<!DOCTYPE html><html data-theme="dark" lang="en-US"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="stylesheet" href="/_next/static/css/8f4c1d5ac92728b5.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/f60c4c18eaea2539.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/10a162551269c449.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/19ce4d406e564b03.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/206023683b1c0579.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-11f4915bd98f8a25.js"/><script src="/_next/static/chunks/c05f6132-04ed626f2288e828.js" async=""></script><script src="/_next/static/chunks/2328-7afeeffa74a984be.js" async=""></script><script src="/_next/static/chunks/main-app-5ac86ba54cb5ca21.js" async=""></script><script src="/_next/static/chunks/0ac02ab0-9734b1a658ed1114.js" async=""></script><script src="/_next/static/chunks/3970-9261773f9c0e8d18.js" async=""></script><script src="/_next/static/chunks/1299-897517986f6d760d.js" async=""></script><script src="/_next/static/chunks/2534-c754c698a60b8575.js" async=""></script><script src="/_next/static/chunks/2682-17379429f0b93fb5.js" async=""></script><script src="/_next/static/chunks/1800-14fa0c06af0073b0.js" async=""></script><script src="/_next/static/chunks/1638-693bfc588657e07c.js" async=""></script><script src="/_next/static/chunks/181-8557cc112cd03503.js" async=""></script><script src="/_next/static/chunks/1413-6d820c3bb613cd06.js" async=""></script><script src="/_next/static/chunks/app/page-d57d6546cb7e66be.js" async=""></script><script src="/_next/static/chunks/6676-20e4890b05aafbf0.js" async=""></script><script src="/_next/static/chunks/2411-d7e1899bfb2358fc.js" async=""></script><script src="/_next/static/chunks/5463-5252e78b2dd34d4e.js" async=""></script><script src="/_next/static/chunks/6551-731be90d7a47741b.js" async=""></script><script src="/_next/static/chunks/app/layout-db05aba00a9dacde.js" async=""></script><script src="/_next/static/chunks/1044-687250a180f48329.js" async=""></script><script src="/_next/static/chunks/1049-097a54a192c2924a.js" async=""></script><script src="/_next/static/chunks/9633-b2d87d5d19bd0ffd.js" async=""></script><script src="/_next/static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js" async=""></script><script src="/_next/static/chunks/app/error-8391fd18fc444d3f.js" async=""></script><link rel="preload" href="https://cdn.optimizely.com/js/28081820005.js" as="script"/><link rel="preload" href="https://www.googletagmanager.com/gtm.js?id=GTM-5T9DW3B" as="script"/><meta name="next-size-adjust" content=""/><meta content="cC-8xOerZ3opiLx9VloUCzc6SgMfOZHYihJzWA19-KI" name="google-site-verification"/><title>SANS Cyber Security White Papers | SANS Institute</title><meta name="description" content="View all White Papers or search and filter to find a specific page"/><meta name="language" content="en"/><link rel="canonical" href="https://www.sans.org/white-papers"/><meta property="og:title" content="SANS Cyber Security White Papers"/><meta property="og:description" content="View all White Papers or search and filter to find a specific page White Paper Listing Page"/><meta property="og:url" content="https://www.sans.org/white-papers"/><meta property="og:site_name" content="SANS Institute"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary"/><meta name="twitter:site" content="@SANSInstitute"/><meta name="twitter:title" content="SANS Cyber Security White Papers"/><meta name="twitter:description" content="View all White Papers or search and filter to find a specific page White Paper Listing Page"/><link rel="icon" href="/favicon.ico" type="image/x-icon" sizes="48x48"/><link rel="icon" href="/icon1.png?2951f2f1b780f8ac" type="image/png" sizes="96x96"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script><script>window[Symbol.for("InstantSearchInitialResults")] = {"white_paper_single_displayDateTimestamp_desc":{"state":{"facets":[],"disjunctiveFacets":["facets.focusArea","facets.language"],"hierarchicalFacets":[],"facetsRefinements":{},"facetsExcludes":{},"disjunctiveFacetsRefinements":{"facets.focusArea":[],"facets.language":[]},"numericRefinements":{},"tagRefinements":[],"hierarchicalFacetsRefinements":{},"index":"white_paper_single_displayDateTimestamp_desc","query":"","hitsPerPage":12,"page":0,"maxValuesPerFacet":10,"highlightPreTag":"__ais-highlight__","highlightPostTag":"__/ais-highlight__"},"results":[{"hits":[{"contentType":"white_paper_single","updatedAt":"2026-04-07T12:08:56.500Z","createdAt":"2026-04-07T12:08:56.500Z","uid":"bltc7fe5760e293768d","title":"Cyber Risk Intelligence and Security Posture (CRISP): From Compliance to Threat-Informed Intelligence","locale":"en-us","url":"/white-papers/cyber-risk-intelligence-security-posture-crisp-compliance-threat-informed-intelligence","updatedAtTimestamp":1775563736,"createdAtTimestamp":1775563736,"description":"This paper presents CRISP (Cyber Risk Intelligence \u0026 Security Posture), a platform that automates the transformation of STIG compliance data into threat-informed security intelligence. ","keywords":"crisp, cyber risk intelligence","metadata":{"title":"Cyber Risk Intelligence and Security Posture (CRISP): From Compliance to Threat-Informed Intelligence","description":"This paper presents CRISP (Cyber Risk Intelligence \u0026 Security Posture), a platform that automates the transformation of STIG compliance data into threat-informed security intelligence. ","keywords":"crisp, cyber risk intelligence","robots":[],"canonical_url":"https://www.sans.org/white-papers/cyber-risk-intelligence-security-posture-crisp-compliance-threat-informed-intelligence","canonical_url_override":"","browser_title":"Cyber Risk Intelligence and Security Posture (CRISP): From Compliance to Threat-Informed Intelligence | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"blt389e0807c9792316","title":"Whitepaper: Thumbnail: Abstract 1","image":{"uid":"blt264f59cf15275d55","_version":3,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-07-15T07:59:21.864Z","created_by":"blt3fce71b3cc7d233d","description":"600x510","dimension":{"height":510,"width":600},"file_size":"557756","filename":"assets_whitepaper_abstract_600x510.png","parent_uid":"blt92289511a3219723","tags":["whitepaper","thumbnail","abstract"],"title":"Whitepaper: Thumbnail: Abstract 1","updated_at":"2025-12-29T10:29:43.996Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-29T10:29:46.037Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt264f59cf15275d55/68760a59a2509fcce033f213/assets_whitepaper_abstract_600x510.png"},"caption":"","alt_text":"Whitepaper","tags":["whitepaper","thumbnail","abstract"],"locale":"en-us","created_by":"blt3fce71b3cc7d233d","updated_by":"blt3fce71b3cc7d233d","created_at":"2025-07-15T08:02:41.657Z","updated_at":"2025-07-15T08:02:41.657Z","ACL":{},"_version":1,"publish_details":{"time":"2025-08-04T15:03:48.637Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-04-07","displayDateTimestamp":1775520000,"authors":[],"facets":{"focusArea":["Cyber Defense"],"language":["English"],"topic":["Risk"]},"objectID":"white_paper_single.bltc7fe5760e293768d","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-04-07T12:08:56.500Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-04-07T12:08:56.500Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"bltc7fe5760e293768d","matchLevel":"none","matchedWords":[]},"title":{"value":"Cyber Risk Intelligence and Security Posture (CRISP): From Compliance to Threat-Informed Intelligence","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/cyber-risk-intelligence-security-posture-crisp-compliance-threat-informed-intelligence","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1775563736","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1775563736","matchLevel":"none","matchedWords":[]},"description":{"value":"This paper presents CRISP (Cyber Risk Intelligence \u0026 Security Posture), a platform that automates the transformation of STIG compliance data into threat-informed security intelligence. ","matchLevel":"none","matchedWords":[]},"keywords":{"value":"crisp, cyber risk intelligence","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"Cyber Risk Intelligence and Security Posture (CRISP): From Compliance to Threat-Informed Intelligence","matchLevel":"none","matchedWords":[]},"description":{"value":"This paper presents CRISP (Cyber Risk Intelligence \u0026 Security Posture), a platform that automates the transformation of STIG compliance data into threat-informed security intelligence. ","matchLevel":"none","matchedWords":[]},"keywords":{"value":"crisp, cyber risk intelligence","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/cyber-risk-intelligence-security-posture-crisp-compliance-threat-informed-intelligence","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"Cyber Risk Intelligence and Security Posture (CRISP): From Compliance to Threat-Informed Intelligence | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt389e0807c9792316","matchLevel":"none","matchedWords":[]},"title":{"value":"Whitepaper: Thumbnail: Abstract 1","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"blt264f59cf15275d55","matchLevel":"none","matchedWords":[]},"_version":{"value":"3","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-07-15T07:59:21.864Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"557756","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_whitepaper_abstract_600x510.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt92289511a3219723","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"abstract","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Abstract 1","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-29T10:29:43.996Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-29T10:29:46.037Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt264f59cf15275d55/68760a59a2509fcce033f213/assets_whitepaper_abstract_600x510.png","matchLevel":"none","matchedWords":[]}},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Whitepaper","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"abstract","matchLevel":"none","matchedWords":[]}],"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-07-15T08:02:41.657Z","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-07-15T08:02:41.657Z","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-08-04T15:03:48.637Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-04-07","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1775520000","matchLevel":"none","matchedWords":[]},"facets":{"focusArea":[{"value":"Cyber Defense","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"Risk","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-04-02T22:06:19.955Z","createdAt":"2026-04-02T22:03:33.283Z","uid":"blt0ffe670efaf32564","title":"The Next Generation of Data Security","locale":"en-us","url":"/white-papers/next-generation-data-security","updatedAtTimestamp":1775167579,"createdAtTimestamp":1775167413,"description":"The Next Generation of Data Security white paper for Lightbeam","keywords":"next gen, data security","metadata":{"title":"The Next Generation of Data Security","description":"SANS had the opportunity to review the Lightbeam platform, which brings identity and data security concepts together in a unified solution. In this white paper, SANS Analyst Dave Shackleford walks through the platform, covering its advanced data and identity security concepts and controls, and look sahead to what’s coming in complex hybrid environments to better identify and protect our data.","keywords":"next gen, data security","robots":[],"canonical_url":"https://www.sans.org/white-papers/next-generation-data-security","canonical_url_override":"","browser_title":"The Next Generation of Data Security | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"blt34577d91c5161007","_version":1,"locale":"en-us","ACL":{},"alt_text":"Two people looking at a computer","caption":"","created_at":"2025-12-05T16:38:28.126Z","created_by":"blt58929c2940d86abd","image":{"uid":"bltaf5cba4267c4b648","_version":2,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-12-05T16:36:54.436Z","created_by":"blt58929c2940d86abd","description":"600x510","dimension":{"height":510,"width":600},"file_size":"363267","filename":"assets_fallback_2-column_Live-Stream_600x510.png","parent_uid":"blt92289511a3219723","tags":["whitepaper","thumbnail","stock"],"title":"Whitepaper: Thumbnail: Stock 8","updated_at":"2025-12-05T16:37:51.743Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-05T16:37:54.524Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaf5cba4267c4b648/69330a2645d0fcaba12c1583/assets_fallback_2-column_Live-Stream_600x510.png"},"tags":["whitepaper","thumbnail","stock"],"title":"Whitepaper: Thumbnail: Stock 8","updated_at":"2025-12-05T16:38:28.126Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-05T16:38:31.330Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-04-06","displayDateTimestamp":1775433600,"authors":[{"name":{"prefix":"","first":"Dave","middle":"","last":"Shackleford","postfix":""},"url":"/profiles/dave-shackleford"}],"facets":{"focusArea":["Cybersecurity Leadership"],"language":["English"],"topic":["Vulnerability"]},"objectID":"white_paper_single.blt0ffe670efaf32564","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-04-02T22:06:19.955Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-04-02T22:03:33.283Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt0ffe670efaf32564","matchLevel":"none","matchedWords":[]},"title":{"value":"The Next Generation of Data Security","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/next-generation-data-security","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1775167579","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1775167413","matchLevel":"none","matchedWords":[]},"description":{"value":"The Next Generation of Data Security white paper for Lightbeam","matchLevel":"none","matchedWords":[]},"keywords":{"value":"next gen, data security","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"The Next Generation of Data Security","matchLevel":"none","matchedWords":[]},"description":{"value":"SANS had the opportunity to review the Lightbeam platform, which brings identity and data security concepts together in a unified solution. In this white paper, SANS Analyst Dave Shackleford walks through the platform, covering its advanced data and identity security concepts and controls, and look sahead to what’s coming in complex hybrid environments to better identify and protect our data.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"next gen, data security","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/next-generation-data-security","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"The Next Generation of Data Security | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt34577d91c5161007","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Two people looking at a computer","matchLevel":"none","matchedWords":[]},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-05T16:38:28.126Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"bltaf5cba4267c4b648","matchLevel":"none","matchedWords":[]},"_version":{"value":"2","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-05T16:36:54.436Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"363267","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_fallback_2-column_Live-Stream_600x510.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt92289511a3219723","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 8","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-05T16:37:51.743Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-05T16:37:54.524Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaf5cba4267c4b648/69330a2645d0fcaba12c1583/assets_fallback_2-column_Live-Stream_600x510.png","matchLevel":"none","matchedWords":[]}},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 8","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-05T16:38:28.126Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-05T16:38:31.330Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-04-06","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1775433600","matchLevel":"none","matchedWords":[]},"authors":[{"name":{"prefix":{"value":"","matchLevel":"none","matchedWords":[]},"first":{"value":"Dave","matchLevel":"none","matchedWords":[]},"middle":{"value":"","matchLevel":"none","matchedWords":[]},"last":{"value":"Shackleford","matchLevel":"none","matchedWords":[]},"postfix":{"value":"","matchLevel":"none","matchedWords":[]}},"url":{"value":"/profiles/dave-shackleford","matchLevel":"none","matchedWords":[]}}],"facets":{"focusArea":[{"value":"Cybersecurity Leadership","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"Vulnerability","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-04-02T08:27:24.323Z","createdAt":"2026-04-01T14:46:13.949Z","uid":"bltb2954d08d8a419ab","title":"Operationalizing CTEM within the SOC: A Proactive Approach to Threat Detection and Response","locale":"en-us","url":"/white-papers/operationalizing-ctem-soc-proactive-approach-threat-detection-response","updatedAtTimestamp":1775118444,"createdAtTimestamp":1775054773,"description":"With either an in-house or an outsourced approach, organizations invest in a security operations center (SOC) to perform threat detection, investigation, and response. SOCs may also leverage threat hunting to identify threats earlier and proactively reduce risk.","keywords":"soc, security operations, threat detection, threat investigation","metadata":{"title":"Operationalizing CTEM within the SOC: A Proactive Approach to Threat Detection and Response","description":"With either an in-house or an outsourced approach, organizations invest in a security operations center (SOC) to perform threat detection, investigation, and response. SOCs may also leverage threat hunting to identify threats earlier and proactively reduce risk.","keywords":"soc, security operations, threat detection, threat investigation","robots":[],"canonical_url":"https://www.sans.org/white-papers/operationalizing-ctem-soc-proactive-approach-threat-detection-response","canonical_url_override":"","browser_title":"Operationalizing CTEM within the SOC: A Proactive Approach to Threat Detection and Response | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"bltb0e80501d68a0697","_version":1,"locale":"en-us","ACL":{},"alt_text":"Person reading whitepaper","caption":"","created_at":"2025-07-15T08:01:38.630Z","created_by":"blt3fce71b3cc7d233d","image":{"uid":"blta52eb8c0a8ed3a24","_version":3,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-07-15T07:59:21.948Z","created_by":"blt3fce71b3cc7d233d","description":"600x510","dimension":{"height":510,"width":600},"file_size":"326191","filename":"assets_whitepaper_stock2_600x510.png","parent_uid":"blt92289511a3219723","tags":["stock","whitepaper","thumbnail"],"title":"Whitepaper: Thumbnail: Stock 2","updated_at":"2025-12-29T10:29:20.258Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-29T10:29:23.161Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta52eb8c0a8ed3a24/68760a59117f15ab9b303f1f/assets_whitepaper_stock2_600x510.png"},"tags":["whitepaper","thumbnail","stock"],"title":"Whitepaper: Thumbnail: Stock 2","updated_at":"2025-07-15T08:01:38.630Z","updated_by":"blt3fce71b3cc7d233d","publish_details":{"time":"2025-08-05T12:10:44.610Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-04-01","displayDateTimestamp":1775001600,"authors":[],"facets":{"focusArea":["Cyber Defense"],"language":["English"],"topic":["Incident response"]},"objectID":"white_paper_single.bltb2954d08d8a419ab","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-04-02T08:27:24.323Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-04-01T14:46:13.949Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"bltb2954d08d8a419ab","matchLevel":"none","matchedWords":[]},"title":{"value":"Operationalizing CTEM within the SOC: A Proactive Approach to Threat Detection and Response","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/operationalizing-ctem-soc-proactive-approach-threat-detection-response","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1775118444","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1775054773","matchLevel":"none","matchedWords":[]},"description":{"value":"With either an in-house or an outsourced approach, organizations invest in a security operations center (SOC) to perform threat detection, investigation, and response. SOCs may also leverage threat hunting to identify threats earlier and proactively reduce risk.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"soc, security operations, threat detection, threat investigation","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"Operationalizing CTEM within the SOC: A Proactive Approach to Threat Detection and Response","matchLevel":"none","matchedWords":[]},"description":{"value":"With either an in-house or an outsourced approach, organizations invest in a security operations center (SOC) to perform threat detection, investigation, and response. SOCs may also leverage threat hunting to identify threats earlier and proactively reduce risk.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"soc, security operations, threat detection, threat investigation","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/operationalizing-ctem-soc-proactive-approach-threat-detection-response","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"Operationalizing CTEM within the SOC: A Proactive Approach to Threat Detection and Response | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"bltb0e80501d68a0697","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Person reading whitepaper","matchLevel":"none","matchedWords":[]},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-07-15T08:01:38.630Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"blta52eb8c0a8ed3a24","matchLevel":"none","matchedWords":[]},"_version":{"value":"3","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-07-15T07:59:21.948Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"326191","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_whitepaper_stock2_600x510.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt92289511a3219723","matchLevel":"none","matchedWords":[]},"tags":[{"value":"stock","matchLevel":"none","matchedWords":[]},{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 2","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-29T10:29:20.258Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-29T10:29:23.161Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta52eb8c0a8ed3a24/68760a59117f15ab9b303f1f/assets_whitepaper_stock2_600x510.png","matchLevel":"none","matchedWords":[]}},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 2","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-07-15T08:01:38.630Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-08-05T12:10:44.610Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-04-01","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1775001600","matchLevel":"none","matchedWords":[]},"facets":{"focusArea":[{"value":"Cyber Defense","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"Incident response","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-03-26T15:49:29.232Z","createdAt":"2026-03-26T13:13:49.040Z","uid":"bltfb0e805d7099f462","title":"Can Root Detection Be Trusted? A Study of Bypass Techniques on Mobile Platforms","locale":"en-us","url":"/white-papers/can-root-detection-be-trusted-bypass-techniques-mobile-platforms","updatedAtTimestamp":1774540169,"createdAtTimestamp":1774530829,"description":"This paper investigates the resilience of current Android root detection mechanisms against a hierarchy of modern bypass techniques.","keywords":"mobile platforms, bypass techniques, cody ruscigno","metadata":{"title":"Can Root Detection Be Trusted? A Study of Bypass Techniques on Mobile Platforms","description":"This paper investigates the resilience of current Android root detection mechanisms against a hierarchy of modern bypass techniques.","keywords":"mobile platforms, bypass techniques, cody ruscigno","robots":[],"canonical_url":"https://www.sans.org/white-papers/can-root-detection-be-trusted-bypass-techniques-mobile-platforms","canonical_url_override":"","browser_title":"Can Root Detection Be Trusted? A Study of Bypass Techniques on Mobile Platforms | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"blt34577d91c5161007","_version":1,"locale":"en-us","ACL":{},"alt_text":"Two people looking at a computer","caption":"","created_at":"2025-12-05T16:38:28.126Z","created_by":"blt58929c2940d86abd","image":{"uid":"bltaf5cba4267c4b648","_version":2,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-12-05T16:36:54.436Z","created_by":"blt58929c2940d86abd","description":"600x510","dimension":{"height":510,"width":600},"file_size":"363267","filename":"assets_fallback_2-column_Live-Stream_600x510.png","parent_uid":"blt92289511a3219723","tags":["whitepaper","thumbnail","stock"],"title":"Whitepaper: Thumbnail: Stock 8","updated_at":"2025-12-05T16:37:51.743Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-05T16:37:54.524Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaf5cba4267c4b648/69330a2645d0fcaba12c1583/assets_fallback_2-column_Live-Stream_600x510.png"},"tags":["whitepaper","thumbnail","stock"],"title":"Whitepaper: Thumbnail: Stock 8","updated_at":"2025-12-05T16:38:28.126Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-05T16:38:31.330Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-03-26","displayDateTimestamp":1774483200,"authors":[],"facets":{"focusArea":["Offensive Operations"],"language":["English"],"topic":["Mobile","Vulnerability"]},"objectID":"white_paper_single.bltfb0e805d7099f462","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-03-26T15:49:29.232Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-03-26T13:13:49.040Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"bltfb0e805d7099f462","matchLevel":"none","matchedWords":[]},"title":{"value":"Can Root Detection Be Trusted? A Study of Bypass Techniques on Mobile Platforms","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/can-root-detection-be-trusted-bypass-techniques-mobile-platforms","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1774540169","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1774530829","matchLevel":"none","matchedWords":[]},"description":{"value":"This paper investigates the resilience of current Android root detection mechanisms against a hierarchy of modern bypass techniques.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"mobile platforms, bypass techniques, cody ruscigno","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"Can Root Detection Be Trusted? A Study of Bypass Techniques on Mobile Platforms","matchLevel":"none","matchedWords":[]},"description":{"value":"This paper investigates the resilience of current Android root detection mechanisms against a hierarchy of modern bypass techniques.