1、FROM NGO TO CYBER:THE PSYCHOLOGY OF DOING MORE WITH LESSAnna PiecztkowskaBy:MattyBenYazidJackieVolunteering for International Professionals(VIP)Fellowship Programme$2,000Art entrepreneurshipMovieSong。
2、Zero Trust AI in Ransomware Defense:Reinventing Risk ManagementPresented by Jessica DapeloZero Trust AI in Ransomware Defense:Reinventing Risk Management by Jessica Dapelo“This isnt just about firewa。
3、Asset Management or:How I learned to stop kicking the can down the roadPresented by:Nikolas Upanavage,P.E.EPC Perspective2Engineering Requirements Identification Design DrawingsProcurement Specificat。
4、 Quantum computing is based on quantum mechanics and harnesses its principles to process information in ways that are fundamentally different from classical computing.While quantum physics is the bro。
5、May 20251PwC Threat IntelligenceBreaking Bad Actors:Transforming Threat Intelligence into RaaS ResilienceIntroductionsTina MacaireStrategic Crime LeadPwCTina is a Senior Associate on PwCsGlobal Threa。
6、DESIGNING CULTURALLY RELEVANT SECURITY AWARENESS CAMPAIGNS2025 SANS Security Awareness ConferenceAngel N.JordanMake Security Awareness CampaignsThat Actually L.A.N.D.Connect with me on LinkedIn-Angel。
7、Developing an ICS/OT Disaster Recovery StrategyWorkshopMike Hoffman&Saltanat MashirovaWHO ARE WE?Saltanat Mashirova Product Manager Lead(ICS/OT Cybersecurity)Honeywell Member of the Operational T。
8、 2025 THE MITRE CORPORATION.ALL RIGHTS RESERVED.Approved for Public Release;Distribution Unlimited.Public Release Case Number 25-2837Ambiguous Techniques:Determining Malice Through ContextSANS Hack a。
9、Simplifying The Threat Surface from a Hackers PerspectiveDan McInerney,Threat Researcher,Protect AIGenerative AITHE PLATFORM FOR AI AND ML SECURITY|PROTECT AI RESTRICTED|DO NOT DISTRIBUTEAttack Surfa。
10、The art of concealment:How cybercriminals are becoming and remaining anonymousImage byHansuan Fabregas on PixabayConcealmentis theact of hidingsomething3The roleof concealmentwithrespect tocybercrime。
11、Going Technical,Against All Odds:from Digital Communications to Reverse Engineering MalwareAlex PerottiPwC Threat IntelligenceSANS New2Cyber Summit 2025TLP:WHITE GameplanFinding your whyNo matter wha。
12、Handle with Care:The Fragile Reality of Cloud Emergency AccessSimon VernonSANS Head or R&D EMEASANS Principal Technical Architect RangesCloud Security ArchitectvCISOFounderRoot and Emergency Acce。
13、Anatomy of a Cyber AttackJon MannSenior Security EngineerCISSP,GDSA,GSEC,GSTRT,GCIH,ITIL Kill Chain-Steps an adversary typically takes to penetrate a system and achieve their objectives.-Obstructing 。
14、Emerging Regulations and Their Impact on Critical Infrastructurejdchristopher/in/jdchristopherJASON D.CHRISTOPHERVP of Cybersecurity&Digital TransformationResearch,innovation,and commercializatio。
15、High-Fidelity Threat Hunting:Unveiling Insider Threats Beyond the Logs.The Dual-Identity Evasion TechniqueOscar CrcamoCybersecurity Sr ConsultantC:whoamiCybersecurity Sr Consultant at a Canadian firm。
16、 2025 Palo Alto Networks,Inc.All rights reserved.Proprietary and confidential information.2025 Palo Alto Networks,Inc.All rights reserved.Proprietary and confidential information.Defending AgainstJav。
