www.sans.org
Open in
urlscan Pro
45.60.31.34
Public Scan
Submitted URL: https://click.email.sans.org/?qs=2d5060bf19825ccfbd8ea80fef3b17956c2c6c2ddfe942fad8be979d20f77ccaac3e0193a0782633f2d4b73f78b1...
Effective URL: https://www.sans.org/cyber-security-training-events/cloudsecnext-summit-2024/?utm_medium=Email&utm_source=atRisk&utm_...
Submission: On September 12 via api from US — Scanned from US
Effective URL: https://www.sans.org/cyber-security-training-events/cloudsecnext-summit-2024/?utm_medium=Email&utm_source=atRisk&utm_...
Submission: On September 12 via api from US — Scanned from US
Form analysis
1 forms found in the DOM<form id="footerNewsletterForm" autocomplete="off" data-v-64bb6155="">
<div class="form-item" data-v-64bb6155=""><label for="subscribe-email-footerNewsletterForm" data-v-64bb6155=""></label> <input id="subscribe-email-footerNewsletterForm" type="email" name="email" autocomplete="on" placeholder="Your Email..."
required="required" class="subscribe-email" data-v-64bb6155=""></div>
<div class="form-item" data-v-64bb6155="">
<div id="sidebarCountry_footer-wrapper" class="select light large" data-v-1b4c0987="" data-v-64bb6155="">
<div class="wrp" data-v-1b4c0987=""><!---->
<div class="combo-wrap" data-v-1b4c0987="">
<div class="combo-wrap-inner" data-v-1b4c0987=""><input id="sidebarCountry_footer" placeholder="Select your country" autocomplete="chrome-off" class="combobox" data-v-1b4c0987="" type="text" role="combobox" aria-controls="4ox6xaDH"
aria-autocomplete="list" aria-expanded="false">
<div class="listbox listbox-for-sidebarCountry_footer" data-v-1b4c0987="" id="4ox6xaDH" role="listbox">
<div data-optvalue="261" class="option" data-v-1b4c0987="" role="option" id="QYRSJ6QU"> United States </div>
<div data-optvalue="76" class="option" data-v-1b4c0987="" role="option" id="6kxeG27P"> Canada </div>
<div data-optvalue="260" class="option" data-v-1b4c0987="" role="option" id="9yZxCH4m"> United Kingdom </div>
<div data-optvalue="233" class="option" data-v-1b4c0987="" role="option" id="cbYEs90C"> Spain </div>
<div data-optvalue="59" class="option" data-v-1b4c0987="" role="option" id="9i56MtbE"> Belgium </div>
<div data-optvalue="95" class="option" data-v-1b4c0987="" role="option" id="UUI9RKrL"> Denmark </div>
<div data-optvalue="199" class="option" data-v-1b4c0987="" role="option" id="dNzsyZa5"> Norway </div>
<div data-optvalue="189" class="option" data-v-1b4c0987="" role="option" id="6L1CsfM2"> Netherlands </div>
<div data-optvalue="51" class="option" data-v-1b4c0987="" role="option" id="rdW7i6Eq"> Australia </div>
<div data-optvalue="138" class="option" data-v-1b4c0987="" role="option" id="3X3HJ4ln"> India </div>
<div data-optvalue="146" class="option" data-v-1b4c0987="" role="option" id="r4k0G6YN"> Japan </div>
<div data-optvalue="227" class="option" data-v-1b4c0987="" role="option" id="pj4cXxTK"> Singapore </div>
<div data-optvalue="39" class="option" data-v-1b4c0987="" role="option" id="rgJ7I890"> Afghanistan </div>
<div data-optvalue="1188" class="option" data-v-1b4c0987="" role="option" id="Tv6v540a"> Aland Islands </div>
<div data-optvalue="40" class="option" data-v-1b4c0987="" role="option" id="6s8a9iDc"> Albania </div>
<div data-optvalue="41" class="option" data-v-1b4c0987="" role="option" id="xvadGPM5"> Algeria </div>
<div data-optvalue="42" class="option" data-v-1b4c0987="" role="option" id="gDAvrJGD"> American Samoa </div>
<div data-optvalue="43" class="option" data-v-1b4c0987="" role="option" id="rdSxnpJu"> Andorra </div>
<div data-optvalue="44" class="option" data-v-1b4c0987="" role="option" id="LgNKbQn6"> Angola </div>
<div data-optvalue="45" class="option" data-v-1b4c0987="" role="option" id="OlimPZJG"> Anguilla </div>
<div data-optvalue="46" class="option" data-v-1b4c0987="" role="option" id="jGJ6nXSU"> Antarctica </div>
<div data-optvalue="47" class="option" data-v-1b4c0987="" role="option" id="D3Al21aJ"> Antigua and Barbuda </div>
<div data-optvalue="48" class="option" data-v-1b4c0987="" role="option" id="X0GHTKDL"> Argentina </div>
<div data-optvalue="49" class="option" data-v-1b4c0987="" role="option" id="oswjXTFV"> Armenia </div>
<div data-optvalue="50" class="option" data-v-1b4c0987="" role="option" id="LIf0hi58"> Aruba </div>
<div data-optvalue="52" class="option" data-v-1b4c0987="" role="option" id="ybTj3FzG"> Austria </div>
<div data-optvalue="53" class="option" data-v-1b4c0987="" role="option" id="FPZQksJv"> Azerbaijan </div>
<div data-optvalue="54" class="option" data-v-1b4c0987="" role="option" id="7FH4sxfU"> Bahamas </div>
<div data-optvalue="55" class="option" data-v-1b4c0987="" role="option" id="7KQaRLbc"> Bahrain </div>
<div data-optvalue="56" class="option" data-v-1b4c0987="" role="option" id="IXnvTTlz"> Bangladesh </div>
<div data-optvalue="57" class="option" data-v-1b4c0987="" role="option" id="gcpgvxIt"> Barbados </div>
<div data-optvalue="58" class="option" data-v-1b4c0987="" role="option" id="mxBbVr0t"> Belarus </div>
<div data-optvalue="60" class="option" data-v-1b4c0987="" role="option" id="s6Tn88Qr"> Belize </div>
<div data-optvalue="61" class="option" data-v-1b4c0987="" role="option" id="S91YOUd9"> Benin </div>
<div data-optvalue="62" class="option" data-v-1b4c0987="" role="option" id="WvfPBgSW"> Bermuda </div>
<div data-optvalue="63" class="option" data-v-1b4c0987="" role="option" id="jN7BuutF"> Bhutan </div>
<div data-optvalue="64" class="option" data-v-1b4c0987="" role="option" id="1ZZoVDiw"> Bolivia </div>
<div data-optvalue="1189" class="option" data-v-1b4c0987="" role="option" id="NJIRYrWs"> Bonaire, Sint Eustatius, and Saba </div>
<div data-optvalue="65" class="option" data-v-1b4c0987="" role="option" id="MSoUAX0P"> Bosnia And Herzegovina </div>
<div data-optvalue="66" class="option" data-v-1b4c0987="" role="option" id="pBSpxG6V"> Botswana </div>
<div data-optvalue="67" class="option" data-v-1b4c0987="" role="option" id="60ck5Gnq"> Bouvet Island </div>
<div data-optvalue="68" class="option" data-v-1b4c0987="" role="option" id="30JzgztV"> Brazil </div>
<div data-optvalue="69" class="option" data-v-1b4c0987="" role="option" id="nA551vJY"> British Indian Ocean Territory </div>
<div data-optvalue="70" class="option" data-v-1b4c0987="" role="option" id="5yqG5bZ4"> Brunei Darussalam </div>
<div data-optvalue="71" class="option" data-v-1b4c0987="" role="option" id="k2z1uWCL"> Bulgaria </div>
<div data-optvalue="72" class="option" data-v-1b4c0987="" role="option" id="khFVbdDJ"> Burkina Faso </div>
<div data-optvalue="73" class="option" data-v-1b4c0987="" role="option" id="0KRL3sT7"> Burundi </div>
<div data-optvalue="74" class="option" data-v-1b4c0987="" role="option" id="oCFL0W38"> Cambodia </div>
<div data-optvalue="75" class="option" data-v-1b4c0987="" role="option" id="clbNPecT"> Cameroon </div>
<div data-optvalue="77" class="option" data-v-1b4c0987="" role="option" id="SHHRy21d"> Cape Verde </div>
<div data-optvalue="78" class="option" data-v-1b4c0987="" role="option" id="pg3KUlKS"> Cayman Islands </div>
<div data-optvalue="79" class="option" data-v-1b4c0987="" role="option" id="GBvO6IYA"> Central African Republic </div>
<div data-optvalue="80" class="option" data-v-1b4c0987="" role="option" id="49F7D3zI"> Chad </div>
<div data-optvalue="81" class="option" data-v-1b4c0987="" role="option" id="NXFnaTzH"> Chile </div>
<div data-optvalue="82" class="option" data-v-1b4c0987="" role="option" id="7WbFFFUg"> China </div>
<div data-optvalue="83" class="option" data-v-1b4c0987="" role="option" id="JWUe09Tk"> Christmas Island </div>
<div data-optvalue="84" class="option" data-v-1b4c0987="" role="option" id="gIZfo83n"> Cocos (Keeling) Islands </div>
<div data-optvalue="85" class="option" data-v-1b4c0987="" role="option" id="AglByZtM"> Colombia </div>
<div data-optvalue="86" class="option" data-v-1b4c0987="" role="option" id="p4yUU7fs"> Comoros </div>
<div data-optvalue="87" class="option" data-v-1b4c0987="" role="option" id="A0MqmRsm"> Congo </div>
<div data-optvalue="88" class="option" data-v-1b4c0987="" role="option" id="d4ewYX0g"> Cook Islands </div>
<div data-optvalue="89" class="option" data-v-1b4c0987="" role="option" id="Gqo6ikDL"> Costa Rica </div>
<div data-optvalue="90" class="option" data-v-1b4c0987="" role="option" id="Jd1UdmHw"> Cote D'ivoire </div>
<div data-optvalue="91" class="option" data-v-1b4c0987="" role="option" id="UkDoFL2m"> Croatia (Local Name: Hrvatska) </div>
<div data-optvalue="1192" class="option" data-v-1b4c0987="" role="option" id="xBunsmzE"> Curacao </div>
<div data-optvalue="93" class="option" data-v-1b4c0987="" role="option" id="ewvMRncY"> Cyprus </div>
<div data-optvalue="94" class="option" data-v-1b4c0987="" role="option" id="6Y2Mhxgv"> Czech Republic </div>
<div data-optvalue="1190" class="option" data-v-1b4c0987="" role="option" id="Sr8jZmpn"> Democratic Republic of the Congo </div>
<div data-optvalue="96" class="option" data-v-1b4c0987="" role="option" id="Mo0ELq1N"> Djibouti </div>
<div data-optvalue="97" class="option" data-v-1b4c0987="" role="option" id="KHpx9ZRf"> Dominica </div>
<div data-optvalue="98" class="option" data-v-1b4c0987="" role="option" id="ipYknxWW"> Dominican Republic </div>
<div data-optvalue="1198" class="option" data-v-1b4c0987="" role="option" id="f9Z2CrQw"> East Timor </div>
<div data-optvalue="100" class="option" data-v-1b4c0987="" role="option" id="3h5NW5KY"> Ecuador </div>
<div data-optvalue="101" class="option" data-v-1b4c0987="" role="option" id="zMEr2rrz"> Egypt </div>
<div data-optvalue="102" class="option" data-v-1b4c0987="" role="option" id="lvw6plCu"> El Salvador </div>
<div data-optvalue="103" class="option" data-v-1b4c0987="" role="option" id="1hLjSOFK"> Equatorial Guinea </div>
<div data-optvalue="104" class="option" data-v-1b4c0987="" role="option" id="ucHctjjr"> Eritrea </div>
<div data-optvalue="105" class="option" data-v-1b4c0987="" role="option" id="qHjpIJLF"> Estonia </div>
<div data-optvalue="240" class="option" data-v-1b4c0987="" role="option" id="8nDjlMYc"> Eswatini </div>
<div data-optvalue="106" class="option" data-v-1b4c0987="" role="option" id="JxqapOLj"> Ethiopia </div>
<div data-optvalue="108" class="option" data-v-1b4c0987="" role="option" id="pFf4dCtx"> Falkland Islands (Malvinas) </div>
<div data-optvalue="109" class="option" data-v-1b4c0987="" role="option" id="t2mVk39f"> Faroe Islands </div>
