SANS Institute | LinkedIn

Pasar al contenido principal
Foto de portada de SANS Institute
SANS Institute SANS Institute

Seguridad de redes y sistemas informáticos

Rockville, Maryland 357.426 seguidores

SANS is the most trusted resource for information security training, cyber security certifications and research.

Ver empleos Seguir
  • Ver los 1693 empleados

  • Denunciar esta empresa

Sobre nosotros

SANS is the most trusted and by far the largest source for information and cybersecurity training and certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - Internet Storm Center.

Sitio web http://www.sans.org/

Enlace externo para SANS Institute

Sector Seguridad de redes y sistemas informáticos Tamaño de la empresa De 201 a 500 empleados Sede Rockville, Maryland Tipo De financiación privada Fundación 1989 Especialidades Information Security Training, Digital Forensics Courses, Cyber Security Training, Security Awareness Training, Penetration Testing Courses, Application Security Courses, Security Leadership Courses, Industrial Control Systems Security Courses, cloud security courses, blue team operations courses, cyber security certifications, security awareness training, cyber security white papers, cyber security webcasts y cyber security policies

Ubicaciones

  • Principal

    11200 Rockville Pike

    Suite 200

    Rockville, Maryland 20852, US

    Cómo llegar

Empleados en SANS Institute

  • Haz clic aquí para ver el perfil de Lenny Zeltser

    Lenny Zeltser

  • Haz clic aquí para ver el perfil de Jeremy Rabson

    Jeremy Rabson

  • Haz clic aquí para ver el perfil de John Nix

    John Nix

  • Haz clic aquí para ver el perfil de Xavier Mertens 🇧🇪

    Xavier Mertens 🇧🇪

Ver todos los empleados

Actualizaciones

  • SANS Institute ha compartido esto

    Ver el perfil de Anthony Switzer Anthony Switzer 5 días
    • Denunciar esta publicación

    Being in the room at the SANS Difference Maker Awards was a reminder of how much this field has been shaped by people most never hear about. I was surrounded by people who have quietly shaped this field for decades, it was humbling. These are not headline chasers. They are builders, teachers, and problem solvers who pulled the discipline forward when most of the world was not paying attention. Watching the video and hearing Dan Kaminsky’s mother speak was especially powerful. It was a reminder that behind the research papers, scripts, and disclosures are real people and real families. Dan’s work touched the internet itself, yet many in cybersecurity today may not fully realize how foundational his contributions were. There are countless individuals like this in our field. People deep in the work. Finding hard problems. Solving them before most ever know they existed. Their impact is not measured in titles or awards, but in the things that keep working, keep running, and keep people safe. Events like this matter because they remind us why the work matters and who we stand on the shoulders of. Thank you to SANS Institute for creating the space to recognize that.

    Ver el perfil de Rob T. Lee Rob T. Lee 1 semana

    “The Lifetime Achievement Award isn’t about what you achieve in your lifetime. That’s part of it. It’s about how many people you influence and bring in and then take it further.” - Mudge Zatko It was our honor to present the Lifetime Achievement Award to Dan Kaminsky at this year's Difference Makers. Thank you to Dan's mother, Trudy Maurer who traveled to D.C. to accept the award on Dan's behalf, to Randy Howell, Mudge Zatko, Jeff Moss, Paul Vixie, 😷 Adam Shostack, 👑 Kymberlee Price, Derek Hinch, Gadi Evron, Brian Markus, MBA, CISSP, Todd Jarvis, Michael Tiffany, Lena Smart, Jonathan Leitschuh, Kyle Moses, and those who did the work to put videos of Dan on YouTube so the next generation of ethical hackers can learn from him, including DEF CON, BlackHat, Duo Security, r00tz, Information Security Media Group (ISMG). SANS Institute

    Recomendar Comentar Compartir
  • SANS Institute ha compartido esto

    Ver el perfil de Joseph D. L. Joseph D. L. 4 días
    • Denunciar esta publicación

