<?xml version="1.0" encoding="UTF-8"?>
  <urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
 
  <url>
    <loc>https://www.sans.org/webcasts/three-cloud-security-differentiators-leaders</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/quantum-ready-security-phased-path-distribution-resilience</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/guidance-leading-cloud-security-journey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-8</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/eliminate-endpoint-blind-spots-real-time-security-governance-autonomous-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-detection-and-response-survey-webcast-forum</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/code-confidence-how-hands-on-training-strengthens-application-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/full-packet-capture-as-a-strategic-and-regulatory-imperative-sep-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2024-state-of-security-automation-survey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-the-2023-mitre-test-means-for-you</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/five-ics-cybersecurity-critical-controls-mexico-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/performing-ics-ot-security-assessments-aligned-sans-ics-ot-five-critical-controls</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/effective-ics-ot-ttx-design-facilitation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2025-sans-government-security-forum</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/enhancing-security-operations-google-threat-intelligence</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/empowering-responders-with-automated-investigation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-ics-ot-survey-webcast-forum-the-state-of-ics-ot-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/honeypots-scale-insights-sans-internet-storm-center</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/protecting-ci-cd-pipelines-growing-threats-and-the-keys-to-securing-them</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/protecting-the-sdlc-modernizing-secure-software-delivery-with-aspm</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-works-in-improving-end-user-phishing-awareness-recognition-and-resistance</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-sans-soc-survey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-defense-initiative-2025-interactive-fireside-chat-gharun-lacy</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-you-need-to-know-about-the-sec-cybersecurity-mandate-part-of-the-sans-compliance-countdown-series</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-to-attract-hire-retain-top-tier-cybersecurity-talent-key-insights-2025-cybersecurity-workforce-research-report</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/demystifying-bec-threat-detection-microsoft-365</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-attract-hire-retain-mid-level-cybersecurity-roles-outcomes-of-giac-workforce-study</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2025-zero-trust-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/from-servant-surrogate-misenar-4a-model-agentic-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-your-2026-cybersecurity-audit-plan</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/practical-threat-modeling-community-templates</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tanium-autonomous-endpoint-management-next-gen-secops-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/part-4-ctrl-alt-comply-cloud-services-cip-standards-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/arms-race-evasion-examining-evolving-evasion-techniques-incident-response-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/beyond-basics-what-cloud-defenders-need-know</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-defense-initiative-current-threat-landscape-how-ai-plays-role</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-defense-initiative-how-changed-way-use-ai-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/general-quarters-the-impact-of-cybersecurity-on-the-maritime-industry</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2025-ai-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2025-threat-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/top-active-directory-attacks-every-security-professional-should-know</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/advanced-network-detection-and-response-ndr</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-compliance-countdown</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dod-cio-cyber-workforce-session</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/wisdom-from-cyber-security-battlefield-lessons-from-leading-incident-response-teams-apj-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/easing-consulting-consulting-side-other-approaches</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/gridex-viii-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2025-soc-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2025-cloud-identity-and-access-management-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/gridex-vii-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/billions-stake-insurance-data-reveals-correlation-between-sans-five-critical-controls-risk-reduction</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2025-emerging-technologies-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/state-of-threat-detection-the-defenders-dilemma</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/security-masterclass-privilege-without-the-pain</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/essentials-of-information-gathering-and-analysis-required-of-csirts</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/self-improvement-of-security-hands-on-skills-for-dfir</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-detection-response-survey-transforming-cybersecurity-operations-ai-automation-and-integration-in-detection-and-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/resilient-by-design-rethinking-cybersecurity-in-manufacturing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/chatgpt-your-security-program-two-years-in-what-worked-what-didnt</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hack-defend-summit-solutions-track-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/orlando-fall-2025-keypad-safe-attack-pulseview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/modernizing-ot-security-how-frenos-uses-digital-twin-technology-ai-threat-emulation-transform-security-posture-compliance</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-to-learn-faster-ai-sampling-broadly-delving-efficiently-absorbing-fully-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/proactive-defense-emulating-real-world-adversaries-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/clearing-fog-detection-defense-against-aws-persistence-techniques</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/continuous-penetration-testing-closing-gaps-threat-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fortifying-government-defenses-a-sans-government-focused-solutions-forum</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-you-need-know-about-cybersecurity-maturity-model-certification</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/optimize-your-defenses-to-combat-the-threats-that-matter-most</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/soar-into-2024-harness-the-power-of-the-5-5-5-benchmark-for-cloud-detection-and-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/top-tips-for-safeguarding-your-business-with-mobile-app-vetting</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-attack-surface-vulnerability-management-survey-hackers-dont-wait-why-should-we</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/human-powered-security-with-hackerone</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/stop-playing-security-whack-a-mole-enforcing-cloud-security-organizational-controls</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/economic-security-connects-executives-cyber-defenders-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/evolving-frontier-dfir-readiness-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/closing-gaps-zero-trust-microsegementation-hybrid-cloud-zscaler</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2026-ics-ot-security-survey-insights-industrial-cybersecurity-crossroads</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cybersecurity-standards-scorecard-2025-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-ai-cis-controls-v8</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cloudsecnext-summit-solutions-track-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/are-you-really-getting-benefits-unified-logs</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/jumpstart-into-cyber</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secure-sauce-scavenger-hunt</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/take-sensitive-data-protection-to-the-next-level-in-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/microsegmentation-in-a-click</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/maximizing-network-security-with-microsegmentation-to-minimize-the-risk-from-any-attacker</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/identify-evaluate-prioritize-industrial-cyber-risk</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ics-security-and-management-of-change-risks-and-resilience</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/identify-detect-and-recover-from-industrial-cyber-threats</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/unlocking-osint-potential-exclusive-look-sans-osint-poster-matt-edmondson</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/foiling-modern-attacks-map-mitre-att-ck-tactics-to-falco-rules</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/insights-into-the-latest-ransomware-trends</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rise-of-the-infostealers</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/healthcare-threat-landscape-risk-mitigation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2023-multicloud-survey-navigating-the-complexities-of-multiple-clouds</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-application-security-api-survey-protecting-our-applications-and-apis</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/osint-summit-bonus-session</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/managed-detection-and-response-optimizing-external-expertise</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-ics-ot-security-communities</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-network-security-2025-where-ai-good-bad-security-defence</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/the-future-of-log-centralization-for-siems-and-dfir-is-the-end-nigh</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-the-cloud-changes-secops-and-incident-response-lessons-from-a-real-world-living-off-the-cloud-attack</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/the-future-of-risk-based-detection</