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"mobile platforms, bypass techniques, cody ruscigno","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/can-root-detection-be-trusted-bypass-techniques-mobile-platforms","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"Can Root Detection Be Trusted? A Study of Bypass Techniques on Mobile Platforms | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt34577d91c5161007","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Two people looking at a computer","matchLevel":"none","matchedWords":[]},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-05T16:38:28.126Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"bltaf5cba4267c4b648","matchLevel":"none","matchedWords":[]},"_version":{"value":"2","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-05T16:36:54.436Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"363267","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_fallback_2-column_Live-Stream_600x510.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt92289511a3219723","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 8","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-05T16:37:51.743Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-05T16:37:54.524Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaf5cba4267c4b648/69330a2645d0fcaba12c1583/assets_fallback_2-column_Live-Stream_600x510.png","matchLevel":"none","matchedWords":[]}},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 8","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-05T16:38:28.126Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-05T16:38:31.330Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-03-26","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1774483200","matchLevel":"none","matchedWords":[]},"facets":{"focusArea":[{"value":"Offensive Operations","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"Mobile","matchLevel":"none","matchedWords":[]},{"value":"Vulnerability","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-03-26T12:19:35.895Z","createdAt":"2026-03-26T12:19:35.895Z","uid":"bltab49393325dd2f97","title":"Asset-Aware Network Monitoring","locale":"en-us","url":"/white-papers/asset-aware-network-monitoring","updatedAtTimestamp":1774527575,"createdAtTimestamp":1774527575,"description":"This research demonstrates how passive network security monitoring can detect unauthorized devices and communications by comparing observed network traffic against documented asset inventory data.","keywords":"network monitoring, passive monitoring, network security","metadata":{"title":"Asset-Aware Network Monitoring","description":"This research demonstrates how passive network security monitoring can detect unauthorized devices and communications by comparing observed network traffic against documented asset inventory data.","keywords":"network monitoring, passive monitoring, network security","robots":[],"canonical_url":"https://www.sans.org/white-papers/asset-aware-network-monitoring","canonical_url_override":"","browser_title":"Asset-Aware Network Monitoring | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"bltbd2d658d6d2947aa","title":"Whitepaper: Thumbnail: Abstract 2","image":{"uid":"blt19c5d52de92f60f6","_version":3,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-07-15T07:59:21.897Z","created_by":"blt3fce71b3cc7d233d","description":"600x510","dimension":{"height":510,"width":600},"file_size":"470300","filename":"assets_whitepaper_abstract2_600x510.png","parent_uid":"blt92289511a3219723","tags":["whitepaper","thumbnail","abstract"],"title":"Whitepaper: Thumbnail: Abstract 2","updated_at":"2025-12-29T10:29:36.864Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-29T10:29:39.412Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt19c5d52de92f60f6/68760a59117f15b4ac303f1b/assets_whitepaper_abstract2_600x510.png"},"caption":"","alt_text":"Whitepaper","tags":["whitepaper","thumbnail","abstract"],"locale":"en-us","created_by":"blt3fce71b3cc7d233d","updated_by":"blt3fce71b3cc7d233d","created_at":"2025-07-15T08:03:00.916Z","updated_at":"2025-07-15T08:03:00.916Z","ACL":{},"_version":1,"publish_details":{"time":"2025-07-30T17:59:03.188Z","user":"blt08b8842f1dd4d011","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-03-26","displayDateTimestamp":1774483200,"authors":[],"facets":{"focusArea":["Industrial Control Systems Security"],"language":["English"],"topic":["Risk","Siem"]},"objectID":"white_paper_single.bltab49393325dd2f97","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-03-26T12:19:35.895Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-03-26T12:19:35.895Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"bltab49393325dd2f97","matchLevel":"none","matchedWords":[]},"title":{"value":"Asset-Aware Network Monitoring","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/asset-aware-network-monitoring","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1774527575","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1774527575","matchLevel":"none","matchedWords":[]},"description":{"value":"This research demonstrates how passive network security monitoring can detect unauthorized devices and communications by comparing observed network traffic against documented asset inventory data.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"network monitoring, passive monitoring, network security","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"Asset-Aware Network Monitoring","matchLevel":"none","matchedWords":[]},"description":{"value":"This research demonstrates how passive network security monitoring can detect unauthorized devices and communications by comparing observed network traffic against documented asset inventory data.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"network monitoring, passive monitoring, network security","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/asset-aware-network-monitoring","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"Asset-Aware Network Monitoring | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"bltbd2d658d6d2947aa","matchLevel":"none","matchedWords":[]},"title":{"value":"Whitepaper: Thumbnail: Abstract 2","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"blt19c5d52de92f60f6","matchLevel":"none","matchedWords":[]},"_version":{"value":"3","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-07-15T07:59:21.897Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"470300","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_whitepaper_abstract2_600x510.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt92289511a3219723","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"abstract","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Abstract 2","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-29T10:29:36.864Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-29T10:29:39.412Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt19c5d52de92f60f6/68760a59117f15b4ac303f1b/assets_whitepaper_abstract2_600x510.png","matchLevel":"none","matchedWords":[]}},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Whitepaper","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"abstract","matchLevel":"none","matchedWords":[]}],"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-07-15T08:03:00.916Z","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-07-15T08:03:00.916Z","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-07-30T17:59:03.188Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt08b8842f1dd4d011","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-03-26","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1774483200","matchLevel":"none","matchedWords":[]},"facets":{"focusArea":[{"value":"Industrial Control Systems Security","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"Risk","matchLevel":"none","matchedWords":[]},{"value":"Siem","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-03-26T13:05:05.312Z","createdAt":"2026-03-26T13:03:23.186Z","uid":"blt6cd918823764af88","title":"Focused vs Dump-Everything Ingestion for GCP and Kubernetes SIEM Pipelines","locale":"en-us","url":"/white-papers/focused-dump-everything-ingestion-gcp-kubernetes-siem-pipelines","updatedAtTimestamp":1774530305,"createdAtTimestamp":1774530203,"description":"This research compares two concurrent ingestion strategies for Google Cloud Platform (GCP) and Google Kubernetes Engine (GKE) telemetry into Splunk.","keywords":"","metadata":{"title":"Focused vs Dump-Everything Ingestion for GCP and Kubernetes SIEM Pipelines","description":"This research compares two concurrent ingestion strategies for Google Cloud Platform (GCP) and Google Kubernetes Engine (GKE) telemetry into Splunk.","keywords":"","robots":[],"canonical_url":"https://www.sans.org/white-papers/focused-dump-everything-ingestion-gcp-kubernetes-siem-pipelines","canonical_url_override":"","browser_title":"Focused vs Dump-Everything Ingestion for GCP and Kubernetes SIEM Pipelines | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"bltfc957410ac8f33b0","locale":"en-us","_version":1,"ACL":{},"alt_text":"Man talking into microphone","caption":"","created_at":"2025-12-04T15:11:09.584Z","created_by":"blt58929c2940d86abd","image":{"uid":"bltf06d4572c98c4f6f","_version":2,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-12-04T15:06:29.060Z","created_by":"blt58929c2940d86abd","description":"600x510","dimension":{"height":510,"width":600},"file_size":"607061","filename":"assets_2-column_600x510_stock5.png","parent_uid":"blt65dd3de185c1dc8e","tags":["webcast","thumbnail","stock"],"title":"Webcast: Thumbnail: Stock 11","updated_at":"2025-12-04T15:09:11.773Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-04T15:09:16.700Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf06d4572c98c4f6f/6931a375d2d25c1d8e031af1/assets_2-column_600x510_stock5.png"},"tags":["thumbnail","stock","webcast"],"title":"Webcast: Thumbnail: Stock 11","updated_at":"2025-12-04T15:11:09.584Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-04T15:11:14.665Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-03-26","displayDateTimestamp":1774483200,"authors":[],"facets":{"focusArea":["Cyber Defense"],"language":["English"],"topic":["Siem","Cloud"]},"objectID":"white_paper_single.blt6cd918823764af88","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-03-26T13:05:05.312Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-03-26T13:03:23.186Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt6cd918823764af88","matchLevel":"none","matchedWords":[]},"title":{"value":"Focused vs Dump-Everything Ingestion for GCP and Kubernetes SIEM Pipelines","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/focused-dump-everything-ingestion-gcp-kubernetes-siem-pipelines","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1774530305","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1774530203","matchLevel":"none","matchedWords":[]},"description":{"value":"This research compares two concurrent ingestion strategies for Google Cloud Platform (GCP) and Google Kubernetes Engine (GKE) telemetry into Splunk.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"Focused vs Dump-Everything Ingestion for GCP and Kubernetes SIEM Pipelines","matchLevel":"none","matchedWords":[]},"description":{"value":"This research compares two concurrent ingestion strategies for Google Cloud Platform (GCP) and Google Kubernetes Engine (GKE) telemetry into Splunk.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/focused-dump-everything-ingestion-gcp-kubernetes-siem-pipelines","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"Focused vs Dump-Everything Ingestion for GCP and Kubernetes SIEM Pipelines | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"bltfc957410ac8f33b0","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Man talking into microphone","matchLevel":"none","matchedWords":[]},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-04T15:11:09.584Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"bltf06d4572c98c4f6f","matchLevel":"none","matchedWords":[]},"_version":{"value":"2","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-04T15:06:29.060Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"607061","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_2-column_600x510_stock5.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt65dd3de185c1dc8e","matchLevel":"none","matchedWords":[]},"tags":[{"value":"webcast","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]}],"title":{"value":"Webcast: Thumbnail: Stock 11","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-04T15:09:11.773Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-04T15:09:16.700Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf06d4572c98c4f6f/6931a375d2d25c1d8e031af1/assets_2-column_600x510_stock5.png","matchLevel":"none","matchedWords":[]}},"tags":[{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]},{"value":"webcast","matchLevel":"none","matchedWords":[]}],"title":{"value":"Webcast: Thumbnail: Stock 11","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-04T15:11:09.584Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-04T15:11:14.665Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-03-26","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1774483200","matchLevel":"none","matchedWords":[]},"facets":{"focusArea":[{"value":"Cyber Defense","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"Siem","matchLevel":"none","matchedWords":[]},{"value":"Cloud","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-03-26T21:09:57.551Z","createdAt":"2026-03-25T16:57:33.535Z","uid":"blt6fd618377f79125f","title":"When the Security Scanner Became the Weapon: TeamPCP Supply Chain TTP Report","locale":"en-us","url":"/white-papers/when-security-scanner-became-weapon","updatedAtTimestamp":1774559397,"createdAtTimestamp":1774457853,"description":"Download the TeamPCP threat intelligence report. Analyze a real-world supply chain attack across CI/CD, cloud, and AI systems with TTPs, IOCs, and actionable insights.","keywords":"teampcp, vulnerability, threat intelligence report","metadata":{"title":"When the Security Scanner Became the Weapon: TeamPCP Supply Chain TTP Report","description":"Download the TeamPCP threat intelligence report. Analyze a real-world supply chain attack across CI/CD, cloud, and AI systems with TTPs, IOCs, and actionable insights.","keywords":"teampcp, vulnerability, threat intelligence report","robots":[],"canonical_url":"https://www.sans.org/white-papers/when-security-scanner-became-weapon","canonical_url_override":"","browser_title":"When the Security Scanner Became the Weapon: TeamPCP Supply Chain TTP Report | SANS Institute","language":"en"},"thumbnail":[],"displayDate":"2026-03-25","displayDateTimestamp":1774396800,"authors":[{"name":{"prefix":"","first":"Kenneth","middle":"G.","last":"Hartman","postfix":""},"url":"/profiles/kenneth-g-hartman"},{"name":{"prefix":"","first":"Eric","middle":"","last":"Johnson","postfix":""},"url":"/profiles/eric-johnson"}],"facets":{"focusArea":["Cloud Security"],"language":["English"],"topic":["AI","Cloud","Incident response","Vulnerability"]},"objectID":"white_paper_single.blt6fd618377f79125f","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-03-26T21:09:57.551Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-03-25T16:57:33.535Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt6fd618377f79125f","matchLevel":"none","matchedWords":[]},"title":{"value":"When the Security Scanner Became the Weapon: TeamPCP Supply Chain TTP Report","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/when-security-scanner-became-weapon","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1774559397","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1774457853","matchLevel":"none","matchedWords":[]},"description":{"value":"Download the TeamPCP threat intelligence report. Analyze a real-world supply chain attack across CI/CD, cloud, and AI systems with TTPs, IOCs, and actionable insights.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"teampcp, vulnerability, threat intelligence report","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"When the Security Scanner Became the Weapon: TeamPCP Supply Chain TTP Report","matchLevel":"none","matchedWords":[]},"description":{"value":"Download the TeamPCP threat intelligence report. Analyze a real-world supply chain attack across CI/CD, cloud, and AI systems with TTPs, IOCs, and actionable insights.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"teampcp, vulnerability, threat intelligence report","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/when-security-scanner-became-weapon","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"When the Security Scanner Became the Weapon: TeamPCP Supply Chain TTP Report | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"displayDate":{"value":"2026-03-25","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1774396800","matchLevel":"none","matchedWords":[]},"authors":[{"name":{"prefix":{"value":"","matchLevel":"none","matchedWords":[]},"first":{"value":"Kenneth","matchLevel":"none","matchedWords":[]},"middle":{"value":"G.","matchLevel":"none","matchedWords":[]},"last":{"value":"Hartman","matchLevel":"none","matchedWords":[]},"postfix":{"value":"","matchLevel":"none","matchedWords":[]}},"url":{"value":"/profiles/kenneth-g-hartman","matchLevel":"none","matchedWords":[]}},{"name":{"prefix":{"value":"","matchLevel":"none","matchedWords":[]},"first":{"value":"Eric","matchLevel":"none","matchedWords":[]},"middle":{"value":"","matchLevel":"none","matchedWords":[]},"last":{"value":"Johnson","matchLevel":"none","matchedWords":[]},"postfix":{"value":"","matchLevel":"none","matchedWords":[]}},"url":{"value":"/profiles/eric-johnson","matchLevel":"none","matchedWords":[]}}],"facets":{"focusArea":[{"value":"Cloud Security","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"AI","matchLevel":"none","matchedWords":[]},{"value":"Cloud","matchLevel":"none","matchedWords":[]},{"value":"Incident response","matchLevel":"none","matchedWords":[]},{"value":"Vulnerability","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-03-24T14:00:57.334Z","createdAt":"2026-03-24T14:00:10.413Z","uid":"bltfc84c74562d51c99","title":"Implementing Micro-Segmentation in a Legacy Enterprise Lab Network: A Zero Trust Approach to Reducing Lateral Movement, Improving Containment, and Controlling Operational Overhead","locale":"en-us","url":"/white-papers/implementing-micro-segmentation-legacy-enterprise-lab-network","updatedAtTimestamp":1774360857,"createdAtTimestamp":1774360810,"description":"This study evaluates micro-segmentation as a practical Zero Trust control in a Windows Active Directory lab that models common legacy dependencies (directory services, file services, a web tier, and a database tier). ","keywords":"windows, memory acquisition, artifacts","metadata":{"title":"Implementing Micro-Segmentation in a Legacy Enterprise Lab Network: A Zero Trust Approach to Reducing Lateral Movement, Improving Containment, and Controlling Operational Overhead","description":"This study evaluates micro-segmentation as a practical Zero Trust control in a Windows Active Directory lab that models common legacy dependencies (directory services, file services, a web tier, and a database tier). ","keywords":"windows, memory acquisition, artifacts","robots":[],"canonical_url":"https://www.sans.org/white-papers/implementing-micro-segmentation-legacy-enterprise-lab-network","canonical_url_override":"","browser_title":"Implementing Micro-Segmentation in a Legacy Enterprise Lab Network | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"blt432d4c7ef7efb8c2","_version":1,"locale":"en-us","ACL":{},"alt_text":"Keyboards in a line","caption":"","created_at":"2025-12-05T16:29:06.756Z","created_by":"blt58929c2940d86abd","image":{"uid":"blt99c468308a819652","_version":2,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-12-04T14:23:40.671Z","created_by":"blt58929c2940d86abd","description":"600x510","dimension":{"height":510,"width":600},"file_size":"304213","filename":"assets_fallback_2-column_Cheat-Sheet_600x510.png","parent_uid":"blt92289511a3219723","tags":["whitepaper","white paper","stock","thumbnail"],"title":"Whitepaper: Thumbnail: Stock 5","updated_at":"2025-12-05T16:28:20.718Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-05T16:28:23.634Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt99c468308a819652/6931996c7737a334da684f0d/assets_fallback_2-column_Cheat-Sheet_600x510.png"},"tags":["whitepaper","white paper","stock"],"title":"Whitepaper: Thumbnail: Stock 5","updated_at":"2025-12-05T16:29:06.756Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-05T16:29:10.557Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-03-24","displayDateTimestamp":1774310400,"authors":[],"facets":{"focusArea":["Digital Forensics and Incident Response"],"language":["English"],"topic":["Risk"]},"objectID":"white_paper_single.bltfc84c74562d51c99","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-03-24T14:00:57.334Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-03-24T14:00:10.413Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"bltfc84c74562d51c99","matchLevel":"none","matchedWords":[]},"title":{"value":"Implementing Micro-Segmentation in a Legacy Enterprise Lab Network: A Zero Trust Approach to Reducing Lateral Movement, Improving Containment, and Controlling Operational Overhead","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/implementing-micro-segmentation-legacy-enterprise-lab-network","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1774360857","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1774360810","matchLevel":"none","matchedWords":[]},"description":{"value":"This study evaluates micro-segmentation as a practical Zero Trust control in a Windows Active Directory lab that models common legacy dependencies (directory services, file services, a web tier, and a database tier). ","matchLevel":"none","matchedWords":[]},"keywords":{"value":"windows, memory acquisition, artifacts","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"Implementing Micro-Segmentation in a Legacy Enterprise Lab Network: A Zero Trust Approach to Reducing Lateral Movement, Improving Containment, and Controlling Operational Overhead","matchLevel":"none","matchedWords":[]},"description":{"value":"This study evaluates micro-segmentation as a practical Zero Trust control in a Windows Active Directory lab that models common legacy dependencies (directory services, file services, a web tier, and a database tier). ","matchLevel":"none","matchedWords":[]},"keywords":{"value":"windows, memory acquisition, artifacts","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/implementing-micro-segmentation-legacy-enterprise-lab-network","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"Implementing Micro-Segmentation in a Legacy Enterprise Lab Network | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt432d4c7ef7efb8c2","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Keyboards in a line","matchLevel":"none","matchedWords":[]},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-05T16:29:06.756Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"blt99c468308a819652","matchLevel":"none","matchedWords":[]},"_version":{"value":"2","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-04T14:23:40.671Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"304213","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_fallback_2-column_Cheat-Sheet_600x510.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt92289511a3219723","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"white paper","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 5","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-05T16:28:20.718Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-05T16:28:23.634Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt99c468308a819652/6931996c7737a334da684f0d/assets_fallback_2-column_Cheat-Sheet_600x510.png","matchLevel":"none","matchedWords":[]}},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"white paper","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 5","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-05T16:29:06.756Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-05T16:29:10.557Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-03-24","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1774310400","matchLevel":"none","matchedWords":[]},"facets":{"focusArea":[{"value":"Digital Forensics and Incident Response","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"Risk","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-03-20T20:40:42.543Z","createdAt":"2026-03-20T20:40:42.543Z","uid":"blt73dfc1a56720981f","title":"Assessing the Impact of Memory Acquisition on Key Windows Artifacts","locale":"en-us","url":"/white-papers/assessing-impact-memory-acquisition-key-windows-artifacts","updatedAtTimestamp":1774039242,"createdAtTimestamp":1774039242,"description":"This research evaluates the impact of memory capture tools on data at rest, aiming to understand the degree of change that occurs to artifacts, measure differences based on tool selection, and inform best practices for live responders.","keywords":"windows, memory acquisition, artifacts","metadata":{"title":"Assessing the Impact of Memory Acquisition on Key Windows Artifacts","description":"This research evaluates the impact of memory capture tools on data at rest, aiming to understand the degree of change that occurs to artifacts, measure differences based on tool selection, and inform best practices for live responders. ","keywords":"windows, memory acquisition, artifacts","robots":[],"canonical_url":"https://www.sans.org/white-papers/assessing-impact-memory-acquisition-key-windows-artifacts","canonical_url_override":"","browser_title":"Assessing the Impact of Memory Acquisition on Key Windows Artifacts | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"blt432d4c7ef7efb8c2","_version":1,"locale":"en-us","ACL":{},"alt_text":"Keyboards in a line","caption":"","created_at":"2025-12-05T16:29:06.756Z","created_by":"blt58929c2940d86abd","image":{"uid":"blt99c468308a819652","_version":2,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-12-04T14:23:40.671Z","created_by":"blt58929c2940d86abd","description":"600x510","dimension":{"height":510,"width":600},"file_size":"304213","filename":"assets_fallback_2-column_Cheat-Sheet_600x510.png","parent_uid":"blt92289511a3219723","tags":["whitepaper","white paper","stock","thumbnail"],"title":"Whitepaper: Thumbnail: Stock 5","updated_at":"2025-12-05T16:28:20.718Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-05T16:28:23.634Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt99c468308a819652/6931996c7737a334da684f0d/assets_fallback_2-column_Cheat-Sheet_600x510.png"},"tags":["whitepaper","white paper","stock"],"title":"Whitepaper: Thumbnail: Stock 5","updated_at":"2025-12-05T16:29:06.756Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-05T16:29:10.557Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-03-20","displayDateTimestamp":1773964800,"authors":[],"facets":{"focusArea":["Digital Forensics and Incident Response"],"language":["English"],"topic":["Incident response"]},"objectID":"white_paper_single.blt73dfc1a56720981f","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-03-20T20:40:42.543Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-03-20T20:40:42.543Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt73dfc1a56720981f","matchLevel":"none","matchedWords":[]},"title":{"value":"Assessing the Impact of Memory Acquisition on Key Windows Artifacts","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/assessing-impact-memory-acquisition-key-windows-artifacts","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1774039242","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1774039242","matchLevel":"none","matchedWords":[]},"description":{"value":"This research evaluates the impact of memory capture tools on data at rest, aiming to understand the degree of change that occurs to artifacts, measure differences based on tool selection, and inform best practices for live responders.