<?xml version="1.0" encoding="UTF-8"?>
  <urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
 
  <url>
    <loc>https://www.sans.org/presentations/managing-security-vulnerabilities-in-the-cloud</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/to-patch-or-not-to-patch-ot-systems-daily-dilemmas-in-risk-management-and-plant-business-continuity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-go-beyond-gatekeeping-a-systems-design-approach-to-security-engineering</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-rise-of-malicious-msix-file</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/creating-a-security-metrics-program-how-to-measure-programmatic-success</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-arms-race-of-evasion-examining-evolving-evasion-techniques-in-incident-response</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-risk-transfer-conundrum</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/red-team-engagements---training-your-blue-team-to-hunt-adversaries</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/securing-communications-in-the-human-supply-chain</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/bridging-the-gap-the-playbook-of-a-biso</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/who-dares-wins-effective-crisis-management</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/believing-in-yourself-to-lead-your-team</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-how-to-become-a-ciso</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/navigating-regulatory-challenges-understanding-nis2-dora-and-cra</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ai-security-demystified</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/preparing-for-the-quantum-threat-practical-steps-for-cybersecurity-teams</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-field-guide-to-pqc-migration</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/quantum-primer-opportunities-and-threats</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/post-quantum-cryptography-why-its-secure</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/llm-sats-ftw</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/vulnerability-chaining-in-the-age-of-ai</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-assistant-to-adversary-when-agentic-ai-becomes-an-insider-threat</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/smart-phone-forensics-circa-2028</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-cross-sector-methodology-for-ranking-ot-cyber-scenarios-and-critical-entities</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/7-tips-for-working-with-a-recruiter</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/dissecting-the-cicada-in-the-shadow-of-the-black-cat</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/open-source-serverless-cloud-certificate-authority</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/training-a-taigr-to-protect-our-power</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/leveraging-free-tools-for-security-testing</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/unpacking-the-psycho-cyber-iam-kill-chain</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/adding-functionality-to-the-azurerm-provider-for-secops</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keep-calm-and-how-to-deploy-safely-at-billion-event-scale</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/best-practices-for-how-to-manage-all-your-access-from-the-cloud-the-next-frontier-in-your-security-journey</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-yin-and-yang-of-generative-ai-in-cybersecurity-opportunities-and-challenges</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/threat-hunting-with-kusto-the-query-language-to-uncovering-the-unknown</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/who-polices-the-policies-privilege-escalation-and-persistence-with-azure-policy</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/flood-the-zone-with-fakes-catching-adversaries-with-ai-generated-cloud-deception-environments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/identity-crisis-tracking-adversaries-in-aws</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/provable-security-building-automated-validation-of-your-cloud-security-controls</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-needle-in-a-haystack-how-to-find-a-threat-hidden-in-over-6-billion-logs-per-day</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/thinking-inside-the-box-effective-devsecops-for-containers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/eks-security-safari-hunting-threats-in-the-wild-wild-cloud</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/connecting-the-broken-links-exploring-identity-integrations-between-the-three-csps-and-their-managed-kubernetes-offerings</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-aft-to-ato-aws-native-fedramp-through-terraform</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/apple-watch-forensics-live-demo-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cybersecurity-charisma-unlocking-security-culture-and-leadership</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-essentials-of-information-gathering-and-analysis-required-of-csirts</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/let-s-be-honest-about-mitre-att-ck-mappings-and-the-so-what-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tecnologia-expresividad-y-contexto-en-la-observacion-de-amenazas</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/gone-in-60-seconds-digital-forensics-acquisitions-at-the-speed-of-cloud</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-cybersecurity-in-the-water-and-wastewater-industry-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/no-one-likes-to-face-the-consequences-but-cce-is-here-to-help-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-cognitive-stairway-of-analysis---graphic-recording</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/verisize-your-way-into-cti---graphic-recording</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/devsecops-4---crowdsec-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cloud-3---qualys-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/agenda</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/bronze-union-an-unexpected-journey-into-the-dna-of-a-targeted-threat-group</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/why-attackers-should-avoid-c-sharp</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/memory-smearing-myth-or-reality</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-roadmap-to-help-enterprise-security-operations-centers-expand-duties-to-ot-environments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/andrew-martin</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-creative-process-behind-fun-low-budget-videos</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/changing-culture-lessons-from-teaching-music</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/finding-evil-in-windows-10-compressed-memory</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/pipeline-incident-response</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/summit_archive_1561488873</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/arming-secops-with-a-special-forces-targeting-process</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/creating-incident-response-playbooks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/securing-your-application-identities</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cloud-the-hard-way</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-knack-for-nac-locking-down-network-access-across-a-global-enterprise</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/summit-agenda</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote---solar-winds-of-change</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-to-automate-response-with-m365</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beginners-track-security-awareness-recognition-program</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/think-red-act-blue---evaluating-the-security-cost-of-new-technology</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/purple-wars-episode-2---attack-of-the-emulators</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/purple-maturity-model</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/purple-team-feedback-loop</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cyber-physical-safety-systems-for-water-utilities</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/bric-ing-the-supply-chain---managing-ics-product-security-in-a-fragmenting-world</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ttps-from-ics-cyber-range-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-nuts-bolts-of-cryptography-everyday-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/introduction-to-security-architecture</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/heroes-in-a-bash-shell---the-linux-command-line</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/job-role-spotlight---insert-2-for-an-offensive-security-career</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ir-playbooks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/attck-your-cti-lessons-learned-from-four-years-in-the-trenches</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/locking-it-down-best-practices-for-strong-passwords-and-authentication-tools</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/moving-small-businesses-to-the-cloud-what-you-need-to-know</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-smbs-can-defend-against-top-threats-using-the-cis-critical-security-controls-controls-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-creating-a-culture-of-cyber-readiness-for-small-businesses</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-i-m-all-for-progress-it-s-change-i-can-t-stand-why-operating-technology-security-is-so-hard-for-utilities</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-risk-to-space-as-satellite-communications-systems-and-ground-networks-are-the-new-target-for-attackers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/developing-and-running-ics-tabletops-testing-operational-effectiveness-of-control-1-of-the-five-sans-ics-cybersecurity-critical-controls</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-future-of-ot-security-happened-in-2022-and-you-didn-t-even-know-it-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/emulating-adversary-actions-in-the-operational-environment-with-caldera-ot</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-a-security-program-for-operational-technology</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ics-ot-secure-remote-access</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-to-perform-effective-ot-cybersecurity-risk-assessments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/delivering-ot-security-from-legislation-to-harmonized-daily-business-at-industrial-sites</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/new-cyber-physical-threats-to-industrial-equipment</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/deeper-data-better-protection-harnessing-the-power-of-vital-ot-endpoint-information-for-security-resilience-and-performance</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/establishing-your-baseline</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/do-we-have-logs-for-that-when-network-traffic-analysis-falls-short</