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-top-attacks-and-threats-report</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fantastic-caches-what-you-can-find-in-them-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/im-an-incident-responder-ask-me-anything</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/introducing-ransomware-landscape-lessons-from-2023-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fantastic-caches-what-you-can-find</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/improving-developer-security-maturity-how-stop-repeating-common-mistakes</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/improving-developer-security-maturity-how-to-stop-repeating-common-mistakes-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/attacker-techniques-are-evolving-how-about-you</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/attacker-techniques-are-evolving-how-about-you-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/weaponizing-algorithm-sec535</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-for-electric-control-5-risk-based-ics-vulnerability-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-for-electric-control-4-ics-secure-remote-access</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-for-electric-control-3-ics-network-visibility-monitoring</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-for-electric-control-2-ics-defensible-control-system-network-architecture</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-for-electric-control-1-ics-specific-incident-response-plan</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/configuring-the-future-addressing-network-and-configuration-risks-in-modern-cloud-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/Spring-Cyber-Solutions-Fest-2024-Attack-Surface-Vulnerability-Track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-ics-ot-survey-the-state-of-ics-ot-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/prevent-cloud-incidents-from-becoming-cloud-breaches</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-ai-survey-ai-and-its-growing-role-in-cybersecurity-lessons-learned-and-path-forward</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/achieve-cloud-security-at-scale</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sansfire-does-network-telemetry-still-matter-todays-threat-landscape</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/does-network-telemetry-still-matter-todays-threat-landscape</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/part-3-ctrl-alt-comply-cloud-service-provider-perspectives</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2023-ics-ot-cybersecurity-survey-2023-s-challenges-and-tomorrow-s-defenses</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/Spring-Cyber-Solutions-Fest-2024-Emerging-Technologies-Track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cis-sltt-winter-2026-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-ren-isac-educational-institutions-winter-2026-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/education-winter-2025-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/buyers-guide-how-to-secure-egress-traffic-from-workloads-in-the-public-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/employee-contractor-consultant-which-work-model-best-for-you</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dc-metro-fall-2025-securing-ai-focused-world</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dfir-view-web-cms-breaches-learn-from-real-attacks</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/proactive-defense-emulating-real-world-adversaries</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/story-kurtlar-scada-malware-discovery-victim-disclosure</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-chicago-spring-2025-sans-night-ai-realities-why-am-i-in-a-handbasket</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hype-around-grc-engineering-what-it-is-why-its-growing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/balancing-on-prem-cloud-security-strategic-considerations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2024-cloud-security-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-solutions-track-ics-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/software-supply-chain-security-hunting-hidden-threats-before-they-strike</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-soc-survey-facing-top-challenges-in-security-operations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tactical-tripwires</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-threat-hunting-survey-chasing-shadows-advancements-in-threat-hunting-amidst-ai-and-cloud-challenges</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/breach-and-attack-simulation-security-team-success</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rise-of-malicious-msix-file</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/safeguard-your-business-critical-web-apps-and-apis-with-a-waf</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/welcome-sans-healthcare-forum-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/strengthen-organizational-security-posture-role-based-training-sans</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-sans-threat-hunting-survey-focusing-on-the-hunters-and-how-best-to-support-them</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/bridging-the-gap-securing-your-digital-transformation-journey-with-armis</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/soc-visibility-triad-why-you-need-ndr-alongside-edr</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/shift-left-becomes-shift-everywhere-continuous-development-demands-continuous-security-testing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secure-your-multi-cloud-environment-from-code-to-cloud-with-microsoft-defender-cspm</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-multicloud-survey-securing-multiple-clouds-amid-constant-changes</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/5-automation-trends-to-scale-and-modernize-your-infosec-compliance-program</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/Spring-Cyber-Solutions-Fest-2024-DevSecOps-Application-Security-Track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/i-have-trust-issues-and-so-does-my-ciso--how-ndr-can-help-identify-issues-in-your-zta</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-cti-survey-managing-the-evolving-threat-landscape</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/do-you-know-where-your-data-is</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/enhance-security-investigations-with-servicenow-asset-data</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/lesson-learned-yard-greenfield-projects-hard-too</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/gulf-region-2025-three-keys-becoming-cyber-risk-officer</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-to-learn-faster-ai-sampling-broadly-delving-efficiently-absorbing-fully</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-defense-initiative-pay-play-surviving-winning-ransomware-negotiations-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/preparing-risk-deepfakes</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-utilities-forum</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-seemplicity-review</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-multicloud-survey-securing-multiple-clouds-at-scale</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-cloud-security-exchange</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/adopting-an-offensive-security-posture-strategies-and-best-practices</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/understanding-detecting-user-impersonation-lateral-movement</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-offense-defense-sec588-sec510</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/raiders-encrypted-disk-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/career-evolution-reflection-on-skills-which-elevated-my-cybersecurity-career-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/no-experience-required-gaining-clarity-career-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-the-future-with-microsoft-defender-for-cloud-best-practices-and-insights</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/capitol-hill-cybersecurity-career-week-sans-institute</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-ai-cybersecurity-forum-insights-front-lines</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cybersecurity-career-journeys-sans-experts</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/impact-ai-workforce</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/unlock-power-network-visibility-industrial-environments</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/update-sec598-automate-security-generative-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/least-privilege-adventure-third-party-cloud-account-access</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hands-on-workshop-protecting-cloud-assets-improving-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hands-on-workshop-cloud-vm-deployment-hardening</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/bridge-clouds-unifying-worlds-entra-id-hybrid-landscapes</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-6</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/evolution-of-siem-in-the-cloud-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/evolution-of-siem-in-the-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-security-first-principles-future-opportunities-4-of-5</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dc-metro-fall-2025-ai-apocalypse-navigating-promise-peril</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-ai-survey-webcast-forum-measuring-genai-s-impact-on-security-three-years-later</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/when-vibes-lie-securing-iac-prompt-age-generated-templates</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/data-security-age-ai-proactive-strategies-protect-most-valuable-assets</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-5g-frontier-real-threats-deepfakes-defense-strategies</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rethinking-digital-forensics-incident-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tendencias-respuesta-incidentes-investigacion-digital</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/vulnerability-management-matters-telling-right-story-drive-action</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-threat-protecting-email-ai-generated-attacks</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/detecting-crypto-currency-mining-corporate-environments</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/purple-teaming-reloaded-ai-adversaries-new-sec599</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/improving-security-outcomes-skilled-practitioners-business-value</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/solving-ot-governance</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rethinking-digital-forensics-incident-response-september</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/information-security-llms</