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"windows, memory acquisition, artifacts","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"Assessing the Impact of Memory Acquisition on Key Windows Artifacts","matchLevel":"none","matchedWords":[]},"description":{"value":"This research evaluates the impact of memory capture tools on data at rest, aiming to understand the degree of change that occurs to artifacts, measure differences based on tool selection, and inform best practices for live responders. ","matchLevel":"none","matchedWords":[]},"keywords":{"value":"windows, memory acquisition, artifacts","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/assessing-impact-memory-acquisition-key-windows-artifacts","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"Assessing the Impact of Memory Acquisition on Key Windows Artifacts | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt432d4c7ef7efb8c2","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Keyboards in a line","matchLevel":"none","matchedWords":[]},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-05T16:29:06.756Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"blt99c468308a819652","matchLevel":"none","matchedWords":[]},"_version":{"value":"2","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-04T14:23:40.671Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"304213","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_fallback_2-column_Cheat-Sheet_600x510.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt92289511a3219723","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"white paper","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 5","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-05T16:28:20.718Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-05T16:28:23.634Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt99c468308a819652/6931996c7737a334da684f0d/assets_fallback_2-column_Cheat-Sheet_600x510.png","matchLevel":"none","matchedWords":[]}},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"white paper","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 5","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-05T16:29:06.756Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-05T16:29:10.557Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-03-20","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1773964800","matchLevel":"none","matchedWords":[]},"facets":{"focusArea":[{"value":"Digital Forensics and Incident Response","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"Incident response","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-03-20T18:32:17.026Z","createdAt":"2026-03-20T18:23:48.476Z","uid":"blt56488cbc1eca05a2","title":"Post-Exploitation: C2 Framework Effectiveness Against Advanced Audit Logging","locale":"en-us","url":"/post-exploitation-c2-framework-effectiveness-against-advanced-audit-logging","updatedAtTimestamp":1774031537,"createdAtTimestamp":1774031028,"description":"This research paper examines the effectiveness of a sample of open-source Commandand-Control (C2) frameworks in evading advanced audit logging during postexploitation.","keywords":"open-source, c2, frameworks, exploitation","metadata":{"title":"Post-Exploitation: C2 Framework Effectiveness Against Advanced Audit Logging","description":"This research paper examines the effectiveness of a sample of open-source Commandand-Control (C2) frameworks in evading advanced audit logging during postexploitation.","keywords":"open-source, c2, frameworks, exploitation","robots":[],"canonical_url":"https://www.sans.org/post-exploitation-c2-framework-effectiveness-against-advanced-audit-logging","canonical_url_override":"","browser_title":"Post-Exploitation: C2 Framework Effectiveness Against Advanced Audit Logging | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"blt389e0807c9792316","title":"Whitepaper: Thumbnail: Abstract 1","image":{"uid":"blt264f59cf15275d55","_version":3,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-07-15T07:59:21.864Z","created_by":"blt3fce71b3cc7d233d","description":"600x510","dimension":{"height":510,"width":600},"file_size":"557756","filename":"assets_whitepaper_abstract_600x510.png","parent_uid":"blt92289511a3219723","tags":["whitepaper","thumbnail","abstract"],"title":"Whitepaper: Thumbnail: Abstract 1","updated_at":"2025-12-29T10:29:43.996Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-29T10:29:46.037Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt264f59cf15275d55/68760a59a2509fcce033f213/assets_whitepaper_abstract_600x510.png"},"caption":"","alt_text":"Whitepaper","tags":["whitepaper","thumbnail","abstract"],"locale":"en-us","created_by":"blt3fce71b3cc7d233d","updated_by":"blt3fce71b3cc7d233d","created_at":"2025-07-15T08:02:41.657Z","updated_at":"2025-07-15T08:02:41.657Z","ACL":{},"_version":1,"publish_details":{"time":"2025-08-04T15:03:48.637Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-03-20","displayDateTimestamp":1773964800,"authors":[],"facets":{"focusArea":["Offensive Operations"],"language":["English"],"topic":["Incident response","Linux"]},"objectID":"white_paper_single.blt56488cbc1eca05a2","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-03-20T18:32:17.026Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-03-20T18:23:48.476Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt56488cbc1eca05a2","matchLevel":"none","matchedWords":[]},"title":{"value":"Post-Exploitation: C2 Framework Effectiveness Against Advanced Audit Logging","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/post-exploitation-c2-framework-effectiveness-against-advanced-audit-logging","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1774031537","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1774031028","matchLevel":"none","matchedWords":[]},"description":{"value":"This research paper examines the effectiveness of a sample of open-source Commandand-Control (C2) frameworks in evading advanced audit logging during postexploitation.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"open-source, c2, frameworks, exploitation","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"Post-Exploitation: C2 Framework Effectiveness Against Advanced Audit Logging","matchLevel":"none","matchedWords":[]},"description":{"value":"This research paper examines the effectiveness of a sample of open-source Commandand-Control (C2) frameworks in evading advanced audit logging during postexploitation.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"open-source, c2, frameworks, exploitation","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/post-exploitation-c2-framework-effectiveness-against-advanced-audit-logging","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"Post-Exploitation: C2 Framework Effectiveness Against Advanced Audit Logging | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt389e0807c9792316","matchLevel":"none","matchedWords":[]},"title":{"value":"Whitepaper: Thumbnail: Abstract 1","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"blt264f59cf15275d55","matchLevel":"none","matchedWords":[]},"_version":{"value":"3","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-07-15T07:59:21.864Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"557756","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_whitepaper_abstract_600x510.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt92289511a3219723","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"abstract","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Abstract 1","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-29T10:29:43.996Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-29T10:29:46.037Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt264f59cf15275d55/68760a59a2509fcce033f213/assets_whitepaper_abstract_600x510.png","matchLevel":"none","matchedWords":[]}},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Whitepaper","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"abstract","matchLevel":"none","matchedWords":[]}],"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-07-15T08:02:41.657Z","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-07-15T08:02:41.657Z","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-08-04T15:03:48.637Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-03-20","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1773964800","matchLevel":"none","matchedWords":[]},"facets":{"focusArea":[{"value":"Offensive Operations","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"Incident response","matchLevel":"none","matchedWords":[]},{"value":"Linux","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-03-20T18:54:20.414Z","createdAt":"2026-03-20T18:53:25.248Z","uid":"blt52c57b579386c553","title":"Enhancing Linux Threat Detection: A Sysmon - Based Approach to Identifying Sandworm TTPs","locale":"en-us","url":"/white-papers/enhancing-linux-threat-detection-sysmon-based-approach-identifying-sandworm-ttps","updatedAtTimestamp":1774032860,"createdAtTimestamp":1774032805,"description":"Linux systems have become foundational across modern IT enterprises. Threat actors are increasingly targeting Linux systems, including well - known advanced persistent threats (APTs) such as Sandworm.","keywords":"linux, ttps, sandworm, threat detection, sysmon","metadata":{"title":"Enhancing Linux Threat Detection: A Sysmon - Based Approach to Identifying Sandworm TTPs","description":"Linux systems have become foundational across modern IT enterprises. Threat actors are increasingly targeting Linux systems, including well - known advanced persistent threats (APTs) such as Sandworm. This research evaluates the effectiveness of Sysmon for Linux in detecting Sandworm tactics, techniques, and procedures (TTPs) compared to the more established Linux audit subsystem (auditd).","keywords":"linux, ttps, sandworm, threat detection, sysmon","robots":[],"canonical_url":"https://www.sans.org/white-papers/enhancing-linux-threat-detection-sysmon-based-approach-identifying-sandworm-ttps","canonical_url_override":"","browser_title":"Enhancing Linux Threat Detection: A Sysmon - Based Approach to Identifying Sandworm TTPs | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"bltb0e80501d68a0697","_version":1,"locale":"en-us","ACL":{},"alt_text":"Person reading whitepaper","caption":"","created_at":"2025-07-15T08:01:38.630Z","created_by":"blt3fce71b3cc7d233d","image":{"uid":"blta52eb8c0a8ed3a24","_version":3,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-07-15T07:59:21.948Z","created_by":"blt3fce71b3cc7d233d","description":"600x510","dimension":{"height":510,"width":600},"file_size":"326191","filename":"assets_whitepaper_stock2_600x510.png","parent_uid":"blt92289511a3219723","tags":["stock","whitepaper","thumbnail"],"title":"Whitepaper: Thumbnail: Stock 2","updated_at":"2025-12-29T10:29:20.258Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-29T10:29:23.161Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta52eb8c0a8ed3a24/68760a59117f15ab9b303f1f/assets_whitepaper_stock2_600x510.png"},"tags":["whitepaper","thumbnail","stock"],"title":"Whitepaper: Thumbnail: Stock 2","updated_at":"2025-07-15T08:01:38.630Z","updated_by":"blt3fce71b3cc7d233d","publish_details":{"time":"2025-08-05T12:10:44.610Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-03-20","displayDateTimestamp":1773964800,"authors":[],"facets":{"focusArea":["Cyber Defense"],"language":["English"],"topic":["Incident response","Linux"]},"objectID":"white_paper_single.blt52c57b579386c553","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-03-20T18:54:20.414Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-03-20T18:53:25.248Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt52c57b579386c553","matchLevel":"none","matchedWords":[]},"title":{"value":"Enhancing Linux Threat Detection: A Sysmon - Based Approach to Identifying Sandworm TTPs","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/enhancing-linux-threat-detection-sysmon-based-approach-identifying-sandworm-ttps","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1774032860","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1774032805","matchLevel":"none","matchedWords":[]},"description":{"value":"Linux systems have become foundational across modern IT enterprises. Threat actors are increasingly targeting Linux systems, including well - known advanced persistent threats (APTs) such as Sandworm.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"linux, ttps, sandworm, threat detection, sysmon","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"Enhancing Linux Threat Detection: A Sysmon - Based Approach to Identifying Sandworm TTPs","matchLevel":"none","matchedWords":[]},"description":{"value":"Linux systems have become foundational across modern IT enterprises. Threat actors are increasingly targeting Linux systems, including well - known advanced persistent threats (APTs) such as Sandworm. This research evaluates the effectiveness of Sysmon for Linux in detecting Sandworm tactics, techniques, and procedures (TTPs) compared to the more established Linux audit subsystem (auditd).","matchLevel":"none","matchedWords":[]},"keywords":{"value":"linux, ttps, sandworm, threat detection, sysmon","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/enhancing-linux-threat-detection-sysmon-based-approach-identifying-sandworm-ttps","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"Enhancing Linux Threat Detection: A Sysmon - Based Approach to Identifying Sandworm TTPs | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"bltb0e80501d68a0697","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Person reading whitepaper","matchLevel":"none","matchedWords":[]},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-07-15T08:01:38.630Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"blta52eb8c0a8ed3a24","matchLevel":"none","matchedWords":[]},"_version":{"value":"3","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-07-15T07:59:21.948Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"326191","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_whitepaper_stock2_600x510.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt92289511a3219723","matchLevel":"none","matchedWords":[]},"tags":[{"value":"stock","matchLevel":"none","matchedWords":[]},{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 2","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-29T10:29:20.258Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-29T10:29:23.161Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta52eb8c0a8ed3a24/68760a59117f15ab9b303f1f/assets_whitepaper_stock2_600x510.png","matchLevel":"none","matchedWords":[]}},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 2","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-07-15T08:01:38.630Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt3fce71b3cc7d233d","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-08-05T12:10:44.610Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-03-20","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1773964800","matchLevel":"none","matchedWords":[]},"facets":{"focusArea":[{"value":"Cyber Defense","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"Incident response","matchLevel":"none","matchedWords":[]},{"value":"Linux","matchLevel":"none","matchedWords":[]}]}}},{"contentType":"white_paper_single","updatedAt":"2026-03-20T20:18:40.665Z","createdAt":"2026-03-20T20:17:21.464Z","uid":"blt435fe0c2eab90e5c","title":"Leveraging Generative AI for Password Cracking Efficiency Under Resource Constraints","locale":"en-us","url":"/white-papers/leveraging-generative-ai-password-cracking-efficiency-under-resource-constraints","updatedAtTimestamp":1774037920,"createdAtTimestamp":1774037841,"description":"The purpose of this research is to investigate whether generative AI can alleviate the hardware and financial burdens of password cracking (password recovery) while maintaining or even improving cracking success rates.","keywords":"gen ai, password cracking, leveraging","metadata":{"title":"Leveraging Generative AI for Password Cracking Efficiency Under Resource Constraints","description":"The purpose of this research is to investigate whether generative AI can alleviate the hardware and financial burdens of password cracking (password recovery) while maintaining or even improving cracking success rates. By comparing AI-assisted methods with established baselines, this study aims to provide practitioners with practical, low-cost techniques for constrained environments.","keywords":"gen ai, password cracking, leveraging","robots":[],"canonical_url":"https://www.sans.org/white-papers/leveraging-generative-ai-password-cracking-efficiency-under-resource-constraints","canonical_url_override":"","browser_title":"Leveraging Generative AI for Password Cracking Efficiency Under Resource Constraints | SANS Institute","language":"en"},"thumbnail":[{"_content_type_uid":"image","uid":"blt28187c53965b9ed5","locale":"en-us","_version":1,"ACL":{},"alt_text":"Woman smiling at tablet","caption":"","created_at":"2025-12-05T16:26:47.500Z","created_by":"blt58929c2940d86abd","image":{"uid":"blt888d910101ac1ed0","_version":3,"is_dir":false,"ACL":{},"content_type":"image/png","created_at":"2025-12-04T14:23:13.808Z","created_by":"blt58929c2940d86abd","description":"600x510","dimension":{"height":510,"width":600},"file_size":"574361","filename":"assets_2-column_600x510_stock6.png","parent_uid":"blt92289511a3219723","tags":["whitepaper","thumbnail","white paper","stock","woman smiling at laptop"],"title":"Whitepaper: Thumbnail: Stock 3","updated_at":"2025-12-05T16:26:01.381Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-05T16:26:04.337Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"},"url":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt888d910101ac1ed0/693199517737a30ed6684f09/assets_2-column_600x510_stock6.png"},"tags":["abstract","whitepaper","white paper"],"title":"Whitepaper: Thumbnail: Stock 3","updated_at":"2025-12-05T16:26:47.500Z","updated_by":"blt58929c2940d86abd","publish_details":{"time":"2025-12-05T16:26:49.889Z","user":"blt58929c2940d86abd","environment":"blt270ee554e80b4d53","locale":"en-us"}}],"displayDate":"2026-03-20","displayDateTimestamp":1773964800,"authors":[],"facets":{"focusArea":["Artificial Intelligence"],"language":["English"],"topic":["AI","Risk"]},"objectID":"white_paper_single.blt435fe0c2eab90e5c","_highlightResult":{"contentType":{"value":"white_paper_single","matchLevel":"none","matchedWords":[]},"updatedAt":{"value":"2026-03-20T20:18:40.665Z","matchLevel":"none","matchedWords":[]},"createdAt":{"value":"2026-03-20T20:17:21.464Z","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt435fe0c2eab90e5c","matchLevel":"none","matchedWords":[]},"title":{"value":"Leveraging Generative AI for Password Cracking Efficiency Under Resource Constraints","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"url":{"value":"/white-papers/leveraging-generative-ai-password-cracking-efficiency-under-resource-constraints","matchLevel":"none","matchedWords":[]},"updatedAtTimestamp":{"value":"1774037920","matchLevel":"none","matchedWords":[]},"createdAtTimestamp":{"value":"1774037841","matchLevel":"none","matchedWords":[]},"description":{"value":"The purpose of this research is to investigate whether generative AI can alleviate the hardware and financial burdens of password cracking (password recovery) while maintaining or even improving cracking success rates.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"gen ai, password cracking, leveraging","matchLevel":"none","matchedWords":[]},"metadata":{"title":{"value":"Leveraging Generative AI for Password Cracking Efficiency Under Resource Constraints","matchLevel":"none","matchedWords":[]},"description":{"value":"The purpose of this research is to investigate whether generative AI can alleviate the hardware and financial burdens of password cracking (password recovery) while maintaining or even improving cracking success rates. By comparing AI-assisted methods with established baselines, this study aims to provide practitioners with practical, low-cost techniques for constrained environments.","matchLevel":"none","matchedWords":[]},"keywords":{"value":"gen ai, password cracking, leveraging","matchLevel":"none","matchedWords":[]},"canonical_url":{"value":"https://www.sans.org/white-papers/leveraging-generative-ai-password-cracking-efficiency-under-resource-constraints","matchLevel":"none","matchedWords":[]},"canonical_url_override":{"value":"","matchLevel":"none","matchedWords":[]},"browser_title":{"value":"Leveraging Generative AI for Password Cracking Efficiency Under Resource Constraints | SANS Institute","matchLevel":"none","matchedWords":[]},"language":{"value":"en","matchLevel":"none","matchedWords":[]}},"thumbnail":[{"_content_type_uid":{"value":"image","matchLevel":"none","matchedWords":[]},"uid":{"value":"blt28187c53965b9ed5","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]},"_version":{"value":"1","matchLevel":"none","matchedWords":[]},"alt_text":{"value":"Woman smiling at tablet","matchLevel":"none","matchedWords":[]},"caption":{"value":"","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-05T16:26:47.500Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"image":{"uid":{"value":"blt888d910101ac1ed0","matchLevel":"none","matchedWords":[]},"_version":{"value":"3","matchLevel":"none","matchedWords":[]},"content_type":{"value":"image/png","matchLevel":"none","matchedWords":[]},"created_at":{"value":"2025-12-04T14:23:13.808Z","matchLevel":"none","matchedWords":[]},"created_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"description":{"value":"600x510","matchLevel":"none","matchedWords":[]},"dimension":{"height":{"value":"510","matchLevel":"none","matchedWords":[]},"width":{"value":"600","matchLevel":"none","matchedWords":[]}},"file_size":{"value":"574361","matchLevel":"none","matchedWords":[]},"filename":{"value":"assets_2-column_600x510_stock6.png","matchLevel":"none","matchedWords":[]},"parent_uid":{"value":"blt92289511a3219723","matchLevel":"none","matchedWords":[]},"tags":[{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"thumbnail","matchLevel":"none","matchedWords":[]},{"value":"white paper","matchLevel":"none","matchedWords":[]},{"value":"stock","matchLevel":"none","matchedWords":[]},{"value":"woman smiling at laptop","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 3","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-05T16:26:01.381Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-05T16:26:04.337Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}},"url":{"value":"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt888d910101ac1ed0/693199517737a30ed6684f09/assets_2-column_600x510_stock6.png","matchLevel":"none","matchedWords":[]}},"tags":[{"value":"abstract","matchLevel":"none","matchedWords":[]},{"value":"whitepaper","matchLevel":"none","matchedWords":[]},{"value":"white paper","matchLevel":"none","matchedWords":[]}],"title":{"value":"Whitepaper: Thumbnail: Stock 3","matchLevel":"none","matchedWords":[]},"updated_at":{"value":"2025-12-05T16:26:47.500Z","matchLevel":"none","matchedWords":[]},"updated_by":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"publish_details":{"time":{"value":"2025-12-05T16:26:49.889Z","matchLevel":"none","matchedWords":[]},"user":{"value":"blt58929c2940d86abd","matchLevel":"none","matchedWords":[]},"environment":{"value":"blt270ee554e80b4d53","matchLevel":"none","matchedWords":[]},"locale":{"value":"en-us","matchLevel":"none","matchedWords":[]}}}],"displayDate":{"value":"2026-03-20","matchLevel":"none","matchedWords":[]},"displayDateTimestamp":{"value":"1773964800","matchLevel":"none","matchedWords":[]},"facets":{"focusArea":[{"value":"Artificial Intelligence","matchLevel":"none","matchedWords":[]}],"language":[{"value":"English","matchLevel":"none","matchedWords":[]}],"topic":[{"value":"AI","matchLevel":"none","matchedWords":[]},{"value":"Risk","matchLevel":"none","matchedWords":[]}]}}}],"nbHits":3129,"page":0,"nbPages":261,"hitsPerPage":12,"facets":{"facets.language":{"English":3128,"Portuguese":1},"facets.focusArea":{"Cyber Defense":427,"Digital Forensics and Incident Response":369,"Cybersecurity Leadership":294,"Security Awareness":245,"Cybersecurity and IT Essentials":137,"Cloud Security":118,"Industrial Control Systems Security":76,"Artificial Intelligence":41,"Offensive Operations":17,"Cybersecurity Insights":2}},"exhaustiveFacetsCount":true,"exhaustiveNbHits":true,"exhaustiveTypo":true,"exhaustive":{"facetsCount":true,"nbHits":true,"typo":true},"query":"","params":"facets=%5B%22facets.focusArea%22%2C%22facets.language%22%5D\u0026highlightPostTag=__%2Fais-highlight__\u0026highlightPreTag=__ais-highlight__\u0026hitsPerPage=12\u0026maxValuesPerFacet=10\u0026page=0","index":"white_paper_single_displayDateTimestamp_desc","renderingContent":{},"processingTimeMS":1,"processingTimingsMS":{"_request":{"roundTrip":3},"afterFetch":{"format":{"highlighting":1,"total":2}},"total":0},"serverTimeMS":2}],"requestParams":[{"facets":["facets.focusArea","facets.language"],"highlightPostTag":"__/ais-highlight__","highlightPreTag":"__ais-highlight__","hitsPerPage":12,"maxValuesPerFacet":10,"page":0,"query":""}]}}</script></head><body class="__variable_71459b __variable_5c0054 __variable_9e78df"><div hidden=""><!--$--><!--/$--></div><!--$--><!--/$--><!--$--><!--/$--><noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-N9Z5JVC" style="display:none;visibility:hidden" width="0"></iframe></noscript><script>((a,b,c,d,e,f,g,h)=>{let i=document.documentElement,j=["light","dark"];function k(b){var c;(Array.isArray(a)?a:[a]).forEach(a=>{let c="class"===a,d=c&&f?e.map(a=>f[a]||a):e;c?(i.classList.remove(...d),i.classList.add(b)):i.setAttribute(a,b)}),c=b,h&&j.includes(c)&&(i.style.colorScheme=c)}if(d)k(d);else try{let a=localStorage.getItem(b)||c,d=g&&"system"===a?window.matchMedia("(prefers-color-scheme: dark)").matches?"dark":"light":a;k(d)}catch(a){}})("data-theme","theme","system",null,["light","dark"],null,true,false)</script><div class="c-skip-links"><ul class="skip-links__list u-container"><li class="skip-links__list-item"><button class="c-button button--tertiary-white skip-links__list-item-button" type="button"><span class="button__label">Skip to main content</span></button></li><li class="skip-links__list-item"><button class="c-button button--tertiary-white skip-links__list-item-button" type="button"><span class="button__label">Go to search</span></button></li><li class="skip-links__list-item"><button class="c-button button--tertiary-white skip-links__list-item-button" type="button"><span class="button__label">Go to footer</span></button></li></ul></div><header class="c-header header--is-visible"><div class="c-topbar"><div class="c-container topbar__container"><nav aria-label="Topbar navigation" class="topbar__nav"><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/login"><svg height="16" width="16"><use href="/icons.svg#login"></use></svg>Log In</a></div><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/create"><svg height="16" width="16"><use href="/icons.svg#new"></use></svg>Join - It&#x27;s Free</a></div></nav><button class="c-theme-switcher" type="button"><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#moon"></use></svg><span class="sr-only"></span><span class="theme-switcher__toggle"></span><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#sun"></use></svg></button></div></div><div class="header__wrapper"><div class="c-container header__container"><a aria-disabled="false" aria-label="Go to homepage" href="/"><svg height="33" width="65" class="header__logo"><use href="/icons.svg#logo"></use></svg></a><div class="header__drawer"><div class="c-mobile-drawer-search" role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="mobile-drawer-search-label"><form class="mobile-drawer-search__form" noValidate="" role="search" action="" method="GET"><label class="sr-only" for="mobile-drawer-search-input" id="mobile-drawer-search-label">Search</label><div class="c-search-input mobile-drawer-search__input"><input autoCapitalize="none" class="search-input__field" type="search" aria-autocomplete="both" aria-labelledby="mobile-drawer-search-label" id="mobile-drawer-search-input" autoComplete="off" autoCorrect="off" enterKeyHint="search" spellCheck="false" placeholder="What are you looking for?" maxLength="512"/><div class="search-input__buttons"><button class="c-button button--primary button--icon-right button--is-icon-only" type="submit"><div class="c-loading-spinner loading-spinner--size-md button__loader"><div class="loading-spinner__spinner"></div></div><span class="sr-only">Search</span></button></div></div></form><div class="search-results--mobile-drawer"></div></div><div class="c-header-navigation"><div aria-label="Main tab navigation" class="header-navigation__tabs" role="tablist"><button id="header-navigation-tab-0" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-0" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Training</span></button><button id="header-navigation-tab-1" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-1" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learning Paths</span></button><button id="header-navigation-tab-2" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-2" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Free Resources</span></button><button id="header-navigation-tab-3" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-3" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">For Organizations</span></button></div><div aria-labelledby="header-navigation-tab-0" id="header-navigation-tab-0" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/cyber-security-training-overview">Training</a><div class="c-grid grid--columns-12"><nav aria-label="navigation for: training" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-8 header-navigation__tabpanel-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="Courses" class="header-navigation__tabpanel-link-container" href="/cybersecurity-courses"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#courses-cards-three"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Courses</p><p class="c-text header-navigation__tabpanel-item-single-description">Build cyber prowess with training from renowned experts</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Ways to Train" class="header-navigation__tabpanel-link-container" href="/cyber-security-training-formats"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#training"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Ways to Train</p><p class="c-text header-navigation__tabpanel-item-single-description">Multiple training options to best fit your schedule and preferred learning style</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Cyber Ranges" class="header-navigation__tabpanel-link-container" href="/cyber-ranges"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#hands-on-solutions"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Cyber Ranges</p><p class="c-text header-navigation__tabpanel-item-single-description">Hands-on training to keep you at the top of your game</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a href="/cyber-security-training-events" aria-label="Training Events &amp; Summits" class="header-navigation__tabpanel-link-container" target="_self"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#location"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Training Events &amp; Summits</p><p class="c-text header-navigation__tabpanel-item-single-description">Expert-led training at locations around the world</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Certifications" class="header-navigation__tabpanel-link-container" href="/cyber-security-certifications"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#sealcheck-certification"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Certifications</p><p class="c-text header-navigation__tabpanel-item-single-description">Demonstrate cybersecurity expertise with GIAC certifications</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Free Training Events" class="header-navigation__tabpanel-link-container" href="/free-cybersecurity-events"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#calendar-check"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Free Training Events</p><p class="c-text header-navigation__tabpanel-item-single-description">Upcoming workshops, webinars and local events
</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Workforce Security and Risk Training " class="header-navigation__tabpanel-link-container" href="/for-organizations/workforce"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#shield-workforce"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Workforce Security and Risk Training </p><p class="c-text header-navigation__tabpanel-item-single-description">Harden enterprise security with end-user and role-based training</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Meet Our Instructors" class="header-navigation__tabpanel-link-container" href="/instructors"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#user-private-training"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Meet Our Instructors</p><p class="c-text header-navigation__tabpanel-item-single-description">Train with world-class cybersecurity experts who bring real-world expertise to class.</p></div></a></div></nav><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-card"><div class="header-navigation__tabpanel-card"><div class="header-navigation__tabpanel-card-title"><span class="c-heading heading--is-h6 heading--is-h6-desktop">Featured Course</span><a class="c-button button--tertiary header-navigation__tabpanel-card-button" href="/cyber-security-courses"><span class="button__label">View All Courses</span></a></div><article class="c-course-card course-card--is-default header-navigation__tabpanel-course-card" id="SEC595"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals</h3><header class="course-card__header"></header><div class="course-card__labels"><span class="course-card__label-code">SEC595</span><span class="course-card__label-focus-area">Cyber Defense, Artificial Intelligence</span></div><div class="course-card__image-wrapper"><img alt="SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=3840&amp;quality=75&amp;format=webp"/></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/applied-data-science-machine-learning"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/applied-data-science-machine-learning#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Get a Free Hour of SANS Training</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">Experience SANS training through course previews.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/course-preview"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn More</span></a></div></div></div></div><div aria-labelledby="header-navigation-tab-1" id="header-navigation-tab-1" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/learning-paths">Learning Paths</a><div class="c-grid grid--columns-12"><nav aria-label="navigation for: learning paths" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-8 header-navigation__tabpanel-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="By Focus Area" class="header-navigation__tabpanel-link-container" href="/cybersecurity-focus-areas"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#focus"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Focus Area</p><p class="c-text header-navigation__tabpanel-item-single-description">Chart your path to job-specific training courses</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="New to Cyber" class="header-navigation__tabpanel-link-container" href="/mlp/new-to-cyber"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#new"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">New to Cyber</p><p class="c-text header-navigation__tabpanel-item-single-description">Give your cybersecurity career the right foundation for success</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="By Job Role" class="header-navigation__tabpanel-link-container" href="/job-roles"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#briefcase-management"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Job Role</p><p class="c-text header-navigation__tabpanel-item-single-description">Find the courses and certifications that align with our current or desired role</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Leadership" class="header-navigation__tabpanel-link-container" href="/cybersecurity-focus-areas/leadership"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#ranking"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Leadership</p><p class="c-text header-navigation__tabpanel-item-single-description">Training designed to help security leaders reduce organizational risk</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="By Skills Framework or Directive" class="header-navigation__tabpanel-link-container" href="/frameworks-and-directives"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#atom"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Skills Framework or Directive</p><p class="c-text header-navigation__tabpanel-item-single-description">Explore how SANS courses align with leading cybersecurity skills frameworks including NICE, ECSF and DoD 8140</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Degree and Certificate Programs" class="header-navigation__tabpanel-link-container" href="https://www.sans.edu/"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#degree"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Degree and Certificate Programs</p><p class="c-text header-navigation__tabpanel-item-single-description">Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="By Skills Roadmap" class="header-navigation__tabpanel-link-container" href="/cyber-security-skills-roadmap"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#learning-paths"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Skills Roadmap</p><p class="c-text header-navigation__tabpanel-item-single-description">Find the right training path based on critical skills</p></div></a></div></nav><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-card"><div class="header-navigation__tabpanel-card"><div class="header-navigation__tabpanel-card-title"><span class="c-heading heading--is-h6 heading--is-h6-desktop">Featured</span><a class="c-button button--tertiary header-navigation__tabpanel-card-button" href="/cybersecurity-focus-areas"><span class="button__label">View all Focus Areas</span></a></div><div class="c-learning-paths-card learning-parths-card--is-simplified learning-paths-card--is-color-ai header-navigation__tabpanel-learning-path-card"><svg height="24" width="24" class="learning-paths-card__icon"><use href="/icons.svg#related"></use></svg><a class="c-button button--tertiary-white button--icon-right button--icon-translate-right learning-paths-card__cta" href="/cybersecurity-focus-areas/ai"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">NEW - AI Security Training</span></a></div></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Can&#x27;t find what you are looking for?</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">Let us help.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/about/contact"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact us</span></a></div></div></div></div><div aria-labelledby="header-navigation-tab-2" id="header-navigation-tab-2" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/security-resources">Free Resources</a><div class="c-grid grid--columns-12"><div aria-label="navigation for: free resources" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-9 header-navigation__tabpanel-items header-navigation__tabpanel-items--is-3-grid"><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Watch &amp; Listen</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/webcasts"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Webinars</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/presentations"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Summit Presentations</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/podcasts"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Podcasts &amp; Live Streams</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/security-resources/watch-and-listen"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Read</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/blog"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Blog</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/newsletters"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Newsletters</span></a><a href="https://isc.sans.edu/" class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" target="_blank"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Internet Storm Center</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/security-resources/read"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Download</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/tools"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Open Source Tools</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/posters"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Posters &amp; Cheat Sheets</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/information-security-policy"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Policy Templates</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/white-papers"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">White Papers</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/security-resources/download"><span class="button__label">Overview</span></a></nav></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="SANS Community Benefits" class="header-navigation__tabpanel-link-container" href="/member-benefits"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#new"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">SANS Community Benefits</p><p class="c-text header-navigation__tabpanel-item-single-description">Connect, learn, and share with other cybersecurity professionals</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Customer Case Studies" class="header-navigation__tabpanel-link-container" href="/customer-reviews"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#people-3"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Customer Case Studies</p><p class="c-text header-navigation__tabpanel-item-single-description">Discover how organizations and individual cyber practitioners use SANS training and GIAC certifications</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="AI Risk &amp; Readiness" class="header-navigation__tabpanel-link-container" href="/artificial-intelligence"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#head"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">AI Risk &amp; Readiness</p><p class="c-text header-navigation__tabpanel-item-single-description">Explore expert-driven guidance, training, and tools to help defend against AI-powered threats and adopt AI securely</p></div></a></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Join the SANS Community</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">Become a member for instant access to our free resources.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/member-benefits"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Sign Up</span></a></div></div></div></div><div aria-labelledby="header-navigation-tab-3" id="header-navigation-tab-3" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/for-organizations">For Organizations</a><div class="c-grid grid--columns-12"><div aria-label="navigation for: for organizations" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-9 header-navigation__tabpanel-items header-navigation__tabpanel-items--is-3-grid"><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Team Development</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/why-partner-with-sans"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Why Partner with SANS</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/group-purchasing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Group Purchases</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/cybersecurity-assessments"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Skills &amp; Talent Assessments</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/private-training"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Private &amp; Custom Training Programs</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/for-organizations/team-development"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Leadership Development</span><a href="/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Cybersecurity%20Leadership" class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Management Courses &amp; Accreditation</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/cyber-ranges/cyber-crisis-exercises"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Cyber Crisis Exercises</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/cyber-leaders-network"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">SANS Cyber Leaders Network</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/cybersecurity-focus-areas/leadership"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Workforce Security &amp; Risk</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/security-awareness-training"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Security Awareness Training</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/compliance-training"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Compliance Training</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/risk-management"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Risk Management</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/services"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Services</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/resources"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Resources</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/for-organizations/workforce"><span class="button__label">Overview</span></a></nav></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="Public Sector" class="header-navigation__tabpanel-link-container" href="/for-organizations/public-sector"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#building-office-enterprise"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Public Sector</p><p class="c-text header-navigation__tabpanel-item-single-description">Mission-focused cybersecurity training for government, defense, and education</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Partnerships" class="header-navigation__tabpanel-link-container" href="/partnerships"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#people-2"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Partnerships</p><p class="c-text header-navigation__tabpanel-item-single-description">Explore industry-specific programming and customized training solutions</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Sponsorship Opportunities" class="header-navigation__tabpanel-link-container" href="/sponsorship"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#info"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Sponsorship Opportunities</p><p class="c-text header-navigation__tabpanel-item-single-description">Sponsor a SANS event or research paper</p></div></a></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Interested in developing a training plan to fit your organization’s needs?</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">We&#x27;re here to help.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/about/contact"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact Us</span></a></div></div></div></div></div><a class="c-button button--primary button--icon-right button--icon-translate-right header__button" target="_top" href="/about/contact#connect-with-a-training-advisor"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact Sales</span></a><div class="c-topbar header__drawer-topbar"><div class="c-container topbar__container"><nav aria-label="Topbar navigation" class="topbar__nav"><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/login"><svg height="16" width="16"><use href="/icons.svg#login"></use></svg>Log In</a></div><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/create"><svg height="16" width="16"><use href="/icons.svg#new"></use></svg>Join - It&#x27;s Free</a></div></nav><button class="c-theme-switcher" type="button"><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#moon"></use></svg><span class="sr-only"></span><span class="theme-switcher__toggle"></span><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#sun"></use></svg></button></div></div></div><button class="c-button button--tertiary-white button--icon-right header__button-modal" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#menu"></use></svg><span class="button__label">Menu</span></button><div class="header__buttons"><div id="search"><button class="c-button button--secondary button--icon-left header__button header__button--search" aria-label="Open search" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#search"></use></svg><span class="button__label">Search</span></button><div class="desktop-header-search__modal" role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="desktop-header-search-label"><div class="desktop-header-search__input-wrapper"><div class="c-container desktop-header-search__input-container"><form class="desktop-header-search__form" noValidate="" role="search" action="" method="GET"><label class="sr-only" for="desktop-header-search-input" id="desktop-header-search-label">Search</label><input class="desktop-header-search__input" aria-autocomplete="both" aria-labelledby="desktop-header-search-label" id="desktop-header-search-input" autoComplete="off" autoCorrect="off" autoCapitalize="none" enterKeyHint="search" spellCheck="false" placeholder="What are you looking for?" maxLength="512" type="search" name="query"/><button class="c-button button--unstyled button--icon-right button--is-icon-only desktop-header-search__close-button" aria-label="Close" type="reset"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#close"></use></svg></button></form></div></div><div class="desktop-header-search__panel"></div></div></div><a class="c-button button--primary button--icon-right button--icon-translate-right header__button" target="_top" href="/about/contact#connect-with-a-training-advisor"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact Sales</span></a></div></div></div></header><main id="main"><div></div><div class="c-search-hero"><div class="search-hero__header-wrapper"><div class="c-grid search-hero__grid grid--has-container grid--columns-4 grid--columns-tablet-12"><div class="grid__item grid__item--col-span-4 grid__item--col-span-tablet-8 grid__item--col-span-desktop-6"><h1 class="c-heading search-hero__title" id="search-hero-title">Cybersecurity Whitepapers</h1><div class="c-rich-text hero__description"><p style="direction:ltr">Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.