<div data-optvalue="110" class="option" data-v-1b4c0987="" role="option" id="T2dd5BfU"> Fiji </div>
<div data-optvalue="111" class="option" data-v-1b4c0987="" role="option" id="Huz8TX94"> Finland </div>
<div data-optvalue="112" class="option" data-v-1b4c0987="" role="option" id="jMzrAthI"> France </div>
<div data-optvalue="114" class="option" data-v-1b4c0987="" role="option" id="TFtk2Txj"> French Guiana </div>
<div data-optvalue="115" class="option" data-v-1b4c0987="" role="option" id="3BGzgqC2"> French Polynesia </div>
<div data-optvalue="116" class="option" data-v-1b4c0987="" role="option" id="uTEuWJXP"> French Southern Territories </div>
<div data-optvalue="117" class="option" data-v-1b4c0987="" role="option" id="NHju7vNW"> Gabon </div>
<div data-optvalue="118" class="option" data-v-1b4c0987="" role="option" id="iYmVnxnQ"> Gambia </div>
<div data-optvalue="119" class="option" data-v-1b4c0987="" role="option" id="lmnTcbEf"> Georgia </div>
<div data-optvalue="120" class="option" data-v-1b4c0987="" role="option" id="CqwXud2L"> Germany </div>
<div data-optvalue="121" class="option" data-v-1b4c0987="" role="option" id="MUdA4Xla"> Ghana </div>
<div data-optvalue="122" class="option" data-v-1b4c0987="" role="option" id="7DUNRZuT"> Gibraltar </div>
<div data-optvalue="123" class="option" data-v-1b4c0987="" role="option" id="MHwygjBv"> Greece </div>
<div data-optvalue="124" class="option" data-v-1b4c0987="" role="option" id="bg9zfo15"> Greenland </div>
<div data-optvalue="125" class="option" data-v-1b4c0987="" role="option" id="sYXITYn7"> Grenada </div>
<div data-optvalue="126" class="option" data-v-1b4c0987="" role="option" id="7w3lfBpl"> Guadeloupe </div>
<div data-optvalue="127" class="option" data-v-1b4c0987="" role="option" id="Chw3CC2t"> Guam </div>
<div data-optvalue="128" class="option" data-v-1b4c0987="" role="option" id="flNycnU6"> Guatemala </div>
<div data-optvalue="1077" class="option" data-v-1b4c0987="" role="option" id="rVD2wtww"> Guernsey </div>
<div data-optvalue="129" class="option" data-v-1b4c0987="" role="option" id="32UK13m5"> Guinea </div>
<div data-optvalue="130" class="option" data-v-1b4c0987="" role="option" id="JdtXKtvb"> Guinea-Bissau </div>
<div data-optvalue="131" class="option" data-v-1b4c0987="" role="option" id="Oqnahiro"> Guyana </div>
<div data-optvalue="132" class="option" data-v-1b4c0987="" role="option" id="otMo1PpE"> Haiti </div>
<div data-optvalue="133" class="option" data-v-1b4c0987="" role="option" id="HR7RNxA6"> Heard And McDonald Islands </div>
<div data-optvalue="134" class="option" data-v-1b4c0987="" role="option" id="8fjgsRL5"> Honduras </div>
<div data-optvalue="135" class="option" data-v-1b4c0987="" role="option" id="TWQi2z9o"> Hong Kong </div>
<div data-optvalue="136" class="option" data-v-1b4c0987="" role="option" id="8FkHQ1R3"> Hungary </div>
<div data-optvalue="137" class="option" data-v-1b4c0987="" role="option" id="bPFYyfiC"> Iceland </div>
<div data-optvalue="139" class="option" data-v-1b4c0987="" role="option" id="AabJEwRy"> Indonesia </div>
<div data-optvalue="141" class="option" data-v-1b4c0987="" role="option" id="EXkFju7R"> Iraq </div>
<div data-optvalue="142" class="option" data-v-1b4c0987="" role="option" id="zHowwdPg"> Ireland </div>
<div data-optvalue="1079" class="option" data-v-1b4c0987="" role="option" id="cbJH1NKN"> Isle of Man </div>
<div data-optvalue="143" class="option" data-v-1b4c0987="" role="option" id="lIINTqZg"> Israel </div>
<div data-optvalue="144" class="option" data-v-1b4c0987="" role="option" id="MrSVJShI"> Italy </div>
<div data-optvalue="145" class="option" data-v-1b4c0987="" role="option" id="VuBIf68l"> Jamaica </div>
<div data-optvalue="1076" class="option" data-v-1b4c0987="" role="option" id="6PSFfOR1"> Jersey </div>
<div data-optvalue="147" class="option" data-v-1b4c0987="" role="option" id="dUpRtARR"> Jordan </div>
<div data-optvalue="148" class="option" data-v-1b4c0987="" role="option" id="reXjyPfC"> Kazakhstan </div>
<div data-optvalue="149" class="option" data-v-1b4c0987="" role="option" id="OPL8B2FE"> Kenya </div>
<div data-optvalue="150" class="option" data-v-1b4c0987="" role="option" id="Y1dRnwW2"> Kiribati </div>
<div data-optvalue="152" class="option" data-v-1b4c0987="" role="option" id="Bf5VDKQq"> Korea, Republic Of </div>
<div data-optvalue="1199" class="option" data-v-1b4c0987="" role="option" id="CgT3EN5S"> Kosovo </div>
<div data-optvalue="153" class="option" data-v-1b4c0987="" role="option" id="afUIlFRo"> Kuwait </div>
<div data-optvalue="154" class="option" data-v-1b4c0987="" role="option" id="1QKbPVuT"> Kyrgyzstan </div>
<div data-optvalue="155" class="option" data-v-1b4c0987="" role="option" id="45f2l7mQ"> Lao People's Democratic Republic </div>
<div data-optvalue="156" class="option" data-v-1b4c0987="" role="option" id="ZqThT2UF"> Latvia </div>
<div data-optvalue="157" class="option" data-v-1b4c0987="" role="option" id="pGsGGuvh"> Lebanon </div>
<div data-optvalue="158" class="option" data-v-1b4c0987="" role="option" id="2v9TIqiN"> Lesotho </div>
<div data-optvalue="159" class="option" data-v-1b4c0987="" role="option" id="KThua0Ry"> Liberia </div>
<div data-optvalue="161" class="option" data-v-1b4c0987="" role="option" id="mJF5CjLN"> Liechtenstein </div>
<div data-optvalue="162" class="option" data-v-1b4c0987="" role="option" id="5DYY0mAy"> Lithuania </div>
<div data-optvalue="163" class="option" data-v-1b4c0987="" role="option" id="ugDZIZ6j"> Luxembourg </div>
<div data-optvalue="164" class="option" data-v-1b4c0987="" role="option" id="sEMdgxae"> Macau </div>
<div data-optvalue="166" class="option" data-v-1b4c0987="" role="option" id="krhSFumP"> Madagascar </div>
<div data-optvalue="167" class="option" data-v-1b4c0987="" role="option" id="bFCqVbtg"> Malawi </div>
<div data-optvalue="168" class="option" data-v-1b4c0987="" role="option" id="vOeW4Hdy"> Malaysia </div>
<div data-optvalue="169" class="option" data-v-1b4c0987="" role="option" id="5MUEZCJ4"> Maldives </div>
<div data-optvalue="170" class="option" data-v-1b4c0987="" role="option" id="fqJtvLfk"> Mali </div>
<div data-optvalue="171" class="option" data-v-1b4c0987="" role="option" id="lYRm6xu2"> Malta </div>
<div data-optvalue="172" class="option" data-v-1b4c0987="" role="option" id="H9sfZJs7"> Marshall Islands </div>
<div data-optvalue="173" class="option" data-v-1b4c0987="" role="option" id="wWQbRiyV"> Martinique </div>
<div data-optvalue="174" class="option" data-v-1b4c0987="" role="option" id="0XXGnP0s"> Mauritania </div>
<div data-optvalue="175" class="option" data-v-1b4c0987="" role="option" id="Rfpmr1ig"> Mauritius </div>
<div data-optvalue="176" class="option" data-v-1b4c0987="" role="option" id="amYjpfWk"> Mayotte </div>
<div data-optvalue="177" class="option" data-v-1b4c0987="" role="option" id="gX1C5LCQ"> Mexico </div>
<div data-optvalue="178" class="option" data-v-1b4c0987="" role="option" id="qd3lja8O"> Micronesia, Federated States Of </div>
<div data-optvalue="179" class="option" data-v-1b4c0987="" role="option" id="AXtRqpWN"> Moldova, Republic Of </div>
<div data-optvalue="180" class="option" data-v-1b4c0987="" role="option" id="sKvBpgcE"> Monaco </div>
<div data-optvalue="181" class="option" data-v-1b4c0987="" role="option" id="f85pM2N5"> Mongolia </div>
<div data-optvalue="1089" class="option" data-v-1b4c0987="" role="option" id="hit31ZCL"> Montenegro </div>
<div data-optvalue="182" class="option" data-v-1b4c0987="" role="option" id="JFFgvhlX"> Montserrat </div>
<div data-optvalue="183" class="option" data-v-1b4c0987="" role="option" id="yfJugx6J"> Morocco </div>
<div data-optvalue="184" class="option" data-v-1b4c0987="" role="option" id="HNpNmKm1"> Mozambique </div>
<div data-optvalue="185" class="option" data-v-1b4c0987="" role="option" id="VnamSllW"> Myanmar </div>
<div data-optvalue="186" class="option" data-v-1b4c0987="" role="option" id="6S1aWiMz"> Namibia </div>
<div data-optvalue="187" class="option" data-v-1b4c0987="" role="option" id="3EwYbc4K"> Nauru </div>
<div data-optvalue="188" class="option" data-v-1b4c0987="" role="option" id="nqMO9Wd9"> Nepal </div>
<div data-optvalue="190" class="option" data-v-1b4c0987="" role="option" id="7JKhZZ29"> Netherlands Antilles </div>
<div data-optvalue="191" class="option" data-v-1b4c0987="" role="option" id="r5iDmpA3"> New Caledonia </div>
<div data-optvalue="192" class="option" data-v-1b4c0987="" role="option" id="0GqCR2O6"> New Zealand </div>
<div data-optvalue="193" class="option" data-v-1b4c0987="" role="option" id="CPL2j4BZ"> Nicaragua </div>
<div data-optvalue="194" class="option" data-v-1b4c0987="" role="option" id="6vcBZvG7"> Niger </div>
<div data-optvalue="195" class="option" data-v-1b4c0987="" role="option" id="ppdyQ0bn"> Nigeria </div>
<div data-optvalue="196" class="option" data-v-1b4c0987="" role="option" id="DVkRhjGm"> Niue </div>
<div data-optvalue="197" class="option" data-v-1b4c0987="" role="option" id="JUGKrO7m"> Norfolk Island </div>
<div data-optvalue="165" class="option" data-v-1b4c0987="" role="option" id="54JFwV88"> North Macedonia </div>
<div data-optvalue="198" class="option" data-v-1b4c0987="" role="option" id="HJDaGh5j"> Northern Mariana Islands </div>
<div data-optvalue="200" class="option" data-v-1b4c0987="" role="option" id="hSafUhsj"> Oman </div>
<div data-optvalue="201" class="option" data-v-1b4c0987="" role="option" id="mgoEJ4M5"> Pakistan </div>
<div data-optvalue="202" class="option" data-v-1b4c0987="" role="option" id="yxKyukhK"> Palau </div>
<div data-optvalue="1045" class="option" data-v-1b4c0987="" role="option" id="CLcCyvuC"> Palestine </div>
<div data-optvalue="203" class="option" data-v-1b4c0987="" role="option" id="dXalMhgh"> Panama </div>
<div data-optvalue="204" class="option" data-v-1b4c0987="" role="option" id="snuast07"> Papua New Guinea </div>
<div data-optvalue="205" class="option" data-v-1b4c0987="" role="option" id="jZahtfSC"> Paraguay </div>
<div data-optvalue="206" class="option" data-v-1b4c0987="" role="option" id="QOJ7LGq8"> Peru </div>
<div data-optvalue="207" class="option" data-v-1b4c0987="" role="option" id="7Jsm1GYF"> Philippines </div>
<div data-optvalue="208" class="option" data-v-1b4c0987="" role="option" id="TIqzllaO"> Pitcairn </div>
<div data-optvalue="209" class="option" data-v-1b4c0987="" role="option" id="JcpTnjvs"> Poland </div>