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/intel-action-building-high-speed-early-warning-misp-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/save-time-modern-search-techniques</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-lab-detect-what-matters-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-lab-detect-what-matters</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/network-security-2025-vulnerability-chaining-mapping-vulnerabilities-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-threat-intelligence-summit-solutions-track-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/5-critical-skills-infosec-professionals</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fortifying-resilience-exploration-product-security-assessment-poster</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dfircon-miami-2025-code-community-calling-building-tools-mission</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/nerc-cip-015-monitoring-deep-inside-critical-networks-keep-adversaries-outside</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fantastic-caches-what-you-can-find-in-them</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/raiders-encrypted-disk</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/achieving-ot-network-visibility-detective-controls-nerc-cip-world-119285</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/every-move-you-make-every-app-you-play</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cybersecurity-era-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-driven-secops-unifying-controls-automating-response-advancing-modern-soc-using-palo-altos-xsiam</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/latest-ai-impact-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/swimlane-turbine-ai-automation-security-operations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/20-critical-security-controls-96685</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/mastering-adversary-emulation-with-caldera-practical-guide</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/defensible-architectures-cloud-connectivity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/liars-aiers</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/flying-low-a-look-at-some-sophisticated-and-stealthy-attacks</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/risk-rules-everything-around-me-making-smart-vm-decisions-without-guesswork</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/virginia-beach-2025-go-pentest-yourself</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-dfir-summit-solutions-track-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/insights-into-detection-engineering-findings-from-a-sans-and-anvilogic-survey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/threat-hunting-deepbluecli-v3</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/penguin-power-21st-century-intrusion</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-for-water-control-1-ics-specific-incident-response-plan</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/copy-of-cryptography-the-encryption-and-password-hashing-recipe-with-a-little-salt---in-bahasa-indonesian</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cybersecurity-age-llm-risks-opportunities-future-ai-driven-information-security-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/changing-role-security-leader-what-it-means-to-you-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/getting-started-with-malware-analysis-practical-journey-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-to-process-data-using-splunk-for-dfir-practitioners-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-detection-response-survey-transforming-cybersecurity-operations-ai-automation-integration-detection-response-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/operationalizing-a-cyber-security-red-team-building-executing-and-improving-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/scattered-spider-com-cybercrime-intelligence-proactive-defense-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/linux-persistence-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/evolution-of-siem-in-the-cloud-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/elevating-osint-how-ai-transforming-intelligence-gathering-techniques-whats-new-in-sec587-advanced-osint-course-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/pass-the-what-now-understanding-credential-attacks-in-a-windows-11-world-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/promoting-your-path-from-engineer-to-ciso-2024-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/unmasking-threats-in-digital-shadows-leveraging-machine-learning-enhanced-detection-connected-world-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/enterprise-cloud-security-architecture-patterns-panel-discussion-jp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/iot-forensics-uncovering-unsolved-evidence-in-cctv-investigations-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/you-need-wings-to-fly-to-the-cloud-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ransomware-as-service-raas-evolution-implications-countermeasures-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-affordable-targeted-cyber-defence-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-use-misp-share-qualitative-tactical-operational-intelligence-broad-community-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-you-can-do-develop-security-personnel-improve-skills-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/using-sof-elk-speed-up-incident-response-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/nextstep-osint-practical-image-video-verification-techniques-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/five-ics-cybersecurity-critical-controls-apac-practitioners-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/changing-trends-malware-techniques-infiltrate-target-environments-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-sans-secure-australia-2023-detecting-hunting-ransomware-operator-tools-its-easier-than-you-think-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-sans-secure-australia-2023-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secure-singapore-2023-community-night-managing-large-scale-response-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secure-singapore-2023-community-night-using-live-ranges-soc-ir-training-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/getting-started-fuzzing-bug-discovery-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/osint-open-source-intelligence-starting-from-scratch-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/dfir-evidence-collection-preservation-cloud-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/industrial-control-systems-threat-landscape-active-defense-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/urgent-webcast-russian-cyber-attack-escalation-in-ukraine-what-you-need-know-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-you-need-to-know-about-apple-cve-2021-30860-aka-forcedentry-in-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-ive-changed-way-use-ai-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/heroes-and-anti-heroes-of-the-soc</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ics-ot-cybersecurity-survey-2023-aus-insights-feb</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-sans-night-cracking-the-code-the-role-of-programming-in-information-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-dfir-match-made-cyber-heaven-or-recipe-for-digital-disaster</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sansfire-2024-sans-mic-implant-phone-home</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/architecting-safety-using-cybersecurity-requirements-assessments</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-powered-risk-management-tools-small-businesses</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-nashville-winter-2025-sans-night-getting-involved-in-a-startup-make-a-dent-in-the-universe</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/to-phish-or-not-to-phish-understanding-modern-attacks-defenses</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-sans-night-sboms-the-hard-way-hacking-bob-the-minion</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ransomware-impact-on-large-global-enterprises</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/getting-your-hands-dirty-with-industrial-control-systems-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/roses-are-red-violets-are-blue-pentera-is-purple-and-we-re-here-to-hack-you</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-security-problem-creative-ways-gain-experience-experience-118595</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/great-reboot-infosec-professionals-extended-mess-sansatmic-116795</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/interactive-pentest-experience-118175</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tech-tuesday-workshop-building-out-a-hands-on-purple-team-stack-part-2</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-s-new-with-the-cis-controls-v8</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber42-vulnerability-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sec670-red-team-ops-windows-tool-dev-preview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/purple-team-interactive-poster-walkthrough</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/active-ics-cyber-defense-colonel-mustard-candlestick-kitchen</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cybersecurity-standards-scorecard-2022-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/common-persistence-strategies-emulating-preventing-detecting</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/emulating-detecting-responding-lolbas-attacks-sec699-update-preview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/assumed-breach-better-model-vietnamese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/blind-data-exfiltration-using-dns-burp-collaborator</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secret-vulnerability-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/getting-started-fuzzing-bug-discovery</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/promoting-your-path-engineer-to-ciso</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-pen-test-austin-2023-keynote-up-your-security-game</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-leadership-new-orleans-2023-hands-on-workshop-cyber42-operational-cybersecurity-leader</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/improve-cybersecurity-culture</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/core-netwars-tournament-7---walmart-oct-2021</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/the-5-critical-controls-for-ics-ot-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/red-purple-team-improve-defenders-ability-stop-attackers-may-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-pen-test-austin-2023-workshop-building-azure-security-labs-using-terraform</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/five-ics-cybersecurity-critical-controls-apac-practitioners-ko</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