17、/SOFTWARE IMPROVEMENT GROUP/SOFTWARE IMPROVEMENT GROUPAI securitymade easyRob van der VeerSANS AI CYBERSECURITY SUMMIT APRIL 1ST2025/SOFTWARE IMPROVEMENT GROUPResponsibleTrustworthyAI writes secure c。
18、Investigating a malicious script in Microsoft Intune:A DFIR case studySANS DFIR Summit 20252 2025 KPMG LLP,a Delaware limited liability partnership and a member firm of the KPMG global organization o。
19、Securing the Grid:AIs Promise for Cyber Resilience in Power SystemsRichard MacwanManager,Cyber Resilience Science Group03/31/2025NREL|2NREL|2Power Grids:The Backbone of AI and SocietyUS electricity c。
20、Building a Cybersmart Culture through AmbassadorshipA Grassroots EffortHeather ReedSecurity&Compliance Manager,NPPC North America18 Years with Nestle 5 years IT Security&Compliance Leadership。
21、B e y o n d C l i c k R a t e sU s i n g H o l i s ti c Me t r i c s t o D r i v e S e c ur i t y A w a r e n e s s S uc c e s sSarah Kate ThomasDirector of Information Security,The New York TimesA g。
22、Training a TAIGR to Protect Our Power2025Andrew BochmanGrid Strategist&Infrastructure DefenderIntroductionNot this jury.The Alignment ProblemSo what became of these?AlignmentAI SafetyGuardrails?R。
23、CybersecuritySustaining Your ICS Cyber ProgramGaining Support,Communicating Risk,and Ensuring Long-Term Success Blake GilsonUpstream Oil&GasManufacturingMidstreamPipelineFuels/TerminalsLube OpsUn。
24、Adriana Kemper Sr.Manager,Strategic Talent Initiatives Shannon LittellSr.Manager Cybersecurity Communications 1Hacking the Career Board:Selecting and Training the Next Generation of Cybersecurity Pro。
25、Securing Identities in Complex ICS EnvironmentsStephen MathezerOverview5 Critical Controls1.Overview of Identity in OT3.Centralized Identity5.Remote Access7.App.Identity Example9.Zero Trust2.Complian。
26、 2025 Stroz Friedberg LLC.All rights reserved.Proprietary.Do not share,copy or use without the express permission of Stroz Friedberg,LLC.Ensuring Data Integrity in Incident Response:Tools and Techniq。
27、Watching the Watchers Watching the Watchers Safeguards and Security for Artificial Safeguards and Security for Artificial Intelligence systemsIntelligence systemsEoin Wickens-Director of Threat Intel。
28、Diana Vicezar/in/dianavicezarNavigating AI in CybersecurityNew2Cyber 2025What Makes AI Powerful in Cybersecurity?Process massive amounts of dataDetect anomaliesAutomate tasksHow Malicious Actors Use 。
29、NEGATING THE NOISEPrioritize Your Cybersecurity Information ConsumptionMarch 13,2025Kirk CarterkirkedcarterWHOAMI-Husband,Dad-Senior Cybersecurity InstructorUS Army Cyber School-Cybersecurity Consult。
30、Go jump in a lakeHow a data lake can help your security programBrian DavisPrincipal Software EngineerWho am I?Member of the Red Canary Architecture teamIve been building complex distributed systems f。
31、The SOC Of the Future(The Future Is Now)Carson ZimmermanSANS Hack&Defend 2025About MeWorked in Security Operations for 20 years SOC Architect/SOC Nerd Microsoft All the SOC personas before that C。
32、A Day in the Life of a Network Security EngineerSanjay Poddar,Advanced Services Engineer,FortinetSANS New2Cyber Summit 2025What is Network Security Engineering?Network SecurityRole in protecting Cybe。