</p></div></div><div class="grid__item grid__item--col-span-4 grid__item--col-span-tablet-8 grid__item--col-span-desktop-6 search-hero__input-wrapper"><form noValidate="" role="search" aria-labelledby="search-hero-title" action=""><div class="c-search-input"><input autoCapitalize="none" class="search-input__field" type="search" aria-autocomplete="both" aria-labelledby="" id="search-hero-input" autoComplete="off" autoCorrect="off" enterKeyHint="search" spellCheck="false" placeholder="Type to search.." maxLength="512" value=""/><div class="search-input__buttons"><button class="c-button button--primary button--icon-right button--is-icon-only" type="submit"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#search"></use></svg><span class="sr-only">Search</span></button></div></div></form></div></div><div class="c-background-rings"><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div></div></div><div class="search-hero__results-container"></div></div><div class="algolia-lister-template__scroll-anchor"></div><div class="u-hidden"><div class="ais-SortBy"><select class="ais-SortBy-select" aria-label="Sort results by"><option class="ais-SortBy-option" value="white_paper_single_displayDateTimestamp_desc" selected="">Newest first</option><option class="ais-SortBy-option" value="white_paper_single_displayDateTimestamp_asc">Oldest first</option></select></div><div class="ais-SearchBox"><form class="ais-SearchBox-form" noValidate="" role="search" action=""><input class="ais-SearchBox-input" aria-label="Search" autoComplete="off" autoCorrect="off" autoCapitalize="off" placeholder="" spellCheck="false" maxLength="512" type="search" value=""/><button class="ais-SearchBox-submit" type="submit" title="Submit the search query"><svg class="ais-SearchBox-submitIcon" width="10" height="10" viewBox="0 0 40 40" aria-hidden="true"><path d="M26.804 29.01c-2.832 2.34-6.465 3.746-10.426 3.746C7.333 32.756 0 25.424 0 16.378 0 7.333 7.333 0 16.378 0c9.046 0 16.378 7.333 16.378 16.378 0 3.96-1.406 7.594-3.746 10.426l10.534 10.534c.607.607.61 1.59-.004 2.202-.61.61-1.597.61-2.202.004L26.804 29.01zm-10.426.627c7.323 0 13.26-5.936 13.26-13.26 0-7.32-5.937-13.257-13.26-13.257C9.056 3.12 3.12 9.056 3.12 16.378c0 7.323 5.936 13.26 13.258 13.26z"></path></svg></button><button class="ais-SearchBox-reset" type="reset" title="Clear the search query" hidden=""><svg class="ais-SearchBox-resetIcon" viewBox="0 0 20 20" width="10" height="10" aria-hidden="true"><path d="M8.114 10L.944 2.83 0 1.885 1.886 0l.943.943L10 8.113l7.17-7.17.944-.943L20 1.886l-.943.943-7.17 7.17 7.17 7.17.943.944L18.114 20l-.943-.943-7.17-7.17-7.17 7.17-.944.943L0 18.114l.943-.943L8.113 10z"></path></svg></button><span class="ais-SearchBox-loadingIndicator" hidden=""><svg aria-label="Results are loading" width="16" height="16" viewBox="0 0 38 38" stroke="#444" class="ais-SearchBox-loadingIcon" aria-hidden="true"><g fill="none" fill-rule="evenodd"><g transform="translate(1 1)" stroke-width="2"><circle stroke-opacity=".5" cx="18" cy="18" r="18"></circle><path d="M36 18c0-9.94-8.06-18-18-18"><animateTransform attributeName="transform" type="rotate" from="0 18 18" to="360 18 18" dur="1s" repeatCount="indefinite"></animateTransform></path></g></g></svg></span></form></div><div class="ais-HitsPerPage"><select class="ais-HitsPerPage-select"><option class="ais-HitsPerPage-option" value="12" selected="">12</option><option class="ais-HitsPerPage-option" value="30">30</option><option class="ais-HitsPerPage-option" value="60">60</option></select></div><div class="ais-Pagination"><ul class="ais-Pagination-list"><li class="ais-Pagination-item ais-Pagination-item--disabled ais-Pagination-item--firstPage"><span class="ais-Pagination-link" aria-label="First Page">‹‹</span></li><li class="ais-Pagination-item ais-Pagination-item--disabled ais-Pagination-item--previousPage"><span class="ais-Pagination-link" aria-label="Previous Page">‹</span></li><li class="ais-Pagination-item ais-Pagination-item--page ais-Pagination-item--selected"><a class="ais-Pagination-link" href="https://web.prod.marketing.sans.services/white-papers?page=1" aria-label="Page 1">1</a></li><li class="ais-Pagination-item ais-Pagination-item--page"><a class="ais-Pagination-link" href="https://web.prod.marketing.sans.services/white-papers?page=2" aria-label="Page 2">2</a></li><li class="ais-Pagination-item ais-Pagination-item--page"><a class="ais-Pagination-link" href="https://web.prod.marketing.sans.services/white-papers?page=3" aria-label="Page 3">3</a></li><li class="ais-Pagination-item ais-Pagination-item--page"><a class="ais-Pagination-link" href="https://web.prod.marketing.sans.services/white-papers?page=4" aria-label="Page 4">4</a></li><li class="ais-Pagination-item ais-Pagination-item--page"><a class="ais-Pagination-link" href="https://web.prod.marketing.sans.services/white-papers?page=5" aria-label="Page 5">5</a></li><li class="ais-Pagination-item ais-Pagination-item--page"><a class="ais-Pagination-link" href="https://web.prod.marketing.sans.services/white-papers?page=6" aria-label="Page 6">6</a></li><li class="ais-Pagination-item ais-Pagination-item--page"><a class="ais-Pagination-link" href="https://web.prod.marketing.sans.services/white-papers?page=7" aria-label="Page 7">7</a></li><li class="ais-Pagination-item ais-Pagination-item--nextPage"><a class="ais-Pagination-link" href="https://web.prod.marketing.sans.services/white-papers?page=2" aria-label="Next Page">›</a></li><li class="ais-Pagination-item ais-Pagination-item--lastPage"><a class="ais-Pagination-link" href="https://web.prod.marketing.sans.services/white-papers?page=261" aria-label="Last Page, Page 261">››</a></li></ul></div><div class="ais-RefinementList"><ul class="ais-RefinementList-list"><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Cyber Defense"/><span class="ais-RefinementList-labelText">Cyber Defense</span><span class="ais-RefinementList-count">427</span></label></li><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Digital Forensics and Incident Response"/><span class="ais-RefinementList-labelText">Digital Forensics and Incident Response</span><span class="ais-RefinementList-count">369</span></label></li><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Cybersecurity Leadership"/><span class="ais-RefinementList-labelText">Cybersecurity Leadership</span><span class="ais-RefinementList-count">294</span></label></li><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Security Awareness"/><span class="ais-RefinementList-labelText">Security Awareness</span><span class="ais-RefinementList-count">245</span></label></li><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Cybersecurity and IT Essentials"/><span class="ais-RefinementList-labelText">Cybersecurity and IT Essentials</span><span class="ais-RefinementList-count">137</span></label></li><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Cloud Security"/><span class="ais-RefinementList-labelText">Cloud Security</span><span class="ais-RefinementList-count">118</span></label></li><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Industrial Control Systems Security"/><span class="ais-RefinementList-labelText">Industrial Control Systems Security</span><span class="ais-RefinementList-count">76</span></label></li><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Artificial Intelligence"/><span class="ais-RefinementList-labelText">Artificial Intelligence</span><span class="ais-RefinementList-count">41</span></label></li><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Offensive Operations"/><span class="ais-RefinementList-labelText">Offensive Operations</span><span class="ais-RefinementList-count">17</span></label></li><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Cybersecurity Insights"/><span class="ais-RefinementList-labelText">Cybersecurity Insights</span><span class="ais-RefinementList-count">2</span></label></li></ul></div><div class="ais-RefinementList"><ul class="ais-RefinementList-list"><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="English"/><span class="ais-RefinementList-labelText">English</span><span class="ais-RefinementList-count">3128</span></label></li><li class="ais-RefinementList-item"><label class="ais-RefinementList-label"><input class="ais-RefinementList-checkbox" type="checkbox" value="Portuguese"/><span class="ais-RefinementList-labelText">Portuguese</span><span class="ais-RefinementList-count">1</span></label></li></ul></div></div><div class="c-lister-bar"><div class="c-container lister-bar__container"><div class="lister-bar__left-side"><div class="c-lister-filters-small-view lister-top-bar__filter-small-view"><span class="filter-small-view__label">Filter by:</span><div dir="ltr" data-orientation="horizontal"><div role="tablist" aria-orientation="horizontal" class="filter-small-view__tab-list" tabindex="-1" data-orientation="horizontal" style="outline:none"><button aria-disabled="false" id="radix-_R_ipaav5u9bb_-trigger-facets.focusArea" role="tab" tabindex="-1" class="c-button button--secondary button--icon-right c-lister-filter-tab-button" type="button" aria-selected="false" aria-controls="radix-_R_ipaav5u9bb_-content-facets.focusArea" data-state="inactive" data-orientation="horizontal" data-radix-collection-item=""><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-down-heavy"></use></svg><span class="button__label">Focus Area</span></button><button aria-disabled="false" id="radix-_R_ipaav5u9bb_-trigger-facets.language" role="tab" tabindex="-1" class="c-button button--secondary button--icon-right c-lister-filter-tab-button" type="button" aria-selected="false" aria-controls="radix-_R_ipaav5u9bb_-content-facets.language" data-state="inactive" data-orientation="horizontal" data-radix-collection-item=""><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-down-heavy"></use></svg><span class="button__label">Language</span></button></div><div class="filter-small-view__tab-panels"><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-_R_ipaav5u9bb_-trigger-facets.focusArea" hidden="" id="radix-_R_ipaav5u9bb_-content-facets.focusArea" tabindex="0" class=""></div><div data-state="inactive" data-orientation="horizontal" role="tabpanel" aria-labelledby="radix-_R_ipaav5u9bb_-trigger-facets.language" hidden="" id="radix-_R_ipaav5u9bb_-content-facets.language" tabindex="0" class=""></div></div></div></div><button class="c-button button--secondary button--icon-right c-lister-drawer-mobile-button lister-top-bar-drawer-button--mobile-only" type="button" aria-haspopup="dialog" aria-expanded="false" aria-controls="radix-_R_4paav5u9bb_" data-state="closed"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#filter"></use></svg><span class="button__label">Filter</span></button></div><div class="lister-bar__right-side"><div class="lister-bar__slot lister-bar__slot-is-hidden-on-mobile"><label class="c-select select--simple"><span class="c-form-field-label"><span class="form-field-label__text">Show:</span></span><div class="select__wrapper"><select class="select__select"><option value="12" selected="">12</option><option value="30">30</option><option value="60">60</option></select><svg height="12" width="12" class="select__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></div></label></div><div class="lister-bar__slot lister-bar__slot-is-hidden-on-mobile"><label class="c-select select--simple"><span class="c-form-field-label"><span class="form-field-label__text">Sort by:</span></span><div class="select__wrapper"><select class="select__select"><option value="white_paper_single_displayDateTimestamp_desc" selected="">Newest first</option><option value="white_paper_single_displayDateTimestamp_asc">Oldest first</option></select><svg height="12" width="12" class="select__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></div></label></div><button class="c-button button--secondary button--icon-right c-lister-drawer-mobile-button course-lister-top-bar__sort-drawer-button" type="button" aria-haspopup="dialog" aria-expanded="false" aria-controls="radix-_R_99aav5u9bb_" data-state="closed"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#sort"></use></svg><span class="button__label">Sort and view</span></button></div></div></div><div class="c-container c-algolia-lister-results-metadata algolia-lister-template__metadata algolia-lister-template__metadata--webinar-date-refinements"><span class="c-lister-showing-x-of-y algolia-lister-results-metadata__showing-x-of-y">Showing<!-- --> <b>12</b> <!-- -->of<!-- --> <!-- -->3129</span></div><div class="c-grid c-resource-lister-grid grid--has-container grid--columns-1 grid--columns-tablet-2 grid--columns-desktop-3"><a class="c-resource-card" href="/white-papers/cyber-risk-intelligence-security-posture-crisp-compliance-threat-informed-intelligence"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">Cyber Risk Intelligence and Security Posture (CRISP): From Compliance to Threat-Informed Intelligence</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Cyber Defense</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">7 Apr 2026</span></li></ul></a><a class="c-resource-card" href="/white-papers/next-generation-data-security"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">The Next Generation of Data Security</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Cybersecurity Leadership</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">6 Apr 2026</span></li><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#instructors"></use></svg><span class="resource-card__data-list-item-label">Dave Shackleford</span></li></ul></a><a class="c-resource-card" href="/white-papers/operationalizing-ctem-soc-proactive-approach-threat-detection-response"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">Operationalizing CTEM within the SOC: A Proactive Approach to Threat Detection and Response</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Cyber Defense</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">1 Apr 2026</span></li></ul></a><a class="c-resource-card" href="/white-papers/can-root-detection-be-trusted-bypass-techniques-mobile-platforms"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">Can Root Detection Be Trusted? A Study of Bypass Techniques on Mobile Platforms</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Offensive Operations</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">26 Mar 2026</span></li></ul></a><a class="c-resource-card" href="/white-papers/asset-aware-network-monitoring"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">Asset-Aware Network Monitoring</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Industrial Control Systems Security</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">26 Mar 2026</span></li></ul></a><a class="c-resource-card" href="/white-papers/focused-dump-everything-ingestion-gcp-kubernetes-siem-pipelines"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">Focused vs Dump-Everything Ingestion for GCP and Kubernetes SIEM Pipelines</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Cyber Defense</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">26 Mar 2026</span></li></ul></a><a class="c-resource-card" href="/white-papers/when-security-scanner-became-weapon"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">When the Security Scanner Became the Weapon: TeamPCP Supply Chain TTP Report</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Cloud Security</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">25 Mar 2026</span></li><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#instructors"></use></svg><span class="resource-card__data-list-item-label">Kenneth G. Hartman, Eric Johnson</span></li></ul></a><a class="c-resource-card" href="/white-papers/implementing-micro-segmentation-legacy-enterprise-lab-network"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">Implementing Micro-Segmentation in a Legacy Enterprise Lab Network: A Zero Trust Approach to Reducing Lateral Movement, Improving Containment, and Controlling Operational Overhead</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Digital Forensics and Incident Response</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">24 Mar 2026</span></li></ul></a><a class="c-resource-card" href="/white-papers/assessing-impact-memory-acquisition-key-windows-artifacts"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">Assessing the Impact of Memory Acquisition on Key Windows Artifacts</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Digital Forensics and Incident Response</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">20 Mar 2026</span></li></ul></a><a class="c-resource-card" href="/post-exploitation-c2-framework-effectiveness-against-advanced-audit-logging"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">Post-Exploitation: C2 Framework Effectiveness Against Advanced Audit Logging</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Offensive Operations</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">20 Mar 2026</span></li></ul></a><a class="c-resource-card" href="/white-papers/enhancing-linux-threat-detection-sysmon-based-approach-identifying-sandworm-ttps"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">Enhancing Linux Threat Detection: A Sysmon - Based Approach to Identifying Sandworm TTPs</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Cyber Defense</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">20 Mar 2026</span></li></ul></a><a class="c-resource-card" href="/white-papers/leveraging-generative-ai-password-cracking-efficiency-under-resource-constraints"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop resource-card__title">Leveraging Generative AI for Password Cracking Efficiency Under Resource Constraints</h3><small class="resource-card__meta"><span class="resource-card__resource">Whitepaper</span><span class="resource-card__meta-divider"></span><span class="resource-card__subtitle">Artificial Intelligence</span></small><ul class="resource-card__data-list"><li class="resource-card__data-list-item"><svg height="16" width="16" class="resource-card__data-list-item-icon"><use href="/icons.svg#calendar"></use></svg><span class="resource-card__data-list-item-label">20 Mar 2026</span></li></ul></a></div><div class="c-container c-lister-pagination u-container"><div class="lister-pagination__wrapper"><button aria-disabled="true" class="c-button button--link button--icon-left button--icon-translate-right lister-pagination__previous-button" title="Previous"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Previous</span></button><div class="lister-pagination__numbers"><button class="c-button button--unstyled lister-pagination__number lister-pagination__number--active" title="Go to page 1" type="button"><span class="button__label">1</span></button><button class="c-button button--unstyled lister-pagination__number" title="Go to page 2" type="button"><span class="button__label">2</span></button><button class="c-button button--unstyled lister-pagination__number" title="Go to page 3" type="button"><span class="button__label">3</span></button><span aria-hidden="true" class="lister-pagination__ellipsis">...</span><button class="c-button button--unstyled lister-pagination__number" title="Go to page 261" type="button"><span class="button__label">261</span></button></div><button aria-disabled="false" class="c-button button--link button--icon-right lister-pagination__next-button" title="Next"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Next</span></button></div></div><!--$--><!--/$--></main><footer class="c-footer" id="footer"><div class="c-container"><div class="footer__newsletter"><h2 class="c-heading footer__newsletter-title">Get Curated News, Vulnerabilities, and Essential Security Awareness Tips</h2><div class="footer__newsletter"><button class="c-button button--primary button--icon-right button--icon-translate-right footer__newsletter-button" type="button" aria-haspopup="dialog" aria-expanded="false" aria-controls="radix-_R_16pbb_" data-state="closed"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Subscribe to Newsletter </span></button></div></div><div class="c-grid footer__navigation grid--columns-12"><div class="grid__item grid__item--col-span-12 grid__item--col-span-desktop-3"><h2 class="c-heading heading--is-h4 heading--is-h4-desktop footer__navigation-title">The Highest Standard in Cybersecurity Education Since 1989</h2></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-desktop-5 grid__item--col-end-13"><div class="c-accordion footer__navigation-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_japbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_3apbb_" class="accordion__trigger" data-radix-collection-item="">Company<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_japbb_" hidden="" role="region" aria-labelledby="radix-_R_3apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_lapbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_5apbb_" class="accordion__trigger" data-radix-collection-item="">Help &amp; Support<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_lapbb_" hidden="" role="region" aria-labelledby="radix-_R_5apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_napbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_7apbb_" class="accordion__trigger" data-radix-collection-item="">Training Programs<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_napbb_" hidden="" role="region" aria-labelledby="radix-_R_7apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_papbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_9apbb_" class="accordion__trigger" data-radix-collection-item="">Get Involved<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_papbb_" hidden="" role="region" aria-labelledby="radix-_R_9apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="footer__copy"><a aria-label="Go to homepage" class="footer__copy-logo-link" href="/"><svg class="footer__copy-logo" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 65 33" fill="none"><path fill="currentColor" d="M7.53 13.095C4.945 9.15 2.576 6.678 2.576 3.947c0-1.994 1.008-3.22 2.588-3.22 2.323 0 4.252 3.514 4.778 9.744h.734V.433H9.94l-.965 1.91C7.926.91 6.521 0 5.163 0 2.488.001.339 2.624.339 7.263c0 4.9 2.149 8.205 4.691 12.021 2.763 4.117 4.385 7.18 4.385 9.652 0 1.95-1.184 3.048-2.762 3.048-2.893 0-5.48-3.86-5.744-11.302H0v12.114h.91l1.183-2.306C3.583 32.224 4.986 33 6.828 33c3.157 0 5.394-3.124 5.394-8.196 0-4.076-1.886-7.503-4.691-11.709m51.9 19.038c-2.544 0-4.852-3.143-5.55-8.682h6.514c1.16 2.078 1.8 3.926 1.8 5.477 0 1.951-1.184 3.206-2.764 3.206m-23.353-9.72V5.898l7.23 16.514h-7.23zm-1.225 4.6c0 3.076-.014 4.572-2.208 4.572h-1.388l-1.43-8.133h5.026zm-15.504-4.6 2.744-16.062 2.656 16.062zm40.96-9.318c-2.586-3.945-4.953-6.417-4.953-9.148 0-1.994 1.007-3.22 2.585-3.22 2.325 0 4.254 3.514 4.78 9.744h.659V.433h-.66l-.964 1.91C60.703.91 59.3 0 57.94 0c-2.674 0-4.822 2.623-4.822 7.262 0 4.899 2.148 8.3 4.691 12.117.708 1.055 1.341 2.167 1.89 3.033h-5.94c-.033-.692-.056-.866-.071-1.731h-.984v1.73h-4.201V5.032c0-2.731.175-3.73 2.45-3.685V.433h-6.825v.913c2.1 0 2.976 1.258 2.976 4.119v14.352L39.308.433h-6.382V1.3h1.924v21.113h-5.238L25.773.433h-3.859L16.57 27.12c-.527 2.687-.442 4.054-3.068 4.445v.886h7.175v-.886c-1.924-.044-2.448-.565-2.448-1.952 0-.607.047-1.13.09-1.519l.793-4.643h5.875l1.316 8.134h-2.475v.866h15.926v-.886c-2.45-.174-3.676-1.562-3.676-4.813V23.45h7.736l3.784 9h.906v-9h4.201v9.345h.984l1.184-2.307C56.362 32.225 57.765 33 59.607 33 62.763 33 65 29.876 65 24.804c0-4.076-1.886-7.503-4.691-11.709z"></path></svg></a><nav aria-label="Social Navigation" class="footer__socials"><a aria-label="LinkedIn" class="footer__socials-link" title="LinkedIn" target="_blank" href="https://www.linkedin.com/company/sans-institute"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="M26.154 4H5.846A1.846 1.846 0 0 0 4 5.846v20.308A1.846 1.846 0 0 0 5.846 28h20.308A1.846 1.846 0 0 0 28 26.154V5.846A1.846 1.846 0 0 0 26.154 4m0 22.154H5.846V5.846h20.308zm-13.846-12v7.384a.923.923 0 0 1-1.847 0v-7.384a.923.923 0 0 1 1.847 0m10.154 3.23v4.154a.923.923 0 1 1-1.847 0v-4.153a2.308 2.308 0 1 0-4.615 0v4.153a.923.923 0 0 1-1.846 0v-7.384a.923.923 0 0 1 1.822-.206 4.153 4.153 0 0 1 6.486 3.437m-9.693-6.46a1.385 1.385 0 1 1-2.77-.001 1.385 1.385 0 0 1 2.77 0"></path></svg></a><a aria-label="X" class="footer__socials-link" title="X" target="_blank" href="https://x.com/SANSInstitute"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="m26.838 26.45-7.82-12.29 7.716-8.489a1 1 0 0 0-1.479-1.344l-7.35 8.085-5.058-7.949A1 1 0 0 0 12.004 4H6.007a1 1 0 0 0-.843 1.537l7.82 12.288-7.716 8.495a.999.999 0 1 0 1.479 1.344l7.35-8.085 5.058 7.949a1 1 0 0 0 .844.457h5.996a1 1 0 0 0 .843-1.535m-6.291-.464L7.827 6h3.623l12.725 19.987z"></path></svg></a><a aria-label="YouTube" class="footer__socials-link" title="YouTube" target="_blank" href="https://www.youtube.com/@SANSInstitute"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="m20.555 15.168-6-4A1 1 0 0 0 13 12v8a1 1 0 0 0 1.555.832l6-4a1 1 0 0 0 0-1.665M15 18.13v-4.256L18.198 16zM29.291 8.69a3 3 0 0 0-1.811-2.05C23.195 4.985 16.375 5 16 5S8.805 4.985 4.52 6.64a3 3 0 0 0-1.811 2.05C2.385 9.938 2 12.218 2 16s.385 6.063.709 7.31a3 3 0 0 0 1.811 2.051C8.625 26.945 15.05 27 15.918 27h.165c.867 0 7.296-.055 11.397-1.639a3 3 0 0 0 1.811-2.051c.324-1.25.709-3.527.709-7.31s-.385-6.062-.709-7.31m-1.936 14.125a1 1 0 0 1-.596.686c-3.957 1.528-10.685 1.5-10.75 1.5H16c-.068 0-6.791.025-10.75-1.5a1 1 0 0 1-.596-.686C4.35 21.674 4 19.571 4 16s.35-5.674.645-6.809a1 1 0 0 1 .596-.691C9.056 7.026 15.45 7 15.973 7h.033c.068 0 6.798-.022 10.75 1.5a1 1 0 0 1 .596.686C27.65 10.326 28 12.43 28 16s-.35 5.674-.645 6.809z"></path></svg></a><a aria-label="Facebook" class="footer__socials-link" title="Facebook" target="_blank" href="https://www.facebook.com/sansinstitute/"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="M16 4a12 12 0 1 0 12 12A12.013 12.013 0 0 0 16 4m.923 22.111V18.77h2.77a.923.923 0 1 0 0-1.846h-2.77v-2.77a1.846 1.846 0 0 1 1.846-1.845h1.846a.923.923 0 0 0 0-1.847H18.77a3.69 3.69 0 0 0-3.692 3.693v2.77h-2.77a.923.923 0 1 0 0 1.845h2.77v7.342a10.154 10.154 0 1 1 1.846 0"></path></svg></a><a aria-label="Tik Tok" class="footer__socials-link" title="Tik Tok" target="_blank" href="https://www.tiktok.com/@sansinstituteofficial"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="M28,9c-3.3,0-6-2.7-6-6,0-.6-.4-1-1-1h-5c-.6,0-1,.4-1,1v16.5c0,1.4-1.1,2.5-2.5,2.5s-2.5-1.1-2.5-2.5c0-1,.6-1.8,1.4-2.3.3-.2.6-.5.6-.9v-5.3c0-.6-.4-1-1-1,0,0-.1,0-.2,0-4.5.8-7.8,4.9-7.8,9.5s4.3,9.5,9.5,9.5,9.5-4.3,9.5-9.5v-5c1.9,1,3.9,1.5,6,1.5.6,0,1-.4,1-1v-5c0-.6-.4-1-1-1ZM27,14c-2-.2-3.8-.9-5.4-2-.4-.3-1.1-.2-1.4.2-.1.2-.2.4-.2.6v6.8c0,4.1-3.4,7.5-7.5,7.5s-7.5-3.4-7.5-7.5,2.1-6.1,5-7.2v3.5c-2.1,1.4-2.6,4.2-1.2,6.2,1.4,2.1,4.2,2.6,6.2,1.2,1.2-.8,2-2.2,2-3.7V4h3.1c.5,3.6,3.3,6.5,6.9,6.9v3Z"></path></svg></a></nav><small class="footer__copy-nav"><div class="footer__copyright"><nav aria-label="Legal navigation" class="footer__copy-nav-list"><a class="footer__copy-nav-list-link" target="_blank" href="/legal/privacy">Privacy Policy</a><a class="footer__copy-nav-list-link" href="/legal/terms-conditions">Terms and Conditions</a><a class="footer__copy-nav-list-link" target="_blank" href="/legal/do-not-share-sell">Do Not Sell/Share My Personal Information</a><a class="footer__copy-nav-list-link" href="/legal/cookie-notice">Cookie Notice</a></nav></div><div class="footer__trademark"><span class="c-text footer__copy-nav-trademark">© <!-- -->2026<!-- --> <!-- -->The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute.</span><span class="c-text footer__copy-nav-trademark">Our <a href="/legal/terms-conditions">Terms and Conditions</a> detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.</span></div></small></div></div></footer><script src="/_next/static/chunks/webpack-11f4915bd98f8a25.js" id="_R_" async=""></script><script>(self.__next_f=self.__next_f||[]).push([0])</script><script>self.__next_f.push([1,"1:\"$Sreact.fragment\"\n3:I[21911,[],\"\"]\n4:I[44843,[],\"\"]\n6:I[91390,[],\"OutletBoundary\"]\n8:I[851,[],\"AsyncMetadataOutlet\"]\na:I[91390,[],\"ViewportBoundary\"]\nc:I[91390,[],\"MetadataBoundary\"]\nd:\"$Sreact.suspense\"\nf:I[66461,[],\"\"]\n10:I[57730,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"PageLoadGTM\"]\n12:I[92671,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"\"]\n13:I[18373,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"GoogleTagManager\"]\n14:I[53120,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9"])</script><script>self.