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/orlando-utilities-commission-cyber-security-and-efficient-management-of-grid-edge</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/multiverse-of-convergence-charting-it-ot-threat-overlap</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/combating-implicit-trust-in-west-texas-oil-field</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/manufacturing-cybersecurity-boots-on-the-ground-and-back-to-the-basics</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/live-demo-don-t-say-a-peep</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-a-post-apocalyptic-hellscape-what-ransomware-looks-like-after-raas</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/analysis-on-legit-tools-abused-in-human-operated-ransomware</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lessons-from-the-frontlines-ransomware-attacks-new-techniques-and-old-tricks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-raas-ipe-for-disaster-the-evolving-ransomware-as-a-service-raas-space-as-told-through-tools-techniques-and-procedures-ttps-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/you-got-a-toad-a-novel-technique-for-dropping-ransomware</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cracking-ransomware-bypassing-anti-analysis-techniques-and-decrypting-lockbit-black-ransomware</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/data-science-for-ransomware-defense-and-negotiation</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-investing-in-neurodiversity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-neurodivergent-associates-are-an-asset-a-ciso-s-perspective-on-retention-and-inclusion</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/panel-everyone-is-invited-making-cybersecurity-conferences-user-friendly-for-all</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/accommodations-awareness-and-allyship-at-work-how-to-initiate-a-foundation-of-inclusion</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-demonstrating-ciso-roi-with-the-c-suite</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/panel-how-artificial-intelligence-ai-will-change-cybersecurity-leadership</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-cisos-can-better-connect-with-their-boards-and-make-the-case-for-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/leading-high-performing-teams-during-lean-times</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-risk-to-space-satellite-communications-systems-and-ground-networks-as-attack-targets</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/learning-to-heal-how-neurodivergent-adults-can-recover-from-years-of-educational-trauma</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/recruiting-training-and-retaining-neurodivergent-talent</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/fantastic-aws-hacks-and-where-to-find-them</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/why-secdevops-is-the-new-way-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/why-i-m-encouraged-to-barf-at-work</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-rookie-to-rockstar-kickstart-your-career-as-a-soc-analyst</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/risky-business-careers-in-grc</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/analysis-101-for-the-incident-responder</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/amp-up-your-career-careers-in-energy-and-critical-infrastructure-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/don-t-get-popped-vulnerability-management-do-s-and-don-ts</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/new-shell-in-town-adventures-in-using-powershell-on-linux</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-finding-cybersecurity-a-practitioner-s-path-to-success</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/fast-track-your-cybersecurity-career</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hackeando-tu-mente-como-come-ar-e-continuar-a-evoluir</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sitting-at-the-big-table-experiences-as-a-first-time-information-security-officer</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/c-mo-los-efectos-visuales-me-empujan-a-la-ciberseguridad</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/outside-of-the-shell-cybersecurity-careers-and-paths-for-the-non-technical-people</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/networking-101-introverts-only</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-a-pattern-of-life-leveraging-location-and-health-data</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/missing-pieces-tips-and-tricks-on-how-to-ensure-your-acquisitions-aren-t-missing-critical-data</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-little-bit-of-this-a-little-bit-of-dat</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-dfir-evidence-collection-and-preservation-for-the-cloud</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hunting-powershell-obfuscation-with-support-vector-classifiers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/threat-hunting-in-microsoft-365-environment</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hunting-windows-u-boats-with-cyber-depth-charges</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/stepping-out-of-the-android-malware-sandbox-running-analyzing-malware-on-a-physical-honeyphone</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-truth-about-usb-device-serial-numbers-and-the-lies-your-tools-tell-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/text-editor-tricks-for-blue-teamers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/fast-unix-like-incident-response-triage-using-uac-tool</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/establishing-connections-illuminating-remote-access-artifacts-in-windows</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/exploiting-advanced-volatile-memory-analysis-challenges-for-fun-and-profit</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cracking-the-beacon-automating-the-extraction-of-implant-configurations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-darknet-of-things-hunting-cybercriminals</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/living-with-ransomware-the-new-normal-in-cyber-security</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-the-godfather-of-forensics-how-to-leverage-your-year-one-to-get-an-offer-you-cannot-refuse</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hunting-for-active-directory-persistence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/do-you-see-it-coming-building-for-observability</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hunting-threat-actors-using-osint-forensics</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/dfir4vsphere-investigating-vmware-vsphere-virtualization-platforms</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/conducting-forensic-examinations-in-zero-trust-environments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/doh-why-don-t-we-have-that-tailoring-evidence-preservation-for-incident-objectives</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/analysis-paralysis-setting-the-right-goal-for-your-incident-analysis</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/whatsapp-with-your-imessage-dude-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/recomendaciones-de-investigaci-n-para-analizar-incidentes-bec-eac</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/inteligencia-de-amenazas-mediante-notebooks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/aventuras-de-un-cazador-de-amenazas-internas</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ingenier-a-social-malware-y-dfir-en-el-2022</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lessons-learned-from-ten-years-of-osint-automation</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/osint-ai-the-good-the-bad-and-the-fake</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/protecting-high-value-individuals-an-osint-workflow</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-to-investigate-phishing-campaigns</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ad-analytics-and-marketing-seo-tools-as-a-resource-for-osint-investigations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/finding-frausters-who-hide-behind-cloudflare</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/glass-bottom-osint</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-dark-web-the-other-side</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/blockchain-investigations-101-an-intro-to-ethereum</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/what-value-does-osint-bring-to-the-web-3-0-space-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/once-upon-a-crime-a-novel-approach-to-osint-through-storytelling</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/open-house-real-property-osint-and-researching-public-records</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/i-know-you-contact-exploitation-in-socmint-investigations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/once-more-unto-the-data-breach-navigating-investigations-of-unconventional-data-sources</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/new-today-old-tomorrow-emerging-technology-forensics</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/investigating-a-wsa-endpoint</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/picture-perfect-the-power-of-attack-path-diagrams-in-dfir-investigations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/fast-forensics-and-threat-hunting-with-yamato-security-tools</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hunting-c2-beaconing-at-scale-in-the-modern-age</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/eks-incident-response-and-forensic-analysis</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ios-advanced-recovery-looking-for-deleted-evidence-of-whatsapp-activities</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-to-effectively-investigate-a-human-operated-ransomware-attack-in-a-network-without-advanced-security-solutions-logging</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/incident-analysis-case-study-focusing-on-net-malware</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/defending-and-investigating-hypervisors</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/i-want-the-log-i-can-t-have</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/windows-registry-forensics-there-s-always-something-new</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/breaching-the-depths-of-the-abyss-exposing-rootkits-and-bootkits</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-bridging-the-gap-integrating-digital-forensics-with-open-source-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/2-meta-2-oculus</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/what-can-dfiq-do-for-you-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/special-delivery-defending-and-investigating-advanced-intrusions-on-secure-email-gateways</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-truth-about-usb-serial-numbers-redux</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/direct-handling-of-aws-snapshots-reading-files-in-a-snap-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/differential-file-system-analysis-for-the-quick-win</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/windows-search-index-the-forensic-artifact-you-ve-been-searching-for</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/forensic-investigation-of-email-client-tool-marks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beyond-the-basics-microsoft-365-attacks-we-didn-t-see-coming</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-new-perspective-on-resource-level-cloud-forensics</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-the-growth-of-global-election-disinformation-the-role-and-methodology-of-government-linked-cyber-actors</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/osint-uncovered-enhancing-investigations-with-the-obsint-guidelines</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tips-and-tricks-for-digital-dumpster-diving</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lessons-learned-from-using-osint-to-track-cybercrime-in-latam</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-importance-of-reproducable-methodologies-in-osint-investigations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/demystifying-data-dumps</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-puzzle-palace-model-in-osint-analytic-mindset-navigating-the-unknown-with-critical-thinking-and-creativity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/decoding-russian-propaganda-disinformation-and-military-strategy-the-role-of-open-source-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/unlocking-the-digital-landscape-exploring-the-power-of-osint-for-a-connected-world</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/wisdom-from-the-cyber-security-battlefield---lessons-from-leading-incident-response-teams-in-apj</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/iot-forensics-exploiting-an-unexplored-piece-of-evidence-in-cctv-investigations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-economic-security-bridge-between-executives-and-cyber-defenders-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/career-evolution-a-reflection-on-skills-which-elevated-my-cybersecurity-career</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/are-you-really-getting-the-benefits-of-unified-logs-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/you-need-wings-to-fly-to-the-cloud</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ransomware-as-a-service-raas-evolution-implications-and-countermeasures-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-affordable-targeted-cyber-defence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-latest-exploit-blastpass-in-the-ongoing-nso-zero-click-zero-day-exploitation-campaign</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-humans-are-more-important-than-hardware</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/identifying-the-secret-military-helicopters-of-washington-d-c-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-impact-of-ai-with-osint</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/toads-hunting-online-advertisements</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/maximizing-social-media-data-extraction-dumping-and-preserving-content-for-osint</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/oh-my-stars-using-astronavigation-techniques-to-do-image-geo-positioning</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/every-contact-leaves-a-trace</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-the-public-archive-to-the-wayback-machine-thinking-like-a-historian-for-osint-practitioners</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/stunt-osint-ai-and-content-networking-display</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-practical-guide-to-osint-on-the-russian-internet</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/trailblazer-piercing-the-veil-of-vehicle-secrets-with-osint-alchemy</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/osint-psychology-understanding-the-human-element-of-intelligence-gathering</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-view-from-the-trenches</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/breach-data-infrastructure</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/detection-engineers-unveiled-a-day-in-the-life-and-the-path-to-this-exciting-career</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-rogue-to-vanguard-my-odyssey-through-the-cyber-realm</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-the-fast-food-effect-translating-fast-food-mastery-into-cross-industry-success</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/breaking-the-mold-how-two-women-from-non--technical-backgrounds-broke-into-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/unmasking-organizational-culture-harnessing-osint-for-better-informed-career-decisions</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lightning-talks-day-in-the-life-of-a-cti-engineer</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lightning-talks-inclusive-cybersecurity-tips-for-hacking-barriers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lightning-talks-a-career-journey-from-security-to-privacy-engineering</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/el-final-de-la-era-del-profesional-de-seguridad</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/automatizando-su-salida-de-las-cosas-aburridas-para-los-analistas-de-seguridad</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/conciencia-de-seguridad-mitos-y-verdades</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/mi-primer-trabajo-descubriendo-la-realidad-laboral</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/te-mereces-tu-xito</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/business-continuity-plan-for-ics-ot-systems</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/breaking-the-loop-of-uncertainty</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/panel-discussion-what-you-need-to-know-about-the-nis-ii-directive-from-an-ics-perspective</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/scadasploit-c2-ot_how-to-break-an-ics-system</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tactical-packet-analysis</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/The-Backup-Alchemy-Tool</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/threat-hunting-doesnt-have-to-be-hard</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/threat-intelligence-based-defense-in-depth-implementation-in-ot-environments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-art-of-deception-how-to-use-modern-honeypots-to-secure-ics-environments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans-ics-europe-summit-2024-pdf-agenda</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ransomware-data-leak-sites-the-uncomfortable-truths</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/atomic-ransomware-emulation</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/defending-against-the-cyber-siege-strategies-for-active-defense-against-pre-ransomware-and-ransomware-attacks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ransomware-running-wild-in-the-cloud</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/unmasking-cyber-shadows-a-tactical-approach-to-hunting-ransomware-ttps</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-behind-the-screens-decrypting-the-ransomware-diaries</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hacking-the-power-grid-in-a-virtual-city-at-scale</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/answering-the-big-question-has-my-ot-been-compromised-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/is-your-operator-ready-for-a-cyber-attack-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/does-practice-make-perfect-lessons-learned-from-full-scale-power-system-incident-response-exercise</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/journey-to-an-ot-soc-case-studies-from-expanding-visibility</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/fuxnet-the-new-ics-malware-that-targets-critical-infrastructure-sensors</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/using-chatgpt-to-write-ics-ot-defensive-and-offensive-tools</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/one-team-one-fight-how-vulnerability-collaboration-crushes-threat-actors-hopes-and-dreams</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lessons-learned-building-ot-socs</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/machina-matrix-ot-security-and-operations-in-cyber-overdrive-building-operational-resilience</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/value-of-mentorship-building-a-better-approach-to-support-neurodiversity-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/wearing-multiple-hats-a-story-of-one-cybersecurity-professional-parenting-two-neurodivergent-youngsters</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/embracing-neurodiversity-strategies-for-retaining-and-advancing-neurodivergent-employees-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lightning-talks-justin-merhoff</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/neurodiversity_2024_digital-notebook</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lightning-talks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lightning-talks-joy-toney</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-thriving-together-empowering-neurodivergent-individuals-in-the-workplace</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/different-voices-different-perspectives-the-importance-of-neuroinclusion-for-better-mental-health</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-autistic-advantage-thriving-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/automated-vulnerability-hunting-where-are-we-now</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/Living-with-ADHD-in-Infosec</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/pen-test-hackfest-europe-summit-agenda-2024</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/security-self-awareness-changing-culture-through-introspection</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/three-things-security-awareness-pros-should-steal-from-marketing</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/fear-empathy-and-team-spirit-the-psychology-of-cybersecurity-communication</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ransomware-for-security-awareness-practitioners</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/recognition-revolution-how-rewarding-and-recognizing-your-employees-can-drastically-increase-engagement</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/bridging-the-gap-ensuring-accessibility-in-cybersecurity-solutions</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/escape-rooms-and-virtual-treasure-hunts-leveraging-interactive-learning-in-your-awareness-program</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/one-size-does-not-fit-all-how-to-guild-a-successful-awareness-program-for-your-organization-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/empathy-in-cybersecurity-nurturing-trust-and-mitigating-risk-with-repeat-clickers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/looking-for-some-bigger-phish-to-fry-engage-and-retain-learning-through-phishing-rodeos</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-risk-driven-role-based-training-programs-best-practices-and-emerging-needs</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cultivating-a-zero-trust-mindset-nedbanks-cybermindfulness-program</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/opening-talk-accelerating-business-potential-with-a-security-driven-culture-how-amazonians-embrace-security-as-job-zero</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/evolving-beyond-basic-analytics-to-quantify-human-risk</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/avoiding-a-culture-clash-how-to-harmonize-security-practices-with-organizational-values</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/create-a-brand-create-a-culture</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/using-celebration-to-revivify-phish-testing</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-science-backed-approach-to-human-risk-management-the-beauty-of-scholar-practitioner-research</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-beyond-the-breach-the-role-culture-plays</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/its-a-small-world-of-security-data-after-all---using-behavioral-data-to-inform-security-awareness-campaigns-and-measure-impact</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ssa-summit_2024_digital-notebook</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/automating-incident-response-scalable-and-fast-within-minutes</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cutting-through-the-chaos-file-detection-and-analysis-using-strelka</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/machine-learning-for-enhanced-malware-detection-and-classification</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-allure-of-the-hunt-drawing-new-talent-into-dfir</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/who-touched-my-gcp-project-understanding-the-principal-part-in-cloud-audit-logs</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/gaining-better-visibility-on-a-cloudy-day-additional-microsoft-cloud-data-sets-you-may-not-be-looking-at-but-probably-should</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/dormant-devices-and-chatty-logs---extracting-forensic-artifacts-from-seemingly-idle-ios-devices</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/not-all-androids-who-wonder-are-lost---exploring-android-s-find-my-device-system</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/getting-down-and-dirty-with-mac-imaging</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/dfir-summit-notebook-2024</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cloud-kleptos-lessons-learned-responding-to-scattered-spider</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/llama-the-fast-file-processor-with-no-drama</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/leveling-up-ghidra-learn-ghidra-plugins-with-a-game-boy-game</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-saas-y-side-of-incident-response</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-tortured-responders-department-scott-and-rebekah-s-version</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/external-partnerships-how-an-information-sharing-analysis-center-works-with-its-members-to-improve-cyber-defenses-for-their-sector</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-the-lone-wolf-found-their-pack-how-to-grow-your-security-awareness-program-with-leadership-education-and-support</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/osinter-automating-the-cti-heavy-lifting-the-open-source-way-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/threat-intelligence-is-a-fallacy-but-i-may-be-biased</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/clustering-attacker-behavior-connecting-the-dots-in-the-raas-ecosystem</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-chatgpt-can-both-help-and-hurt-cybersecurity-and-awareness-programs</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/navigating-the-maze-extracting-and-analyzing-forensic-artifacts-in-containerized-environments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-rise-and-rise-of-advanced-ecrime-threat---incident-response-edition</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/electron-apps-unplugged-unveiling-digital-forensic-treasures</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/united-we-stand-a-deep-dive-into-dfir-cases-with-the-security-analyst-empowered-by-generative-ai</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/representing-and-coordinating-digital-investigation-in-smart-city-infrastructure</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/an-overview-of-the-sans-five-ics-cybersecurity-critical-controls-and-focus-on-control-number-1---ics-specific-incident-response-plan</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/breaking-through-vanguard-of-supply-chain</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/down-the-http-stack-responding-to-scarred-manticore-apt</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-root-to-fruit-laying-the-foundation-for-effective-automotive-incident-response</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-code-to-compromise-analyzing-threats-in-gcp-cloud-functions</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/starting-a-cyber-security-program-for-organizations-with-severely-limited-budget</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/navigating-the-ai-security-horizon-a-ciso-s-guide-to-sustaining-cyber-resilience</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/leading-without-authority-leadership-beyond-titles</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/for-the-win-aligning-security-initiatives-with-the-business</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-challenges-and-opportunities-for-modern-cisos</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/zero-to-cti-a-novice-s-journey-into-threat-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/slow-cooking-and-cyber-threat-intelligence-cooking-a-high-performing-team</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/bridging-the-intelligence-divide-building-cti-blueprints-for-value-based-production</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/revisiting-the-indicator-towards-a-threat-intelligence-ontology</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beyond-the-basics-the-role-of-llm-in-modern-threat-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-to-leverage-cloud-threat-intelligence-without-drowning-the-zero-noise-approach</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-cyber-hobbit-there-and-back-again-in-cti</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/why-won-t-they-listen-connecting-your-cti-to-decision-makers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beyond-cryptojacking-studying-contemporary-malware-in-the-cloud</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/applying-threat-intelligence-practically-to-meet-the-needs-of-an-evolving-regulatory-environment</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/navigating-the-digital-battlefield-a-framework-for-geopolitical-cyber-risk-assessment</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/deep-dive-into-supply-chain-compromise-hospitality-s-hidden-risks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-d-r-incident-how-threat-intelligence-helped-us-defend-and-respond-to-a-nation--state-sponsored-threat-actor</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/intellimation-guidance-for-integrating-automation-in-your-cyber-threat-intelligence-program</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sharing-compared-a-study-on-the-changing-landscape-of-cti-networking</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-compendium-of-exploits-and-bypasses-for-ebpf-based-cloud-security</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/modern-adversarial-reconnaissance-long-live-the-external</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/seek-out-new-protocols-and-boldly-hack-undetected</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-hacking-the-cloud-like-an-apt</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/proxyjacking-the-latest-cybercriminal-side-hustle</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/unlocking-secrets-an-exploration-of-pulseview-side-channel-timing-attacks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/self-improvement-of-security-hands-on-skills-for-dfir</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/practical-msticpy-use-rainbow-bridge-to-siem-for-advanced-threat-hunting-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/-keynote-the-evolving-frontier-of-dfir-readiness</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/enhancing-red-teaming-with-ai-and-ml</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/anti-deception-catching-the-canaries</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-series-of-unfortunate-events-a-tail-of-hacking-organizations-through-bug-bounties</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/modernizing-cloud-vulnerability-management-with-serverless-containers-and-iac</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/migrating-1-5k-repos-to-github-mistakes-tools-and-lessons-learned</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/spooky-scary-cloud-attack</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beyond-the-perimeter-uncovering-the-hidden-threat-of-data-exfiltration-in-google-cloud-platform</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/oops-i-leaked-it-again-how-we-found-pii-in-exposed-rds-snapshots</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/policy-as-code-strengthening-governance-and-security-in-cloud-infrastructure</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/real-world-lessons-learned-from-18-months-of-cloud-infrastructure-entitlement-management-ciem-implementations-in-the-enterprise</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-the-latest-cloud-security-megatrend-ai-for-security-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/top-10-azure-security-tips-from-10-years-of-securing-azure-applications</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/crossing-the-bridge-a-journey-through-attack-vectors-in-managed-kubernetes-services</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ebpf-superpowers-for-enhanced-cloud-native-security</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-ramp-manages-authorization-in-the-cloud-and-achieves-least-privilege</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/journey-to-securing-the-cloud-detecting-and-fixing-misconfigurations-at-datadog-scale</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/practical-security-monitoring-and-response-in-microsoft-azure</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cloud-security-what-works-and-what-doesn-t</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/detection-and-remediation-playbook-in-gcp</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/detective-controls-in-k8s-environments-wrangling-security-data-out-of-your-clusters</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/failing-to-scale-bumps-in-the-road-while-scaling-cloud-access</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tactical-risk-reduction-in-ics-ot-environments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-high-five-top-trends-in-ics</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-recipe-for-security-culture</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/error-400-bad-request-how-security-teams-sometimes-limit-their-own-outcomes</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/combining-chatgpt-and-fogg-behaviour-model-to-design-your-program</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-to-leverage-cyber-threat-intelligence-to-not-only-mature-your-program-but-promote-your-career</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cybersecurity-leadership-mobilize-not-paralyze</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-future-of-security-awareness-and-training-hint-it-isn-t-about-awareness-or-training-how-to-disrupt-the-status-quo</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/elevate-your-security-awareness-program-harnessing-the-power-of-mindfulness</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-fast-and-the-fintech-reducing-human-risk</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/laying-the-groundwork-for-impactful-role-based-cyber-training-and-awareness</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hack-and-play-your-way-to-information-security-awareness</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-we-achieved-our-2023-goal-of-1-000-new-cyber-champions-in-just-10-days-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/behavior-change-in-action-use-cases-from-a-global-organization</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/instructions-not-included-technical-communicators-rewrite-how-security-speaks-cyber</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/secops-the-missing-link-in-your-security-awareness-programs</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/phishing-for-insights-not-passwords-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/conversational-security-awareness-putting-humanity-into-your-human-risk-management-program</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/trolls-in-a-basement-when-security-awareness-and-customer-service-collide</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-aftermath-of-a-social-engineering-pentest-are-we-being-ethically-responsible-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-how-experts-hack-your-organization-and-ai-just-made-it-easier</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/shall-we-play-a-game-arcade-worthy-games-using-office365</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lessons-learned-from-living-in-a-content-grinder</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/creating-multidimensional-metrics-the-secret-recipe-to-measuring-impactful-training-programs</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-metrics-we-are-the-champions</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/what-ux-ui-taught-me-about-improving-security-awareness</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/metrics-of-enterprise-security-culture-change</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-grow-your-security-awareness-career</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/leveraging-organizational-change-management-ocm-for-successful-behavior-change</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/aligning-your-awareness-efforts-to-threat-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/it-s-easy-to-stay-safe-online</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-trip-to-the-metaverse-can-virtual-reality-training-help-your-employees-behave-more-securely-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/put-on-your-psychology-glasses-and-see-metrics-in-a-new-way</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/all-change-please-security-behaviors-in-the-context-of-today-s-risks-threats-and-vulnerabilities</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-to-make-a-developer-love-security</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/driving-behavioral-change-through-personalized-cybersecurity-interventions</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-equifax-journey-a-guide-to-human-risk-management</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/phish-training-metrics-maturity-and-how-to-continually-evolve-your-program</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/adventures-in-phishing-using-email-risk-ratings-to-lower-risky-phishing-behavior</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cloudy-with-a-chance-of-breaches-osint-adventures-in-tracing-exposed-credentials</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-cyber-pilfer-chain-detecting-and-disrupting-post-exploitation-data-theft</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/drop-it-like-it-s-qbot-separating-malicious-droppers-loaders-and-crypters-from-their-payloads-for-better-initial-access-detection</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-leave-only-footprints-when-prevention-fails</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/zero-trust-architecture-beyond-proxy-or-point-solutions</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ecosystem-of-insights-building-operation-dashboards-that-enable-teams</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/bluehound-blue-teams-of-the-world-unite-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-how-to-save-your-soc-from-stagnation</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/blurple-teaming-open-source-continuous-security-testing-in-the-soc</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/bridging-the-gap-improving-rules-effectiveness-by-integrating-detection-and-response</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hunting-onenote-malware-a-practical-guide-for-blue-teams</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/panel-from-nothing-to-something-getting-experience-when-you-have-no-experience</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cybersecurity-role-finder-navigating-your-personal-path-into-cybersecurity-careers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/going-the-distance-lessons-from-the-last-mile-education-fund</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/new2cyber-everything-you-need-to-know-to-start-your-cybersecurity-career</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/docintel-a-context-centric-cyber-threat-intelligence-platform</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/operationalizing-intelligence-sops-with-think-steps</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-to-use-cti-no-matter-the-size-of-your-organization</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-cyber-vory-the-evolution-of-the-russian-organized-crime-threat-actors</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/starting-an-intelligence-program-centered-around-open-source-synapse</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ransomware-rebranding-so-hot-right-now-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/malware-analysis-whats-the-point</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-way-to-a-stakeholder-s-heart-is-by-providing-value-measuring</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-report-writer-s-grimoire</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/breaking-the-ransomware-tool-set-when-a-threat-actor-opsec-failure-became-a-threat-intelligence-gold-mine</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lessons-learned-from-over-a-decade-in-osint</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/developing-the-analyst-creating-career-roadmaps-for-intelligently-progressing-in-cti</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/unmasking-the-iranian-apt-cobalt-mirage</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/consume-and-produce-the-economics-of-cyber-threat-intelligence-operations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-deconstructing-the-analyst-mindset</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/leveraging-curiosity-to-enhance-analytic-technique</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/were-in-now-now-the-tyranny-of-current-intelligence-and-how-to-manage-it</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/is-sharing-caring-a-deeply-human-study-on-cti-networking</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lone-wolf-actors-how-ransomware-evolved-into-freelance-work</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/mind-your-gaps-leveraging-intelligence-gaps-to-drive-your-intelligence-activities</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/integrated-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-first-purpose-rediscovering-warning-analysis-for-cti</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-strategic-return-on-investment-through-cyber-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/typodetect-detectando-trampas-para-enganar-tu-cerebro</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tecnicas-cti-para-la-caracterizacion-de-un-ataque-con-ransomware</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/data-sources-2-0-operacionalizando-los-nuevos-objetos-del-marco-att-ck</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/clip-addiction-a-threat-intelligence-approach-to-video-based-chinese-infoops</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/inside-the-persistent-mind-of-a-chinese-nation-state-actor</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-getting-started-as-a-cyber-threat-intel-analyst-how-it-begins</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/threat-actor-of-in-tur-est-unveiling-balkan-targeting</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/deadringer-three-apts-walk-into-a-bar-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/applied-forecasting-using-forecasting-techniques-to-anticipate-cyber-threats</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote---journey-to-the-center-of-cti-story-systems-and-self</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-get-offensive-with-management</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/demystifying-capture-the-flag-ctf-competitions</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hacking-jwt</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/gen-ai-for-dfir-in-the-real-world-practical-use-cases</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ais-achilles-heel-navigating-the-owasp-top-10-for-llms</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-frontier-of-cybersecurity-defending-against-ai-based-threats</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/making-secure-ai-real-real-threats-lessons-learned-and-future-of-the-secure-ai-technology-stack</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cobots-not-robots-ai-in-security-operations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ai-for-soc-teams</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/secure-ai-is-20-years-old</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/enhance-investigations-using-llm-embeddings-clustering</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-security-journey-at-elastic</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/investigating-parsing-windows-11-notepad-tabs-using-the-dissect-framework</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/rise-of-the-drones-modern-drone-forensic-opportunities</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/operation-diplomatic-specter-a-new-chinese-apt-leverages-rare-toolset-to-target-governments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/vermanent-a-tool-for-clues-search-in-voice-messages</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/segugio-automatic-detection-and-malware-config-extraction-based-on-yara-rules</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/where-s-the-money-defeating-atm-disk-encryption</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/what-hacking-the-planet-taught-us-about-defending-supply-chain-attacks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/redefining-security-boundaries-unveiling-hypervisor-backed-security-features-for-windows-security</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/very