33、How we built a security scorecard that drives accountability without fearTransparency over secrecy August 2025Information Security Senior Program Manager Gina AndrewsRocket team member since 2021,spe。
34、Fashion Forward,Security First:Supporting Gen AI at ScaleFlorence MottayCISO ZalandoStand up if youve worked on an AI system Remain standingif youve ever worked on a red team or security assessment.S。
35、Workshop:Paul Piotrowski and Mike HoffmanWorkshop:Paul Piotrowski and Mike HoffmanDOING FAT/SAT RIGHT IN ICS/OT PROJECTSWHO ARE WE?Paul PiotrowskiSANS Certified Instructor,ICS410 Principal OT Cyber S。
36、22 OCTOBER 2025CRISIS COMMUNICATIONS IN A CYBER EMERGENCY Brunswick Group NICOLA HUDSONPartner,Global Co-lead of Cybersecurity,Data&Privacy LondonCYBER INCIDENTS:A BRIEF HISTORY13 Brunswick Group。
37、Snakes on a(Control)Plane:Purple-Teaming Azure IAM for Threat DetectionLYDIA GRASLIE THREAT DETECTION ENGINEEREDWARD JONESAbout MeThreat Detection Engineer at Edward JonesTA for SANS SEC 541 Former E。
38、Believing in YourselfTo Lead Your TeamKristy WestphalSANS Cybersecurity Leadership SummitWhere are we going today?Who am I?Why am I here?The room with no lightsWhats in it for you?What next?Who am I?。
39、OverviewWho are we?Why are we discussing Cloud connectivity in OT?The SANS 2024 ICS/OT Cybersecurity Survey indicates cloud-based ICS/OT solutions saw a+15%increase in adoption,especially in non-regu。
40、DEEPFAKE DIARIES:The latest AI-based attacks and how to help your employees detect them1.HEALTH FRAUDABC News Australia1.HEALTH FRAUDThe Kelly Clarkson ShowREAL1.HEALTH FRAUDABC News AustraliaREAL2.I。
41、How I Learned to Stop Worrying and Love Vibe CodingSecurity Edition Im Jon Zeolla Founder,SANS Instructor SEC540(Cloud Native),SEC545(GenAI)Open Source(CNCF,ASF,OpenSSF,)Conference Organizer Pittsbur。
42、aws sts get-caller-identityDakota RileySANS Instructor SEC540Staff Security Engineer LiveRampBuilder and BreakerHome:Northern KentuckySupply Chain and CI attacksNPM/NodeJSEstimated 37k+malicious pack。
43、Building an AI Pen-testing AssistantTool ObjectivesHave a conversational-guide style(so a chatbot)Have knowledge of CVEs and other vulnerability databasesHave knowledge of common pen-test tools(nmap,。
44、Classification:InternalNavigating the EU Regulatory LandscapeApril 2025ww w.n vi s o.e uMaxim Deweerdt,Principal SANS Instructor and NVISO Senior ManagerPieter Batsleer,NVISO Senior ManagerClassifica。
45、Thugs and Thieves:Ciaran MartinDirector,SANS CISO Network&former head of UK NCSCSANS CYBER LEADERS SUMMIT22 October 2025Lessons for Leaders From A Difficult YearThugs and Thieves:Ciaran MartinDir。
46、CYBERSECURITY OF OT/SCADA SYSTEMSTO PATCH OR NOT TO PATCH OT SYSTEMS-DAILY DILEMMAS IN RISK MANAGEMENT AND PLANT BUSINESS CONTINUITY1234567Vulnerability Identification in the OT/SCADA systems and sec。
47、4n6pi An Open-Source Forensic Disk Imager Egon Lampert Senior Incident Responder at Redguard,Switzerland 8 Years in DFIR automate all the thingsWhoami2 Forensic Investigation on decommissioned hardwa。
48、CONTEXT IS ALL U NEEDFinding Relevant Events Logs&Alerts+11,000 Alerts/DayRECEIVED BY SECURITY TEAMS(FORRESTER)ON AVERAGEONLY 9%OF ATTACKS GENERATE ALERTS(MANDIANT)ATTACKS ARE SO STEALTHY287 Days。