sec565-red-team-operations-pivoting-workshop</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/five-ics-cybersecurity-critical-controls-apac-practitioners</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/containers-workshop-how-they-work-how-assess-them</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-sans-survey-breaking-it-ot-silos-with-ot-ics-visibility</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/guardians-ai-frontier-mitre-atlas-unveiled-navigating-ai-ml-system-attacks</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/upgrading-cloud-forensics-for509</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-orlando-fall-2023-keynote-employee-contractor-consultant-which-work-model-is-best-for-you</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/focusing-on-the-right-cybersecurity-priorities</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rapid-incident-response-solving-problem-scale</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/creating-engaging-cyber-challenges-netwars-architects-view</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/the-importance-of-ndr-detection-in-depth</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/detecting-critical-vulnerabilities-nmap-nse-workshop-cisa-kev-catalog</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/kerberos-kerberoasting</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-get-started-cyber-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/you-came-with-that-plan-youre-braver-than-thought</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cybersecurity-standards-scorecard-2023-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-create-windows-implants-using-cc</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/combating-supply-chain-attacks-product-security-testing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/exploring-link-between-corruption-cybercrime</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/navigating-serverless-containerized-iac-vulnerability-manage-revolution</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/managing-information-security-risk-cis-controls</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tips-tricks-digital-dumpster-diving</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/second-rule-hacking-there-are-no-rules</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-solutions-fest-2023-threat-hunting-intelligence</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/pragmatic-approach-conduct-ot-penetration</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cyber-defense-initiative-2023-sans-night-the-industrial-ics-ot-cyber-threat-landscape</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-east-2024-keynote-cybersecurity-controls-for-ics-and-critical-infrastructure-in-times-of-warfare</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ot-penetration-testing-lessons-learned-penetration-testing-operational-environments</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/vulnerability-management-program-effective</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/vulnerability-management-finding-context</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secure-by-design</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber42-transformational-leader</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ot-pen-testing-how-not-to-sink-an-oil-rig</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber42-operational-cybersecurity-leader</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ics-attack-map-series-electric</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/opening-remarks-future-forecast-keynote-rsa-top-cyber-threats-early-preview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-pen-test-austin-2024-keynote-yelling-at-the-cloud-enterprise-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/unleashing-secure-access-with-an-identity-centric-zero-trust-network-access-solution-microsoft-entra-private-access</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sansfire-2024-keynote-25-years-of-the-internet-storm-center-time-traveling-through-sensor-data</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-offensive-operations-baltimore-2024-keynote-an-exclusive-fireside-chat-from-military-life-to-cyber-professional</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/-threat-hunting-summit-solutions-track-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/intro-c-windows-part-2</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/an-intro-to-c-windows-part-3</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2024-threat-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/expanding-security-toolkit-119615</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/women-cybersecurity-survey-112295</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/top-attacks-threat-report-112665</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/remote-workers-working-poll-114535</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-workshop-ntlm-relaying-101-how-internal-pentesters-compromise-domains</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/Fall-Cyber-Solutions-Fest-2024-Detection-Response-Track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2025-attack-surface-vulnerability-management-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/intro-c-windows-devs</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-kickass-home-lab-sansatmic-117975</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber42-game-day-industrial-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/attack-surface-management-virtual-conference-118750</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ransoming-critical-infrastructure---emergency-webcast</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/protect-surfaces-services-aws-cloud-112935</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/closing-critical-skills-gap-modern-effective-security-operations-centers-socs-survey-results-113485</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/understanding-iec-62443-overview-standard-deployment-fortinet-products-compliance-116935</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/improve-threat-detection-hunting-aws-cloud-mitre-att-ck-matrix-112940</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/detecting-malicious-activity-large-enterprises-116140</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tech-tuesday-workshop---use-terraform-to-provision-your-own-cloud-based-remote-browsing-workstation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/artificial-intelligence-solutions-forum</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/active-ics-cyber-defense-colonel-mustardcandlestick-kitchen-120020</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tech-tuesday-workshop-cobalt-strike-detection-log-analysis-119395</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/data-security-solutions-forum-118145</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2021-ransomware-detection-and-incident-response-report/</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tech-tuesday-workshop-cloud-attacks-incident-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rekt-casino-hack-assessment-operational-series-vulnerability-management-wrong-1-4-118150</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rekt-casino-hack-assessment-transformational-series-weak-security-program-unprotected-systems-poor-detection-response-2-4-118190</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/your-extra-layer-of-security-getting-to-zero-trust-network-access</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/herramientas-rapidas-dfir-para-respuesta-incidents-caza-de-amenazas-117445</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2021-ics-headlines-from-the-year-in-review</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/russian-cyber-attack-escalation-in-ukraine</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloudsecnext-summit-san-diego</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber42-ransomware-hhs-private</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/different-sides-of-the-same-coin-the-difference-between-forensic-science-and-forensic-engineering-in-incident-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cis-summer-2022-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/discover-new-ics-cybersecurity-field-manual-vol-1</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/osint-era-disinformation-fake-news</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/demystifying-siem-edr-xdr-mdr</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/digital-forensics-and-incident-response-summit-solutions-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/new-and-updated-top-20-cyber-attacks-on-industrial-control-systems</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/open-season-cyberthreats-i-threat-hunting-101-101097</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/unpacking-hypewhat-and-cant-prevent-detect-software-supply-chain-attacks-118640</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/best-practices-lessons-learned-starting-osint-teams</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/industrial-control-systems-threat-landscape-active-defense-korean</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/industrial-control-systems-threat-landscape-active-defense-thai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-workshop-advanced-python-automation-hands-on-workshop</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/integrating-open-ndr-to-automate-alert-response-via-better-network-evidence</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-practical-cloud-security-roadmap-2022-thai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/serverless-defenders-bahasa-indonesian</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/serverless-defenders-korean</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/osint-era-disinformation-fake-news-thai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/getting-your-hands-dirty-with-industrial-control-systems-bahasa-indonesian</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-you-need-to-know-about-apple-cve-2021-30860-aka-forcedentry-in-bahasa-indonesian</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/getting-your-hands-dirty-with-industrial-control-systems-korean</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/getting-your-hands-dirty-with-industrial-control-systems-thai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/seeing-cyber-threats-over-the-horizon-in-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2023-night-best-practices-and-lessons-learned-from-starting-up-multiple-osint-teams</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-workshop-advanced-python-automation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-workshop-metadata-madness</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/a-sans-first-look-at-a-self-supervised-learning-application-for-anomaly-detection</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-to-build-a-risk-register-that-accounts-for-internal-and-external-risk</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