-pwnable-networks-exploiting-the-top-corporate-vpn-clients-for-remote-root-and-system-shells</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-attacking-intelligence-attacking-and-defending-ai-on-the-edge</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-call-is-coming-from-inside-the-house-api-abuse-by-authenticated-users</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ai-enhanced-purple-teaming</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/purple-red-blue</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-did-they-respond-so-fast-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ai-for-adversaries-bypassing-modern-security-controls</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-memory-safe-languages-won-t-save-you</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote---osint-efficiency---extending-building-tools</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hard-and-soft-osint-skills-for-success</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/designing-playbooks-with-purple-team-approach</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/automotive-critical-controls-a-mapping-of-cis-critical-controls-to-automotive-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sneaky-tip-and-tricks-with-alternate-data-streams</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote---attacking-and-defending-the-microsoft-cloud-office-365-azure-ad</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/shared-security-services-how-to-adjust-to-an-evergrowing-landscape-of-security-operations-center-responsibilities</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/profiling-threat-actors-in-dns</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/developing-effective-detection-and-defense-strategies-against-activity-groups-in-oil-gas-ot-using-models</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-human-firewall---a-multifacted-approach-to-combating-social-engineering</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/leveraging-vips-attack-surface-through-osint</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/common-misconceptions-and-mistakes-made-in-threat-hunting</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/employing-threat-continuous-testing-to-improve-blue-team-visibility</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-living-in-the-shadow-of-the-shadow-brokers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/finding-and-decoding-malicious-powershell-scripts</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/schroedingers-backslash-tracking-the-chinese-apt-goblin-panda-with-rtf-metadata</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/open-source-intelligence-summit-training-2019-agenda</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/assessing-industrial-cybersecurity-assessments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/virtuous-cycles-rethinking-the-soc-for-longterm-success</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/third-party-software-assessments-for-modern-development</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/optimizing-caldera-for-automated-adversary-emulation</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/phish-apples-and-oranges-assessing-the-sophistication-of-your-phishing-simulations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tracking-actors-through-their-webinjects</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/putting-big-data-to-work-in-dfir</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ransomware-defense-and-response---minimizing-risk-of-an-increasing-threat</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/usando-mitre-dentro-del-ciclo-de-inteligencia</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ai-powered-security-llm-agent-for-rapid-threat-detection-and-response</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/forensic-wace-a-multi-thread-tool-for-forensic-whatsapp-chat-analysis</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-adapting-tradecraft--examining-ransomware-attacks-in-2024-insights-from-the-dfir-report</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/breaking-bad-actors-transforming-threat-intelligence-into-raas-resilience</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/detecting-initial-access-malware-before-its-too-late</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/facing-modern-ransomware-threats-and-tackling-multi-extortion-tactics</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ransomware-ttx-seven-scenarios-to-include-in-your-next-ttx</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/zero-trust-ai-in-ransomware-defense-reinventing-risk-management</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/asset-management-or-how-i-learned-to-stop-kicking-the-can-down-the-road</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/case-study-when-you-wish-upon-a-star</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/inside-a-new-ot-iot-cyberweapon-iocontrol</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/detection-is-a-must-a-pragmatic-approach-to-threat-detection-within-your-industrial-cybersecurity-program</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/automating-the-sans-ics-5-critical-controls-for-free</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sustaining-your-ics-cyber-program-gaining-support-communicating-risk-and-ensuring-long-term-success</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/evolving-a-definition-of-ics-malware-capability-intent-and-adverse-effects</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans-ics-5-critical-controls-goes-to-the-board-jemenas-5-critical-controls-journey</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/taiwan-digital-blockade-what-war-gaming-taught-us-about-defending-an-island-from-ics-attacks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-the-inl-triple-c-engineering-cyber-resilience-from-why-to-how-a-deep-dive-into-cce-cie-and-cfa</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-navigating-ot-connectivity-and-security-in-the-cloud-era</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-countdown-to-containment-interactive-ics-ot-cyber-crisis-walkthrough</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-cyber-fat-sat</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-emerging-regulations-and-their-impact-on-critical-infrastructure</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-ot-cybersecurity-risk-assessments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-plug-program-pwn-building-usb-hid-attack-tools-with-inexpensive-microcontrollers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-developing-an-ics-ot-disaster-recovery-strategy</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/telegram-101-to-401</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-tv-news-to-cybersecurity-the-five-steps-i-took-to-completely-change-careers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cyber-adjacent-five-lessons-learned-from-a-day-in-the-life-of-an-it-project-manager</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/going-technical-against-all-odds-from-digital-communications-to-reverse-engineering-malware</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-day-in-the-life-of-a-threat-emulation-specialist-demystifying-offensive-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/anatomy-of-a-cyber-attack</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/negating-the-noise</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ever-sucked-into-wikipedia-for-three-hours-cti-might-be-for-you</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/navigating-ai-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-day-in-the-life-of-a-network-security-engineer</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-keys-to-charting-your-own-course-thriving-beyond-traditional-paths</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/social-media-discussion-with-the-osintmillennial</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ads-as-intel-exploring-adints-capability-to-pinpoint-personal-locations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/shadow-hunting-advanced-osint-skills-to-navigate-the-breach-data-labyrinth</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/crowdsourced-intelligence-the-role-of-the-osint-community-in-global-investigations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-hunt-them-where-they-play</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/mastering-email-osint-techniques-for-uncovering-online-footprints</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/osint-and-network-security-navigating-the-balance-between-public-information-and-internal-threat-protection</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beyond-google-lens-how-real-estate-sites-can-assist-geolocation-efforts</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/chinese-social-media-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/back-to-basics-keywords-and-listening-in</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/investigating-fentanyl-supply-chains-an-osint-analysis-of-chinese-biotechnology-companies</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/data-processing-cheat-codes-for-osint-at-scale</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hidden-in-plain-site-leverage-commented-code-and-web-metadata-for-website-research</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/finding-threat-actor-infrastructure-with-ssl-certificates</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-the-power-of-osint-navigating-the-new-hybrid-cold-war</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/its-so-overt-its-covert-leveraging-classic-humint-tactics-in-cti-investigations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-the-anticipatory-approach-actionable-not-reactionable-cyber-threat-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/leadership-workshop-tools-and-strategies-to-motivate-yourself-and-others-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/decoding-cyber-threats-a-practical-guide-to-using-attack-trees</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sales-and-marketing-are-threat-actors-too</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/navigating-the-fog-of-war-a-programmatic-approach-to-capturing-and-communicating-relevant-insights-from-rising-geopolitical-tensions</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/iterate-and-innovate-applying-the-startup-mindset-to-cti</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/what-a-cluster-a-case-study-in-threat-actor-collaboration-and-framework-for-comparative-attribution</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-threat-intelligence-to-detection-engineering-a-case-study-on-identifying-gaps-in-detection-and-enhancing-cti-value-for-the-organization</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ics-attack-concepts-and-demonstrations-tim-conway</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ics-asia-pacific-summit-agenda-final</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/empower-employees---nudging-by-numbers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-cognitive-stairway-of-analysis</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/collections-and-elections---how-the-new-york-times-built-an-intel-collections-program-in-2020</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/making-cti-cool-methods-for-teaching-cyber-threat-intelligence-through-gaming</