    I had the chance to facilitate SANS ICS 613 OT Penetration Testing & Assessments at SANS Institute Cyber Defense initiative in D.C. The class was led by Don C. Weber & Tyler Webb and even had special appearances by Jason Dely . Holding true to the SANS promise it was a great class full of ready for the field tidbits that could easily be used in the industry the moment you return to work. Both instructors had an obvious passion for the subjects they taught and were eager to answer questions at every turn. While in attendance I was able to pick the brain of Gharun Lacy and snag a picture for the gEEk in me. I also found time to play a bit in the Netwars! I am going to have to make my way to ICS summit so I can have a bit more of an edge on the competition! KPMG somehow ended up as the lead cup sleeve provider and I appreciate their efforts to keep my hands safe from harm. Hard to pentest if your hands are out of commission. Georgia Institute of Technology was represented well as I met 3 other #RamblinWrecks who are currently in the Masters of cybersecurity program on the cyber physical systems track. Thank you to SANS for an opportunity to participate in the work study program and facilitate at a great event. Thank you to Aleta Technologies, Inc. for giving me a chance to pursue the opportunity. Great way to close out the year! I look forward to what 2026 will bring! #ICSSECURITY #OTCyber #SANS

    • No hay descripción de texto alternativo para esta imagen
    • No hay descripción de texto alternativo para esta imagen
    • No hay descripción de texto alternativo para esta imagen
    Recomendar Comentar Compartir
  • SANS Institute ha compartido esto

    Ver el perfil de Steven T. Steven T. 4 días Editado
    • Denunciar esta publicación

    Before the year’s fully over, here's my 2025 in review: 🏆 2025 brought two moments I genuinely didn't expect; receiving the SANS Difference Makers Award for Practitioner of the Year (Cyber Defence), and being named in Computing’s Top 100 IT Leaders. Grateful. Humbled. Still processing both. But awards aren't the story. They're the byproduct. Here's what actually filled the year: 🔹 A deep DFIR content series; Windows, Linux, macOS, cloud forensics 🔹 Practical thinking on AI in SecOps (agentic workflows, cognitive debt, Jevon's Paradox) 🔹 Growing our SOC and CTI teams across UK and US 🔹 Volunteering and mentoring; UK Cyber Security Council, Infosecurity Europe advisory board, Royal Holloway, University of London MSc mentorship 🔹 Earning Chartered Cyber Security Professional (Secure Operations) 🧠 The DFIR Series I spent months writing deep-dives on forensic artifacts that save investigations when logs are wiped or tampered. SRUM → user attribution and covert network visibility when everything else is gone https://lnkd.in/ehPRtUaw RDP forensics → secondary event channels when Security logs don't tell the whole story https://lnkd.in/eesQWpCF Linux → ephemeral artifacts that speak loudest if you capture them fast https://lnkd.in/eMFhANQC macOS → Unified Logs, KnowledgeC.db, and how we caught a 6-minute exfil attempt https://lnkd.in/e5zyP9iN If you're building DFIR capability, these are yours to use. 🤖 On AI in SecOps I explored agentic AI workflows this year, AI assisting detection engineering and triage, not replacing human judgement. The caution? Jevon's Paradox. Making things faster can increase demand, not reduce analyst burnout. The goal isn't more alerts triaged faster. It's better signal, less noise, sustainable MTTR. Start by embedding AI into your engineering layer. Don't skip the human in the loop. 👥 People First People are the strongest part of any cyber defence. We expanded our SOC and CTI teams this year. I took on mentoring MSc students at Royal Holloway, assessor work with The Cyber Scheme, joined the Infosecurity Europe advisory board, and began volunteering with the UK Cyber Security Council on professional standards. If you're building a career in this field or hiring with mentorship in mind, let's connect. 🙏 Thank You To SANS Institute for the recognition. To the UK Cyber Security Council and The Cyber Scheme. To my team, the work is always collective. And to everyone who engaged with the DFIR series: you guys rock. Ready to keep making a difference. Opinions are my own and do not represent my employer. #DFIR #SecOps #CyberSecurity #ThreatHunting #DetectionEngineering #CyberResilience #LinkedInRewind #Coauthor #2025wrapped #SANSDMA #CTI #SOC #Chartered #Mentor #Volunteering #TopOnePercent

    • No hay descripción de texto alternativo para esta imagen
    2 comentarios Recomendar Comentar Compartir
  • SANS Institute ha compartido esto

    Ver la página de empresa de Huntress Huntress

    117.397 seguidores

    3 días
    • Denunciar esta publicación

    She hunts. She responds. She wrecks hackers. Huge congrats to Anna P., winner of the 2025 SANS Institute Difference Maker Award, Practitioner of the Year - Cyber Defender She earned it. We’re just here to brag about her.