__next_f.push([1,"261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"default\"]\n15:I[32517,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"SendLyticsEmailCampaignId\"]\n17:I[18677,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"LangBoundaryRefresher\"]\n18:I[13146,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-1"])</script><script>self.__next_f.push([1,"7379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"default\"]\n"])</script><script>self.__next_f.push([1,"19:I[82028,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"WhitePaperListingAlgoliaTemplate\"]\n"])</script><script>self.__next_f.push([1,"1a:I[61997,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"default\"]\n1c:I[50527,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"ThemeProvider\"]\n1d:I[91541,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"SkipLinks\"]\n1e:I[293,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"stat"])</script><script>self.__next_f.push([1,"ic/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"default\"]\n20:I[99960,[\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"8039\",\"static/chunks/app/error-8391fd18fc444d3f.js\"],\"default\"]\n23:I[57281,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"default\"]\n24:I[51312,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"SansLink\"]\n25:I[77707,[],\"IconMark\"]\n27:I[50600,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd0350"])</script><script>self.__next_f.push([1,"3.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"FooterNavigation\"]\n2e:I[41912,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"HeaderProvider\"]\n2f:I[8299,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"Header\"]\n:HL[\"/_next/static/media/07f0d0991c204e49-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/1c2b560656f22784-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/25e9b8f09a8d4ee4-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/442946fed64c2011-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/4f498a2054f9dc71-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/64d67560db5baada-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/794d29e41a12b5c4-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}"])</script><script>self.__next_f.push([1,"]\n:HL[\"/_next/static/media/a048339354d5408e-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/b036901809a398af-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/d644870e415613ec-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/css/8f4c1d5ac92728b5.css\",\"style\"]\n:HL[\"/_next/static/css/f60c4c18eaea2539.css\",\"style\"]\n:HL[\"/_next/static/css/10a162551269c449.css\",\"style\"]\n:HL[\"/_next/static/css/19ce4d406e564b03.css\",\"style\"]\n:HL[\"/_next/static/css/206023683b1c0579.css\",\"style\"]\n"])</script><script>self.__next_f.push([1,"0:{\"P\":null,\"b\":\"YhY6kuKTxZ6AzGAnnFTnu\",\"p\":\"\",\"c\":[\"\",\"white-papers\"],\"i\":false,\"f\":[[[\"\",{\"children\":[[\"slugs\",\"white-papers\",\"c\"],{\"children\":[\"__PAGE__\",{}]}]},\"$undefined\",\"$undefined\",true],[\"\",[\"$\",\"$1\",\"c\",{\"children\":[[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/8f4c1d5ac92728b5.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/f60c4c18eaea2539.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"2\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/10a162551269c449.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}]],\"$L2\"]}],{\"children\":[[\"slugs\",\"white-papers\",\"c\"],[\"$\",\"$1\",\"c\",{\"children\":[null,[\"$\",\"$L3\",null,{\"parallelRouterKey\":\"children\",\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L4\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"forbidden\":\"$undefined\",\"unauthorized\":\"$undefined\"}]]}],{\"children\":[\"__PAGE__\",[\"$\",\"$1\",\"c\",{\"children\":[\"$L5\",[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/19ce4d406e564b03.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/206023683b1c0579.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}]],[\"$\",\"$L6\",null,{\"children\":[\"$L7\",[\"$\",\"$L8\",null,{\"promise\":\"$@9\"}]]}]]}],{},null,false]},null,false]},null,false],[\"$\",\"$1\",\"h\",{\"children\":[null,[[\"$\",\"$La\",null,{\"children\":\"$Lb\"}],[\"$\",\"meta\",null,{\"name\":\"next-size-adjust\",\"content\":\"\"}]],[\"$\",\"$Lc\",null,{\"children\":[\"$\",\"div\",null,{\"hidden\":true,\"children\":[\"$\",\"$d\",null,{\"fallback\":null,\"children\":\"$Le\"}]}]}]]}],false]],\"m\":\"$undefined\",\"G\":[\"$f\",[]],\"s\":false,\"S\":false}\n"])</script><script>self.__next_f.push([1,"5:[[\"$\",\"$L10\",null,{\"event\":\"Page Load\",\"eventAction\":\"Selected Listing Title\",\"eventCategory\":\"Content interactions\",\"eventLabel\":\"white_paper_listing_page\"}],\"$L11\"]\n"])</script><script>self.__next_f.push([1,"2:[\"$\",\"html\",null,{\"data-theme\":\"dark\",\"lang\":\"en-US\",\"children\":[[\"$\",\"head\",null,{\"children\":[[\"$\",\"meta\",null,{\"content\":\"cC-8xOerZ3opiLx9VloUCzc6SgMfOZHYihJzWA19-KI\",\"name\":\"google-site-verification\"}],[\"$\",\"$L12\",null,{\"id\":\"optimizely-init\",\"dangerouslySetInnerHTML\":{\"__html\":\"\\n              window[\\\"optimizely\\\"] = window[\\\"optimizely\\\"] || [];\\n              const oneTrustCookie = document.cookie\\n                .split(';')\\n                .map(function(x) { return x.trim(); })\\n                .filter(function(x) { return x.startsWith('OptanonConsent'); })[0];\\n              if (!oneTrustCookie) {\\n                window[\\\"optimizely\\\"].push({ type: \\\"disable\\\" });\\n              } else {\\n                var optOutPreference = !decodeURIComponent(oneTrustCookie).includes('C0003:1');\\n                window[\\\"optimizely\\\"].push({ type: \\\"optOut\\\", isOptOut: optOutPreference });\\n              }\\n            \"}}],[\"$\",\"$L12\",null,{\"src\":\"https://cdn.optimizely.com/js/28081820005.js\"}]]}],[\"$\",\"$L13\",null,{\"gtmId\":\"GTM-5T9DW3B\"}],[\"$\",\"$L14\",null,{}],[\"$\",\"$L15\",null,{}],[\"$\",\"body\",null,{\"className\":\"__variable_71459b __variable_5c0054 __variable_9e78df\",\"children\":[[\"$\",\"noscript\",null,{\"children\":[\"$\",\"iframe\",null,{\"height\":\"0\",\"src\":\"https://www.googletagmanager.com/ns.html?id=GTM-N9Z5JVC\",\"style\":{\"display\":\"none\",\"visibility\":\"hidden\"},\"width\":\"0\"}]}],\"$L16\",[\"$\",\"$L17\",null,{}],[\"$\",\"$L18\",null,{}]]}]]}]\n"])</script><script>self.__next_f.push([1,"11:[\"$\",\"$L19\",null,{\"algolia\":{\"apiKey\":\"efc23343b7c48a65f7ddba6f07e3c086\",\"appId\":\"M2CVJC95IX\",\"url\":\"m2cvjc95ix-dsn.algolia.net\"},\"hero\":{\"breadcrumbs\":\"$undefined\",\"description\":{\"type\":\"doc\",\"uid\":\"ac51705a17914354a427fc37186291b0\",\"attrs\":{},\"children\":[{\"uid\":\"7f7a3d6f56724abf8f0ad5632e79d429\",\"type\":\"p\",\"attrs\":{\"style\":{\"direction\":\"ltr\"}},\"children\":[{\"text\":\"Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.\",\"attrs\":{\"style\":{\"font-size\":\"11pt\"}}}]}],\"_version\":16},\"title\":\"Cybersecurity Whitepapers\"}}]\n"])</script><script>self.__next_f.push([1,"b:[[\"$\",\"meta\",\"0\",{\"charSet\":\"utf-8\"}],[\"$\",\"meta\",\"1\",{\"name\":\"viewport\",\"content\":\"width=device-width, initial-scale=1\"}]]\n7:null\n"])</script><script>self.__next_f.push([1,"16:[\"$\",\"$L1a\",null,{\"locale\":\"en-US\",\"now\":\"$D2026-04-09T19:31:12.755Z\",\"timeZone\":\"UTC\",\"messages\":{\"facets\":{\"view\":\"View:\",\"skillLevel\":\"Skill Level\",\"focusArea\":\"Focus Area\",\"role\":\"Role\",\"tags\":\"Tags\",\"topic\":\"Topic\",\"status\":\"Status\",\"language\":\"Language\",\"policyCategory\":\"Category\",\"date\":\"Date\",\"type\":\"Type\",\"format\":\"Format\",\"location\":\"Location\",\"noMatches\":\"No possible matches found, reset or adjust the filters to refine these.\"},\"carousel\":{\"controls\":{\"currentSlideIndexAria\":\"Slide {current} of {total}\",\"next\":\"Go to next slide\",\"prev\":\"Go to previous slide\"},\"slider\":{\"slideXofY\":\"Slide {current} of {total}\"}},\"profile\":{\"noUpcomingCoursesTitle\":\"No Upcoming Courses\"},\"common\":{\"close\":\"Close\",\"closeItem\":\"Close {item}\",\"loadMore\":\"Load more\",\"readMore\":\"Read more\",\"readLess\":\"Read less\",\"moreInfo\":\"More info\",\"showAll\":\"Show all\",\"day\":\"Day {day}\",\"by\":\"by\",\"for\":\"for\",\"courses\":\"{count, plural, =0 {No Courses} =1 {1 Course} other {# Courses}}\",\"cpesEvent\":\"{count, plural, =0 {No CPEs} =1 {1 CPE} other {# CPEs}} (Summit Only)\",\"cpes\":\"{count, plural, =0 {No CPEs} =1 {1 CPE} other {# CPEs}}\",\"tournaments\":\"{count, plural, =0 {No Tournaments} =1 {1 NetWars Tournament} other {# NetWars Tournaments}}\",\"hours\":\"{count, plural, =0 {0 Hours} =1 {1 Hour} other {# Hours}}\",\"minutes\":\"{count, plural, =0 {0 Hours} =1 {1 Minute} other {# Minutes}}\",\"days\":\"{count, plural, =0 {0 Days} =1 {1 Day} other {# Days}}\",\"labs\":\"{count, plural, =0 {No Labs} =1 {Labs: 1 Hands-On Lab} other {Labs: # Hands-On Labs}}\",\"minute\":\"Minute\",\"duration\":\"Duration:\",\"durationDaysLabel\":\"(Instructor-Led)\",\"durationHoursLabel\":\"(Self-Paced)\",\"priceCourse\":\"{price} (Course)\",\"allDates\":\"All dates\",\"priceCertification\":\"{price} (Certification)\",\"plusXMore\":\"+ {count} more\",\"privacyPolicy\":\"Privacy Policy\",\"message\":\"message\",\"viewMoreFaqs\":\"View More FAQs\",\"relatedEvents\":\"Related events\",\"viewAllEvents\":\"View all events\",\"virtual\":\"Virtual\",\"authoredBy\":\"Authored by\",\"register\":\"Register\",\"webinar\":\"Webinar\",\"majorUpdates\":\"Major Updates\",\"search\":\"Search\",\"live\":\"Live\",\"date\":{\"startsAt\":\"Starts {startDatePart} at {startTimePart} {tz}\",\"to\":\"{dateString}: {startTime} to {endTime} {tz}\"},\"splitContentTags\":{\"Major Updates\":\"Major Updates\",\"Updated\":\"Updated\",\"Beta\":\"Beta\",\"Free\":\"Free\",\"New\":\"New\",\"Special Offer\":\"Special Offer\",\"Featured\":\"Featured\",\"Part One\":\"Part One\",\"Part Two\":\"Part Two\"}},\"video\":{\"play\":\"Play video\",\"youtube\":{\"error\":\"Unable to load the video due to an issue with YouTube\"},\"modal\":{\"playButtonLabel\":\"Play video in modal\",\"title\":\"Video modal: watch the video\"}},\"cards\":{\"courseCard\":{\"buttonPrimaryLabel\":\"Register\",\"buttonSecondaryLabel\":\"View course details\",\"enrollInPerson\":\"Enroll In-Person\",\"enrollVirtual\":\"Enroll Virtual\",\"logInLabel\":\"Log in to register:\",\"quickViewLabel\":\"Quick view\",\"soldOut\":\"Sold out\",\"waitingList\":\"Join waiting list\",\"AIFocused\":\"AI-FOCUSED\",\"AISkills\":\"AI SKILLS\"},\"webinarCard\":{\"ctaLabel\":\"View details\",\"cardType\":\"Webinar\",\"live\":\"Live\",\"type\":{\"technical-presentation\":\"Technical Presentation\",\"workshop\":\"Workshop\",\"solutions-forum\":\"Solutions Forum\",\"industry-research-presentation\":\"Industry Research Presentation\",\"panel-discussion\":\"Panel Discussion\",\"leadership-insights\":\"Leadership Insights\"}},\"eventCard\":{\"buttonPrimaryLabel\":\"Register\",\"buttonSecondaryLabel\":\"View event details\"},\"downloadCard\":{\"downloadExample\":\"Download example\",\"readAll\":\"Read Whitepaper\",\"readMore\":\"Read more about {title}\"},\"insightCard\":{\"authoredBy\":\"Authored by\",\"writtenBy\":\"Written By\",\"createdBy\":\"Created By\",\"features\":\"Features\",\"presentedBy\":\"Presented by\",\"typePodcast\":{\"typeTitle\":\"Podcast\",\"authorsLabel\":\"Features\",\"defaultImageAlt\":\"Podcast placeholder image\"},\"typePosterAndCheatSheet\":{\"typeTitle\":\"Poster and cheat sheet\",\"defaultImageAlt\":\"Poster and cheat sheet placeholder image\"},\"typeSummitPresentation\":{\"typeTitle\":\"Summit presentation\",\"defaultImageAlt\":\"Summit presentation placeholder image\"},\"typeWebinar\":{\"typeTitle\":\"Webinar\",\"defaultImageAlt\":\"Webinar placeholder image\",\"presented\":\"Presented:\",\"upcoming\":\"Upcoming:\"},\"typeWhitepaper\":{\"typeTitle\":\"Whitepaper\",\"defaultImageAlt\":\"Whitepaper placeholder image\"},\"typeBlog\":{\"typeTitle\":\"Blog\",\"defaultImageAlt\":\"Blog placeholder image\"},\"typeCourseSingle\":{\"typeTitle\":\"Course\",\"defaultImageAlt\":\"Course placeholder image\"},\"typeEventSingle\":{\"typeTitle\":\"Event\",\"defaultImageAlt\":\"Event placeholder image\"},\"typeCaseStudy\":{\"typeTitle\":\"Case Study\",\"defaultImageAlt\":\"Case study placeholder image\"},\"typeOpenSourceTools\":{\"typeTitle\":\"Open Source Tools\",\"defaultImageAlt\":\"Open Source Tools placeholder image\"},\"typePolicy\":{\"typeTitle\":\"Policy\",\"defaultImageAlt\":\"Policy placeholder image\"}},\"personCard\":{\"ctaLabel\":\"Learn more\",\"readMoreAbout\":\"Read more about {name}\"},\"learningPathsCard\":{\"ctaLabel\":\"Learn more\"},\"podcastCard\":{\"ctaLabel\":\"Listen now\",\"resourceType\":\"Podcast\",\"season\":\"Season {season}\"},\"scheduleCard\":{\"facilitatedBy\":\"Facilitated by\",\"moderatedBy\":\"Moderated by\",\"openToNonCourseLearners\":\"Open to non-course learners\",\"panelList\":\"Panelists\",\"presentedBy\":\"Presented by\",\"virtual\":\"Virtual\"},\"skillsCard\":{\"relatedRoleTitle\":\"Similar roles\",\"ctaLabel\":\"Explore learning path\"},\"whitepaperSplitContent\":{\"readMore\":\"Read more\",\"relatedWebinar\":\"Related Webcast\"}},\"form\":{\"downloadLabel\":\"Download\",\"requiredLabel\":\"Required\",\"sponsorsIntro\":\"The webinar is offered fre of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your registration details with sponsor(s), a recorded webinar will be available approximately 30 days after its initial release through SANS archive. To access the recording, you will need to create a SANS account, but your information will not be shared with sponsors(s).\",\"sponsorsConsent\":\"I consent to sharing my information with SANS and the sponsor(s) listed below for this webinar. Registration information includes your name, title, organization, state, country, phone number and email address. Each organization will use your registration details in accordance with their respective privacy policies. You can review SANS's privacy policy bellow and the sponsors's privacy policies on their websites which are accessible by clicking on their logos below. By proceeding with registration you acknowledge and agree to these terms\",\"serverError\":\"Unable to process your request. Please try again later.\",\"successMessage\":\"Form submitted successfully\",\"submitNotice\":\"By providing this information, you agree to the processing of your personal data by SANS as described in our \u003clink\u003ePrivacy Policy\u003c/link\u003e.\",\"gdprNotice\":\"Please send me opportunities to become certified, learn new cyber skills, and find team training options.\",\"errors\":{\"required\":\"Field is required\",\"minLength\":\"Input is too short (minimium of 2 characters)\",\"maxLength\":\"Input is too long (maximum of 2000 characters)\",\"email\":\"Invalid email address\",\"phoneNumber\":\"Invalid phone number\"},\"webinar\":{\"registrationSuccess\":\"Thank you for registering!\"},\"labels\":{\"yes\":\"Yes\",\"no\":\"No\"},\"errorGeneric\":\"Unable to process your form request. Please try again later.\",\"standardFields\":{\"firstName\":{\"label\":\"First Name\"},\"lastName\":{\"label\":\"Last Name\"},\"email\":{\"label\":\"Your Email\"},\"jobTitle\":{\"label\":\"Job Title\"},\"organization\":{\"label\":\"Organization\"},\"country\":{\"label\":\"Country\",\"placeholder\":\"Select country\"},\"industry\":{\"label\":\"Industry\",\"placeholder\":\"Select industry\"},\"state\":{\"label\":\"US State\",\"placeholder\":\"Select state\"},\"phoneNumber\":{\"label\":\"Phone number\",\"date\":\"Please enter a valid date\"}},\"submit\":\"Submit\"},\"courses\":{\"jobRolesTitle\":\"Relevant Job Roles\",\"related\":{\"title\":\"Related Courses\",\"description\":\"Short description of the section to provide users context and value of the content being featured in this carousel.\",\"viewAll\":\"View all courses\",\"cta\":\"/cyber-security-courses\"},\"lister\":{\"heroTitle\":\"Search courses\"},\"filters\":{\"focusArea\":\"Focus Area\",\"status\":\"Status\",\"filterCourses\":\"Filter courses\"},\"scheduleTable\":{\"instructedBy\":\"Instructed by\",\"enrollCtaLabel\":\"Start enrolling\",\"filterLabels\":{\"date\":\"Date\",\"allDates\":\"All dates\",\"next30days\":\"Next 30 days\",\"next60days\":\"Next 60 days\",\"next6months\":\"Next 6 months\",\"next12months\":\"Next 12 months\",\"location\":\"Location\",\"trainingFormat\":\"Format\",\"focusArea\":\"Focus Area\",\"status\":\"Status\"},\"tooltips\":{\"price\":\"Course price tooltip\"},\"labels\":{\"courseScheduleList\":\"Schedule {timezone}\",\"dateAndTime\":\"Date \u0026 Time\",\"enrollmentOptions\":\"Registration Options\",\"enrollmentOptionsCtaMobile\":\"Registration Options\",\"fetchingSchedule\":\"Fetching schedule..\",\"loadMore\":\"Load more\",\"showAll\":\"Show all\",\"locationAndInstructor\":\"Location \u0026 instructor\",\"price\":\"Course price\",\"InPerson\":\"In-Person\",\"SelfPaced\":\"Self-Paced\",\"Virtual\":\"Virtual\",\"viewEventDetails\":\"View event details\",\"soldout\":\"Sold Out {modality}\",\"registrationClosed\":\"Registration Closed\",\"waitlist\":\"Join {modality} Waitlist\",\"onDemandPrice\":\"OnDemand Bundle +{price}\",\"certificationPrice\":\"Certification +{price}\",\"contactUs\":\"\u003clink\u003eContact us\u003c/link\u003e for group pricing options\"},\"modality\":{\"dateAndTime\":{\"onDemand\":{\"subtitle\":\"Self-Paced, 4 months access\",\"4MonthsAccess\":\"4 months access\",\"title\":\"OnDemand (Anytime)\"},\"selfPaced\":{\"title\":\"Anytime\"}},\"Ondemand\":\"Virtual (OnDemand)\",\"virtual\":\"Virtual (live)\",\"selfPaced\":\"Virtual (Self-paced)\"},\"title\":\"Course schedule \u0026 pricing\"},\"syllabus\":{\"textBlock\":{\"columnTitles\":{\"labs\":\"Labs\",\"topics\":\"Topics covered\"}},\"splitFixScroll\":{\"ctaLetterLabel\":\"Download the letter\",\"ctaSyllabusLabel\":\"Download full syllabus\"}}},\"events\":{\"types\":{\"Summit\":\"Summit\",\"TrainingEvent\":\"Training Event\"},\"register\":{\"free\":\"Free\"},\"filters\":{\"trackName\":\"Track Name\",\"trackType\":\"Track Type\",\"eventFormat\":\"Event Type\"},\"options\":{\"InPerson\":\"In-Person\",\"InPerson\u0026Virtual\":\"In-Person \u0026 Virtual\",\"Keynote\":\"Keynote\",\"NetWars\":\"NetWars\",\"Reception\":\"Reception\",\"Virtual\":\"Virtual\",\"Social\":\"Social\",\"Community\":\"Community\",\"Workshop\":\"Workshop\",\"Talk\":\"Talk\"}},\"faq\":{\"resetSearch\":\"Reset search\",\"noResults\":\"We couldn’t find a match for \\\"{term}\\\". Try searching again using different search terms\",\"placeholderText\":\"Search keywords or questions\"},\"lister\":{\"filters\":{\"labels\":{\"whitepapers\":\"Filter Whitepapers\",\"filterBlogs\":\"Filter blogs\",\"generic\":\"Filter\",\"event_single\":\"Filter events\",\"archived\":\"Archived\",\"upcoming\":\"Upcoming\"},\"applyButton\":\"Apply filters\",\"backToFilters\":\"Back to filters\",\"buttonLabel\":\"Filter\",\"filterBy\":\"Filter by:\",\"filterDrawerTitle\":\"Filter by:\",\"filterCoursesDrawerTitle\":\"Filter courses\",\"reset\":\"Clear all filters\"},\"noResults\":{\"listerNothingFound\":\"No results found\",\"description\":\"Please try a different combination of filters and search again.\",\"title\":\"We couldn't find a match for your selection\"},\"quickFilters\":{\"title\":\"Recommended:\"},\"showing\":{\"of\":\"of\",\"prefix\":\"Showing\"},\"date\":{\"from\":\"From\",\"until\":\"Until\",\"today\":\"Today\"},\"sort\":{\"labels\":{\"relevance\":\"Relevance\",\"newestFirst\":\"Newest first\",\"oldestFirst\":\"Oldest first\",\"recency\":\"Recency\",\"role\":\"Role\",\"alphabeticalAZ\":\"Alphabetical A-Z\",\"alphabeticalZA\":\"Alphabetical Z-A\"},\"drawerTitle\":\"Sort and view by:\",\"mobileButtonLabel\":\"Sort and view\",\"show\":\"Show:\",\"sortBy\":\"Sort by:\",\"reset\":\"Reset\",\"submit\":\"Apply sorting\"},\"view\":{\"label\":\"View:\",\"grid\":\"Grid\",\"list\":\"List\"}},\"pagination\":{\"goTo\":\"Go to page {page}\",\"next\":\"Next\",\"previous\":\"Previous\"},\"heros\":{\"course\":{\"secondaryCta\":\"Course Preview\",\"primaryCta\":\"Register Now\",\"createdBy\":\"Course authored by:\"},\"download\":{\"c2MatrixEdition\":\"C2 Matrix Edition:\",\"communityEdition\":\"Community Edition:\",\"createdBy\":\"Created by:\",\"ctaLogIn\":\"Login to download\",\"ctaC2MatrixEdition\":\"Download C2 Matrix Edition\",\"ctaCommunityEdition\":\"Download Community Edition\",\"ctaGeneric\":\"Download\",\"lastUpdate\":\"Last updated\"},\"summitPresentation\":{\"downloadFile\":\"Download File\",\"presentedBy\":\"Presented by:\"},\"privacy\":{\"ctaDownloadFile\":\"Download PDF\",\"ctaDownloadDocument\":\"Download DOCX\",\"downloadFileLabel\":\"Download File:\",\"downloadDocumentLabel\":\"Download Document:\"},\"posters\":{\"downloadFile\":\"Download File\",\"publishedDate\":\"Published\"},\"whitepaper\":{\"downloadFile\":\"Download File\",\"sponsorsIntro\":\"This content is provided free of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your contact details with the sponsor(s), you have the option of waiting approximately 30 days after the original publication date.  After 30 days, to download the content, you will be required to create a SANS account, but your information will not be shared with the sponsor(s).\",\"sponsorsConsent\":\" I consent to sharing my information with SANS and the sponsor(s) listed below for this paper. This information includes your name, title, organization, state, country, phone number and email address. Each organization will use your details in accordance with their respective privacy policies. You can review the SANS privacy policy below and the sponsors' privacy policies on their websites which are accessible by clicking on their logos below. By proceeding, you acknowledge and agree to these terms and the processing of your personal data by SANS as described in our Privacy Policy.\"},\"instructor\":{\"connectWith\":\"Connect with {name}\",\"specialities\":\"Specialities\",\"titleWithCompany\":\"{title} at {company}\"},\"podcast\":{\"features\":\"Features\",\"participants\":\"Participants\",\"published\":\"Published\",\"categories\":{\"cyberLeaders\":\"Cyber leaders\",\"waitJustAnInfoSec\":\"Wait just an Infosec\",\"cloudAce\":\"Cloud ace\",\"blueprint\":\"Blueprint\",\"trustMeIMCertified\":\"Trust me, I’m certified\",\"ouch_\":\"Ouch!\"}},\"webinar\":{\"login\":\"Login to register\",\"unavailable\":\"This webinar is currently unavailable. Please check back latter.\",\"join\":\"Join\",\"watch\":\"Watch\",\"testZoomConnection\":\"Registration Complete - Test Connection\",\"downloadPresentation\":\"Download Presentation\",\"addToCalendar\":\"Add to Calendar\",\"calendars\":{\"google\":\"Google\",\"outlook\":\"Outlook\",\"ical\":\"Ical\",\"yahoo\":\"Yahoo\"},\"type\":{\"technical-presentation\":\"Technical Presentation\",\"workshop\":\"Workshop\",\"solutions-forum\":\"Solutions Forum\",\"industry-research-presentation\":\"Industry Research Presentation\",\"panel-discussion\":\"Panel Discussion\",\"leadership-insights\":\"Leadership Insights\"}}},\"filterAndSort\":{\"mobileSortDrawerCtaLabel\":\"Sort and view\",\"mobileFilterDrawerCtaLabel\":\"Filter results\",\"sort\":{\"label\":\"Sort by:\",\"options\":{\"relevance\":\"Relevance\",\"recency\":\"Recency\"}},\"reset\":\"Clear all\",\"hitsPerPage\":{\"label\":\"Show:\"},\"filter\":{\"label\":\"Filter results\"}},\"navigation\":{\"breadcrumbs\":{\"label\":\"Breadcrumbs\",\"previousLevel\":\"Previous level\"},\"search\":{\"resultPage\":{\"title\":\"Search results\",\"nothingFoundForQuery\":\"No results found for “\u003cmark\u003e{query}\u003c/mark\u003e”, try again with a different search term.\"},\"results\":{\"heading\":\"Search results\"},\"globalSearch\":{\"suggested\":\"Suggested Searches\",\"quickLinks\":\"Suggested Links\",\"placeholder\":\"What are you looking for?\",\"resetSearch\":\"Clear all filters\",\"noFiltersAvailable\":\"No filters available\",\"noResultsFoundFor\":\"No results found for \\\"{query}\\\", try again with a different search term.\"},\"sortingTooltip\":\"Showing results for both Relevance and Recency: Newest to Oldest. Sort by Recency: Newest to Oldest only.\",\"error\":\"An error occurred while fetching search results, please try again later.\",\"closeSearchPanel\":\"Close search panel\",\"noResults\":\"No results found\",\"placeholderText\":\"Type to search..\",\"popularSearches\":\"Popular searches\",\"resetSearch\":\"Reset search\",\"searching\":\"searching..\",\"suggestedSearches\":\"Suggested Searches\",\"labels\":{\"course_landing_page\":\"Course\",\"course_listing_page\":\"Courses\",\"course_single_page\":\"Course\",\"default_page\":\"Page\",\"event_single\":\"Event\",\"focus_area_page\":\"Focus Area\",\"framework_single_page\":\"Framework\",\"homepage\":\"Homepage\",\"job_role_page\":\"Job Role\",\"learning_path_page\":\"Learning Path\",\"organization_landing_page\":\"Organization\",\"person\":\"Person\",\"job_roles_listing_page\":\"Job Roles\",\"podcast_single_page\":\"Podcast\",\"policy_single_page\":\"Policy\",\"poster_and_cheat_sheet_single\":\"Poster \u0026 Cheat Sheet\",\"resource_landing_page\":\"Resource\",\"summit_presentation_single\":\"Summit Presentation\",\"webinar_single\":\"Webinar\",\"white_paper_single\":\"Whitepaper\",\"webcast_single\":\"Webinar\",\"open_source_tools_single\":\"Open Source Tool\",\"open_source_tools_listing_page\":\"Open Source Tools\",\"blog_single_page\":\"Blog\",\"newsletter_ouch\":\"Newsletter OUCH\",\"newsletter_ouch_listing_page\":\"Newsletter OUCH\",\"newsletter_risk\":\"Newsletter RISK\",\"newsletter_risk_listing_page\":\"Newsletter RISK\",\"newsletter_newsbites\":\"Newsletter NewsBites\",\"newsletter_newsbites_listing_page\":\"Newsletter NewsBites\",\"podcast_listing_page\":\"Podcasts\",\"blog_listing_page\":\"Blogs\",\"webinar_listing_page\":\"Webinars\",\"posters_listing_page\":\"Posters \u0026 Cheat Sheets\",\"instructor_listing_page\":\"Instructors\",\"summit_presentation_listing_page\":\"Summit Presentations\",\"policy_listing_page\":\"Policies\",\"event_listing_page\":\"Events\",\"white_paper_listing_page\":\"Whitepapers\"}},\"header\":{\"mainNavigation\":\"Main tab navigation\",\"back\":\"Back\",\"tabpanelNavigation\":\"navigation for: \",\"viewAll\":\"View all\",\"close\":\"Close\",\"logo\":\"Go to homepage\",\"menu\":\"Menu\",\"search\":\"Search\",\"openSearch\":\"Open search\",\"closeSearch\":\"Close search\"},\"footer\":{\"legalNavigation\":\"Legal navigation\",\"logoNavigation\":\"Go to homepage\",\"socialNavigation\":\"Social Navigation\"},\"topbar\":{\"aria\":{\"dropdownNavigation\":\"Topbar dropdown navigation\",\"navigation\":\"Topbar navigation\"}},\"skipLinks\":{\"skipToMainContent\":\"Skip to main content\",\"skipToSearch\":\"Go to search\",\"skipToFooter\":\"Go to footer\"}},\"platformLinksAndDescription\":{\"apple\":\"Apple Podcasts\",\"listenOn\":\"Listen on\",\"readTranscript\":\"Read transcript\",\"spotify\":\"Spotify\",\"youtube\":\"YouTube\"},\"scheduleBlock\":{\"courses\":\"Courses\",\"coursesContactDescription\":\"Looking for group pricing?