<div data-optvalue="210" class="option" data-v-1b4c0987="" role="option" id="NRqnJOI3"> Portugal </div>
<div data-optvalue="211" class="option" data-v-1b4c0987="" role="option" id="HyYOfnXm"> Puerto Rico </div>
<div data-optvalue="212" class="option" data-v-1b4c0987="" role="option" id="Xk7FG6ve"> Qatar </div>
<div data-optvalue="213" class="option" data-v-1b4c0987="" role="option" id="y7xc8j8r"> Reunion </div>
<div data-optvalue="214" class="option" data-v-1b4c0987="" role="option" id="Z41VsxZO"> Romania </div>
<div data-optvalue="215" class="option" data-v-1b4c0987="" role="option" id="nz8R53yi"> Russian Federation </div>
<div data-optvalue="216" class="option" data-v-1b4c0987="" role="option" id="2H462d3W"> Rwanda </div>
<div data-optvalue="1088" class="option" data-v-1b4c0987="" role="option" id="Rcavgtxl"> Saint Bartholemy </div>
<div data-optvalue="217" class="option" data-v-1b4c0987="" role="option" id="HAdocs4s"> Saint Kitts And Nevis </div>
<div data-optvalue="218" class="option" data-v-1b4c0987="" role="option" id="xsHlY0k5"> Saint Lucia </div>
<div data-optvalue="1195" class="option" data-v-1b4c0987="" role="option" id="wV8szPeA"> Saint Martin </div>
<div data-optvalue="219" class="option" data-v-1b4c0987="" role="option" id="gJwC1o35"> Saint Vincent And The Grenadines </div>
<div data-optvalue="220" class="option" data-v-1b4c0987="" role="option" id="kRPqu5ol"> Samoa </div>
<div data-optvalue="221" class="option" data-v-1b4c0987="" role="option" id="1YAPDIyx"> San Marino </div>
<div data-optvalue="222" class="option" data-v-1b4c0987="" role="option" id="YkZCrlRb"> Sao Tome And Principe </div>
<div data-optvalue="223" class="option" data-v-1b4c0987="" role="option" id="d7lwTAxF"> Saudi Arabia </div>
<div data-optvalue="224" class="option" data-v-1b4c0987="" role="option" id="5UAnyT0d"> Senegal </div>
<div data-optvalue="993" class="option" data-v-1b4c0987="" role="option" id="hDgTlmrA"> Serbia </div>
<div data-optvalue="225" class="option" data-v-1b4c0987="" role="option" id="plrskRzJ"> Seychelles </div>
<div data-optvalue="226" class="option" data-v-1b4c0987="" role="option" id="Mm8W6UnY"> Sierra Leone </div>
<div data-optvalue="1197" class="option" data-v-1b4c0987="" role="option" id="LHFygScF"> Sint Maarten </div>
<div data-optvalue="228" class="option" data-v-1b4c0987="" role="option" id="Amc7XVqx"> Slovakia </div>
<div data-optvalue="229" class="option" data-v-1b4c0987="" role="option" id="IhyAPGN9"> Slovenia </div>
<div data-optvalue="230" class="option" data-v-1b4c0987="" role="option" id="KPkzP5iB"> Solomon Islands </div>
<div data-optvalue="232" class="option" data-v-1b4c0987="" role="option" id="RmUop4ju"> South Africa </div>
<div data-optvalue="1193" class="option" data-v-1b4c0987="" role="option" id="TlaOWur0"> South Georgia and the South Sandwich Islands </div>
<div data-optvalue="1196" class="option" data-v-1b4c0987="" role="option" id="ywOv9z5a"> South Sudan </div>
<div data-optvalue="234" class="option" data-v-1b4c0987="" role="option" id="4UqiPqNJ"> Sri Lanka </div>
<div data-optvalue="235" class="option" data-v-1b4c0987="" role="option" id="9SP397Us"> St. Helena </div>
<div data-optvalue="236" class="option" data-v-1b4c0987="" role="option" id="n5MNtRFT"> St. Pierre And Miquelon </div>
<div data-optvalue="238" class="option" data-v-1b4c0987="" role="option" id="OkoBX9zE"> Suriname </div>
<div data-optvalue="239" class="option" data-v-1b4c0987="" role="option" id="jeRyO4Su"> Svalbard And Jan Mayen Islands </div>
<div data-optvalue="241" class="option" data-v-1b4c0987="" role="option" id="kkcSRTsT"> Sweden </div>
<div data-optvalue="242" class="option" data-v-1b4c0987="" role="option" id="hJJ01iV8"> Switzerland </div>
<div data-optvalue="244" class="option" data-v-1b4c0987="" role="option" id="0HW67qZr"> Taiwan </div>
<div data-optvalue="245" class="option" data-v-1b4c0987="" role="option" id="s8g9Fuc8"> Tajikistan </div>
<div data-optvalue="246" class="option" data-v-1b4c0987="" role="option" id="6FAD3ryc"> Tanzania </div>
<div data-optvalue="247" class="option" data-v-1b4c0987="" role="option" id="aptcOj2o"> Thailand </div>
<div data-optvalue="248" class="option" data-v-1b4c0987="" role="option" id="1FTEbYbC"> Togo </div>
<div data-optvalue="249" class="option" data-v-1b4c0987="" role="option" id="t2uO3X9m"> Tokelau </div>
<div data-optvalue="250" class="option" data-v-1b4c0987="" role="option" id="U4CivWHv"> Tonga </div>
<div data-optvalue="251" class="option" data-v-1b4c0987="" role="option" id="4oKrc6ku"> Trinidad And Tobago </div>
<div data-optvalue="252" class="option" data-v-1b4c0987="" role="option" id="Fj1hC6Bj"> Tunisia </div>
<div data-optvalue="253" class="option" data-v-1b4c0987="" role="option" id="pp5Osm5S"> Turkey </div>
<div data-optvalue="254" class="option" data-v-1b4c0987="" role="option" id="hNg1ROXl"> Turkmenistan </div>
<div data-optvalue="255" class="option" data-v-1b4c0987="" role="option" id="pskR8MOE"> Turks And Caicos Islands </div>
<div data-optvalue="256" class="option" data-v-1b4c0987="" role="option" id="AbLs2vcd"> Tuvalu </div>
<div data-optvalue="257" class="option" data-v-1b4c0987="" role="option" id="k8zJKir4"> Uganda </div>
<div data-optvalue="258" class="option" data-v-1b4c0987="" role="option" id="axois4Jg"> Ukraine </div>
<div data-optvalue="259" class="option" data-v-1b4c0987="" role="option" id="Xl9X78V7"> United Arab Emirates </div>
<div data-optvalue="262" class="option" data-v-1b4c0987="" role="option" id="tpswK0au"> United States Minor Outlying Islands </div>
<div data-optvalue="263" class="option" data-v-1b4c0987="" role="option" id="ORrl0Xr5"> Uruguay </div>
<div data-optvalue="264" class="option" data-v-1b4c0987="" role="option" id="exNZaMHh"> Uzbekistan </div>
<div data-optvalue="265" class="option" data-v-1b4c0987="" role="option" id="Lh5VRiVk"> Vanuatu </div>
<div data-optvalue="266" class="option" data-v-1b4c0987="" role="option" id="NmIxtCui"> Vatican City </div>
<div data-optvalue="267" class="option" data-v-1b4c0987="" role="option" id="AXoAJ8ul"> Venezuela </div>
<div data-optvalue="268" class="option" data-v-1b4c0987="" role="option" id="KRCtwHyq"> Vietnam </div>
<div data-optvalue="269" class="option" data-v-1b4c0987="" role="option" id="HDis6hQL"> Virgin Islands (British) </div>
<div data-optvalue="270" class="option" data-v-1b4c0987="" role="option" id="2QSCeYk3"> Virgin Islands (U.S.) </div>
<div data-optvalue="271" class="option" data-v-1b4c0987="" role="option" id="p08FAUZy"> Wallis And Futuna Islands </div>
<div data-optvalue="272" class="option" data-v-1b4c0987="" role="option" id="D8SIZG2W"> Western Sahara </div>
<div data-optvalue="273" class="option" data-v-1b4c0987="" role="option" id="39RPHCiD"> Yemen </div>
<div data-optvalue="276" class="option" data-v-1b4c0987="" role="option" id="QarYsnl6"> Zambia </div>
<div data-optvalue="277" class="option" data-v-1b4c0987="" role="option" id="exy8CUKM"> Zimbabwe </div>
</div>
</div>
</div>
</div>
</div>
</div> <!---->
<div class="form-item" data-v-64bb6155="">
<div class="checkbox" data-v-64bb6155="">
<p data-v-64bb6155="">By providing this information, you agree to the processing of your personal data by SANS as described in our <a href="/legal/privacy/">Privacy Policy.</a></p>
</div>
</div>
<div class="form-item" data-v-64bb6155="">
<ul class="checkboxes__list" data-v-64bb6155="">
<li class="checkboxes__item hidden" data-v-64bb6155="">
<div class="checkbox" data-v-64bb6155=""><input id="newsbites" type="checkbox" name="newsbites" value="newsbites" checked="" data-v-64bb6155=""> <label for="newsbites" data-v-64bb6155="">SANS NewsBites</label></div>
</li>
<li class="checkboxes__item hidden" data-v-64bb6155="">
<div class="checkbox" data-v-64bb6155=""><input id="at_risk" type="checkbox" name="at_risk" value="at_risk" checked="" data-v-64bb6155=""> <label for="at_risk" data-v-64bb6155="">@Risk: Security Alert</label></div>
</li>
<li class="checkboxes__item hidden" data-v-64bb6155="">
<div class="checkbox" data-v-64bb6155=""><input id="ouch" type="checkbox" name="ouch" value="ouch" checked="" data-v-64bb6155=""> <label for="ouch" data-v-64bb6155="">OUCH! Security Awareness</label></div>
</li>
</ul>
</div>
<div class="muted" data-v-64bb6155=""> This site is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" data-v-64bb6155="">Privacy Policy</a> and
<a href="https://policies.google.com/terms" data-v-64bb6155="">Terms of Service</a> apply. </div> <input type="submit" value="Subscribe" class="submitButton button button--large button--light button--primary" data-v-5041ef13=""
data-v-64bb6155="">
</form>
Text Content
homepage Open menu Contact Sales Go one level top * Train and Certify FREE COURSE DEMOS Free course demos allow you to see course content, watch world-class instructors in action, and evaluate course difficulty. TRAIN AND CERTIFY Immediately apply the skills and techniques learned in SANS courses, ranges, and summits Learn More * Overview * Courses * Overview * Full Course List * By Focus Areas * Artificial Intelligence * Cloud Security * Cyber Defense * Cybersecurity and IT Essentials * Cybersecurity Leadership * DFIR * Industrial Control Systems * Offensive Operations * Open-Source Intelligence * By Skill Levels * New to Cyber * Essentials * Advanced * Expert * Training Formats * OnDemand * In-Person * Live Online * Free Course Demos * Training Roadmaps * Skills Roadmap * Focus Area Job Roles * Cyber Defense Job Roles * Offensive Operations Job Roles * DFIR Job Roles * Cloud Job Roles * ICS Job Roles * Leadership Job Roles * NICE Framework * Oversight and Governance * Design and Development * Implementation and Operation * Protection and Defense * Investigation * Cyberspace Intelligence * Cyberspace Effects * Industrial Control Systems * European Skills Framework * GIAC Certifications * Training Events & Summits * Events Overview * In-Person Event Locations * Asia * Australia & New Zealand * Latin America * Mainland Europe * Middle East & Africa * Scandinavia * United Kingdom & Ireland * United States & Canada * Live Online Events List * Summits * OnDemand * Get Started in Cyber * Overview * Degree and Certificate Programs * Scholarships * Free Training & Resources * Cyber Ranges * For Organizations SANS CISO PRIMER: 4 CYBER TRENDS This CISO Primer highlights four major cybersecurity trends SANS experts believe will move the needle for CISOs in 2024. FOR