SANS Amsterdam January 2025 - Mon, Jan 20 - Sat, Jan 25, 2025 |
Amsterdam, NL |
Jan. 20, 2025 |
Jan. 25, 2025 |
Unified Backup Trends 2025 Insights: Key Findings From 3700+ IT Pros |
|
Jan. 21, 2025 |
Jan. 21, 2025 |
Webinar - The One with the Governance Glow-Up |
|
Jan. 21, 2025 |
Jan. 21, 2025 |
Audit & Compliance in the Era of AI and Emerging Technology - January 21, 2025 |
|
Jan. 21, 2025 |
Jan. 21, 2025 |
Webinar | Securing Your AI Ecosystem with AI Runtime Security |
|
Jan. 21, 2025 |
Jan. 21, 2025 |
Live Webinar | Redefining the Road Ahead: Identity Security Insights and Strategic Shifts for 2025 |
|
Jan. 21, 2025 |
Jan. 21, 2025 |
Webinar | AI Spy: Continuous Monitoring of Threats You Didn’t See Coming |
|
Jan. 21, 2025 |
Jan. 21, 2025 |
Cyber Resilience Unlocked: Building Secure IT Foundations and Protecting Your Data |
|
Jan. 21, 2025 |
Jan. 21, 2025 |
DevSecOps “Friends”, Webinar Series: |
|
Jan. 21, 2025 |
Jan. 21, 2025 |
Webinar - DevSecOps “Friends”, Webinar Series : Thursday, January 21, 2025 |
|
Jan. 21, 2025 |
Jan. 21, 2025 |
ECSO NIS2 Implementation White Paper: Challenges and Priorities |
|
Jan. 22, 2025 |
Jan. 22, 2025 |
Webinar - Optimizing AKS costs with Azure Spot VMs - Wednesday, January 22nd, 2025 |
|
Jan. 22, 2025 |
Jan. 22, 2025 |
Webinar - The Development Sweet Spot: Balancing Security and Agility |
|
Jan. 22, 2025 |
Jan. 22, 2025 |
Understanding SBOMs: Deep Dive with Kate Stewart |
|
Jan. 22, 2025 |
Jan. 22, 2025 |
European Cybersecurity Trends 2025 |
|
Jan. 22, 2025 |
Jan. 22, 2025 |
Become a Master of Ransomware Response – January - January 22, 2025 |
|
Jan. 22, 2025 |
Jan. 22, 2025 |
Podcast - Future-proof your VMware workloads with Azure Vmware solution |
|
Jan. 22, 2025 |
Jan. 22, 2025 |
THE MODERN WORKPLACE: TECHNOLOGIES TO ENSURE THE BEST EXPERIENCE NEAR AND FAR |
|
Jan. 22, 2025 |
Jan. 22, 2025 |
Live Webinar | Transforming SOCs with Speed, Scaling and Security Innovation |
|
Jan. 22, 2025 |
Jan. 22, 2025 |
Rethinking Automated Penetration Testing: Be Stealthy and Risk-Free |
|
Jan. 23, 2025 |
Jan. 23, 2025 |
Webinar - Securing Generative AI Workloads on Modern Application Architectures - January 23, 2025 |
|
Jan. 23, 2025 |
Jan. 23, 2025 |
Proactive Data Security and Identity Management |
|
Jan. 23, 2025 |
Jan. 23, 2025 |
Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence |
|
Jan. 23, 2025 |
Jan. 23, 2025 |
What Type of Attacks Will We See in 2025? |
|
Jan. 23, 2025 |
Jan. 23, 2025 |
Unleash the Power of GenAI |
|
Jan. 23, 2025 |
Jan. 23, 2025 |
Live Webinar | Get Ahead and Stay Ahead of Threats with Tanium and Microsoft |
|
Jan. 23, 2025 |
Jan. 23, 2025 |
Live Webinar | Active Directory Under Attack: How to Build a Resilient Enterprise |
|
Jan. 23, 2025 |
Jan. 23, 2025 |
2025 Defense R&D Summit | Potomac Officers Club |
Hilton-McLean 7920 Jones Branch Drive McLean, VA |
Jan. 23, 2025 |
Jan. 23, 2025 |
2025 Conexxus Annual Conference |
Tucson, AZ |
Jan. 26, 2025 |
Jan. 30, 2025 |
Webinar - Gartner Top Strategic Technology Trends for 2025 |
|
Jan. 27, 2025 |
Jan. 27, 2025 |
YOUR ROADMAPPING FESTIVAL ENTERPRISE TRANSFORMATION IN THE AGE OF AI: UPSCALING, UPSKILLING, UPLIFTING |
|
Jan. 27, 2025 |
Jan. 29, 2025 |
YOUR ROADMAPPING FESTIVAL TO ENTERPRISE TRANSFORMATION: UPSCALING, UPSKILLING, UPLIFTING |
Hyatt Regency Miami |
Jan. 27, 2025 |
Jan. 29, 2025 |
OPEX Week: Business Transformation World Summit - 27 - 29 January, 2025 | Hyatt Regency Miami |
Hyatt Regency Miami |
Jan. 27, 2025 |
Jan. 29, 2025 |
Live Webinar | AI-Powered Defense Against AI-Driven Threats |
|
Jan. 28, 2025 |
Jan. 28, 2025 |
2025 Key Trends in Third-Party Risk Management |
|
Jan. 28, 2025 |
Jan. 28, 2025 |
Live Webinar | From Risky to Resilient: Proactive Strategies for Program De-Risking and Audit Readiness |
|
Jan. 28, 2025 |
Jan. 28, 2025 |
Industrial Data Management and the Digital Twin |
|
Jan. 28, 2025 |
Jan. 28, 2025 |
Simplifying Network Access: Secure Modern Connectivity with Tailscale |
|
Jan. 28, 2025 |
Jan. 28, 2025 |
Live Webcast - Application Security 2.0: AI changes everything - January 28, 2025 |
|
Jan. 28, 2025 |
Jan. 28, 2025 |
Webinar - Evolving AppSec Beyond Scanners Achieving Continuous Visibility and Observability for APIs with Runtime Security |
|
Jan. 29, 2025 |
Jan. 29, 2025 |
Watch a Live EvilGinx Demonstration to See How Cybercriminals Bypass MFA |
|
Jan. 29, 2025 |
Jan. 29, 2025 |
Webinar - Tips on Managing Cloud Security in a Hybrid Environment |
|
Jan. 29, 2025 |
Jan. 29, 2025 |
Beyond the Tools: Core Skills for OSINT Mastery |
|
Jan. 29, 2025 |
Jan. 29, 2025 |
Webinar Navex - Top 10 Risk & Compliance Trends for 2025 - Wednesday, January 29 |
|
Jan. 29, 2025 |
Jan. 29, 2025 |
Understanding SBOMs: How to Automate, Generate & Manage SBOMs |
|
Jan. 29, 2025 |
Jan. 29, 2025 |
Critical Challenges: Data Overload, Contextual Relevance, Real-Time Visibility, Secure Collaboration |
|
Jan. 29, 2025 |
Jan. 29, 2025 |
developer roundtable |
|
Jan. 29, 2025 |
Jan. 29, 2025 |
Overcoming the Top Five Challenges in Operationalizing Threat Intelligence |
|
Jan. 29, 2025 |
Jan. 29, 2025 |
AI's Rise in Development: What BSIMM15 Teaches About Security |
|
Jan. 29, 2025 |
Jan. 29, 2025 |
Webinar - Top Ways to Tackle Data Overload and Stay Ahead of Threats |
|
Jan. 29, 2025 |
Jan. 29, 2025 |