\",\"coursesContactLink\":\"Contact us!\",\"title\":\"Schedule\",\"register\":\"Register\",\"tabMobileLabel\":\"Select day:\",\"noResults\":{\"description\":\"Please try a different combination of filters and search again.\",\"title\":\"We couldn't find a match for your selection\"}},\"registrationOptions\":{\"includes\":\"Includes\",\"inPerson\":\"In person\",\"login\":\"Login to register\",\"online\":\"Live online\",\"priceFrom\":\"from\",\"register\":\"Register\",\"selectCourse\":\"Select course to Enroll\",\"soldOut\":\"Sold out\"},\"socials\":{\"share\":{\"facebook\":\"Share on facebook\",\"label\":\"Share\",\"link\":\"Copy link\",\"linkedin\":\"Share on linkedin\",\"x\":\"Share on X\"}},\"splitStandardTextBlock\":{\"aboutLabel\":\"About\",\"secondaryHeading\":\"Press \u0026 Media\"},\"stickyAnchorLinks\":{\"select\":\"Please select\",\"register\":\"Register\",\"jumpLabel\":\"Jump to:\",\"componentLabels\":{\"accordionSection\":\"FAQs\",\"contactCreditCard\":\"Credit Card Payment Support\",\"contactGenericContentBlock\":\"General Inquiries\",\"contactNavigationCards\":\"Helpful Resources\",\"contactPressAndMedia\":\"Press \u0026 Media Inquiries\",\"eventSingleCourses\":\"Quick Course Lister\",\"courseScheduleTable\":\"Schedule \u0026 Pricing\",\"courseSyllabus\":\"Syllabus\",\"courseSyllabusFaqs\":\"FAQs\",\"eventCarousel\":\"Upcoming Events\",\"profileWebinars\":\"Webcasts\",\"eventSplitContent\":\"Location\",\"featuredCardSection\":\"Event Highlights\",\"featuredCoursesWide\":\"Courses\",\"featuredFreeResources\":\"Resources\",\"focusAreaCourseCardCarousel\":\"Related Courses\",\"insightCardHolder\":\"Featured Content\",\"instructorsGrid\":\"Instructors\",\"jobRoleSkillCards\":\"Similar Roles\",\"profileSplitStandardTextBlock\":\"Profile\",\"promotionalContentBanner\":\"Promotional Content Banner\",\"readMoreSection\":\"Overview\",\"registerBlock\":\"Courses\",\"registerBlockCourses\":\"Courses2\",\"relatedCoursesCarousel\":\"Courses\",\"relatedEventsCarousel\":\"Upcoming Events\",\"scheduleBlock\":\"Schedule\",\"speakersGrid\":\"Speakers\",\"sponsors\":\"Sponsors\",\"studentReviews\":\"Student Reviews\",\"contactForm\":\"Connect with a Training Advisor\"}},\"price\":\"Excl. Tax\",\"newsletter\":{\"types\":{\"newsbites\":\"Newsbites\",\"ouch\":\"OUCH\",\"@risk\":\"@RISK\"},\"title\":\"Subscribe to SANS Newsletters\",\"newsletterSelectionError\":\"At least one newsletter must be selected\",\"email\":\"Your Email\",\"subscribedTo\":\"You subscribed to\",\"subscribedSuccess\":\"Thank you for subscribing to the SANS Newsletters!\",\"location\":\"Location\",\"selectCountry\":\"Select your country\",\"selectNewsletters\":\"Select newsletters\",\"serverError\":\"Unable to process your newsletter subscription. Please try again later.\"},\"newsletters\":{\"ouch\":{\"editorial\":{\"translatorHeader\":\"OUCH! Translators\"},\"download_translations\":\"Download Translations\",\"downloadLanguageButton\":\"Download as PDF\",\"downloadLanguageButtonAria\":\"Download as PDF in {language}\",\"downloadNewsletter\":\"Download newsletter\",\"newsletterLanguage\":\"Newsletter language\",\"selectLanguage\":\"Select a language\",\"content\":\"Guest Editor\",\"learn_more\":\"Learn More\",\"read_more\":\"Read More\",\"downloadTranslations\":\"Download translations\"},\"newsletter\":\"Newsletter\",\"sponsors\":\"Sponsors\",\"issue\":\"ISSUE {issue}\",\"volume\":\"VOLUME {volume}\",\"sponsors_description\":\"Short description of the section to provide users context and value of the content being featured in this carousel.\",\"read_more_newsletter\":\"Read more newsletters\",\"risk\":{\"internet_storm_center_spotlight\":\"Internet Storm Center Spotlight\",\"recent_security_issues\":\"Internet Storm Center Entries\",\"security_news\":\"Recent CVEs\",\"sponsors\":\"Sponsors\",\"read_more\":\"Read More\"},\"newsbites\":{\"top_of_the_news\":\"Top of the News\",\"rest_of_the_news\":\"The Rest of the Week's News\",\"view_older_issues\":\"View Older Issues\",\"view_older_issues_content\":\"Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.\",\"read_more_newsletter\":\"Browse Archive\",\"editorsNotes\":\"Editor's Notes\",\"internet_storm_center_tech_corner\":\"Internet Storm Center Tech Corner\",\"readMoreIn\":\"Read more in\",\"sponsors\":\"Sponsors\",\"read_more\":\"Read More\"}},\"languages\":{\"english\":\"English\",\"arabic\":\"Arabic\",\"bahasa\":\"Bahasa\",\"bosnian\":\"Bosnian\",\"bulgarian\":\"Bulgarian\",\"chineseSimplified\":\"Chinese Simplified\",\"chineseTraditionalTaiwanese\":\"Chinese Traditional Taiwanese\",\"danish\":\"Danish\",\"dutch\":\"Dutch\",\"farsi\":\"Farsi\",\"finnish\":\"Finnish\",\"frenchCanadian\":\"French Canadian\",\"french\":\"French\",\"georgian\":\"Georgian\",\"german\":\"German\",\"hebrew\":\"Hebrew\",\"hindi\":\"Hindi\",\"hungarian\":\"Hungarian\",\"indonesian\":\"Indonesian\",\"italian\":\"Italian\",\"japanese\":\"Japanese\",\"korean\":\"Korean\",\"latvian\":\"Latvian\",\"lithuanian\":\"Lithuanian\",\"malaysian\":\"Malaysian\",\"norwegian\":\"Norwegian\",\"persian\":\"Persian\",\"polish\":\"Polish\",\"portuguese\":\"Portuguese\",\"romanian\":\"Romanian\",\"russian\":\"Russian\",\"serbian\":\"Serbian\",\"spanish\":\"Spanish\",\"swedish\":\"Swedish\",\"turkish\":\"Turkish\",\"urdu\":\"Urdu\"},\"contactForm\":{\"title\":\"Connect with a Training Advisor\",\"paragraph\":\"Speak with one of our representatives to learn how SANS can support you and your organization's cybersecurity training needs.\",\"interestedIn\":\"What are you interested in?\",\"selectInterestedIn\":\"Select a service\",\"interestedDetails\":\"Anything specific?\",\"selectInterestedDetails\":\"Select a specific service\",\"interestedInSelectionError\":\"Please select an interest\",\"interests\":{\"individualTraining\":\"Individual Training\",\"teamDevelopment\":\"Team Development\",\"workforceSecurityCompliance\":\"Workforce Security \u0026 Compliance\",\"sponsorshipsPartnerships\":\"Sponsorships \u0026 Partnerships\"},\"interestDetails\":{\"coursesAndCertifications\":\"Courses \u0026 Certifications\",\"handsOnSimulations\":\"Hands-On Simulations\",\"learningPaths\":\"Learning Paths\",\"groupPurchasing\":\"Group Purchasing\",\"skillsAssessments\":\"Skills Assessments\",\"privateAndCustomTraining\":\"Private \u0026 Custom Training\",\"securityAwarenessTraining\":\"Security Awareness Training\",\"complianceTraining\":\"Compliance Training\",\"riskManagement\":\"Risk Management\",\"services\":\"Services\",\"sponsorResearch\":\"Sponsor Research\",\"sponsorAnEvent\":\"Sponsor an Event\",\"partnerWithSans\":\"Partner with SANS\"},\"firstName\":\"First Name\",\"lastName\":\"Last Name\",\"email\":\"Email\",\"phoneNumber\":\"Phone number\",\"organizationName\":\"Organization Name\",\"jobTitle\":\"Job Title\",\"industry\":\"Industry\",\"selectIndustry\":\"Select industry\",\"country\":\"Country\",\"selectCountry\":\"Select your country\",\"state\":\"State\",\"selectState\":\"Select your state\",\"selectStateError\":\"Please select your state\",\"message\":\"Message\",\"successMessage\":\"Thank you for contacting SANS! One of our team members will be reaching out shortly to discuss in further detail.\",\"errorGeneric\":\"Unable to process your contact request. Please try again later.\",\"submitNotice\":\"By providing this information, you agree to the processing of your personal data by SANS as described in our \u003clink\u003ePrivacy Policy\u003c/link\u003e.\",\"serverError\":\"Unable to process your contact form. Please try again later.\"},\"error\":{\"notFoundPage\":{\"ctaLabel\":\"Back to homepage\",\"title\":\"Looks like you`re trying to access a page or resource that has gone undercover\"},\"courseSinglePage\":{\"missingUsps\":\"We're updating our course schedule - please check back later.\"}},\"urls\":{\"login\":\"/account/login\",\"events\":\"/cyber-security-training-events\"},\"resourceCards\":{\"title\":{\"newsletter\":\"Newsletter\",\"blog_single_page\":\"Blog\",\"podcast_single_page\":\"Podcast\",\"open_source_tools_single\":\"Open Source Tools\",\"white_paper_single\":\"Whitepaper\",\"poster_and_cheat_sheet_single\":\"Poster \u0026 Cheat Sheets\",\"summit_presentation_single\":\"Summit Presentation\",\"policy_single_page\":\"Policy template\",\"webinar_single\":\"Webinar\"},\"icon\":{\"label\":{\"season\":\"Season {season}\",\"newsletterIssue\":\"Issue #{number}\",\"newsletterVolume\":\"Volume #{number}\"}}},\"notice\":{\"discountDeadlineLabel\":\"Hotel Group Discount Deadline\",\"refundDeadlineLabel\":\"Refund Deadline\",\"title\":\"Important Dates\",\"earlyBirdTitle\":\"Early Bird Offer\",\"earlyBirdDescription\":\"Save {discount} {currencyType} using the code \\\"{couponCode}\\\" and pay for any 4-6 day course (excluding Beta Courses and 300 Level Courses) by {validUntilDate}.\"}},\"children\":\"$L1b\"}]\n"])</script><script>self.__next_f.push([1,"1b:[\"$\",\"$L1c\",null,{\"defaultTheme\":\"system\",\"enableColorScheme\":false,\"children\":[[\"$\",\"$L1d\",null,{}],[\"$\",\"$L1e\",null,{}],\"$L1f\",[\"$\",\"main\",null,{\"id\":\"main\",\"children\":[\"$\",\"$L3\",null,{\"parallelRouterKey\":\"children\",\"error\":\"$20\",\"errorStyles\":[],\"errorScripts\":[],\"template\":[\"$\",\"$L4\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":[\"$L21\",[]],\"forbidden\":\"$undefined\",\"unauthorized\":\"$undefined\"}]}],\"$L22\"]}]\n"])</script><script>self.__next_f.push([1,"21:[\"$\",\"div\",null,{\"className\":\"c-not-found-section\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid not-found-section__hero grid--has-container grid--columns-12\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-start-1 grid__item--col-start-tablet-2 grid__item--col-start-desktop-4 grid__item--col-end-13 grid__item--col-end-tablet-12 grid__item--col-end-desktop-10 not-found-section__details\",\"children\":[[\"$\",\"h1\",null,{\"className\":\"c-heading heading--is-h3 heading--is-h3-desktop not-found-section__title\",\"children\":\"Looks like the page you're looking for doesn't exist or has moved.\"}],[\"$\",\"$L23\",null,{\"asElement\":\"$24\",\"href\":\"/\",\"icon\":\"arrow-right-heavy\",\"variant\":\"primary\",\"children\":\"Redirect to homepage\"}],false]}],[\"$\",\"span\",null,{\"className\":\"not-found-section__code\",\"children\":\"404\"}]]}],false]}]\n"])</script><script>self.__next_f.push([1,"9:{\"metadata\":[[\"$\",\"title\",\"0\",{\"children\":\"SANS Cyber Security White Papers | SANS Institute\"}],[\"$\",\"meta\",\"1\",{\"name\":\"description\",\"content\":\"View all White Papers or search and filter to find a specific page\"}],[\"$\",\"meta\",\"2\",{\"name\":\"language\",\"content\":\"en\"}],[\"$\",\"link\",\"3\",{\"rel\":\"canonical\",\"href\":\"https://www.sans.org/white-papers\"}],[\"$\",\"meta\",\"4\",{\"property\":\"og:title\",\"content\":\"SANS Cyber Security White Papers\"}],[\"$\",\"meta\",\"5\",{\"property\":\"og:description\",\"content\":\"View all White Papers or search and filter to find a specific page White Paper Listing Page\"}],[\"$\",\"meta\",\"6\",{\"property\":\"og:url\",\"content\":\"https://www.sans.org/white-papers\"}],[\"$\",\"meta\",\"7\",{\"property\":\"og:site_name\",\"content\":\"SANS Institute\"}],[\"$\",\"meta\",\"8\",{\"property\":\"og:type\",\"content\":\"website\"}],[\"$\",\"meta\",\"9\",{\"name\":\"twitter:card\",\"content\":\"summary\"}],[\"$\",\"meta\",\"10\",{\"name\":\"twitter:site\",\"content\":\"@SANSInstitute\"}],[\"$\",\"meta\",\"11\",{\"name\":\"twitter:title\",\"content\":\"SANS Cyber Security White Papers\"}],[\"$\",\"meta\",\"12\",{\"name\":\"twitter:description\",\"content\":\"View all White Papers or search and filter to find a specific page White Paper Listing Page\"}],[\"$\",\"link\",\"13\",{\"rel\":\"icon\",\"href\":\"/favicon.ico\",\"type\":\"image/x-icon\",\"sizes\":\"48x48\"}],[\"$\",\"link\",\"14\",{\"rel\":\"icon\",\"href\":\"/icon1.png?2951f2f1b780f8ac\",\"type\":\"image/png\",\"sizes\":\"96x96\"}],[\"$\",\"$L25\",\"15\",{}]],\"error\":null,\"digest\":\"$undefined\"}\n"])</script><script>self.__next_f.push([1,"e:\"$9:metadata\"\n"])</script><script>self.__next_f.push([1,"22:[\"$\",\"footer\",null,{\"className\":\"c-footer\",\"id\":\"footer\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-container\",\"children\":[\"$L26\",[\"$\",\"$L27\",null,{\"navigation\":[{\"items\":[{\"href\":\"/about\",\"isExternalLink\":false,\"label\":\"About\",\"target\":\"$undefined\"},{\"href\":\"/instructors\",\"isExternalLink\":false,\"label\":\"Instructors\",\"target\":\"$undefined\"},{\"href\":\"/mlp/careers\",\"isExternalLink\":false,\"label\":\"Careers\",\"target\":\"$undefined\"},{\"href\":\"/press\",\"isExternalLink\":false,\"label\":\"Press\",\"target\":\"$undefined\"}],\"label\":\"Company\"},{\"items\":[{\"href\":\"/about/contact\",\"isExternalLink\":false,\"label\":\"Contact\",\"target\":\"_self\"},{\"href\":\"/frequently-asked-questions\",\"isExternalLink\":false,\"label\":\"FAQs\",\"target\":\"_self\"},{\"href\":\"https://partnerportal.sans.org/?_gl=1*leto7p*_gcl_aw*R0NMLjE3NDQ3OTUxNjYuQ2owS0NRandxdjJfQmhDMEFSSXNBRmI1QWM4TW5jZzYyX2tYRWxBNTJTV2c5TmZHRlF5RTNGaG96X09rM2laRXJ2RDd0NHR0UXdsLVBBVWFBdXN6RUFMd193Y0I.*_ga*MTEwOTM1MTUzLjE3MzYxODIwNzQ.*_ga_18EC69JQ0P*MTc0NTU5MTYxOC4yNzAuMS4xNzQ1NTk3MDgyLjQzLjAuMA..\",\"isExternalLink\":true,\"label\":\"Partner Portal\",\"target\":\"_self\"},{\"href\":\"/legal\",\"isExternalLink\":false,\"label\":\"Legal\",\"target\":\"_self\"}],\"label\":\"Help \u0026 Support\"},{\"items\":[{\"href\":\"/work-study-program\",\"isExternalLink\":false,\"label\":\"Work Study Program\",\"target\":\"$undefined\"},{\"href\":\"/mlp/cyber-academies\",\"isExternalLink\":false,\"label\":\"Academies \u0026 Programs\",\"target\":\"$undefined\"},{\"href\":\"/partnerships\",\"isExternalLink\":false,\"label\":\"Workforce Development Partnerships\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/public-sector/state-local-le-program\",\"isExternalLink\":false,\"label\":\"Law Enforcement\",\"target\":\"$undefined\"},{\"href\":\"/mlp/skillsfuture-singapore\",\"isExternalLink\":false,\"label\":\"SkillsFuture Singapore\",\"target\":\"$undefined\"},{\"href\":\"https://www.sans.edu/\",\"isExternalLink\":true,\"label\":\"Degree Programs\",\"target\":\"$undefined\"}],\"label\":\"Training Programs\"},{\"items\":[{\"href\":\"/member-benefits\",\"isExternalLink\":false,\"label\":\"Become a SANS Member\",\"target\":\"$undefined\"},{\"href\":\"/teach\",\"isExternalLink\":false,\"label\":\"Become an Instructor\",\"target\":\"$undefined\"},{\"href\":\"/sponsorship\",\"isExternalLink\":false,\"label\":\"Become a Sponsor\",\"target\":\"$undefined\"},{\"href\":\"/cyber-security-summit/speak-at-a-summit\",\"isExternalLink\":false,\"label\":\"Speak at a Summit\",\"target\":\"$undefined\"},{\"href\":\"/about/awards\",\"isExternalLink\":false,\"label\":\"Award Programs\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/cyber-leaders-network\",\"isExternalLink\":false,\"label\":\"Join the Cyber Leaders Network\",\"target\":\"$undefined\"}],\"label\":\"Get Involved\"}],\"title\":\"The Highest Standard in Cybersecurity Education Since 1989\"}],\"$L28\"]}]}]\n"])</script><script>self.__next_f.push([1,"29:T5f7,"])</script><script>self.__next_f.push([1,"M7.53 13.095C4.945 9.15 2.576 6.678 2.576 3.947c0-1.994 1.008-3.22 2.588-3.22 2.323 0 4.252 3.514 4.778 9.744h.734V.433H9.94l-.965 1.91C7.926.91 6.521 0 5.163 0 2.488.001.339 2.624.339 7.263c0 4.9 2.149 8.205 4.691 12.021 2.763 4.117 4.385 7.18 4.385 9.652 0 1.95-1.184 3.048-2.762 3.048-2.893 0-5.48-3.86-5.744-11.302H0v12.114h.91l1.183-2.306C3.583 32.224 4.986 33 6.828 33c3.157 0 5.394-3.124 5.394-8.196 0-4.076-1.886-7.503-4.691-11.709m51.9 19.038c-2.544 0-4.852-3.143-5.55-8.682h6.514c1.16 2.078 1.8 3.926 1.8 5.477 0 1.951-1.184 3.206-2.764 3.206m-23.353-9.72V5.898l7.23 16.514h-7.23zm-1.225 4.6c0 3.076-.014 4.572-2.208 4.572h-1.388l-1.43-8.133h5.026zm-15.504-4.6 2.744-16.062 2.656 16.062zm40.96-9.318c-2.586-3.945-4.953-6.417-4.953-9.148 0-1.994 1.007-3.22 2.585-3.22 2.325 0 4.254 3.514 4.78 9.744h.659V.433h-.66l-.964 1.91C60.703.91 59.3 0 57.94 0c-2.674 0-4.822 2.623-4.822 7.262 0 4.899 2.148 8.3 4.691 12.117.708 1.055 1.341 2.167 1.89 3.033h-5.94c-.033-.692-.056-.866-.071-1.731h-.984v1.73h-4.201V5.032c0-2.731.175-3.73 2.45-3.685V.433h-6.825v.913c2.1 0 2.976 1.258 2.976 4.119v14.352L39.308.433h-6.382V1.3h1.924v21.113h-5.238L25.773.433h-3.859L16.57 27.12c-.527 2.687-.442 4.054-3.068 4.445v.886h7.175v-.886c-1.924-.044-2.448-.565-2.448-1.952 0-.607.047-1.13.09-1.519l.793-4.643h5.875l1.316 8.134h-2.475v.866h15.926v-.886c-2.45-.174-3.676-1.562-3.676-4.813V23.45h7.736l3.784 9h.906v-9h4.201v9.345h.984l1.184-2.307C56.362 32.225 57.765 33 59.607 33 62.763 33 65 29.876 65 24.804c0-4.076-1.886-7.503-4.691-11.709z"])</script><script>self.__next_f.push([1,"28:[\"$\",\"div\",null,{\"className\":\"footer__copy\",\"children\":[[\"$\",\"$L24\",null,{\"aria-label\":\"Go to homepage\",\"className\":\"footer__copy-logo-link\",\"href\":\"/\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__copy-logo\",\"height\":\"$undefined\",\"width\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 65 33\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"$29\"}]}]}],[\"$\",\"nav\",null,{\"aria-label\":\"Social Navigation\",\"className\":\"footer__socials\",\"children\":[[\"$\",\"$L24\",\"0\",{\"aria-label\":\"LinkedIn\",\"className\":\"footer__socials-link\",\"href\":\"https://www.linkedin.com/company/sans-institute\",\"title\":\"LinkedIn\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"M26.154 4H5.846A1.846 1.846 0 0 0 4 5.846v20.308A1.846 1.846 0 0 0 5.846 28h20.308A1.846 1.846 0 0 0 28 26.154V5.846A1.846 1.846 0 0 0 26.154 4m0 22.154H5.846V5.846h20.308zm-13.846-12v7.384a.923.923 0 0 1-1.847 0v-7.384a.923.923 0 0 1 1.847 0m10.154 3.23v4.154a.923.923 0 1 1-1.847 0v-4.153a2.308 2.308 0 1 0-4.615 0v4.153a.923.923 0 0 1-1.846 0v-7.384a.923.923 0 0 1 1.822-.206 4.153 4.153 0 0 1 6.486 3.437m-9.693-6.46a1.385 1.385 0 1 1-2.77-.001 1.385 1.385 0 0 1 2.77 0\"}]}]}],[\"$\",\"$L24\",\"1\",{\"aria-label\":\"X\",\"className\":\"footer__socials-link\",\"href\":\"https://x.com/SANSInstitute\",\"title\":\"X\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"m26.838 26.45-7.82-12.29 7.716-8.489a1 1 0 0 0-1.479-1.344l-7.35 8.085-5.058-7.949A1 1 0 0 0 12.004 4H6.007a1 1 0 0 0-.843 1.537l7.82 12.288-7.716 8.495a.999.999 0 1 0 1.479 1.344l7.35-8.085 5.058 7.949a1 1 0 0 0 .844.457h5.996a1 1 0 0 0 .843-1.535m-6.291-.464L7.827 6h3.623l12.725 19.987z\"}]}]}],[\"$\",\"$L24\",\"2\",{\"aria-label\":\"YouTube\",\"className\":\"footer__socials-link\",\"href\":\"https://www.youtube.com/@SANSInstitute\",\"title\":\"YouTube\",\"target\":\"_blank\",\"children\":\"$L2a\"}],\"$L2b\",\"$L2c\"]}],\"$L2d\"]}]\n"])</script><script>self.__next_f.push([1,"2a:[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"m20.555 15.168-6-4A1 1 0 0 0 13 12v8a1 1 0 0 0 1.555.832l6-4a1 1 0 0 0 0-1.665M15 18.13v-4.256L18.198 16zM29.291 8.69a3 3 0 0 0-1.811-2.05C23.195 4.985 16.375 5 16 5S8.805 4.985 4.52 6.64a3 3 0 0 0-1.811 2.05C2.385 9.938 2 12.218 2 16s.385 6.063.709 7.31a3 3 0 0 0 1.811 2.051C8.625 26.945 15.05 27 15.918 27h.165c.867 0 7.296-.055 11.397-1.639a3 3 0 0 0 1.811-2.051c.324-1.25.709-3.527.709-7.31s-.385-6.062-.709-7.31m-1.936 14.125a1 1 0 0 1-.596.686c-3.957 1.528-10.685 1.5-10.75 1.5H16c-.068 0-6.791.025-10.75-1.5a1 1 0 0 1-.596-.686C4.35 21.674 4 19.571 4 16s.35-5.674.645-6.809a1 1 0 0 1 .596-.691C9.056 7.026 15.45 7 15.973 7h.033c.068 0 6.798-.022 10.75 1.5a1 1 0 0 1 .596.686C27.65 10.326 28 12.43 28 16s-.35 5.674-.645 6.809z\"}]}]\n"])</script><script>self.__next_f.push([1,"2b:[\"$\",\"$L24\",\"3\",{\"aria-label\":\"Facebook\",\"className\":\"footer__socials-link\",\"href\":\"https://www.facebook.com/sansinstitute/\",\"title\":\"Facebook\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"M16 4a12 12 0 1 0 12 12A12.013 12.013 0 0 0 16 4m.923 22.111V18.77h2.77a.923.923 0 1 0 0-1.846h-2.77v-2.77a1.846 1.846 0 0 1 1.846-1.845h1.846a.923.923 0 0 0 0-1.847H18.77a3.69 3.69 0 0 0-3.692 3.693v2.77h-2.77a.923.923 0 1 0 0 1.845h2.77v7.342a10.154 10.154 0 1 1 1.846 0\"}]}]}]\n"])</script><script>self.__next_f.push([1,"2c:[\"$\",\"$L24\",\"4\",{\"aria-label\":\"Tik Tok\",\"className\":\"footer__socials-link\",\"href\":\"https://www.tiktok.com/@sansinstituteofficial\",\"title\":\"Tik Tok\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"M28,9c-3.3,0-6-2.7-6-6,0-.6-.4-1-1-1h-5c-.6,0-1,.4-1,1v16.5c0,1.4-1.1,2.5-2.5,2.5s-2.5-1.1-2.5-2.5c0-1,.6-1.8,1.4-2.3.3-.2.6-.5.6-.9v-5.3c0-.6-.4-1-1-1,0,0-.1,0-.2,0-4.5.8-7.8,4.9-7.8,9.5s4.3,9.5,9.5,9.5,9.5-4.3,9.5-9.5v-5c1.9,1,3.9,1.5,6,1.5.6,0,1-.4,1-1v-5c0-.6-.4-1-1-1ZM27,14c-2-.2-3.8-.9-5.4-2-.4-.3-1.1-.2-1.4.2-.1.2-.2.4-.2.6v6.8c0,4.1-3.4,7.5-7.5,7.5s-7.5-3.4-7.5-7.5,2.1-6.1,5-7.2v3.5c-2.1,1.4-2.6,4.2-1.2,6.2,1.4,2.1,4.2,2.6,6.2,1.2,1.2-.8,2-2.2,2-3.7V4h3.1c.5,3.6,3.3,6.5,6.9,6.9v3Z\"}]}]}]\n"])</script><script>self.__next_f.push([1,"2d:[\"$\",\"small\",null,{\"className\":\"footer__copy-nav\",\"children\":[[\"$\",\"div\",null,{\"className\":\"footer__copyright\",\"children\":[\"$\",\"nav\",null,{\"aria-label\":\"Legal navigation\",\"className\":\"footer__copy-nav-list\",\"children\":[[\"$\",\"$L24\",\"0\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/privacy\",\"target\":\"_blank\",\"children\":\"Privacy Policy\"}],[\"$\",\"$L24\",\"1\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/terms-conditions\",\"target\":\"$undefined\",\"children\":\"Terms and Conditions\"}],[\"$\",\"$L24\",\"2\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/do-not-share-sell\",\"target\":\"_blank\",\"children\":\"Do Not Sell/Share My Personal Information\"}],[\"$\",\"$L24\",\"3\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/cookie-notice\",\"target\":\"$undefined\",\"children\":\"Cookie Notice\"}]]}]}],[\"$\",\"div\",null,{\"className\":\"footer__trademark\",\"children\":[[\"$\",\"span\",null,{\"className\":\"c-text footer__copy-nav-trademark\",\"children\":[\"© \",2026,\" \",\"The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute.\"]}],[\"$\",\"span\",null,{\"className\":\"c-text footer__copy-nav-trademark\",\"children\":[\"Our \",[\"$\",\"$L24\",null,{\"href\":\"/legal/terms-conditions\",\"children\":\"Terms and Conditions\"}],\" detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.\"]}]]}]]}]\n"])</script><script>self.__next_f.push([1,"1f:[\"$\",\"$L2e\",null,{\"children\":[false,false,[\"$\",\"$L2f\",null,{\"headerData\":{\"headerCta\":{\"href\":\"/about/contact#connect-with-a-training-advisor\",\"label\":\"Contact Sales\",\"size\":\"regular\",\"target\":\"_top\",\"variant\":\"primary\"},\"logo\":\"logo\",\"menuItems\":[{\"bottomBar\":{\"cta\":{\"href\":\"/course-preview\",\"isExternalLink\":false,\"label\":\"Learn More\",\"target\":\"$undefined\"},\"description\":\"Experience SANS training through course previews.\",\"title\":\"Get a Free Hour of SANS Training\"},\"featuredItemCard\":{\"title\":\"Featured Course\",\"courseCard\":{\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/applied-data-science-machine-learning#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/applied-data-science-machine-learning\"}},\"image\":{\"alt\":\"SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC595\",\"focusArea\":\"Cyber Defense, Artificial Intelligence\"},\"title\":\"SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals\"},\"cta\":{\"href\":\"/cyber-security-courses\",\"label\":\"View All Courses\",\"size\":\"$undefined\",\"target\":\"$undefined\",\"variant\":\"$undefined\"}},\"href\":\"/cyber-security-training-overview\",\"itemsSingle\":[{\"description\":\"Build cyber prowess with training from renowned experts\",\"href\":\"/cybersecurity-courses\",\"icon\":\"courses-cards-three\",\"label\":\"Courses\",\"target\":\"$undefined\"},{\"description\":\"Multiple training options to best fit your schedule and preferred learning style\",\"href\":\"/cyber-security-training-formats\",\"icon\":\"training\",\"label\":\"Ways to Train\",\"target\":\"$undefined\"},{\"description\":\"Hands-on training to keep you at the top of your game\",\"href\":\"/cyber-ranges\",\"icon\":\"hands-on-solutions\",\"label\":\"Cyber Ranges\",\"target\":\"$undefined\"},{\"description\":\"Expert-led training at locations around the world\",\"href\":\"/cyber-security-training-events\",\"icon\":\"location\",\"label\":\"Training Events \u0026 Summits\",\"target\":\"_self\"},{\"description\":\"Demonstrate cybersecurity expertise with GIAC certifications\",\"href\":\"/cyber-security-certifications\",\"icon\":\"sealcheck-certification\",\"label\":\"Certifications\",\"target\":\"$undefined\"},{\"description\":\"Upcoming workshops, webinars and local events\\n\",\"href\":\"/free-cybersecurity-events\",\"icon\":\"calendar-check\",\"label\":\"Free Training Events\",\"target\":\"$undefined\"},{\"description\":\"Harden enterprise security with end-user and role-based training\",\"href\":\"/for-organizations/workforce\",\"icon\":\"shield-workforce\",\"label\":\"Workforce Security and Risk Training \",\"target\":\"$undefined\"},{\"description\":\"Train with world-class cybersecurity experts who bring real-world expertise to class.\",\"href\":\"/instructors\",\"icon\":\"user-private-training\",\"label\":\"Meet Our Instructors\",\"target\":\"$undefined\"}],\"label\":\"Training\"},{\"bottomBar\":{\"cta\":{\"href\":\"/about/contact\",\"isExternalLink\":false,\"label\":\"Contact us\",\"target\":\"$undefined\"},\"description\":\"Let us help.\",\"title\":\"Can't find what you are looking for?\"},\"featuredItemCard\":{\"title\":\"Featured\",\"learningPathsCard\":{\"cta\":{\"href\":\"/cybersecurity-focus-areas/ai\",\"label\":\"Learn more\"},\"description\":\"Artificial Intelligence (AI) Cyber Security Training and Resources Ensure professionals at every level are prepared to navigate the complexities of an AI-driven future, equipping them with critical understanding of AI-powered threats and the skills to leverage AI to enhance security operations.\",\"focusArea\":\"ai\",\"icon\":\"related\",\"title\":\"NEW - AI Security Training\"},\"cta\":{\"href\":\"/cybersecurity-focus-areas\",\"label\":\"View all Focus Areas\",\"size\":\"$undefined\",\"target\":\"$undefined\",\"variant\":\"$undefined\"}},\"href\":\"/learning-paths\",\"itemsSingle\":[{\"description\":\"Chart your path to job-specific training courses\",\"href\":\"/cybersecurity-focus-areas\",\"icon\":\"focus\",\"label\":\"By Focus Area\",\"target\":\"$undefined\"},{\"description\":\"Give your cybersecurity career the right foundation for success\",\"href\":\"/mlp/new-to-cyber\",\"icon\":\"new\",\"label\":\"New to Cyber\",\"target\":\"$undefined\"},{\"description\":\"Find the courses and certifications that align with our current or desired role\",\"href\":\"/job-roles\",\"icon\":\"briefcase-management\",\"label\":\"By Job Role\",\"target\":\"$undefined\"},{\"description\":\"Training designed to help security leaders reduce organizational risk\",\"href\":\"/cybersecurity-focus-areas/leadership\",\"icon\":\"ranking\",\"label\":\"Leadership\",\"target\":\"$undefined\"},{\"description\":\"Explore how SANS courses align with leading cybersecurity skills frameworks including NICE, ECSF and DoD 8140\",\"href\":\"/frameworks-and-directives\",\"icon\":\"atom\",\"label\":\"By Skills Framework or Directive\",\"target\":\"$undefined\"},{\"description\":\"Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.