ORGANIZATIONS Build a world-class cyber team with our workforce development programs. Learn More * Overview * Group Purchasing * Build Your Team * Assessments * Private Training * By Industry * Health Care * Industrial Control Systems Security * Military * Leadership Training * Leadership Courses * Executive Cybersecurity Exercises * Leadership Simulation Game * Security Awareness 2024 SECURITY AWARENESS REPORT Embedding a Strong Security Culture SECURITY AWARENESS Increase your staff’s cyber awareness, help them change their behaviors, and reduce your organizational risk Learn More * Overview * Products & Services * Security Awareness Training * EndUser Training * Phishing Platform * Specialized * Developer Training * ICS Engineer Training * IT Administrator * NERC CIP Training * Role-based PCI DSS Compliance Training * Security Essentials for Business Leaders and Managers * Workforce Risk Management Fundamentals for AI * Risk Assessments * Knowledge Assessment * Culture Assessment * OUCH! Newsletter * Career Development * Overview * Training & Courses * Professional Credential * Blog * Partners * Reports & Case Studies * Resources SECURITY POLICY TEMPLATES In collaboration with security subject-matter experts, SANS has developed a set of security policy templates for your use. RESOURCES Enhance your skills with access to thousands of free resources, 150+ instructor-developed tools, and the latest cybersecurity news and analysis Browse Here * Overview * Webcasts * Webinars * Live Streams * Wait Just An Infosec * Cybersecurity Leadership * SANS Threat Analysis Rundown (STAR) * Free Cybersecurity Events * Free Events Overview * Summits * Solutions Forums * Community Nights * Workshops * Content * Newsletters * NewsBites * @RISK * OUCH! Newsletter * Blog * Podcasts * Blueprint * Trust Me, I'm Certified * Cloud Ace * Wait Just an Infosec * Summit Presentations * Posters & Cheat Sheets * Internet Storm Center * Research * White Papers * Security Policies * Tools * Focus Areas * Artificial Intelligence * Cloud Security * Cyber Defense * Cybersecurity Leadership * Digital Forensics & Incident Response * Industrial Control Systems * Offensive Operations * Open-Source Intelligence (OSINT) * Get Involved JOIN THE COMMUNITY Membership of the SANS.org Community grants you access to cutting edge cyber security news, training, and free tools that can't be found elsewhere. GET INVOLVED Help keep the cyber community one step ahead of threats. Join the SANS community or begin your journey of becoming a SANS Certified Instructor today. Learn More * Overview * Join the Community * Work Study * Teach for SANS * CISO Network * Partnerships * Sponsorship Opportunities * Partner Portal * About OUR MISSION To empower current and future cybersecurity practitioners around the world with immediately useful knowledge and capabilities, we deliver industry-leading community programs, resources and training. ABOUT Learn more about how SANS empowers and educates current and future cybersecurity practitioners with knowledge and skills. Learn More * SANS * Overview * Our Founder * Awards * Customer Reviews * Trade Events * Press * Policies and Procedures * Instructors * Our Instructors * Full Instructor List * Mission * Our Mission * Diversity * Scholarships * Contact * Contact Customer Service * Contact Sales * Press & Media Enquiries * Frequent Asked Questions * Careers * * SANS Sites * Australia * Belgium * Brazil * France * India * Japan * Middle East & Africa * Netherlands * Singapore * Switzerland * United Kingdom * Log In * Join * * Account Dashboard * Log Out * Contact Sales 1. Home > 2. Cyber Security Events > 3. CloudSecNext Summit & Training 2024 CLOUDSECNEXT SUMMIT & TRAINING 2024 Sheraton Denver Downtown Denver, CO, US and Virtual - MT Mon, Sep 30 - Mon, Oct 7, 2024 Summit Agenda Register for Course Register For Summit OverviewSummit AgendaAdvisory BoardSummit OptionsAvailable CoursesCyber RangesBonus SessionsImportant DatesLocation WHAT'S NEXT IN CLOUD SECURITY Summit: Sept 30 - Oct 1 | 13 Courses: Oct 2-7 | Denver, CO & Live Online Summit CPE Credits: 12 Cloud-based services are becoming increasingly more attractive to organizations as they offer flexibility, increased operational efficiency, and improve the time to market products. However, protecting systems, applications, and data in the cloud presents a new set of challenges for organizations to overcome. This two-day Summit covers all aspects of the cloud security side of cybersecurity and will bring together a unique combination of real-world user experiences and case studies, as well as practical, technical training focused on specific approaches and skills for building and maintaining a secure cloud infrastructure. Don't miss this chance to connect with some of the top minds in cloud security. "I found the real-life experiences and lessons-learned to be extremely valuable." - Roger A. Wajda, Secure Cloud LLC CHOOSE YOUR EXPERIENCE: IN-PERSON OR LIVE ONLINE Whether you're planning to dive into the full CloudSecNext experience in Denver, or the free, curated content offered Live Online, you'll walk away with new tools, techniques, and connections that will have a lasting impact on your career. IN-PERSON: ALL ACCESS SUMMIT EXPERIENCE IN DENVER, CO The In-Person Summit includes exclusive access to: * Two Full Days of Highly Technical Content: In-Person attendees get access to all Keynotes, Summit talks, breakout sessions and workshops. CloudSecNext Summit presentations are curated and designed around specific analytical techniques and capabilities, through case studies and firsthand experience, that can be utilized to properly create and maintain cloud security in your organization. We've got several opportunities for incredible interactive learning experiences to transform your skills and take you to the next level. * Exclusive Networking Opportunities with the Top-minds in Cloud Security: You'll have the chance to engage with leading experts, SANS instructors, and your peers in the community. Attendees tell us time and again that one of the greatest takeaways from SANS Summits is the many industry connections they forge or deepen during their time with us. * Night out in Denver, CO at the Museum of Illusions: Experience an event venue that defies the laws of physics and challenges your senses. Enter the fascinating world of illusions where nothing is ever quite as it seems. Visit us at Museum of Illusions Denver and see WOW! Food and drinks will be provided. * Exclusive Access to Interactive Workshops * Access to Exhibit Hall: Meet with cloud security solution and tool providers throughout the Summit and learn how to leverage their products within your organization. * First-Access to Recordings and Presentations: You'll receive exclusive access to approved recordings and presentations post-Summit. * SANS Cloud Security Merchandise and Posters * 2 Full Breakfasts & Lunches, and Breaks with Snacks and Drinks LIVE ONLINE: CURATED TALKS STREAMED FROM DENVER TO YOU * Select talks and content * CloudSecNext Summit Solutions Track | Register Here * Interactive chat on Slack — connect with your Cloud Security community * First access to recordings and presentations WHO SHOULD ATTEND: * Security personnel who are tasked with securing virtualization and private cloud infrastructure * Network and systems administrators who need to understand how to architect, secure and maintain virtualization and cloud technologies * Technical auditors and consultants who need to gain a deeper understanding of cloud computing and security concerns * Security and IT leaders who need to understand the risks of cloud computing and advise business management of the risks and various approaches involved WHAT ATTENDEES SAY "Great way to step back from day-to-day security controls to see the transformational themes our industry is facing. There was a good combination of technical talks with actionable tips for the next 30 days, mixed with themes our org will see over the next 30 days, mixed with themes our org will see over the next 3-5 years." - Will Casey, Optum "Summits are a great way to meet and talk to the trail blazers; the individuals who each in their own way help shine a light for the rest of the community." - Michael Decker, ViaSat, Inc. BUNDLE YOUR SUMMIT EXPERIENCE WITH SANS TRAINING AN IMMERSIVE TRAINING EXPERIENCE — YOUR WAY. JOIN US IN-PERSON AWAY FROM HOME OR OFFICE DISTRACTIONS, OR LIVE ONLINE FROM ANYWHERE In addition to the Summit, world-class SANS courses are being offered to help you expand your information security expertise. SANS instructors are experienced industry practitioners considered to be among the best cybersecurity instructors in the world. They will provide you and your community with the expert guidance and skills you need to stop cyber-attacks against your organizations. Bundle a course with your Summit to maximize your CloudSecNext Summit experience! CloudSecNext Solutions Track Tuesday, October 1 | Free Virtual Event Free Virtual Event | Join SANS cloud expert AJ Yawn and guest speakers for a day full of cloud security solutions, techniques and trends. Register for Free CloudSecNext Summit Solutions Track InterfACE Denver Tuesday, October 1 | 4 – 5:30pm MT Enjoy networking, food, drinks, giveaways, and insightful Cloud Security discussions, all totally free. Learn more and Register SUMMIT AGENDA Summit Chairs: Eric Johnson & Frank Kim | Summit CPE Credits: 12 Mon, September 30 Tue, October 1 Time Description 9:00 am - 9:15 am MT 3:00 pm - 3:15 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar OPENING REMARKS Frank Kim, Fellow, SANS Institute Eric Johnson, Senior Instructor, SANS Institute 9:15 am - 10:00 am MT 3:15 pm - 4:00 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar KEYNOTE: SECURITY JOURNEY AT ELASTIC Mandy Andress, CISO, Elastic Walk with Mandy as she takes you through her journey from her first days of joining Elastic and her continued commitment to creating and maintaining a secure environment through self-defending environments using AI. Show More 10:00 am - 10:15 am MT 4:00 pm - 4:15 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar BREAK 10:15 am - 10:50 am MT 4:15 pm - 4:50 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar WHEN CLOUD ENCRYPTION MATTERS: FROM ANOTHER