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beyond-the-fomo-expanding-horizons-for-cyber-threat-intelligence-analysts</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ransomware-syndicates-cartels-or-twisted-tech-unicorns</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/onnx-store-the-rise-and-fall-of-a-phishing-as-a-service-platform-targeting-financial-institutions</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/but-mom-i-need-to-spend-more-time-on-social-media</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/everybody-wants-to-rule-the-world-of-data-</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/advanced-threat-research-methodologies-unraveling-a-triple-apt-intrusion</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-secret-life-of-forgotten-malware-c2</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-cyber-threat-resilience-with-strat-a-new-methodology-for-cti</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-the-cti-brand-a-path-to-success</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/immaturity-can-be-fun-just-not-in-a-cti-program</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-ransomware-deployment-life-cycle-in-cloud-environments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-hole-in-the-bucket-the-risk-of-public-access-to-cloud-native-storage</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/evolution-of-ransomware-tactics-in-2023-insights-from-the-dfir-report</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/creating-social-network-graphs-using-gephi</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans360-ai-driven-phishing-attacks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans360-scade-detecting-hidden-threats-in-data-centers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans360-breaking-the-blackbox</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans360-genai-risks-to-your-business</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/securing-the-grid-ais-promise-for-cyber-resilience-in-power-systems</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans360-evolving-zero-trust-harnessing-the-power-of-ai</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ai-in-the-crosshairs-exploring-novel-attacks-on-aws-ai-as-a-service</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ai-security-made-easy</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-dark-side-of-ai</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-five-must-haves-of-an-ai-governance-framework</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hackers-perspective-realistic-ai-attack-scenarios</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-what-to-expect-when-you-re-expecting-your-genai-baby</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/using-llms-embeddings-and-similarity-to-assist-dfir-analysis</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/unlocking-cyber-insights-with-ai</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/data-to-defense-generative-ai-and-rag-powering-real-time-threat-response</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/influence-operations-with-ai-and-cyber-enabled-ops</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-an-ai-pen-testing-assistant</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-ai-security-gap</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-human-element-in-ai</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans360-5-tips-for-using-genai-in-dfir</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans360-are-you-a-j-e-d-i-advancing-responsible-use-of-ai-in-the-universe</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans360-change-the-game-build-an-ai-powered-soc</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans360-dancing-with-ai</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sans360-the-next-plague</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-your-mental-health-and-well-being-combating-the-adversaries-of-stress-and-burnout-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ta577-walked-just-past-you-indirect-syscalls-in-pikabot</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/apt41-has-risen-from-the-dust</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/we-will-knock-your-socks-off</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/once-a-victim-always-a-victim</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/russian-gamaredon-apt-group</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/it-has-been-zero-days-since-the-last-edge-device-security-incident</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/camouflage-and-chaos-on-the-trail-of-chinese-apts-playing-the-ransomware-game</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/when-cybercriminals-goof-opsec-oopsies-and-epic-falls</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-recon-to-ruin-exposing-the-iranian-agrius-apt-latest-ttps</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/unveiling-dark-pink-an-in-depth-analysis-of-apac-s-covert-apt-threat</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tracing-mobile-chinese-surveillance-operations-from-acquisition-to-attribution</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beg-borrow-or-steal</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/embracing-the-power-of-threat-intelligence-a-game-changer-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/securing-todays-secrets-against-tomorrows-threats</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/summit-wrap-up</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/infrastructure-attack-as-code-using-terraform-to-attack-cloud</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/Pandora-A-Red-Teaming-Tool-to-Expose-Password-Management-Leaked-Credentials</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-current-look-at-the-threat-landscape-and-how-ai-plays-a-role</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-turing-deception-exploiting-machine-trust</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lets-talk-about-the-rax-how-cfg-impacts-modern-exploits</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/weaponising-ai-for-cyber-attacks-and-offensive-operations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/just-pocket-change-examining-the-cost-of-nickel-and-dime-exploit-mitigations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/a-practical-approach-to-smart-fuzzing-discovering-8-zero-days-in-a-week</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/that-shouldn-t-have-worked</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-security-research-not-just-for-nation-states</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-invisible-threat-ai-powered-vishing-attacks-and-defense-strategies</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-underestimated-superpower-of-certificate-enrollment-agents</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/now-next-never</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beyond-sophistication_leveraging-threat-actor-attributes-to-improve-security-outcomes</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/analyzing-volatile-memory-on-a-google-kubernetes-engine-node-pdf</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/sandboxing-and-threat-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/everyone-gets-a-web-shell</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/war-driven-victimology_a-transformative-odyssey</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/advanced-persistent-art_the-counterintuitive-complexity-rising-relevance-of-mobile-signalling-in-cyber</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/threatintelgpt_how-to-train-your-own-cti-ai-model</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/king-of-thieves</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/enisas-take-on-the-eu-landscape</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/crisis-management_what-could-go-wrong</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/frontier-challenges_black-boxes-closed-ecosystems-and-scale</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/practical-cybercrime-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/scaling-identity-and-access-in-multi-account-enterprises-complexities-and-strategies-for-effective-iam</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/workshop-securing-identities-in-complex-ics-environments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-identity-admins-to-cloud-compromise</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/macos-lockdown-mode</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/playbook-power-up</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/dfir-ai-ze-your-workflow</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/backdoors-and-breadcrumbs</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/mdr-to-idr-handoffs</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/investigating-a-malicious-script-in-microsoft-intune</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/think-like-an-examiner</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/making-sense-of-the-chaos</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/forensic-analysis-of-tails</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ensuring-data-integrity-in-incident-response</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/consolidating-relevant-events-logs-and-alerts</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/macos-endpoint-security-framework</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/luna-moth-a-practical-case-of-threat-intelligence-from-ioc-to-unraveling-an-attacker-infrastructure</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-persistent-is-an-apt---battling-three-threat-actors-in-a-single-environment</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-buzz-to-boost-engagement</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-uncovering-the-dark-world-of-nation-state-scams</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-mismatched-to-mastery</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/reeling-in-the-right-vendor</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/deepfake-diaries</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/designing-culturally-relevant-security-awareness-campaigns</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ngo-to-cyber</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/people-are-not-the-weakest-link-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/collaboration-and-competition</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/challenges-and-solutions-for-building-a-cybersecurity-culture-in-a-complex-organization</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hacking-minds-and-shaping-behaviors</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/transparency-over-secrecy</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hacking-the-career-board</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/game-on-building-a-winning-cybersecurity-culture-through-gamification</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-good-the-bad-and-the-user</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beyond-click-rates</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/mature-your-program-and-grow-your-career</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/building-a-cybersmart-culture-through-ambassadorship</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/lessons-from-hans-christian-andersen</