    Ver el perfil de Anna P. Anna P.

    Threat Hunter | Malware Addict | Blue Team Content Developer | RSAC Speaker

    3 días

    Just received this in the mail today! 😍 The best present for Christmas. Thank you, Rob T. Lee and SANS Institute! 💙

    • No hay descripción de texto alternativo para esta imagen
    5 comentarios Recomendar Comentar Compartir
  • SANS Institute ha compartido esto

    Ver el perfil de Anna P. Anna P. 3 días
    • Denunciar esta publicación

    Just received this in the mail today! 😍 The best present for Christmas. Thank you, Rob T. Lee and SANS Institute! 💙

    • No hay descripción de texto alternativo para esta imagen
    17 comentarios Recomendar Comentar Compartir
  • SANS Institute ha compartido esto

    Ver el perfil de Rob T. Lee Rob T. Lee 4 días
    • Denunciar esta publicación

    Amazing way to end the year, to share this conversation with Zapier CEO Wade Foster on a top AI security question that every business is struggling with right now: shadow AI. Wade is on the front lines of AI transformation. Zapier used to be known just as that company that made tools talk to each other. Now, they are positioned as an enterprise AI orchestration layer. We talked about how shadow AI isn’t the edge case anymore, rather, it's all of our default. The Framework of No (the deny-by-default policy that creates shadow AI) makes the shadow AI problem worse. In 2026, I think those who make headway on their AI transformation are the ones willing to face the issue of shadow AI, and bring the innovation and the risk out of the shadows. Sunlight AI is an operating system you can run Monday morning to address shadow AI, rethink how security is deployed, and build pragmatic governance. I wrote about it here: https://lnkd.in/dpqtg77S More about why The Framework of No won't cut it anymore and what to do instead: https://lnkd.in/dfBqBYb3 Listen on Apple Podcasts: https://lnkd.in/engJkbn8 Video on YouTube: https://lnkd.in/eKABc3_U SANS Institute Zapier Wade Foster Maeve McGeorge Philip Lakin Alicia Smith

    Ver la página de empresa de Zapier Zapier

    332.147 seguidores

    4 días

    Cracking down on AI usage? You might be creating shadow AI 😳 Rob T. Lee, Chief AI Officer at SANS Institute, sees it everywhere. Companies block tools, teams still use them. Just quietly. Rob's fix? Flip from "no" to a “cautious yes." Enable small experiments. Let people learn in the open. He sat down with Wade Foster to discuss: • training that works (hackathons, 30 minute micro-projects, etc) • why executives need hands-on learning • security as a lifeguard, not a chokehold • and a LOT more This and more on a holiday release of Agents of Scale ❄️ Listen here: https://lnkd.in/ef_qW_pp

    1 comentario Recomendar Comentar Compartir
  • SANS Institute ha compartido esto

    Ver la página de empresa de Zapier Zapier

    332.147 seguidores

    4 días
    • Denunciar esta publicación

    Cracking down on AI usage? You might be creating shadow AI 😳 Rob T. Lee, Chief AI Officer at SANS Institute, sees it everywhere. Companies block tools, teams still use them. Just quietly. Rob's fix? Flip from "no" to a “cautious yes." Enable small experiments. Let people learn in the open. He sat down with Wade Foster to discuss: • training that works (hackathons, 30 minute micro-projects, etc) • why executives need hands-on learning • security as a lifeguard, not a chokehold • and a LOT more This and more on a holiday release of Agents of Scale ❄️ Listen here: https://lnkd.in/ef_qW_pp

    … más 1 comentario Recomendar Comentar Compartir
  • Ver la página de empresa de SANS Institute SANS Institute

    357.426 seguidores

    5 días
    • Denunciar esta publicación

    What hiring models actually work in cybersecurity? The 2026 SANS | GIAC Workforce Research Study Survey is gathering real insights. Your voice matters. The survey closes January 7, 2026. ➡️ Take the survey here: https://go.sans.org/bwacyk #WorkforceStudy #WorkforceDevelopment #AI #CyberWorkforce