LAYER OF ACCESS CONTROL TO A FALSE SENSE OF SECURITY Jason Kao, Founder, Fog Security Cloud Encryption is seen as a valuable component of a robust data security strategy. But what does cloud encryption actually offer in terms of security? Cloud Encryption has multiple different types including Cloud Service Provider Managed and Customer Managed. Depending on the type - the security offered can range from another robust layer of access control to a false sense of security. In this talk, we’ll cover the following: - Types of encryption (such as CSP Managed, Customer Managed) - Default encryption for services in cloud. - How cloud encryption impacts data perimeters. - How cloud encryption translates into and impacts cloud identity and access management. - Best practices and considerations for how to implement cloud encryption and data security in cloud. Show More 10:15 am - 10:50 am MT 4:15 pm - 4:50 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar Virtual Track EKS SECURITY SAFARI: HUNTING THREATS IN THE WILD WILD CLOUD Ariel Szarf, Senior Cloud Security Researcher , Mitiga Stav Ochakovski, DevOps Tech Lead, Mitiga Kubernetes is spreading through the world faster than a viral dance challenge on social media. As the K8S ecosystem on the cloud gains more attention and spotlight, hackers actively seek ways to bounce between clusters and clouds, aiming for unauthorized access. Join us to delve deep into the K8S security fundamentals on AWS (EKS) and their logging system. Explore K8S TTPs, K8S to AWS attack vectors and IAM role abuse. Gain a comprehensive understanding of conducting threat hunting on EKS, utilizing AWS and K8S logs to identify threat actors, particularly related to lateral movement and privilege escalation methods within the K8S environment.You’ll come away with practical knowledge about the relevant logs and how to use them to investigate potentials attacks on K8S and EKS. Moreover, you’ll become familiar with mitigation recommendations to prevent future cyber-attacks. Show More 10:15 am - 12:15 pm MT 4:15 pm - 6:15 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar In-Person Only WORKSHOP: A SECURITY RESEARCHER’S VIEW OF GCP Dave Bogle, Principal Threat Researcher, Red Canary In this workshop participants will learn about how GCP is structured and organized. They will learn how IAM works in GCP and how it is utilized to grant users access to various resources. Participants have the option of following along or setting up their own GCP environment and recreating the techniques we are covering in the workshop in their own environment. After this workshop, participants should be able to comfortably navigate the gcloud cli as well as the GCP console. They will also have experience analyzing log events in GCP and identifying relevant data Prerequisites 1. Laptop Required 2. Access to a Google Account - preferably with Google Cloud Platform and gcloud CLI 1. Google Cloud Platform - 90-day, $300 free trial to get you started. 1. If you want to follow along in your own environment, it is recommended that you download about a week beforehand and setup. 2. How to install the gcloud CLI Show More 10:55 am - 11:30 am MT 4:55 pm - 5:30 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar FROM AFT TO ATO, AWS NATIVE FEDRAMP THROUGH TERRAFORM Michael Greenlaw, Co-Founder & Senior Consultant, HanaByte The process of obtaining a FedRAMP ATO in the AWS cloud, often begins with a separation of federal and commercial resources. This separation, or sometimes a move to a new AWS account, is a long and tedious process when starting from zero. We can simplify and automate this process using Terraform with AWS Control Tower via AFT. In this talk we'll look at how Terraform, AFT, and Control tower can be used to create an AWS Native, FedRAMP moderate landing zone. We'll then use the AFT managed pipeline to satisfy a NIST 800-53 control, demonstrating Terraform's FedRAMP automation capabilities. Show More 10:55 am - 11:30 am MT 4:55 pm - 5:30 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar Virtual Track OPEN-SOURCE SERVERLESS CLOUD CERTIFICATE AUTHORITY Paul Schwarzenberger, Cloud Security Engineer, Q-Solution In this talk, we’ll provide details of our recently released open-source project. After a technical overview, you’ll see a hands-on live demonstration of the CA and an example mTLS use case. You’ll learn how you could use this solution for your own applications and systems, to provide a secure and cost-effective certificate authority infrastructure. Documentation: serverlessca.com Blog post: https://medium.com/@paulschwarzenberger/open-source-cloud-certificate-authority-75609439dfe7 Show More 11:35 am - 12:10 pm MT 5:35 pm - 6:10 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar BREAKING COPILOTS FOR FUN AND PROFIT Adir Gruss, Co-Founder and CTO, Aim Security Every organization recognizes the substantial productivity enhancements provided by AI assistants. Microsoft 365 Copilot, GitHub Copilot, and similar tools are prime examples of the benefits derived from using a Retrieval-Augmented Generation (RAG) architecture in enterprise settings. However, these AI solutions are often developed and deployed rapidly by vendors and organizations, which can lead to significant vulnerabilities. In this talk, we will explore the threat model associated with these Copilots, demonstrate their internal mechanics, and discuss real-world examples of vulnerabilities, attack scenarios, and mitigation strategies. Show More 11:35 am - 12:10 pm MT 5:35 pm - 6:10 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar Virtual Track THREAT HUNTING WITH KUSTO - THE QUERY LANGUAGE TO UNCOVERING THE UNKNOWN Mattias Borg , Trusted Cyber Security Advisor, Onevinn AB Stefan Schörling, CTO | Head of MDR , Onevinn AB Join us for an illuminating session on leveraging Kusto, Microsoft's powerful query language, for effective threat hunting. Kusto, offers unparalleled capabilities for analyzing large volumes of data with lightning speed and precision. In this session, we'll dive into the fundamentals of Kusto and explore how it can be used to detect and investigate security threats within your organization's data ecosystem. From crafting complex queries to interpreting query results, attendees will learn practical tips and best practices for harnessing the full potential of Kusto in threat hunting scenarios. Whether you're new to Kusto or seeking to deepen your expertise, this session promises valuable insights to empower you in the ongoing battle against cyber adversaries. Show More 12:10 pm - 1:30 pm MT 6:10 pm - 7:30 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar LUNCH 1:30 pm - 2:05 pm MT 7:30 pm - 8:05 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar LET’S DO DEVOPS: WRITING A NEW TERRAFORM /TOFU AZURERM DATA SOURCE — ALL STEPS! Kyler Middleton, Cloud Security Chick, Veradigm Writing Terraform is so fun, surely writing some functionality for the provider's that underpin Terraform must be easy, right? Let's walk all the way through confirming some functionality that was missing from the AzureRM Provider, to poking around at the provider source code, to writing, testing, and opening a PR to add the functionality we need, and how you can do so too! Show More 1:30 pm - 2:05 pm MT 7:30 pm - 8:05 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar Virtual Track KEEP CALM & HOW TO DEPLOY SAFELY AT BILLION EVENT SCALE Eran Bibi, Co-Founder & Chief Product Officer, Firefly In today's high-scale and high-velocity complex operations, the process and culture are as important as the technology that supports it. In this talk, end-user unicorn AppsFlyer will talk about their journey to building a platform-as-a-product to achieve the velocity, predictability, and self-serve using GitOps to the massive scale their system today requires. We'll look at considerations like building trust into the dev process, correct PR etiquette, codification of resources for agility and automation, and better safety guardrails baked in, all powered by open source and CNCF technology - K8s, flux, Streamzi and OPA. This talk will examine how a real-world high-scale end-user company does this built on an open source and cloud native stack. Show More 1:30 pm - 3:30 pm MT 7:30 pm - 9:30 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar In-Person Only WORKSHOP: PUT DETECTION AND REMEDIATION ENGINEERING TO WORK WITH OPEN SOURCE: A PRACTITIONER PERSPECTIVE Toni de la Fuente, Creator of Prowler and CEO, Prowler Pedro Martin, Cloud Security Engineer , Prowler Whether you are a long time cloud security practitioner or if you are just getting started, this workshop will give you the tools to get cloud security up and running and under control at your organization. With millions of downloads and a large community of users, Prowler is one of the most used tools when it comes to cloud security assessments, hardening, incident response and security posture monitoring.Prowler has some new features and important changes in v4. This includes multi-cloud architecture, python detections and remediations, and a load of new checks for compliance. We will teach how to get the most from Prowler and adapt it to your requirements. Prerequisites - Laptop with the following: 1. Python 3.11 2. pip for Python 3. Git 4. IDE Code editor like VSCode installed in the operating system. 5. Enough credentials for their own AWS, GCP or Azure infrastructure to create users and/or roles. 