/a-leader-s-guide-to-security-operations-improve-productivity-with-threat-intelligence-and-automation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/data-recovery-beyond-software</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/designing-access-shared-datasets-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/new-osint-cheat-code-chatgpt</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-riyadh-march-2023-prevention-vs-detection</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-riyadh-march-2023-5-critical-skills-infosec-professionals</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/pivot-pillage-detecting-lateral-movement</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secure-singapore-2023-community-night-using-live-ranges-soc-ir-training</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secure-singapore-2023-community-night-managing-large-scale-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/osint-open-source-intelligence-starting-from-scratch</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2022-ics-ot-cybersecurity-year-in-review-executive-briefing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/attack-surface-management-solutions-forum-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/a-dns-security-architecture-as-secops-force-multiplier</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-abu-dhabi-march-2023-establishing-link-between-corruption-cybercrime</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-abu-dhabi-march-2023-ics-ot-security-challenges-assessments-takeaways</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/the-state-of-ddos-attacks-a-look-back-at-2022</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/breaking-cloud-kill-chain</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2023-hands-on-cloud-security-workshop-building-detections-in-aws</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-leadership-new-orleans-2023-keynote-top-down-security-operations-setting-clear-soc-metrics-and-goals-for-cyber-defense-success</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-your-cached-assets</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/streamline-and-eliminate-audit-procedures</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/top-5-reasons-why-posture-management-is-not-enough-for-cloud-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-sans-report-become-timeless-the-present-and-future-skills-needed-for-cyber-security-job-success-at-any-level</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/case-cloudy-deception-sherlock-holmes-story</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-sans-secure-australia-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-sans-secure-australia-2023-detecting-hunting-ransomware-operator-tools-its-easier-than-you-think</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/accelerate-your-asm-journey-top-10-attack-surface-management-use-cases</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/container-security-101</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-detections-aws</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-security-does-the-endpoint-still-matter</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-build-security-awareness-program-manage-human-risk</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ren-isac-summer-2023-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cis-summer-2023-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/journey-into-digital-forensics-incident-response-with-julia-gately</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/changing-trends-malware-techniques-infiltrate-target-environments</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/a-sans-first-look-at-zero-trust-based-access-management-and-remote-access-for-ot-it-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/a-journey-of-vulnerability-hunting-in-a-third-party-plugin-in-adobe-acrobat-through-fuzzing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/managing-apps-on-byo-and-managed-devices-how-to-enforce-policies-to-protect-your-data</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/3-crucial-cloud-security-changes-hackproof-your-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-sans-report-the-state-of-mdr</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/top-code-vulnerabilities-to-avoid-in-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/implementing-attack-surface-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-sydney-may-2023-secure-design-supporting-business-implementation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/discover-ics-cybersecurity-field-manual-vol-3</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-pipelines-devsecops-cloud-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-west-2023-hands-on-workshop-building-detections-in-azure</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-west-2023-keynote-thinking-dfirently-from-entry-to-specialty</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/unlocking-digital-mysteries-password-cracking-osint-forensic-investigations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-better-cloud-detections-by-hacking-azure-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-better-cloud-detections-hacking-aws-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/enhancing-ot-security-a-dual-perspective-on-threat-detection-with-emerson-and-dragos</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/exposed-industrial-control-system-remote-services-a-threat-to-critical-infrastructure</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-sans-report-digital-forensics</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sansfire-2023-keynote-internet-storm-center-what-s-new-and-current-threat-brief</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cloud-security-san-francisco-2023-workshop-hands-on-cloud-workshop</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cloud-security-san-francisco-2023-keynote-the-cloud-security-identity-crisis-skills-to-keep-up-in-the-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-solutions-fest-2023-spring-zero-trust</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/commonalities-salt-security-culture</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dodge-the-sliver-bullet-and-find-the-smoking-gun</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-defence-australia-2023-community-night-june-29</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-defence-australia-2023-community-night-july-6</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/applying-findings-verizon-dbir-managing-human-risk</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/bridging-the-gap-overcoming-challenges-in-cloud-migration-and-modernization</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/nextstep-osint-practical-image-video-verification-techniques</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-red-team-capability-solutions-forum-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/advanced-python-automation-hands-on-workshop</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2023-top-new-attacks-and-threat-report</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/is-retail-a-security-fail-make-sure-your-pos-is-not-a-pos</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/using-sof-elk-speed-up-incident-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/advanced-python-ctf</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hunting-suspicious-https-tls-connections</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/using-intelligent-data-as-a-force-multiplier-for-security-and-it-ops</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-carahsoft-government-solutions-forum</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/threat-detection-trends-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/beware-encryption-jedi-mind-trick</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-use-misp-share-qualitative-tactical-operational-intelligence-broad-community</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/-2023-digital-forensics-and-incident-response-summit</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-cloudflare-helps-financial-institutions-improve-visibility-into-a-complex-threat-landscape---q2-case-study</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/open-source-tools-techniques-aml-sanctions-compliance</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-to-use-zero-trust-to-secure-workloads-in-the-public-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-sans-survey-on-application-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dfir-fu</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/forensic-assessment-variant-discovery-in-minutes</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/whatworks-in-building-security-culture-and-maturity-across-a-global-enterprise</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/current-ot-threat-landscape-how-prepare</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/investigating-suspicious-websites-skills-techniques-investigators-threat-intelligence-professionals</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/detecting-ai-osint-investigations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/setting-up-osint-watchdogs-create-free-persistent-monitoring-tools-python</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securely-integrate-multicloud-environments-workload-identity-federation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hands-on-workshop-forensic-analysis-apple-iot-devices</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/mastering-cloud-security-policy-code</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/no-more-acronyms-let-s-solve-problems-putting-caasm-and-sspm-aside-to-talk-real-use-cases</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/destroying-long-lived-cloud-credentials-workload-identity-federation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/if-cyber-security-difficult-you-might-doing-hard-way</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/think-like-a-hybrid-attacker</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/uk-government-capture-flag-tournament</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/uk-university-capture-flag-tournament</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/education-winter-2024-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sltt-winter-2024-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/enterprise-cloud-security-architecture-patterns-panel-discussion</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/attack-surface-management-and-its-implications-for-offensive-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/network-security-in-the-hybrid-cloud-era</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-cloudsecnext-summit-solutions-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-better-detections-aws-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-solutions-fest-2023-ransomware</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-solutions-fest-2023-cloud-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-solutions-fest-2023-soc-soar</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-new-cybersecurity-alert-priority-matrix</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/registry-hives-msixing-redirection</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-new-cyber-security-alert-matrix</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-offensive-operations-australia-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/powershell-super-express-for-information-security-practitioners</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/looking-ahead-to-the-national-cybersecurity-strategy-implementation-plan</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cyber-defense-initiative-2023-sans-night-security-for-generative-ai-101</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cyber-defense-initiative-2023-sans-night-leveraging-ai-a-tutorial</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/quick-quic</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/zero-trust-solutions-in-2023-use-cases-adoption-trends-and-prioritization</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/Hack-More.