\",\"href\":\"https://www.sans.edu/\",\"icon\":\"degree\",\"label\":\"Degree and Certificate Programs\",\"target\":\"$undefined\"},{\"description\":\"Find the right training path based on critical skills\",\"href\":\"/cyber-security-skills-roadmap\",\"icon\":\"learning-paths\",\"label\":\"By Skills Roadmap\",\"target\":\"$undefined\"}],\"label\":\"Learning Paths\"},{\"bottomBar\":{\"cta\":{\"href\":\"/member-benefits\",\"isExternalLink\":false,\"label\":\"Sign Up\",\"target\":\"$undefined\"},\"description\":\"Become a member for instant access to our free resources.\",\"title\":\"Join the SANS Community\"},\"featuredItems\":[{\"description\":\"Connect, learn, and share with other cybersecurity professionals\",\"icon\":\"new\",\"href\":\"/member-benefits\",\"isExternalLink\":false,\"label\":\"SANS Community Benefits\",\"target\":\"$undefined\"},{\"description\":\"Discover how organizations and individual cyber practitioners use SANS training and GIAC certifications\",\"icon\":\"people-3\",\"href\":\"/customer-reviews\",\"isExternalLink\":false,\"label\":\"Customer Case Studies\",\"target\":\"$undefined\"},{\"description\":\"Explore expert-driven guidance, training, and tools to help defend against AI-powered threats and adopt AI securely\",\"icon\":\"head\",\"href\":\"/artificial-intelligence\",\"isExternalLink\":false,\"label\":\"AI Risk \u0026 Readiness\",\"target\":\"$undefined\"}],\"href\":\"/security-resources\",\"itemsMultiple\":[{\"cta\":{\"href\":\"/security-resources/watch-and-listen\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Watch \u0026 Listen\",\"navigation\":[{\"href\":\"/webcasts\",\"isExternalLink\":false,\"label\":\"Webinars\",\"target\":\"$undefined\"},{\"href\":\"/presentations\",\"isExternalLink\":false,\"label\":\"Summit Presentations\",\"target\":\"$undefined\"},{\"href\":\"/podcasts\",\"isExternalLink\":false,\"label\":\"Podcasts \u0026 Live Streams\",\"target\":\"$undefined\"}]},{\"cta\":{\"href\":\"/security-resources/read\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Read\",\"navigation\":[{\"href\":\"/blog\",\"isExternalLink\":false,\"label\":\"Blog\",\"target\":\"$undefined\"},{\"href\":\"/newsletters\",\"isExternalLink\":false,\"label\":\"Newsletters\",\"target\":\"$undefined\"},{\"href\":\"https://isc.sans.edu/\",\"isExternalLink\":true,\"label\":\"Internet Storm Center\",\"target\":\"_blank\"}]},{\"cta\":{\"href\":\"/security-resources/download\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Download\",\"navigation\":[{\"href\":\"/tools\",\"isExternalLink\":false,\"label\":\"Open Source Tools\",\"target\":\"$undefined\"},{\"href\":\"/posters\",\"isExternalLink\":false,\"label\":\"Posters \u0026 Cheat Sheets\",\"target\":\"$undefined\"},{\"href\":\"/information-security-policy\",\"isExternalLink\":false,\"label\":\"Policy Templates\",\"target\":\"$undefined\"},{\"href\":\"/white-papers\",\"isExternalLink\":false,\"label\":\"White Papers\",\"target\":\"$undefined\"}]}],\"label\":\"Free Resources\"},{\"bottomBar\":{\"cta\":{\"href\":\"/about/contact\",\"isExternalLink\":false,\"label\":\"Contact Us\",\"target\":\"$undefined\"},\"description\":\"We're here to help.\",\"title\":\"Interested in developing a training plan to fit your organization’s needs?\"},\"featuredItems\":[{\"description\":\"Mission-focused cybersecurity training for government, defense, and education\",\"icon\":\"building-office-enterprise\",\"href\":\"/for-organizations/public-sector\",\"isExternalLink\":false,\"label\":\"Public Sector\",\"target\":\"$undefined\"},{\"description\":\"Explore industry-specific programming and customized training solutions\",\"icon\":\"people-2\",\"href\":\"/partnerships\",\"isExternalLink\":false,\"label\":\"Partnerships\",\"target\":\"$undefined\"},{\"description\":\"Sponsor a SANS event or research paper\",\"icon\":\"info\",\"href\":\"/sponsorship\",\"isExternalLink\":false,\"label\":\"Sponsorship Opportunities\",\"target\":\"$undefined\"}],\"href\":\"/for-organizations\",\"itemsMultiple\":[{\"cta\":{\"href\":\"/for-organizations/team-development\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Team Development\",\"navigation\":[{\"href\":\"/for-organizations/team-development/why-partner-with-sans\",\"isExternalLink\":false,\"label\":\"Why Partner with SANS\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/team-development/group-purchasing\",\"isExternalLink\":false,\"label\":\"Group Purchases\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/team-development/cybersecurity-assessments\",\"isExternalLink\":false,\"label\":\"Skills \u0026 Talent Assessments\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/team-development/private-training\",\"isExternalLink\":false,\"label\":\"Private \u0026 Custom Training Programs\",\"target\":\"$undefined\"}]},{\"cta\":{\"href\":\"/cybersecurity-focus-areas/leadership\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Leadership Development\",\"navigation\":[{\"href\":\"/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Cybersecurity%20Leadership\",\"isExternalLink\":true,\"label\":\"Management Courses \u0026 Accreditation\",\"target\":\"$undefined\"},{\"href\":\"/cyber-ranges/cyber-crisis-exercises\",\"isExternalLink\":false,\"label\":\"Cyber Crisis Exercises\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/cyber-leaders-network\",\"isExternalLink\":false,\"label\":\"SANS Cyber Leaders Network\",\"target\":\"$undefined\"}]},{\"cta\":{\"href\":\"/for-organizations/workforce\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Workforce Security \u0026 Risk\",\"navigation\":[{\"href\":\"/for-organizations/workforce/security-awareness-training\",\"isExternalLink\":false,\"label\":\"Security Awareness Training\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/compliance-training\",\"isExternalLink\":false,\"label\":\"Compliance Training\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/risk-management\",\"isExternalLink\":false,\"label\":\"Risk Management\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/services\",\"isExternalLink\":false,\"label\":\"Services\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/resources\",\"isExternalLink\":false,\"label\":\"Resources\",\"target\":\"$undefined\"}]}],\"label\":\"For Organizations\"}],\"topbar\":{\"navigation\":[{\"href\":\"/account/login\",\"isExternalLink\":true,\"label\":\"Log In\",\"target\":\"_self\",\"icon\":\"login\",\"dropdownNavigation\":[]},{\"href\":\"/account/create\",\"isExternalLink\":true,\"label\":\"Join - It's Free\",\"target\":\"$undefined\",\"icon\":\"new\",\"dropdownNavigation\":[]}]}},\"algoliaGlobalSearch\":{\"apiKey\":\"efc23343b7c48a65f7ddba6f07e3c086\",\"appId\":\"M2CVJC95IX\",\"url\":\"m2cvjc95ix-dsn.algolia.net\"}}]]}]\n"])</script><script>self.__next_f.push([1,"30:I[18131,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"FooterNewsletterWrapper\"]\n"])</script><script>self.__next_f.push([1,"26:[\"$\",\"div\",null,{\"className\":\"footer__newsletter\",\"children\":[[\"$\",\"h2\",null,{\"className\":\"c-heading footer__newsletter-title\",\"children\":\"Get Curated News, Vulnerabilities, and Essential Security Awareness Tips\"}],[\"$\",\"$L30\",null,{\"buttonLabel\":\"Subscribe to Newsletter \",\"countryListOptions\":[{\"id\":261,\"abbreviation\":\"US\",\"text\":\"United States\",\"is_gdpr\":false},{\"id\":76,\"abbreviation\":\"CA\",\"text\":\"Canada\",\"is_gdpr\":true},{\"id\":260,\"abbreviation\":\"GB\",\"text\":\"United Kingdom\",\"is_gdpr\":true},{\"id\":233,\"abbreviation\":\"ES\",\"text\":\"Spain\",\"is_gdpr\":true},{\"id\":59,\"abbreviation\":\"BE\",\"text\":\"Belgium\",\"is_gdpr\":true},{\"id\":95,\"abbreviation\":\"DK\",\"text\":\"Denmark\",\"is_gdpr\":true},{\"id\":199,\"abbreviation\":\"NO\",\"text\":\"Norway\",\"is_gdpr\":true},{\"id\":189,\"abbreviation\":\"NL\",\"text\":\"Netherlands\",\"is_gdpr\":true},{\"id\":51,\"abbreviation\":\"AU\",\"text\":\"Australia\",\"is_gdpr\":false},{\"id\":138,\"abbreviation\":\"IN\",\"text\":\"India\",\"is_gdpr\":false},{\"id\":146,\"abbreviation\":\"JP\",\"text\":\"Japan\",\"is_gdpr\":false},{\"id\":227,\"abbreviation\":\"SG\",\"text\":\"Singapore\",\"is_gdpr\":false},{\"id\":39,\"abbreviation\":\"AF\",\"text\":\"Afghanistan\",\"is_gdpr\":false},{\"id\":1188,\"abbreviation\":\"AX\",\"text\":\"Aland Islands\",\"is_gdpr\":true},{\"id\":40,\"abbreviation\":\"AL\",\"text\":\"Albania\",\"is_gdpr\":false},{\"id\":41,\"abbreviation\":\"DZ\",\"text\":\"Algeria\",\"is_gdpr\":false},{\"id\":42,\"abbreviation\":\"AS\",\"text\":\"American Samoa\",\"is_gdpr\":false},{\"id\":43,\"abbreviation\":\"AD\",\"text\":\"Andorra\",\"is_gdpr\":false},{\"id\":44,\"abbreviation\":\"AO\",\"text\":\"Angola\",\"is_gdpr\":false},{\"id\":45,\"abbreviation\":\"AI\",\"text\":\"Anguilla\",\"is_gdpr\":true},{\"id\":46,\"abbreviation\":\"AQ\",\"text\":\"Antarctica\",\"is_gdpr\":false},{\"id\":47,\"abbreviation\":\"AG\",\"text\":\"Antigua and Barbuda\",\"is_gdpr\":false},{\"id\":48,\"abbreviation\":\"AR\",\"text\":\"Argentina\",\"is_gdpr\":false},{\"id\":49,\"abbreviation\":\"AM\",\"text\":\"Armenia\",\"is_gdpr\":false},{\"id\":50,\"abbreviation\":\"AW\",\"text\":\"Aruba\",\"is_gdpr\":true},{\"id\":52,\"abbreviation\":\"AT\",\"text\":\"Austria\",\"is_gdpr\":true},{\"id\":53,\"abbreviation\":\"AZ\",\"text\":\"Azerbaijan\",\"is_gdpr\":false},{\"id\":54,\"abbreviation\":\"BS\",\"text\":\"Bahamas\",\"is_gdpr\":false},{\"id\":55,\"abbreviation\":\"BH\",\"text\":\"Bahrain\",\"is_gdpr\":false},{\"id\":56,\"abbreviation\":\"BD\",\"text\":\"Bangladesh\",\"is_gdpr\":false},{\"id\":57,\"abbreviation\":\"BB\",\"text\":\"Barbados\",\"is_gdpr\":false},{\"id\":58,\"abbreviation\":\"BY\",\"text\":\"Belarus\",\"is_gdpr\":false},{\"id\":60,\"abbreviation\":\"BZ\",\"text\":\"Belize\",\"is_gdpr\":false},{\"id\":61,\"abbreviation\":\"BJ\",\"text\":\"Benin\",\"is_gdpr\":false},{\"id\":62,\"abbreviation\":\"BM\",\"text\":\"Bermuda\",\"is_gdpr\":true},{\"id\":63,\"abbreviation\":\"BT\",\"text\":\"Bhutan\",\"is_gdpr\":false},{\"id\":64,\"abbreviation\":\"BO\",\"text\":\"Bolivia\",\"is_gdpr\":false},{\"id\":1189,\"abbreviation\":\"BQ\",\"text\":\"Bonaire, Sint Eustatius, and Saba\",\"is_gdpr\":true},{\"id\":65,\"abbreviation\":\"BA\",\"text\":\"Bosnia And Herzegovina\",\"is_gdpr\":false},{\"id\":66,\"abbreviation\":\"BW\",\"text\":\"Botswana\",\"is_gdpr\":false},{\"id\":67,\"abbreviation\":\"BV\",\"text\":\"Bouvet Island\",\"is_gdpr\":false},{\"id\":68,\"abbreviation\":\"BR\",\"text\":\"Brazil\",\"is_gdpr\":false},{\"id\":69,\"abbreviation\":\"IO\",\"text\":\"British Indian Ocean Territory\",\"is_gdpr\":false},{\"id\":70,\"abbreviation\":\"BN\",\"text\":\"Brunei Darussalam\",\"is_gdpr\":false},{\"id\":71,\"abbreviation\":\"BG\",\"text\":\"Bulgaria\",\"is_gdpr\":true},{\"id\":72,\"abbreviation\":\"BF\",\"text\":\"Burkina Faso\",\"is_gdpr\":false},{\"id\":73,\"abbreviation\":\"BI\",\"text\":\"Burundi\",\"is_gdpr\":false},{\"id\":74,\"abbreviation\":\"KH\",\"text\":\"Cambodia\",\"is_gdpr\":false},{\"id\":75,\"abbreviation\":\"CM\",\"text\":\"Cameroon\",\"is_gdpr\":false},{\"id\":77,\"abbreviation\":\"CV\",\"text\":\"Cape Verde\",\"is_gdpr\":false},{\"id\":78,\"abbreviation\":\"KY\",\"text\":\"Cayman Islands\",\"is_gdpr\":true},{\"id\":79,\"abbreviation\":\"CF\",\"text\":\"Central African Republic\",\"is_gdpr\":false},{\"id\":80,\"abbreviation\":\"TD\",\"text\":\"Chad\",\"is_gdpr\":false},{\"id\":81,\"abbreviation\":\"CL\",\"text\":\"Chile\",\"is_gdpr\":false},{\"id\":82,\"abbreviation\":\"CN\",\"text\":\"China\",\"is_gdpr\":false},{\"id\":83,\"abbreviation\":\"CX\",\"text\":\"Christmas Island\",\"is_gdpr\":false},{\"id\":84,\"abbreviation\":\"CC\",\"text\":\"Cocos (Keeling) Islands\",\"is_gdpr\":false},{\"id\":85,\"abbreviation\":\"CO\",\"text\":\"Colombia\",\"is_gdpr\":false},{\"id\":86,\"abbreviation\":\"KM\",\"text\":\"Comoros\",\"is_gdpr\":false},{\"id\":88,\"abbreviation\":\"CK\",\"text\":\"Cook Islands\",\"is_gdpr\":false},{\"id\":89,\"abbreviation\":\"CR\",\"text\":\"Costa Rica\",\"is_gdpr\":false},{\"id\":90,\"abbreviation\":\"CI\",\"text\":\"Cote D'ivoire\",\"is_gdpr\":false},{\"id\":91,\"abbreviation\":\"HR\",\"text\":\"Croatia (Local Name: Hrvatska)\",\"is_gdpr\":true},{\"id\":1192,\"abbreviation\":\"CW\",\"text\":\"Curacao\",\"is_gdpr\":true},{\"id\":93,\"abbreviation\":\"CY\",\"text\":\"Cyprus\",\"is_gdpr\":true},{\"id\":94,\"abbreviation\":\"CZ\",\"text\":\"Czech Republic\",\"is_gdpr\":true},{\"id\":1190,\"abbreviation\":\"CD\",\"text\":\"Democratic Republic of the Congo\",\"is_gdpr\":false},{\"id\":96,\"abbreviation\":\"DJ\",\"text\":\"Djibouti\",\"is_gdpr\":false},{\"id\":97,\"abbreviation\":\"DM\",\"text\":\"Dominica\",\"is_gdpr\":false},{\"id\":98,\"abbreviation\":\"DO\",\"text\":\"Dominican Republic\",\"is_gdpr\":false},{\"id\":1198,\"abbreviation\":\"TL\",\"text\":\"East Timor\",\"is_gdpr\":false},{\"id\":100,\"abbreviation\":\"EC\",\"text\":\"Ecuador\",\"is_gdpr\":false},{\"id\":101,\"abbreviation\":\"EG\",\"text\":\"Egypt\",\"is_gdpr\":false},{\"id\":102,\"abbreviation\":\"SV\",\"text\":\"El Salvador\",\"is_gdpr\":false},{\"id\":103,\"abbreviation\":\"GQ\",\"text\":\"Equatorial Guinea\",\"is_gdpr\":false},{\"id\":104,\"abbreviation\":\"ER\",\"text\":\"Eritrea\",\"is_gdpr\":false},{\"id\":105,\"abbreviation\":\"EE\",\"text\":\"Estonia\",\"is_gdpr\":true},{\"id\":240,\"abbreviation\":\"SZ\",\"text\":\"Eswatini\",\"is_gdpr\":false},{\"id\":106,\"abbreviation\":\"ET\",\"text\":\"Ethiopia\",\"is_gdpr\":false},{\"id\":108,\"abbreviation\":\"FK\",\"text\":\"Falkland Islands (Malvinas)\",\"is_gdpr\":true},{\"id\":109,\"abbreviation\":\"FO\",\"text\":\"Faroe Islands\",\"is_gdpr\":true},{\"id\":110,\"abbreviation\":\"FJ\",\"text\":\"Fiji\",\"is_gdpr\":false},{\"id\":111,\"abbreviation\":\"FI\",\"text\":\"Finland\",\"is_gdpr\":true},{\"id\":112,\"abbreviation\":\"FR\",\"text\":\"France\",\"is_gdpr\":true},{\"id\":114,\"abbreviation\":\"GF\",\"text\":\"French Guiana\",\"is_gdpr\":true},{\"id\":115,\"abbreviation\":\"PF\",\"text\":\"French Polynesia\",\"is_gdpr\":true},{\"id\":116,\"abbreviation\":\"TF\",\"text\":\"French Southern Territories\",\"is_gdpr\":true},{\"id\":117,\"abbreviation\":\"GA\",\"text\":\"Gabon\",\"is_gdpr\":false},{\"id\":118,\"abbreviation\":\"GM\",\"text\":\"Gambia\",\"is_gdpr\":false},{\"id\":119,\"abbreviation\":\"GE\",\"text\":\"Georgia\",\"is_gdpr\":false},{\"id\":120,\"abbreviation\":\"DE\",\"text\":\"Germany\",\"is_gdpr\":true},{\"id\":121,\"abbreviation\":\"GH\",\"text\":\"Ghana\",\"is_gdpr\":false},{\"id\":122,\"abbreviation\":\"GI\",\"text\":\"Gibraltar\",\"is_gdpr\":true},{\"id\":123,\"abbreviation\":\"GR\",\"text\":\"Greece\",\"is_gdpr\":true},{\"id\":124,\"abbreviation\":\"GL\",\"text\":\"Greenland\",\"is_gdpr\":true},{\"id\":125,\"abbreviation\":\"GD\",\"text\":\"Grenada\",\"is_gdpr\":false},{\"id\":126,\"abbreviation\":\"GP\",\"text\":\"Guadeloupe\",\"is_gdpr\":true},{\"id\":127,\"abbreviation\":\"GU\",\"text\":\"Guam\",\"is_gdpr\":false},{\"id\":128,\"abbreviation\":\"GT\",\"text\":\"Guatemala\",\"is_gdpr\":false},{\"id\":1077,\"abbreviation\":\"GG\",\"text\":\"Guernsey\",\"is_gdpr\":false},{\"id\":129,\"abbreviation\":\"GN\",\"text\":\"Guinea\",\"is_gdpr\":false},{\"id\":130,\"abbreviation\":\"GW\",\"text\":\"Guinea-Bissau\",\"is_gdpr\":false},{\"id\":131,\"abbreviation\":\"GY\",\"text\":\"Guyana\",\"is_gdpr\":false},{\"id\":132,\"abbreviation\":\"HT\",\"text\":\"Haiti\",\"is_gdpr\":false},{\"id\":133,\"abbreviation\":\"HM\",\"text\":\"Heard And McDonald Islands\",\"is_gdpr\":false},{\"id\":134,\"abbreviation\":\"HN\",\"text\":\"Honduras\",\"is_gdpr\":false},{\"id\":135,\"abbreviation\":\"HK\",\"text\":\"Hong Kong\",\"is_gdpr\":false},{\"id\":136,\"abbreviation\":\"HU\",\"text\":\"Hungary\",\"is_gdpr\":true},{\"id\":137,\"abbreviation\":\"IS\",\"text\":\"Iceland\",\"is_gdpr\":true},{\"id\":139,\"abbreviation\":\"ID\",\"text\":\"Indonesia\",\"is_gdpr\":false},{\"id\":141,\"abbreviation\":\"IQ\",\"text\":\"Iraq\",\"is_gdpr\":false},{\"id\":142,\"abbreviation\":\"IE\",\"text\":\"Ireland\",\"is_gdpr\":true},{\"id\":1079,\"abbreviation\":\"IM\",\"text\":\"Isle of Man\",\"is_gdpr\":false},{\"id\":143,\"abbreviation\":\"IL\",\"text\":\"Israel\",\"is_gdpr\":false},{\"id\":144,\"abbreviation\":\"IT\",\"text\":\"Italy\",\"is_gdpr\":true},{\"id\":145,\"abbreviation\":\"JM\",\"text\":\"Jamaica\",\"is_gdpr\":false},{\"id\":1076,\"abbreviation\":\"JE\",\"text\":\"Jersey\",\"is_gdpr\":false},{\"id\":147,\"abbreviation\":\"JO\",\"text\":\"Jordan\",\"is_gdpr\":false},{\"id\":148,\"abbreviation\":\"KZ\",\"text\":\"Kazakhstan\",\"is_gdpr\":false},{\"id\":149,\"abbreviation\":\"KE\",\"text\":\"Kenya\",\"is_gdpr\":false},{\"id\":150,\"abbreviation\":\"KI\",\"text\":\"Kiribati\",\"is_gdpr\":false},{\"id\":152,\"abbreviation\":\"KR\",\"text\":\"Korea, Republic Of\",\"is_gdpr\":false},{\"id\":1199,\"abbreviation\":\"XK\",\"text\":\"Kosovo\",\"is_gdpr\":true},{\"id\":153,\"abbreviation\":\"KW\",\"text\":\"Kuwait\",\"is_gdpr\":false},{\"id\":154,\"abbreviation\":\"KG\",\"text\":\"Kyrgyzstan\",\"is_gdpr\":false},{\"id\":155,\"abbreviation\":\"LA\",\"text\":\"Lao People's Democratic Republic\",\"is_gdpr\":false},{\"id\":156,\"abbreviation\":\"LV\",\"text\":\"Latvia\",\"is_gdpr\":true},{\"id\":157,\"abbreviation\":\"LB\",\"text\":\"Lebanon\",\"is_gdpr\":false},{\"id\":158,\"abbreviation\":\"LS\",\"text\":\"Lesotho\",\"is_gdpr\":false},{\"id\":159,\"abbreviation\":\"LR\",\"text\":\"Liberia\",\"is_gdpr\":false},{\"id\":161,\"abbreviation\":\"LI\",\"text\":\"Liechtenstein\",\"is_gdpr\":true},{\"id\":162,\"abbreviation\":\"LT\",\"text\":\"Lithuania\",\"is_gdpr\":true},{\"id\":163,\"abbreviation\":\"LU\",\"text\":\"Luxembourg\",\"is_gdpr\":true},{\"id\":164,\"abbreviation\":\"MO\",\"text\":\"Macau\",\"is_gdpr\":false},{\"id\":166,\"abbreviation\":\"MG\",\"text\":\"Madagascar\",\"is_gdpr\":false},{\"id\":167,\"abbreviation\":\"MW\",\"text\":\"Malawi\",\"is_gdpr\":false},{\"id\":168,\"abbreviation\":\"MY\",\"text\":\"Malaysia\",\"is_gdpr\":false},{\"id\":169,\"abbreviation\":\"MV\",\"text\":\"Maldives\",\"is_gdpr\":false},{\"id\":170,\"abbreviation\":\"ML\",\"text\":\"Mali\",\"is_gdpr\":false},{\"id\":171,\"abbreviation\":\"MT\",\"text\":\"Malta\",\"is_gdpr\":true},{\"id\":172,\"abbreviation\":\"MH\",\"text\":\"Marshall Islands\",\"is_gdpr\":false},{\"id\":173,\"abbreviation\":\"MQ\",\"text\":\"Martinique\",\"is_gdpr\":true},{\"id\":174,\"abbreviation\":\"MR\",\"text\":\"Mauritania\",\"is_gdpr\":false},{\"id\":175,\"abbreviation\":\"MU\",\"text\":\"Mauritius\",\"is_gdpr\":false},{\"id\":176,\"abbreviation\":\"YT\",\"text\":\"Mayotte\",\"is_gdpr\":true},{\"id\":177,\"abbreviation\":\"MX\",\"text\":\"Mexico\",\"is_gdpr\":false},{\"id\":178,\"abbreviation\":\"FM\",\"text\":\"Micronesia, Federated States Of\",\"is_gdpr\":false},{\"id\":179,\"abbreviation\":\"MD\",\"text\":\"Moldova, Republic Of\",\"is_gdpr\":false},{\"id\":180,\"abbreviation\":\"MC\",\"text\":\"Monaco\",\"is_gdpr\":false},{\"id\":181,\"abbreviation\":\"MN\",\"text\":\"Mongolia\",\"is_gdpr\":false},{\"id\":1089,\"abbreviation\":\"ME\",\"text\":\"Montenegro\",\"is_gdpr\":false},{\"id\":182,\"abbreviation\":\"MS\",\"text\":\"Montserrat\",\"is_gdpr\":true},{\"id\":183,\"abbreviation\":\"MA\",\"text\":\"Morocco\",\"is_gdpr\":false},{\"id\":184,\"abbreviation\":\"MZ\",\"text\":\"Mozambique\",\"is_gdpr\":false},{\"id\":185,\"abbreviation\":\"MM\",\"text\":\"Myanmar\",\"is_gdpr\":false},{\"id\":186,\"abbreviation\":\"NA\",\"text\":\"Namibia\",\"is_gdpr\":false},{\"id\":187,\"abbreviation\":\"NR\",\"text\":\"Nauru\",\"is_gdpr\":false},{\"id\":188,\"abbreviation\":\"NP\",\"text\":\"Nepal\",\"is_gdpr\":false},{\"id\":190,\"abbreviation\":\"AN\",\"text\":\"Netherlands Antilles\",\"is_gdpr\":false},{\"id\":191,\"abbreviation\":\"NC\",\"text\":\"New Caledonia\",\"is_gdpr\":true},{\"id\":192,\"abbreviation\":\"NZ\",\"text\":\"New Zealand\",\"is_gdpr\":false},{\"id\":193,\"abbreviation\":\"NI\",\"text\":\"Nicaragua\",\"is_gdpr\":false},{\"id\":194,\"abbreviation\":\"NE\",\"text\":\"Niger\",\"is_gdpr\":false},{\"id\":195,\"abbreviation\":\"NG\",\"text\":\"Nigeria\",\"is_gdpr\":false},{\"id\":196,\"abbreviation\":\"NU\",\"text\":\"Niue\",\"is_gdpr\":false},{\"id\":197,\"abbreviation\":\"NF\",\"text\":\"Norfolk Island\",\"is_gdpr\":false},{\"id\":165,\"abbreviation\":\"MK\",\"text\":\"North Macedonia\",\"is_gdpr\":false},{\"id\":198,\"abbreviation\":\"MP\",\"text\":\"Northern Mariana Islands\",\"is_gdpr\":false},{\"id\":200,\"abbreviation\":\"OM\",\"text\":\"Oman\",\"is_gdpr\":false},{\"id\":201,\"abbreviation\":\"PK\",\"text\":\"Pakistan\",\"is_gdpr\":false},{\"id\":202,\"abbreviation\":\"PW\",\"text\":\"Palau\",\"is_gdpr\":false},{\"id\":1045,\"abbreviation\":\"PS\",\"text\":\"Palestine\",\"is_gdpr\":false},{\"id\":203,\"abbreviation\":\"PA\",\"text\":\"Panama\",\"is_gdpr\":false},{\"id\":204,\"abbreviation\":\"PG\",\"text\":\"Papua New Guinea\",\"is_gdpr\":false},{\"id\":205,\"abbreviation\":\"PY\",\"text\":\"Paraguay\",\"is_gdpr\":false},{\"id\":206,\"abbreviation\":\"PE\",\"text\":\"Peru\",\"is_gdpr\":false},{\"id\":207,\"abbreviation\":\"PH\",\"text\":\"Philippines\",\"is_gdpr\":false},{\"id\":208,\"abbreviation\":\"PN\",\"text\":\"Pitcairn\",\"is_gdpr\":true},{\"id\":209,\"abbreviation\":\"PL\",\"text\":\"Poland\",\"is_gdpr\":true},{\"id\":210,\"abbreviation\":\"PT\",\"text\":\"Portugal\",\"is_gdpr\":true},{\"id\":211,\"abbreviation\":\"PR\",\"text\":\"Puerto Rico\",\"is_gdpr\":false},{\"id\":212,\"abbreviation\":\"QA\",\"text\":\"Qatar\",\"is_gdpr\":false},{\"id\":213,\"abbreviation\":\"RE\",\"text\":\"Reunion\",\"is_gdpr\":true},{\"id\":214,\"abbreviation\":\"RO\",\"text\":\"Romania\",\"is_gdpr\":true},{\"id\":215,\"abbreviation\":\"RU\",\"text\":\"Russian Federation\",\"is_gdpr\":false},{\"id\":216,\"abbreviation\":\"RW\",\"text\":\"Rwanda\",\"is_gdpr\":false},{\"id\":1088,\"abbreviation\":\"BL\",\"text\":\"Saint Bartholemy\",\"is_gdpr\":true},{\"id\":217,\"abbreviation\":\"KN\",\"text\":\"Saint Kitts And Nevis\",\"is_gdpr\":false},{\"id\":218,\"abbreviation\":\"LC\",\"text\":\"Saint Lucia\",\"is_gdpr\":false},{\"id\":1195,\"abbreviation\":\"MF\",\"text\":\"Saint Martin\",\"is_gdpr\":true},{\"id\":219,\"abbreviation\":\"VC\",\"text\":\"Saint Vincent And The Grenadines\",\"is_gdpr\":false},{\"id\":220,\"abbreviation\":\"WS\",\"text\":\"Samoa\",\"is_gdpr\":false},{\"id\":221,\"abbreviation\":\"SM\",\"text\":\"San Marino\",\"is_gdpr\":false},{\"id\":222,\"abbreviation\":\"ST\",\"text\":\"Sao Tome And Principe\",\"is_gdpr\":false},{\"id\":223,\"abbreviation\":\"SA\",\"text\":\"Saudi Arabia\",\"is_gdpr\":false},{\"id\":224,\"abbreviation\":\"SN\",\"text\":\"Senegal\",\"is_gdpr\":false},{\"id\":993,\"abbreviation\":\"RS\",\"text\":\"Serbia\",\"is_gdpr\":false},{\"id\":225,\"abbreviation\":\"SC\",\"text\":\"Seychelles\",\"is_gdpr\":false},{\"id\":226,\"abbreviation\":\"SL\",\"text\":\"Sierra Leone\",\"is_gdpr\":false},{\"id\":1197,\"abbreviation\":\"SX\",\"text\":\"Sint Maarten\",\"is_gdpr\":true},{\"id\":228,\"abbreviation\":\"SK\",\"text\":\"Slovakia\",\"is_gdpr\":true},{\"id\":229,\"abbreviation\":\"SI\",\"text\":\"Slovenia\",\"is_gdpr\":true},{\"id\":230,\"abbreviation\":\"SB\",\"text\":\"Solomon Islands\",\"is_gdpr\":false},{\"id\":232,\"abbreviation\":\"ZA\",\"text\":\"South Africa\",\"is_gdpr\":false},{\"id\":1193,\"abbreviation\":\"GS\",\"text\":\"South Georgia and the South Sandwich Islands\",\"is_gdpr\":false},{\"id\":1196,\"abbreviation\":\"SS\",\"text\":\"South Sudan\",\"is_gdpr\":false},{\"id\":234,\"abbreviation\":\"LK\",\"text\":\"Sri Lanka\",\"is_gdpr\":false},{\"id\":235,\"abbreviation\":\"SH\",\"text\":\"St. Helena\",\"is_gdpr\":true},{\"id\":236,\"abbreviation\":\"PM\",\"text\":\"St. Pierre And Miquelon\",\"is_gdpr\":true},{\"id\":238,\"abbreviation\":\"SR\",\"text\":\"Suriname\",\"is_gdpr\":false},{\"id\":239,\"abbreviation\":\"SJ\",\"text\":\"Svalbard And Jan Mayen Islands\",\"is_gdpr\":false},{\"id\":241,\"abbreviation\":\"SE\",\"text\":\"Sweden\",\"is_gdpr\":true},{\"id\":242,\"abbreviation\":\"CH\",\"text\":\"Switzerland\",\"is_gdpr\":true},{\"id\":244,\"abbreviation\":\"TW\",\"text\":\"Taiwan\",\"is_gdpr\":false},{\"id\":245,\"abbreviation\":\"TJ\",\"text\":\"Tajikistan\",\"is_gdpr\":false},{\"id\":246,\"abbreviation\":\"TZ\",\"text\":\"Tanzania, United Republic Of\",\"is_gdpr\":false},{\"id\":247,\"abbreviation\":\"TH\",\"text\":\"Thailand\",\"is_gdpr\":false},{\"id\":248,\"abbreviation\":\"TG\",\"text\":\"Togo\",\"is_gdpr\":false},{\"id\":249,\"abbreviation\":\"TK\",\"text\":\"Tokelau\",\"is_gdpr\":false},{\"id\":250,\"abbreviation\":\"TO\",\"text\":\"Tonga\",\"is_gdpr\":false},{\"id\":251,\"abbreviation\":\"TT\",\"text\":\"Trinidad And Tobago\",\"is_gdpr\":false},{\"id\":252,\"abbreviation\":\"TN\",\"text\":\"Tunisia\",\"is_gdpr\":false},{\"id\":253,\"abbreviation\":\"TR\",\"text\":\"Turkey\",\"is_gdpr\":false},{\"id\":254,\"abbreviation\":\"TM\",\"text\":\"Turkmenistan\",\"is_gdpr\":false},{\"id\":255,\"abbreviation\":\"TC\",\"text\":\"Turks And Caicos Islands\",\"is_gdpr\":true},{\"id\":256,\"abbreviation\":\"TV\",\"text\":\"Tuvalu\",\"is_gdpr\":false},{\"id\":257,\"abbreviation\":\"UG\",\"text\":\"Uganda\",\"is_gdpr\":false},{\"id\":258,\"abbreviation\":\"UA\",\"text\":\"Ukraine\",\"is_gdpr\":false},{\"id\":259,\"abbreviation\":\"AE\",\"text\":\"United Arab Emirates\",\"is_gdpr\":false},{\"id\":262,\"abbreviation\":\"UM\",\"text\":\"United States Minor Outlying Islands\",\"is_gdpr\":false},{\"id\":263,\"abbreviation\":\"UY\",\"text\":\"Uruguay\",\"is_gdpr\":false},{\"id\":264,\"abbreviation\":\"UZ\",\"text\":\"Uzbekistan\",\"is_gdpr\":false},{\"id\":265,\"abbreviation\":\"VU\",\"text\":\"Vanuatu\",\"is_gdpr\":false},{\"id\":266,\"abbreviation\":\"VA\",\"text\":\"Vatican City State\",\"is_gdpr\":false},{\"id\":267,\"abbreviation\":\"VE\",\"text\":\"Venezuela\",\"is_gdpr\":false},{\"id\":268,\"abbreviation\":\"VN\",\"text\":\"Vietnam\",\"is_gdpr\":false},{\"id\":269,\"abbreviation\":\"VG\",\"text\":\"Virgin Islands (British)\",\"is_gdpr\":true},{\"id\":270,\"abbreviation\":\"VI\",\"text\":\"Virgin Islands (U.S.)\",\"is_gdpr\":false},{\"id\":271,\"abbreviation\":\"WF\",\"text\":\"Wallis And Futuna Islands\",\"is_gdpr\":true},{\"id\":272,\"abbreviation\":\"EH\",\"text\":\"Western Sahara\",\"is_gdpr\":false},{\"id\":273,\"abbreviation\":\"YE\",\"text\":\"Yemen\",\"is_gdpr\":false},{\"id\":276,\"abbreviation\":\"ZM\",\"text\":\"Zambia\",\"is_gdpr\":false},{\"id\":277,\"abbreviation\":\"ZW\",\"text\":\"Zimbabwe\",\"is_gdpr\":false}]}]]}]\n"])</script></body></html>