Greg Scheidel
Principal InstructorSecurity Program Lead at Iron Vine Security
Specialities
Cyber Defense

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsCyber Defense

Greg Scheidel helps defenders transform chaos into control. As a Certified Instructor for the SANS Institute, he teaches professionals how to move from reactive firefighting to building proactive, enterprise-scale security programs. As Chief Cybersecurity Officer for the Cyber Division at ECS, Greg leads strategy and execution for national-level cybersecurity initiatives. With decades in both technical and executive roles, he bridges the gap between hands-on defense and the strategic decisions that shape secure enterprises. He draws on that same experience in class, showing students how defensive architecture and governance align in practice.
Very helpful instructor. He has been extremely thorough on each topic, going the extra mile to answer questions and provide real world examples.
Greg was really helpful and he really knows the content.
Greg was great all week. Really strong presenter, really easy to follow and listen to, offered constant opportunities for expanded learning. Can't say enough about him.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
In this SANS First Look webcast, we explore how Zscaler’s Zero Trust Branch (ZTB) introduces a new, streamlined approach to securing branch and OT environments.

Join Greg Scheidel as he demystifies the technical foundation of Zero Trust Architecture (ZTA) and outlines the key technologies that drive modern, mature implementations.

Join us at the 2025 Government Security Forum on July 22nd at 10:00 AM ET to gain intelligence, tools, and real-world strategies needed to defend your agency against next-generation cyber threats. Register for free today!

To achieve their objectives in our environment, attackers must move beyond their initial compromise and interact with our environment. Which means that we have the home field advantage - *if* we enable appropriate auditing and monitoring. This session will dig into some specific tactics that leverage that home field advantage and make it easier for us to effectively detect and respond.

To achieve their objectives in our environment, attackers must move beyond their initial compromise and interact with our environment. Which means that we have the home field advantage - *if* we enable appropriate auditing and monitoring. This session will dig into some specific tactics that leverage that home field advantage and make it easier for us to effectively detect and respond.

This presentation will gather top experts and vendors to help you navigate the complexities of implementing Zero Trust strategies effectively.

Data can end up in the unlikeliest of places, even for those organizations that have developed formal data governance policies and implemented technical controls to (try to) keep data in central data stores. Especially troublesome is data stored and worked with on user endpoints—workstations, laptops, devices—such as original unstructured files or containing data extracted from structured data sources.

Step into a world where cutting-edge defense meets practicality in cybersecurity! "SANS Secure Your Fortress" will teach you how to master the latest and most effective defense techniques. Whether you're a seasoned expert or just beginning your cyber journey, this event is for you.

Review relevant educational resources made with contribution from this instructor.