-Report-Less.-Fix-What-You-Find-Every-Time</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sneak-peek-for-sans-vip-customers</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/forensic-analysis-apple-iot-devices</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-infrastructure-security-for-aws</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-detection-engineering-survey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-flight-simulator-part-4-least-privileged-pods-kubernetes-workloads</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/top-security-trends-and-lessons-learned-from-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/mitigate-dangerous-web-application-vulnerabilities-security-awareness-training</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-first-look-backups-and-data-resiliency-made-easy</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/is-your-siem-really-doing-its-job-how-to-take-cybersecurity-to-the-next-level</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/understand-vulnerability-management-maturity-using-self-assessment-tool</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/promoting-your-path-from-engineer-to-ciso-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hands-on-malicious-script-analysis-ransomware-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ics-attack-map-series-oil-gas</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ics-attack-map-series-water-sector</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/attacking-user-identities</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/why-do-we-do-what-we-do-motivational-talk</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-sans-night-swashbuckling-through-cyberspace-arr-chitecting-soc-teams-and-tactics-to-navigate-uncharted-waters</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/from-pentest-to-red-team-overview-of-necessary-skills-breakdown-of-frameworks</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sec401-security-essentials-whose-next-gen-lab-anyway</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/the-ai-battlefield-promoting-your-path-cybersecurity-horizon-and-closing-remarks</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-works-for-strategic-recruitment-hacker-s-view-on-product-security-ciso-perspectives-evolving-trends-challenges</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/outsmart-the-smartphone-what-works-for-enhancing-human-risk-management-know-your-enemy-most-critical-threats</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-security-exchange-2023</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/why-securing-multiple-clouds-using-terraform-harder-than-you-think</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/exploring-link-between-corruption-cybercrime-may-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/combating-insider-threats-with-people-processes-and-ai-based-technology</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/filling-the-human-gap-with-technology---artificial-intelligence-may-know-you-better-than-you-know-yourself</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/modernizing-appsec-with-application-security-posture-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/do-you-trust-your-hardware-appliances-should-you</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/offensive_operations_ctf_virtual_edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/the-future-of-network-security-technology-a-sans-survey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-sans-night-attacks-in-the-cloud-what-s-old-is-new-and-what-s-new-is-new</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-leadership-cloud-security-crystal-city-2024-keynote-security-culture-the-what-why-and-how</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/jwts-good-bad-ugly-security-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-risk-management-essentials-practical-ciso</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-west-2024-keynote-unlock-your-cybersecurity-knowledge</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-ai-solutions-forum</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/enhancing-threat-hunting-efficiency-with-ai-machine-learning</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2023-featured-keynote-chatgpt-gans-and-deep-learning-pulling-back-the-curtain</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-cybersecurity-summit-dark-side-ai-questions-you-should-be-asking</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/unmasking-threats-in-digital-shadows-leveraging-machine-learning-enhanced-detection-connected-world</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/beyond-chatgpt-building-security-applications-using-openai-api</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/top-five-trends-in-ciso-leadership</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-threat-hunting-survey-hunting-for-normal-within-chaos</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-workshop-building-azure-pentest-lab-red-teams</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/exploring-link-between-corruption-cybercrime-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/unlocking-secrets-exploration-pulseview-side-channel-timing-attacks</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/shining-a-light-in-the-dark-observability-and-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securely-moving-to-the-government-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/unlock-essentials-sans-foundations-your-gateway-cybersecurity-success</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/elevating-osint-how-ai-transforming-intelligence-gathering-techniques-whats-new-in-sec587-advanced-osint-course</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/stay-current-stay-secure-unveiling-sans-giacs-latest-training-portfolio</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-prevent-social-engineering-based-successful-red-team-exercises</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/combatting-crypto-miners-tailored-incident-response-azure-aws-google-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/achilles-systems-hack-assessment-series-breach-or-blueprint-building-threat-informed-defense-part-1</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/achilles-systems-hack-assessment-series-revisiting-enterprise-controls-part-2-of-4-operational-leadership</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/achilles-systems-hack-assessment-series-getting-strategic-vulnerability-management-part-3-of-4-operational-leadership</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/achilles-systems-hack-assessment-series-cyber42-game-day-defending-achilles-systems-part-4</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-ot-cybersecurity-year-in-review-executive-briefing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/introduction-ai-leveraging-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cracking-code-role-programming-information-security-why-do-we-do-what-we-do-motivational-talk</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/azure-recon-and-password-guessing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/Spring-Cyber-Solutions-Fest-2024-Insider-Threat-Identity-Access-Management-Track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-rocky-mountain-summer-2024-sans-night-leveraging-ai-to-solve-real-problems</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/everything-is-a-file-or-is-it</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-to-upgrade-your-cybersecurity-risk-assessments</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hands-on-workshop-building-better-detections-azure-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/centralizing-cloud-logs-and-events-with-microsoft-sentinel</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/advanced-forensics-workshop-handling-ai-unsupported-apps-smartphone-investigations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-1</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-3</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-2</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/decoding-time-understanding-endianness-timestamp-formats</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/demystifying-base64-beginners-guide-encoding-decoding</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hands-on-digital-forensics-exploring-evidence-mounted-images</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/data-carving-recovering-hidden-files-digital-graveyards</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/beyond-file-names-decoding-secrets-files-signatures-metadata</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-wars-legal-force-awakens</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-chicago-2024-sans-night-how-to-perform-effective-ot-cyber-security-risk-assessments</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-chicago-2024-sans-night-cybersecurity-controls-for-ics-and-critical-infrastructure-in-times-of-warfare</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-ren-isac-summer-2024-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cis-summer-2024-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/do-you-think-youre-ready-attack-cloud-unlock-secrets-cloud-penetration-testing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ransomware-summit-solutions-track-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/process-code-injection-detection-response-mitigation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-you-need-know-nis-ii-directive-compliance-countdown-series</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/-industrial-control-systems-summit-solutions-track-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/practical-msticpy-use-rainbow-bridge-siem-advanced-threat-hunting</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/scraping-web-threat-intelligence-data</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/effective-ics-ot-ttx-design-facilitation-using-machine-learning-reduce-alert-fatigue</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/demystifying-data-conversion-binary-hexadecimal-decimal-ascii</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2024-security-awareness-report-key-findings-with-lance-spitzner</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-dfir-cyber-heaven-or-digital-hell-which-one-would-you-choose-ja</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/empowering-a-modern-soc-with-ai-practical-use-cases</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/justice-denied-how-bad-digital-forensics-threatens-undermines-justice</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/elevating-audit-strategy-insights-crf-audit-framework</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cybersecurity-standards-scorecard-2024-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-secure-your-fortress-cutting-edge-defense-techniques-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-5</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-4</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cryptographic-signatures-to-sign-or-not-to-sign-that-is-the-question</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/exploring-link-between-corruption-cybercrime-august-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/architecting-a-cloud-security-guardrails-model</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-review-recaptcha-enterprise</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/frameworks-tools-and-techniques-the-journey-to-operational-security-effectiveness-and-maturity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-in-xdr-what-it-means-and-where-it-fits</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/the-journey-to-operational-security-effectiveness-and-maturity-frameworks-tools-and-techniques</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/automating-vulnerability-management-with-breachlock</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/advanced-python-automation-hands-on-workshop-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/detecting-ai-in-osint-investigations-oct-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/community-night-cyber-defence-singapore-august-28</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/always-purple-team-automated-ci-cd-detection-engineering</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/updates-to-advanced-purple-team-class-sec699</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/linux-persistence</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/from-tech-expert-cybersecurity-leader-navigating-transition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/evolution-genai-implications-mitigations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/digital-forensics-and-incident-response-summit-solutions-track-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-cybersecurity-perspectives</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/executive-order-14028-improving-nations-cybersecurity-identity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/adversaries-doing-stranger-things</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cyber-defense-initiative-2024-sans-night-cybersecurity-at-the-crossroads-trends-challenges-and-leadership-solutions</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/scattered-spider-com-cybercrime-intelligence-proactive-defense</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/business-risks-ignoring-ics-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/exploring-sans-internet-storm-center</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-llm-powered-applications</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/using-machine-learning-reduce-alert-fatigue-nov-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/offensive-security-operations-penetration-testing-future</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/devsecops-securing-web-applications-cloud-era</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/demystifying-ai-soc-practical-intro-word-soup-ml-nn-llms</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/advanced-python-techniques-for-security-automation-oct-24</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/future-proof-your-skills-2025-cybersecurity-challenges</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/top-three-ciso-strategic-issues</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/processes-and-modules</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/decade-cti-evolution-key-insights-from-past-sans-cti-surveys</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secure-your-fortress-2024-top-defense-strategies-trends</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/decade-cti-evolution-key-insights-from-past-sans-cti-surveys-es</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-for-water-control-2-ics-defensible-control-system-network-architecture</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-for-water-control-3-ics-network-visibility-monitoring</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-for-water-control-4-ics-secure-remote-access</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-for-water-control-5-risk-based-ics-vulnerability-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/into-looking-glass-medical-device-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/healthcare-industrial-control-security-pharmaceuticals</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fireside-chat-ai-medical-diagnostics</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/crisit-management-healthcare</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tools-simplifying-regulatory-requirements-risk-assessment</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-a-security-conscious-culture</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/enhanced-vendor-risk-assessments</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-7</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cybersecurity-age-llm-risks-opportunities-future-ai-driven-information-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/adopting-unified-cyber-risk-lifecycle-benefits-your-attack-surface</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dark-energy-cyber-threats-satellite-communications-during-conflict</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spooky-scary-lambda-attacks</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sltt-winter-2025-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-cisos-can-break-curse-knowledge</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/operationalizing-cyber-security-red-team-building-executing-improving</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/nis2-directive-readiness-compliance-challenges-and-recommendations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/querying-with-kusto</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/critical-vulnerability-spotted-microsoft-defender-need-to-know</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/understanding-risk-management-mandates-2024-cybersecurity-regulations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/understanding-2024-updates-nist-cybersecurity-framework</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cisos-guide-improving-security-culture</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/choosing-right-grc-tool-insights-effective-risk-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/using-ai-in-your-windows-investigations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cyber-defense-initiative-2024-featured-keynote-cybersecurity-insights-an-interactive-fireside-chat-with-uscybercom-s-morgan-m-adamski-and-rob-lee</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/intro-c-windows-part-4</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/intro-c-windows-part-5</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-6</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-7</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-8</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-9</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-10</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/gen-ai-para-dfir-en-el-mundo-real-casos-de-uso-practicos</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/aviata-solo-flight-challenge-cloud-security-workshop-chapter-9</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/Fall-Cyber-Solutions-Fest-2024-Emerging-Technologies-Track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/Fall-Cyber-Solutions-Fest-Zero-Trust</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-dfircon-miami-2024-special-edition-keynote-ai-enhanced-incident-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/Fall-Cyber-Solutions-Fest-2024-SOC-SOAR-Track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-security-first-principles-future-opportunities-1-of-5</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-security-first-principles-future-opportunities-3-of-5</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-security-first-principles-future-opportunities-2-of-5</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-security-first-principles-future-opportunities-5-of-5</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/detection-engineering-cloud-naughty-nice/</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/three-keys-becoming-cyber-risk-officer</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/twenty-new-labs-infinite-possibilities-sec587-overhaul</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2024-detection-response-survey-transforming-cybersecurity-operations-ai-automation-integration-detection-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/getting-started-with-malware-analysis-practical-journey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-wont-save-you-from-ransomware-heres-what-will</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-security-architecture-design-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cyber-defense-initiative-2024-special-event-from-battlefield-to-boardroom-a-fireside-chat-with-aws-ciso-chris-betz-and-sans-chief-of-research-rob-t-lee</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/adapting-detection-and-response-strategies-in-the-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-maturing-threat-hunt-program-110762</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2020-cyber-threat-intelligence-cti-survey-results-112005</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-shared-responsibility-whitepaper-116785</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/empowering-incident-response-automation-109595</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ctrl-alt-comply-cloud-services-cip-standards-current-compliance-challenges-part-5</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/part-2-ctrl-alt-comply-nerc-cip-cloud-regulated-electric-utility-perspective</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ctrl-alt-comply-nerc-cip-in-the-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-sans-cti-survey-keeping-up-with-a-changing-threat-landscape</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber-solutions-fest-level-cloud-