    • No hay descripción de texto alternativo para esta imagen
    1 comentario Recomendar Comentar Compartir
  • Ver la página de empresa de SANS Institute SANS Institute

    357.426 seguidores

    5 días
    • Denunciar esta publicación

    QR codes make life easier and that’s exactly why scammers love them.“ QR codes weren’t built with security in mind, they were built to make life easier, which also makes them perfect for scammers,” Rob T. Lee, chief of research, AI, and emerging threats at SANS Institute, told CNBC. Quishing (QR code phishing) is on the rise. Users can be tricked into visiting malicious sites just by scanning a menu or parking meter. Security teams should disable auto-launch for QR links, train users to verify URLs post-scan, and monitor for QR-based social engineering.   📰 Read the full story via the New York Post here: https://lnkd.in/egFQCYKf #Quishing #Cybersecurity #InfoSec #SecurityAwareness

    What is ‘Quishing’? Scanning a restaurant menu could lead to being hacked — here’s how to protect yourself Recomendar Comentar Compartir
  • Ver la página de empresa de SANS Institute SANS Institute

    357.426 seguidores

    5 días
    • Denunciar esta publicación

    The SANS 2025 State of ICS/OT Security Report highlights a telling pattern: Teams that tailored threat intel to ICS environments made real gains—faster detection, broader coverage, smarter segmentation. When intel is OT-aware, resilience isn’t just a goal, it’s measurable. 📊 Read the full report and benchmark your intel program → https://go.sans.org/Zde3E6 #OTSecurity #ICS #ThreatIntel #CyberDefense

    • No hay descripción de texto alternativo para esta imagen
    3 comentarios Recomendar Comentar Compartir

Únete para ver lo que te estás perdiendo

  • Encuentra a personas que conoces en SANS Institute
  • Consulta empleos recomendados para ti
  • Ve todas las actualizaciones, noticias y artículos
Unirse ahora

Páginas asociadas

  • SANS Cyber Defense

    Servicios y consultoría de TI

  • SANS Offensive Operations

    Servicios y consultoría de TI

  • SANS Digital Forensics and Incident Response

    Seguridad de redes y sistemas informáticos

  • SANS Workforce Security & Risk Training

    Servicios y tecnologías de la información

    Bethesda, MD

  • SANS Cloud Security

    Servicios y consultoría de TI

    Bethesda, MD

  • SANS ICS

    Seguridad de redes y sistemas informáticos

    Bethesda, MD

  • SANS APAC

    Seguridad de redes y sistemas informáticos

  • SANS Security Leadership

    Seguridad de redes y sistemas informáticos

    North Bethesda, Maryland

  • SANS New2Cyber

    Seguridad de redes y sistemas informáticos

  • SANS Application Security (AppSec)

Mostrar más páginas asociadas Mostrar menos páginas asociadas

Páginas similares

  • GIAC Certifications

    Servicios y tecnologías de la información

    Bethesda, MD

  • Women in CyberSecurity (WiCyS)

    Seguridad de redes y sistemas informáticos

    Cookeville, Tennessee

  • ISC2

    Seguridad de redes y sistemas informáticos

    Alexandria, Virginia

  • SANS EMEA

    Servicios y consultoría de TI

    Swansea, Glamorgan

  • Saudi Air Navigation Services

    Fabricación de componentes aeroespaciales y de aviación

    Jeddah, Western province

  • OffSec

    Seguridad de redes y sistemas informáticos

    New York, NY

  • CompTIA

    Formación técnica y profesional

    Downers Grove, IL

  • SANS Cyber Academy

    Seguridad de redes y sistemas informáticos

    North Bethesda, Maryland

  • Cybersecurity and Infrastructure Security Agency

    Administración pública

    Washington, District of Columbia

  • ISACA

    Asociaciones sectoriales

    Schaumburg, Illinois

Mostrar más páginas similares Mostrar menos páginas similares

Aceptar y unirse a LinkedIn

Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.

Inicia sesión para ver a quién conoces en SANS Institute

Iniciar sesión

¡Hola de nuevo!

Email o teléfono Contraseña Mostrar ¿Has olvidado tu contraseña? Iniciar sesión

o

Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.

¿Estás empezando a usar LinkedIn? Únete ahora

o

¿Estás empezando a usar LinkedIn? Únete ahora

Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.

Từ khóa » Http://sans-hn.de