTEL

1550 Court Place
Denver, CO 80202

Phone: 303-893-3333

Sheraton Denver Downtown Hotel



Join us at Sheraton Denver Downtown Hotel after the $80M transformation. This
family hotel on 16th Street Mall offers access to some of the best attractions
in Denver, Colorado. The mile-long pedestrian promenade brims with shopping,
dining and entertainment. Explore effortlessly thanks to the nearby light rail
station, which takes you to Coors Field, Denver Zoo or Denver Art Museum.
Recharge after a full day in the heated rooftop pool, 5,000-square-foot Sheraton
Fitness center or on-site dining at Yard House and BEZEL. This four-star hotel
maximizes your time from a lobby with town-square energy to on-site business
services. Work smart from a pet-friendly hotel room with free Wi-Fi and a
height-adjustable desk with an ergonomic chair.




HOTEL SPECIAL RATES AND RESERVATIONS


A special discounted rate of $249.00 S/D plus applicable taxes will be honored
based on space availability.

A limited number of Government Per Diem rooms at the prevailing rate are
available with proper ID.

These rates include Internet in your room and are only available through Monday,
September 9th, 2024.



To make a regular reservation, please visit the link below and select
“Attendee.”

To make a government per diem reservation, please visit the link below and
select “I have an access code.” Access Code: SANSGOV

To make a reservation, please visit this link.



Top 3 reasons to stay at the Sheraton Denver Downtown Hotel

 1. No need to factor in daily cab fees and the time associated with travel to
    alternate hotels. Everything is in one convenient location!
 2. By staying at the Sheraton Denver Downtown Hotel, you gain the opportunity
    to further network with your industry peers and remain in the center of the
    activity surrounding the conference.
 3. SANS schedules additional networking events at the Sheraton Denver Downtown
    Hotel that you won't want to miss!




TRAVEL ARRANGEMENTS AND DIRECTIONS

A 50% discounted self-parking rate of per day and night with in and out
privileges  plus applicable taxes for attendees is available. Please visit the
hotel’s website or contact them directly at 303-893-3333 for prevailing parking
rates that are subject to change prior to the official meeting dates.

From Denver International Airport (DEN): Approximately 25.7 miles.

Google Maps




EXPERIENCE DENVER

3 Quick Facts about Denver

 1. Denver International Airport is the largest in the country. Going strictly
    by land area, it covers 33,531 acres, or 53 square miles.
 2. The first permanent building in Denver was a saloon. The saloon wasn’t just
    for drinking, in a foreshadowing of Denver’s love of the performing arts, a
    performance of Macbeth was staged at the saloon in the early days.
 3. Denver has a thriving arts scene. The Denver metropolitan area collects more
    money per capita for the arts than any other city.

Recommended Web Links

http://www.denver.org/


Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
   
 * Register to Learn
 * Courses
 * Certifications
 * Degree Programs
 * Cyber Ranges

   
 * Job Tools
 * Security Policy Project
 * Posters & Cheat Sheets
 * White Papers

   
 * Focus Areas
 * Cyber Defense
 * Cloud Security
 * Cybersecurity Leadership
 * Digital Forensics
 * Industrial Control Systems
 * Offensive Operations

Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Congo
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data
by SANS as described in our Privacy Policy.

 * SANS NewsBites
 * @Risk: Security Alert
 * OUCH! Security Awareness

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of
Service apply.
 * © 2024 SANS® Institute
   
 * Privacy Policy
 * Terms and Conditions
 * Do Not Sell/Share My Personal Information
 * Contact
 * Careers

 * Twitter
 * Facebook
 * Youtube
 * LinkedIn


 X




$H2

$hl

X


SANS Institute uses cookies to customize our site and offer tailored
advertising. View Cookie Policy
Set Your Cookie Preferences Accept All Cookies and Close