6. If willing to do the K8s labs, have permissions to create Kubernetes manage service in their cloud or Docker Desktop installed. Show More 2:10 pm - 2:45 pm MT 8:10 pm - 8:45 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar BEST PRACTICES FOR HOW TO MANAGE ALL YOUR ACCESS FROM THE CLOUD: THE NEXT FRONTIER IN YOUR SECURITY JOURNEY Bailey Bercik, Senior Product Manager, Microsoft Jef Kazimer, Principal Product Manager , Microsoft Driving your organization toward least privilege involves more than just monitoring administrative access. Access to business data can be as critical as administrative access to systems, particularly in highly regulated industries. With the rise of AI capabilities - discovery, ransomware, and data leakage and exfiltration are bigger threats than before. In this talk, we'll cover how to define controls and their use cases, as well as how to identify common resources utilized by the business. We'll highlight the parallels between managing administrative systems and business data and provide frameworks for governing privileged user access like privileged admin access. You'll leave with a practical list of go-do's and quick wins to embark on the next phase of your journey toward least privilege. Show More 2:10 pm - 2:45 pm MT 8:10 pm - 8:45 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar Virtual Track THE RED PILL: UNPACKING THE PSYCHO-CYBER IAM KILL CHAIN Ron Nissim, CEO and Co-founder, Entitle It's funny how some of the most common patterns in engineering organizations are essentially anti-patterns when it comes to access control and safety. In this talk, we'll take you down the rabbit hole of bad access control practices we've witnessed firsthand at clients and partners, that you should definitely rethink. This includes everything from shared admin accounts, shared passwords, over-privileged and long-lasting highly privileged accounts.We'll show how these bad practices can ultimately result in significant harm to your organization––everything from the obvious hijacking of accounts, through social engineering tactics and techniques these practices open the doors wide open to, and how with access to sensitive IT systems, you can put your company and client data at serious risk. We'll walk through real live scenarios of adversarial attacks using the most common methods that are still prevalent in the wild––along with a real world HUMINT (AKA social engineering) and PsyOps that are the backbone to psycho-cyber kill chains. We'll provide practical tips for how to prevent these types of attacks both on a human level and technical level. You'll come away with better security hygiene for your organization, and vigilance as the gatekeeper and guardians. Show More 2:50 pm - 3:10 pm MT 8:50 pm - 9:10 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar BREAK 3:10 pm - 3:45 pm MT 9:10 pm - 9:45 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar CONNECTING THE BROKEN LINKS - EXPLORING IDENTITY INTEGRATIONS BETWEEN THE THREE CSPS AND THEIR MANAGED KUBERNETES OFFERINGS Dakota Riley, Principal Security Engineer, Aquia, Inc AWS, Azure, and GCP all offer a managed Kubernetes service. In addition, all three also offer integration with their IAM backbone to allow both authentication into the cluster from a cloud identity, and providing of IAM credentials to workloads on the cluster to allow secure access to the cloud provider APIs. While this is a valuable feature for securing managed Kubernetes clusters without adding additional identity mechanisms, it's yet another feature for Cloud Security teams to understand and secure. This talk will explore the identity integrations between each of the Cloud Providers and their managed Kubernetes flavors, at a code level to dispel any ambiguity on where the Cloud Provider APIs work with the managed clusters to provide authentication. We will explore how access is granted to cloud identities, and what boundaries can be crossed (eg - cross account access, etc), as well as potential abuse cases. For the defender, we will also specifically talk about how these identities tie into cluster logging, and to trace the full range of events even when someone is authenticating into a cluster using their cloud credentials Show More 3:10 pm - 3:45 pm MT 9:10 pm - 9:45 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar Virtual Track WHO POLICES THE POLICIES? PRIVILEGE ESCALATION & PERSISTENCE WITH AZURE POLICY Alexander Mackie, Detection Engineer, Datadog The Microsoft Azure threat matrix contains a mysterious and almost empty item: AZT508 - Azure Policy, which suggests this service can break bad but gives almost no details as to how. To quote Microsoft: “Azure Policy helps to enforce organizational standards and to assess compliance at-scale.“ How does this banal sounding service come to be used for attacking Azure users? This talk aims to fill in the picture. We will explore the Azure Policy service and how it can be used for badness: punching holes in ACLs, creating persistent backdoors on virtual machines, assigning attacker controlled roles to resources, modifying database encryption, etc. I will demo an abuse scenario, and discuss others that can be used for privilege escalation and persistence. I will also discuss a confused deputy attack on this service. Finally, I will share detection and control recommendations. Show More 3:50 pm - 4:25 pm MT 9:50 pm - 10:25 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar THE YIN AND YANG OF GENERATIVE AI IN CYBERSECURITY: OPPORTUNITIES AND CHALLENGES Vaibhav (VB) Malik, Global Partner Solutions Architect, CloudFlare The rapid advancements in Generative AI have opened up a new frontier in cybersecurity, presenting both unprecedented opportunities and daunting challenges. This presentation aims to equip attendees with the critical knowledge and tools needed to navigate the evolving threat landscape shaped by the rise of AI-powered cyber attacks. The session will delve into the dark side of Generative AI, showcasing how malicious actors are weaponizing this technology to create highly sophisticated phishing campaigns, develop advanced malware, and introduce novel attack methods such as LLM supply chain poisoning. Through real-world examples, participants will gain a comprehensive understanding of the emerging risks associated with Generative AI in the context of cybersecurity. However, the presentation will also emphasize the importance of harnessing the potential of Generative AI responsibly to strengthen organizational defenses. Attendees will learn essential security strategies and best practices to fortify their systems against AI-driven threats, as well as techniques to identify and neutralize these evolving attacks proactively. By striking a balance between exploring the dark side of Generative AI and empowering participants to adapt their defenses accordingly, this session aims to foster a more secure and resilient cybersecurity landscape in the face of this transformative technology. Show More 4:30 pm - 4:45 pm MT 10:30 pm - 10:45 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar DAY 1 WRAP-UP Frank Kim, Fellow, SANS Institute Eric Johnson, Senior Instructor, SANS Institute 5:30 pm - 8:30 pm MT 11:30 pm - 2:30 am UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar In-Person Only NIGHT OUT IN DENVER, CO AT THE MUSEUM OF ILLUSIONS Experience an event venue that defies the laws of physics and challenges your senses. Enter the fascinating world of illusions where nothing is ever quite as it seems. Visit us at Museum of Illusions Denver and see WOW! Entry, food and drinks will be provided. Show More Time Description 9:00 am - 9:15 am MT 3:00 pm - 3:15 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar OPENING REMARKS Frank Kim, Fellow, SANS Institute Eric Johnson, Senior Instructor, SANS Institute 9:15 am - 10:00 am MT 3:15 pm - 4:00 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar KEYNOTE PANEL Kevin Tyers, Associate Instructor Frank Kim, Fellow, SANS Institute Casey Essary, Deputy CISO, BILL Eric Johnson, Senior Instructor, SANS Institute 10:00 am - 10:15 am MT 4:00 pm - 4:15 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar BREAK 10:15 am - 10:50 am MT 4:15 pm - 4:50 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar THINKING INSIDE THE BOX: EFFECTIVE DEVSECOPS FOR CONTAINERS Christopher Pope, DevSecOps Manager, ExxonMobil Containers can be a powerful DevOps tool to greatly improve the consistency and scalability of your environment. But how do we establish visibility and security in our containers without excessive overhead? We’ll start with an overview of the security challenges posed by containers, and how those can be magnified if we aren’t doing DevOps right. Next, we’ll go over DevSecOps best practices for harnessing the power of containers - starting with the image itself. We’ll look at how “shifting security left” applies specifically to containers, from the container pipeline itself, to secrets management and protecting your container registry itself. Lastly, we’ll conclude with a simple framework that will help your teams assess your DevSecOps maturity in relation to containers and identify action steps going forward. Show More 10:15 am - 12:10 pm MT 4:15 pm - 6:10 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar In-Person Only WORKSHOP: SECURITY CONFIGURATION MANAGEMENT IN THE CLOUD: POLICY AS CODE FOR CI/CD GATING Thomas Tusia, Principal Security Engineer, Cisco Bola Shosanya, Security Engineer, Cisco Organizations can use defense in depth to enhance their security configuration management capabilities. Adopting defense in depth in this domain produces a mature, multi-layered strategy in which the organization establishes configuration baselines, defines those baselines in code, implements gating during code deployment processes, and monitors the environment for ongoing compliance. In this discussion, we begin by describing the general approach to security configuration management within Cisco. We then dive into the details, exploring Open Policy Agent (OPA) as a tool for gating with policy as code during the Terraform build process. This presentation includes a workshop that shows attendees how to write an OPA policy and use it within GitHub Actions. Prerequisites 1. Github account 2. Git installed locally 3. IDE Code editor like VSCode installed in the operating system. 