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/pardon-the-disruption-the-psychology-of-security-culture</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/osint-tools-for-diving-deep-dark-web</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/fuji-a-new-open-source-tool-for-full-file-system-acquisition-of-mac-computers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/defending-ai-models-strategies-for-securing-ai-implementations-against-emerging-threats</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-agentic-ai-understanding-and-securing-the-next-frontier-of-intelligent-systems</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-i-learned-to-stop-worrying-and-love-vibe-coding</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/snakes-on-a-control-plane-purple-teaming-azure-iam-for-threat-detection</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/defending-against-javaghost-preventing-abuse-of-your-cloud-environments-for-cyber-attacks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-to-successfully-implement-a-cloud-security-platform</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cloud-driven-security-building-a-data-lake-and-integrating-agentic-solutions-for-real-time-action</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/can-genai-solve-multicloud-security</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/securing-the-future-leveraging-ai-and-genai-in-cloud-security</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/iac-and-gitops-for-resilient-multi-cloud-security</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/iac-meets-reality-engineering-for-the-cloud-you-actually-have</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/go-jump-in-a-lake-how-a-data-lake-can-help-your-security-program</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ghosts-to-guardrails-moving-beyond-the-alert-driven-posture</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/identity-and-access-management-iam-in-the-cloud</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/get-the-flock-out-of-my-cloud-using-duckdb-to-detect-spousal-sabotage</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/securing-tomorrows-cloud-a-strategy-for-pqc-readiness</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/handle-with-care-the-fragile-reality-of-cloud-emergency-access</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/agentic-ai-understanding-and-securing-the-next-frontier-of-intelligent-systems</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/compromising-pipelines-with-evil-terraform</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/amazon-s3-security-19-years-later-why-cloud-data-security-is-still-complex-to-manage</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-art-of-concealment-how-cybercriminals-are-becoming-and-remaining-anonymous</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hunting-payloads-in-linux-extended-file-attributes</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/extracting-the-unseen-real-world-ram-acquisition-and-analysis-from-android-devices</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/home-automation-and-iot-as-a-source-of-evidence-forensic-analysis-of-home-assistant</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tool-4n6pi-a-lightweight-open-source-forensic-disk-imager</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tool-the-only-kanvas-you-need-when-spreadsheets-fail-your-ir-case-management</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/macos-telemetry-vs-edr-telemetry-which-is-better</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/pdf-forensics-and-authenticity-detection</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tool-location-log-analysis-of-google-maps-ios</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/tool-forensic-wace-a-multi-threaded-tool-for-semantic-forensic-analysis-of-whats-app-chats-using-ai-tools</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/mobile-device-hardening-a-forensic-comparison-of-advanced-protection-programmes-in-ios-and-android</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/when-the-threat-group-doesnt-leave-incident-response-under-fire</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/enterprise-digital-forensics-and-security-with-open-tools-automate-audits-computer-forensics-investigations-and-incident-response-with-awx-and-ansible</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-the-augmented-era-disrupt-or-be-disrupted</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/high-fidelity-threat-hunting-unveiling-insider-threats-beyond-the-logs-the-dual-identity-evasion-technique</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-dpapi-to-appbound-looting-credentials-on-modern-web-browsers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-hunt-for-silent-compromise</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/subverting-macos-applications-and-security-controls-through-0-day-vulnerabilities</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/when-attackers-tune-in-weaponizing-llm-fine-tuning-for-stealthy-c2</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/medshield-proactive-threat-modeling-framework-for-connected-iot-care</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/soc-of-the-futurethe-future-is-now</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ambiguous-techniques-determining-malice-through-context</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cloudy-with-a-chance-of-meatballs-handling-the-unexpected-in-cloud-threat-detection</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/thugs-and-thieves-lessons-for-leaders-from-a-very-tough-year</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/crisis-communications-in-a-cyber-emergency</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/getting-the-c-suites-attention-for-cyber</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/fashion-forward-security-first-supporting-gen-ai-at-scale</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/watching-the-watchers-safeguards-and-security-for-artificial-intelligence-systems</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-threat-modeling-agentic-ai-systems-proactive-strategies-for-security-and-resilience</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-failing-forward-how-neurodiversity-shaped-my-journey-to-cybersecurity-leader</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/ai-as-a-neurodivergent-ally-practical-ai-support-for-neurodivergent-success-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/intelligence-is-my-dump-stat-how-i-got-into-cybersecurity-anyway</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cybersecurity-and-autism-opening-new-pathways-for-successful-futures-in-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/we-have-a-code-blue-on-nis2</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/license-to-hack-how-offensive-security-builds-cyber-resilience-in-industrial-environments</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/closing-keynote-detection-resilience-response-evolving-ics-incident-readiness-in-the-ransomware-era</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/remote-access-for-ics-ins-outs-and-hidden-dangers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/publicprivate-collaboration-for-industrial-cyber-resilience-a-framework-for-critical-infrastructure</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/securing-the-unseen-the-future-of-supply-chain-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/when-the-dark-web-talks-the-world-pays-the-hellcat-story</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/copilot-bestie-or-worst-enemy-the-new-era-of-weaponised-llms</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/how-apteens-pose-a-risk-to-your-enterprise-and-career</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/stealth-and-evolved-the-story-of-nimbus-manticore</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/stop-hitting-yourself-turning-evasion-techniques-against-malware</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/beyond-the-digital-drones-as-an-extension-of-the-cyber-threat</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/no-pain-no-gain-how-ai-will-hurt-bug-bounty-hunters-and-how-to-fix-it</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/squidoor-dissecting-a-sophisticated-multi-platform-malware-used-by-a-chinese-apt</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cyber-war-by-proxy</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/service-la-russia-a-tasting-course-of-intelligence-tradecraft-and-russia-based-threat-actor-case-studies</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-crossover-episode-when-espionage-steals-from-crime</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hey-minion-demystifying-north-korean-it-workers</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-from-theory-to-tradecraft-building-detection-systems-to-track-ai-enabled-adversaries</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/the-c2-you-didnt-see-coming-apt-c2-techniques-that-redefine-stealth</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/hunting-north-koreas-state-sponsored-contagious-interview-operation-attacks-on-developers-via-the-software-supply-chain</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/applied-forecasting-part-deux</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/rhadamanthys-and-the-limits-of-private-sector-offensive-operations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/whenever-wherever-blind-eagle-attacks-the-shadow-vector-case</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/new2cti-bling-up-your-intelligence-requirements-enhancing-your-cti-requirements-with-the-diamond-model-of-intrusion-framework</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/new2cti-operationalizing-cti-from-pirs-to-priority-ttps</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/new2cti-beyond-the-feed-designing-cti-programs-that-matter-to-the-business</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/new2cti-connecting-the-dots-transforming-incident-data-into-actionable-campaign-intelligence</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/new2cti-red-teams-with-receipts-operationalizing-cti-for-real-adversary-simulations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/malware-magic-revealing-intel-leads-without-reverse-engineering</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/principle-of-least-ai-in-threat-intelligence-a-blueprint-for-effective-genai-adoption</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/poison-in-the-digital-well-intelligence-driven-defense-against-supply-chain-attacks</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/can-we-forecast-our-own-fate-mapping-the-future-of-the-cti-industry-with-sats</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-overwhelm-to-impact-a-prioritization-matrix</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/from-your-gut-to-a-gold-standard-introducing-the-admiralty-system-in-cti</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/knowing-when-to-quit-a-framework-for-managing-the-deprecation-of-threat-actor-aliases</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/cant-stop-wont-stop-ta584-innovates-initial-access</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/presentations/keynote-if-only-we-had-the-data-a-tale-of-mismatched-expectations</loc>
    <lastmod>2026-03-11T17:04:40Z</lastmod>
  </url>

  </urlset>