4. Docker or Podman (optional) Show More 10:55 am - 11:30 am MT 4:55 pm - 5:30 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar CLOUDY WITH A CHANCE OF MEATBALLS: HANDLING THE UNEXPECTED IN CLOUD THREAT DETECTION Lydia Graslie, Threat Detection Engineer, Edward Jones Threat Detection is hard- it requires deep knowledge about the platform you're detecting on, knowledge of how that platform is attacked, and the technical savvy to interpret logs and write code that detects on those attacks. So what do we do in the case of cloud platforms, where the platform and the logs are constantly changing? This presentation will cover lessons learned in cloud threat detection, and present ways to build resiliency into the threat detection engineer's code and mindset. Show More 11:35 am - 12:10 pm MT 5:35 pm - 6:10 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar PROVABLE SECURITY: BUILDING AUTOMATED VALIDATION OF YOUR CLOUD SECURITY CONTROLS David Levitsky, Principal Infrastructure Security Engineer, Roblox Georgios Kapoglis, Senior Detection and Response Engineer, Roblox How well are your security controls working in your cloud environment? Would you know if they had gaps an attacker could exploit? Could you prove it? Cloud service providers ship new features at breakneck speed. Currently, AWS has over 15,000 APIs and 16,000 permissions. At this scale, it can be difficult to define proper security controls for your organization, verify they’re working as intended, and catch regressions or gaps over time. This presentation will discuss different implementations to validate preventive and detective controls in cloud environments. This talk focuses on AWS to provide concrete examples, but the concepts extend to any cloud environment. It will define provable security and explain how to achieve it with a framework that continuously assesses security controls to ensure functionality and find holes. We’ll walk through real-world examples of security controls with unexpected edge cases that cause failure conditions in the control, which can be proactively caught through automation. This presentation will provide examples and tangible guidance on how to automatically verify cloud security controls at scale and identify security gaps before attackers do. Takeaways: Validating security controls is especially important in cloud environments due to the amount of different permissions and service configurations and how quickly they evolve. Doing this manually is not scalable or sustainable and automation must be leveraged. Attendees will learn how to build automation to validate their controls and how to look for edge cases in common security controls. They’ll learn successful strategies, patterns to avoid, and how to handle testing complicated controls - all of which come from real experience in building and managing these systems. Attendees will learn how to validate their cloud security posture against techniques seen by threat actors targeting cloud environments. Show More 12:15 pm - 1:30 pm MT 6:15 pm - 7:30 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar LUNCH 1:30 pm - 2:05 pm MT 7:30 pm - 8:05 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar A NEEDLE IN A HAYSTACK: HOW TO FIND A THREAT HIDDEN IN OVER 6 BILLION LOGS PER DAY Brian Davis, Principal Software Engineer, Red Canary Detecting threats in the cloud is a huge challenge. All cloud platforms offer audit logs of their cloud control planes (e.g., AWS CloudTrail, Google Cloud Platform Audit Logs, Azure Activity Logs) but these generate such a high volume of logs that wading through them to find indications of a threat can be overwhelming. In this talk, I’ll explain how you can create your own detection platform and build custom analytics to search for whatever needle you want to find in the haystack of logs by taking this massive stream of data and breaking it down into manageable chunks using basic cloud building blocks like S3 buckets and SQS queues, or more sophisticated tools like OpenSearch and Kubernetes. Show More 1:30 pm - 3:30 pm MT 7:30 pm - 9:30 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar In-Person Only WORKSHOP: AVOIDING DATA DISASTERS: TECHNIQUES TO IDENTIFY AND ADDRESS CLOUD STORAGE MISCONFIGURATIONS Serge Borso, Certified Instructor It appears that every few months, there's news of yet another cloud breach stemming from a carelessly configured cloud storage solution. While this isn't the default for most cloud vendors, some users still manage to make their cloud data publicly accessible by going out of their way - sometimes to a significant extent. Whether it's out of ignorance or convenience, it doesn't matter - this practice must come to an end. To address this issue, we've developed a workshop that equips attendees with various techniques and methods to identify and rectify cloud storage misconfigurations in their own cloud accounts. We'll even demonstrate some ways to prevent these misconfigurations from happening in the first place. Although the chosen vendor for this workshop is AWS, due to its Simple Storage Service (S3) being the one making headlines, misconfigurations could occur in any cloud environment. Hence, the techniques discussed in this workshop will be applicable to all cloud vendor environments, including Azure, Google Cloud Platform, and Oracle. LEARNING OBJECTIVES: * Discover all-too-common cloud storage security deficiencies present as either insecure vendor defaults or careless mistakes * Correct these issues using a variety of means (e.g., cloud management console, command line tools, and Infrastructure-as-Code) PREREQUISITE KNOWLEDGE: None. SYSTEM REQUIREMENTS: * Laptop with a modern web browser * AWS account with root access or an IAM user with Administrator Access permissions * If you need an AWS account, you can create a free tier account with root access at https://aws.amazon.com/free/. The cost will be minimal (pennies) to complete the workshop This workshop supports both SEC388: Introduction to Cloud Computing and Security and SEC488: Cloud Security Essentials. Show More 2:10 pm - 2:45 pm MT 8:10 pm - 8:45 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar IDENTITY CRISIS: NAVIGATING CLOUD IDENTITY CHALLENGES AND IMPLEMENTING ROBUST SOLUTIONS Iris Yuning Ye, Product Manager, Microsoft In today's rapidly evolving cloud landscape, managing identities effectively is paramount to maintaining a secure and compliant environment. However, as organizations embrace multi-cloud strategies and adopt diverse cloud-native technologies, they often face an "identity crisis" characterized by complex access management, fragmented user identities, and inconsistent authentication mechanisms. This presentation delves into the heart of cloud identity challenges, offering insights gleaned from real-world implementations and hard-won lessons. Drawing from experiences across various industries, we'll explore the common pitfalls and stumbling blocks encountered when navigating cloud identity, including: Fragmented Identity Landscapes: Understanding the complexities of managing identities across multiple cloud providers, SaaS applications, and on-premises systems. Authentication Dilemmas: Balancing usability and security in authentication methods, including single sign-on (SSO), multi-factor authentication (MFA), and biometric authentication. Authorization Conundrums: Tackling the nuances of fine-grained access control and permissions management in cloud environments, including role-based access control (RBAC) and attribute-based access control (ABAC). Identity Federation Challenges: Overcoming interoperability hurdles and establishing trust between identity providers in federated identity scenarios. Having navigated through these challenges firsthand, we'll share practical strategies and best practices for implementing robust identity solutions in the cloud. From establishing a cohesive identity governance framework to leveraging identity as a security perimeter, attendees will gain actionable insights to strengthen their organization's identity posture and mitigate security risks. Key Takeaways: Gain a deeper understanding of the unique identity challenges inherent in cloud environments. Learn from real-world case studies and best practices for overcoming cloud identity obstacles. Discover strategies for implementing robust and scalable identity solutions across multi-cloud architectures. Acquire actionable insights to enhance identity governance and strengthen security posture in the cloud. Show More 2:50 pm - 3:10 pm MT 8:50 pm - 9:10 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar BREAK 3:10 pm - 3:45 pm MT 9:10 pm - 9:45 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar FLOOD THE ZONE WITH FAKES: CATCHING ADVERSARIES WITH AI-GENERATED CLOUD DECEPTION ENVIRONMENTS Jonathan Looi, Security Engineer, Google Cyber deception enables defenders to impose costs on threat actors, better understand adversary TTPs, and provide high-fidelity detection. Yet, most enterprises don’t deploy deception environments due to the complexity and upfront costs of designing and deploying realistic, high-interaction honeypots. Drawing from real-world experience as a Security Engineer specializing in Threat Intelligence at Google, Jonathan will discuss how to catch hackers in the act with deception as well as how GenAI can be used to lower the barrier of entry for creating realistic cloud deception environments. This talk will cover lessons learned at Google Cloud and help make deception more approachable for enterprises of all sizes. Cybersecurity professionals will learn why deception environments are valuable, how to design a realistic environment, and common pitfalls to avoid. Show More 3:50 pm - 4:00 pm MT 9:50 pm - 10:00 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar CLOSING REMARKS Frank Kim, Fellow, SANS Institute Eric Johnson, Senior Instructor, SANS Institute 4:00 pm - 5:30 pm MT 10:00 pm - 11:30 pm UTC Add to Calendar Add to Calendar Google Calendar iCal Calendar Outlook Calendar In-Person Only INTERFACE AFTER-PARTY SANS Cloud Security Alum community event - The SANS Cloud Security team wants to meet you face-to-face and give you an opportunity to meet other SANS Cloud Aces! Show More SUMMIT OPTIONS Those choosing to attend in Denver will have full access to the Summit, which includes access to ALL talks and content, hands-on workshops, candid discussions with leading experts, SANS instructors, and your peers in the community, an evening social event, and so much more. Live Online Summit attendees will have access to select talks and content, and the event Slack workspace. CLOUDSECNEXT SUMMIT & TRAINING 2024 LIVE ONLINE FREE Register for Live Online Summit CLOUDSECNEXT SUMMIT & TRAINING 2024 IN PERSON *Prices exclude applicable local taxes $425 USD FREE when added to your 4-6 day course purchase Summit attendance requires registration Register for In Person Summit Course List (11) Focus Areas All * All * Cloud Security * Cybersecurity Leadership * Cybersecurity and IT Essentials * Offensive Operations, Pen Testing, and Red Teaming * SEC504: Hacker Tools, Techniques, and Incident Handling GCIH: GIAC Certified Incident Handler $8,525 USD GCIH Certification +$979 OnDemand Bundle +$979 *Prices exclude applicable local taxes View Syllabus In Person Kevin Tyers Starts 2 Oct 2024 at 8:30 AM MT (6 days) Register for In Person Live Online Kevin Tyers Starts 2 Oct 2024 at 8:30 AM MT (6 days) Register for Live Online * SEC488: Cloud Security Essentials GCLD: GIAC Cloud Security Essentials $8,525 USD GCLD Certification +$979 OnDemand Bundle +$979 *Prices exclude applicable local taxes View Syllabus In Person Kenneth G. Hartman Starts 2 Oct 2024 at 8:30 AM MT (6 days) Register for In Person Live Online Kenneth G. Hartman Starts 2 Oct 2024 at 8:30 AM MT (6 days) Register for Live Online * LDR512: Security Leadership Essentials for Managers GSLC: GIAC Security Leadership $8,020 USD GSLC Certification +$979 OnDemand Bundle +$949 *Prices exclude applicable local taxes View Syllabus In Person Frank Kim Starts 2 Oct 2024 at 8:30 AM MT (5 days) Register for In Person Live Online Frank Kim Starts 2 Oct 2024 at 8:30 AM MT (5 days) Register for Live Online * Major Update SEC541: Cloud Security Threat Detection GCTD: GIAC Cloud Threat Detection $8,020 USD GCTD Certification +$979 OnDemand Bundle +$979 *Prices exclude applicable local taxes View Syllabus In Person Ryan Thompson Starts 2 Oct 2024 at 8:30 AM MT (5 days) Register for In Person Live Online Ryan Thompson Starts 2 Oct 2024 at 8:30 AM MT (5 days) Register for Live Online * SEC588: Cloud Penetration Testing GCPN: GIAC Cloud Penetration Tester $8,525 USD GCPN Certification +$979 OnDemand Bundle +$979 *Prices exclude applicable local taxes View Syllabus In Person Aaron Cure Starts 2 Oct 2024 at 8:30 AM MT (6 days) Register for In Person Live Online Aaron Cure Starts 2 Oct 2024 at 8:30 AM MT (6 days) Register for Live Online * SEC522: Application Security: Securing Web Applications, APIs, and Microservices GWEB: GIAC Certified Web Application Defender $8,525 USD GWEB Certification +$979 OnDemand Bundle +$979 *Prices exclude applicable local taxes View Syllabus In Person Joshua Barone Starts 2 Oct 2024 at 8:30 AM MT (6 days) Register for In Person Live Online Joshua Barone Starts 2 Oct 2024 at 8:30 AM MT (6 days) Register for Live Online * Major Update SEC549: Cloud Security Architecture $8,020 USD OnDemand Bundle +$979 *Prices exclude applicable local taxes View Syllabus In Person David Hazar Starts 2 Oct 2024 at 8:30 AM MT (5 days) Register for In Person Live Online David Hazar Starts 2 Oct 2024 at 8:30 AM MT (5 days) Register for Live Online * LDR516: Building and Leading Vulnerability Management Programs $8,020 USD OnDemand Bundle +$979 *Prices exclude applicable local taxes View Syllabus In Person Jonathan Risto Starts 2 Oct 2024 at 8:30 AM MT (5 days) Register for In Person Live Online Jonathan Risto Starts 2 Oct 2024 at 8:30 AM MT (5 days) Register for Live Online * Major Update SEC510: Cloud Security Controls and Mitigations GPCS: GIAC Public Cloud Security $8,525 USD GPCS Certification +$979 OnDemand Bundle +$979 *Prices exclude applicable local taxes View Syllabus In Person Brandon Evans Starts 2 Oct 2024 at 8:30 AM MT (5 days) Register for In Person Live Online Brandon Evans Starts 2 Oct 2024 at 8:30 AM MT (5 days) Register for Live Online * SEC388: Introduction to Cloud Computing and Security $3,405 USD OnDemand Bundle +$380 *Prices exclude applicable local taxes View Syllabus Live Online Serge Borso Starts 2 Oct 2024 at 8:30 AM MT (3 days) Register for Live Online * New SEC598: Security Automation for Offense, Defense, and Cloud $8,525 USD OnDemand Bundle +$979 *Prices exclude applicable local taxes View Syllabus In Person Jason Ostrom Starts 2 Oct 2024 at 8:30 AM MT (6 days) Register for In Person Live Online Jason Ostrom Starts 2 Oct 2024 at 8:30 AM MT (6 days) Register for Live Online Thank You to Our Sponsors IMPORTANT DATES Refund Date Hotel Group Discount Deadline September 13, 2024 September 9, 2024 LOCATION SHERATON DENVER DOWNTOWN HOTEL 1550 Court Place Denver, CO 80202 Phone: 303-893-3333 Sheraton Denver Downtown Hotel Join us at Sheraton Denver Downtown Hotel after the $80M transformation. This family hotel on 16th Street Mall offers access to some of the best attractions in Denver, Colorado. The mile-long pedestrian promenade brims with shopping, dining and entertainment. Explore effortlessly thanks to the nearby light rail station, which takes you to Coors Field, Denver Zoo or Denver Art Museum. Recharge after a full day in the heated rooftop pool, 5,000-square-foot Sheraton Fitness center or on-site dining at Yard House and BEZEL. This four-star hotel maximizes your time from a lobby with town-square energy to on-site business services. Work smart from a pet-friendly hotel room with free Wi-Fi and a height-adjustable desk with an ergonomic chair. HOTEL SPECIAL RATES AND RESERVATIONS A special discounted rate of $249.00 S/D plus applicable taxes will be honored based on space availability. A limited number of Government Per Diem rooms at the prevailing rate are available with proper ID. These rates include Internet in your room and are only available through Monday, September 9th, 2024. To make a regular reservation, please visit the link below and select “Attendee.” To make a government per diem reservation, please visit the link below and select “I have an access code.” Access Code: SANSGOV To make a reservation, please visit this link. Top 3 reasons to stay at the Sheraton Denver Downtown Hotel 1. No need to factor in daily cab fees and the time associated with travel to alternate hotels. Everything is in one convenient location! 2. By staying at the Sheraton Denver Downtown Hotel, you gain the opportunity to further network with your industry peers and remain in the center of the activity surrounding the conference. 3. SANS schedules additional networking events at the Sheraton Denver Downtown Hotel that you won't want to miss! TRAVEL ARRANGEMENTS AND DIRECTIONS A 50% discounted self-parking rate of per day and night with in and out privileges plus applicable taxes for attendees is available. Please visit the hotel’s website or contact them directly at 303-893-3333 for prevailing parking rates that are subject to change prior to the official meeting dates. From Denver International Airport (DEN): Approximately 25.7 miles. Google Maps EXPERIENCE DENVER 3 Quick Facts about Denver 1. Denver International Airport is the largest in the country. Going strictly by land area, it covers 33,531 acres, or 53 square miles. 2. The first permanent building in Denver was a saloon. The saloon wasn’t just for drinking, in a foreshadowing of Denver’s love of the performing arts, a performance of Macbeth was staged at the saloon in the early days. 3. Denver has a thriving arts scene. The Denver metropolitan area collects more money per capita for the arts than any other city. Recommended Web Links http://www.denver.org/ Share: TwitterLinkedInFacebook Copy url Url was copied to clipboard * Register to Learn * Courses * Certifications * Degree Programs * Cyber Ranges * Job Tools * Security Policy Project * Posters & Cheat Sheets * White Papers * Focus Areas * Cyber Defense * Cloud Security * Cybersecurity Leadership * Digital Forensics * Industrial Control Systems * Offensive Operations Subscribe to SANS Newsletters Receive curated news, vulnerabilities, & security awareness tips United States Canada United Kingdom Spain Belgium Denmark Norway Netherlands Australia India Japan Singapore Afghanistan Aland Islands Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua and Barbuda Argentina Armenia Aruba Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belize Benin Bermuda Bhutan Bolivia Bonaire, Sint Eustatius, and Saba Bosnia And Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Territory Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo Cook Islands Costa Rica Cote D'ivoire Croatia (Local Name: Hrvatska) Curacao Cyprus Czech Republic Democratic Republic of the Congo Djibouti Dominica Dominican Republic East Timor Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Eswatini Ethiopia Falkland Islands (Malvinas) Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Territories Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guernsey Guinea Guinea-Bissau Guyana Haiti Heard And McDonald Islands Honduras Hong Kong Hungary Iceland Indonesia Iraq Ireland Isle of Man Israel Italy Jamaica Jersey Jordan Kazakhstan Kenya Kiribati Korea, Republic Of Kosovo Kuwait Kyrgyzstan Lao People's Democratic Republic Latvia Lebanon Lesotho Liberia Liechtenstein Lithuania Luxembourg Macau Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia, Federated States Of Moldova, Republic Of Monaco Mongolia Montenegro Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island North Macedonia Northern Mariana Islands Oman Pakistan Palau Palestine Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Reunion Romania Russian Federation Rwanda Saint Bartholemy Saint Kitts And Nevis Saint Lucia Saint Martin Saint Vincent And The Grenadines Samoa San Marino Sao Tome And Principe Saudi Arabia Senegal Serbia Seychelles Sierra Leone Sint Maarten Slovakia Slovenia Solomon Islands South Africa South Georgia and the South Sandwich Islands South Sudan Sri Lanka St. Helena St. Pierre And Miquelon Suriname Svalbard And Jan Mayen Islands Sweden Switzerland Taiwan Tajikistan Tanzania Thailand Togo Tokelau Tonga Trinidad And Tobago Tunisia Turkey Turkmenistan Turks And Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United States Minor Outlying Islands Uruguay Uzbekistan Vanuatu Vatican City Venezuela Vietnam Virgin Islands (British) Virgin Islands (U.S.) Wallis And Futuna Islands Western Sahara Yemen Zambia Zimbabwe By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy. * SANS NewsBites * @Risk: Security Alert * OUCH! Security Awareness This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. * © 2024 SANS® Institute * Privacy Policy * Terms and Conditions * Do Not Sell/Share My Personal Information * Contact * Careers * Twitter * Facebook * Youtube * LinkedIn X $H2 $hl X SANS Institute uses cookies to customize our site and offer tailored advertising. View Cookie Policy Set Your Cookie Preferences Accept All Cookies and Close