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/when-nearest-neighbor-becomes-nearest-adversary</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/no-pain-no-gain-ai-osint-intelligence-cycle</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-detection-response-survey-transforming-cybersecurity-operations-ai-automation-integration-detection-response-aus</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/part-6-ctrl-alt-comply-cloud-services-cip-standards-path-forward</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-summit-2024-ai-hackfestsolutions-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cloudsecnext-summit-solutions-track-2024-charting-the-course-navigating-the-evolving-landscape-of-cloud-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dev-to-prod-mobile-security-with-zimperium</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cloud-security-exchange-2024</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/is-access-to-corporate-resources-from-any-device-anywhere-truly-possible</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/a-zero-trust-user-access-model-can-expedite-compliance-with-new-looming-nerc-cip-regulations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/advance-network-defenses-for-today-s-federal-government-enterprise</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/third-party-api-security-with-vorlon</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/memory-forensics-acquisition-in-the-cloud</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/advancing-your-cloud-security-journey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hands-on-workshop-avoiding-data-disasters-techniques-identify-address-cloud-storage-misconfigurations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/mastering-pe-parsing-windbg</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/less-busy-work-more-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/xdr-does-not-exist-without-ndr</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2023-sans-visibility-and-attack-surface-survey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-leadership-dc-metro-2025-keynote-hands-off-make-the-machines-do-it</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2024-sans-ics-water-cybersecurity-survey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/osint-scale-using-ai-computer-vision-agents-assist-investigations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/security-architecture-enterprise</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ignorantia-juris-non-excusat-understanding-impact-law-hacker-community-qatar-edition</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/the-soc-of-the-future-is-data-driven</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-protects-the-endpoint</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-protects-file-storage</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-smbs-can-benefit-from-the-security-protections-of-windows-11</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-government-cybersecurity-solutions-focus-report</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-east-baltimore-2025-keynote-from-entertainment-to-action-storytelling-as-cyber-strategy</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/google-secops-the-siem-s-third-act</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/from-playbooks-robocop-evolution-soc-automation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-san-antonio-spring-2025-sans-night-introduction-to-sans-ics613-ics-penetration-testing-and-assessments</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/corellium-mobile-device-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/offensive-security-operations-attack-surface-management-continuous-pen-testing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cti-summit-solutions-track-2025-day-1</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cti-summit-solutions-track-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/intro-kerberos-common-ad-privesc-attacks-empire</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-to-win-over-your-security-team-and-keep-them-engaged</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/take-first-step-ics-ot-security-ICS310</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/level-up-security-team-through-automation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/understanding-continuous-threat-exposure-management-ctem</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tactical-auditing-monitoring</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/changing-role-security-leader-what-it-means-to-you</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/vulnerability-management-industrialized</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/expecto-privacy-casting-security-data</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/new-sans-ics-ot-practice-area-town-hall-qa</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/empowering-modern-soc-ai-practical-use-cases-wiping-media-anti-forensics-exploring-hard-drive-erasure-methods-dfir</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-sans-night-there-is-no-spoon</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-san-antonio-spring-2025-sans-night-how-to-tell-a-story-when-threat-hunting</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/genai-security-risks-challenges</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/improving-windows-event-log-analysis-yamato-security-tools</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tales-from-cryptography</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/structured-approach-system-analysis-incident-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/tactical-auditing-monitoring-may-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-native-security-part-1-scaling-devsecops-gitlab-cl</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-native-security-part-4-policy-code-automated-governance</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2025-ics-security-budget-vs-modern-risk-optimizing-cybersecurity-investments-for-ics-ot-and-critical-infrastructure</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/improving-windows-event-log-analysis-yamato-security-tools-zachary-mathis-top-five-cloud-security-trends-tips-frank-kim</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/continuous-penetration-testing-rethinking-offensive-security-changing-threat-landscape</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/creating-trust-ciso</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-native-security-part-2-kubernetes-observability-opentelemetry</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/using-ai-ml-for-vulnerability-research</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/offensive-operations-ctf-virtual-edition-march-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-new-orleans-2025-keynote-securing-the-things-that-make-all-the-things-work</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2025-emerging-technologies-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2025-cloud-security-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2024-detection-response-survey-transforming-cybersecurity-operations-ai-automation-integration-detection-response-jan-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2025-detection-response-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/backdooring-ai-models</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/setting-up-kernel-debugging-poster-walkthrough</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dfir-bytes-uncovering-mystery-discovered-usb-stick-part-2</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-flight-simulator-part-1-gitlab-ci-workflows-secrets</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-flight-simulator-part-3-safeguarding-software-supply-chain</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-flight-simulator-part-2-protecting-kubernetes-clusters-admission</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/deep-dive-building-security-applications-generative-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/russia-cyber-battlefield-geopolitical-motivations-behind-state-sponsored-hacking</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dfir-bytes-uncovering-mystery-discovered-usb-stick-part-1</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secure-your-fortress-building-robust-resilient-defenses-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-native-security-part-3-continuous-compliance-prowler</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/navigating-the-app-sec-alert-overload-strategies-for-effective-application-security-monitoring</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/security-west-2025-keynote-world-brink-future-cyber-war</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/zero-trust-techniques-defensive-security-sec530</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ot-ransomware-rise-how-protect-your-operations-business</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/navigating-dora-nis2-compliance-financial-sector-organisations-eu</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/pass-the-what-now-understanding-credential-attacks-in-a-windows-11-world</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-boston-2025-make-dent-universe-infosec-startup</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/security-west-2025-past-present-future-cloud-security-github</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/modern-multi-factor-authentication-bypass-techniques-a-taste-of-sans-sec660</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/developers-three-ways-how-your-software-supply-chain-attacked</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/breaking-lock-how-mfa-still-be-defeated</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-emerging-threats-summit-solutions-track-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/intro-to-windbg-part-1-beginning</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rise-terraform-cloud-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/raleigh-2025-i-welcome-our-new-ai-overlords</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/successful-infosec-consulting-lessons-three-decades-in-the-field</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/no-pain-no-gain-ai-osint-intelligence-cycle-dec-2025-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-gen-ai-rag-data-using-azure-ai-search</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/transformational-cybersecurity-leadership-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/transformational-cybersecurity-leadership</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-security-culture-strategy-roadmap</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/silence-logs-detecting-defense-impairment-aws-azure</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/bootstrap-how-to-start-anything</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-safety-aligned-ics-ot-cybersecurity-program</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ransomware-solutions-track-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2026-emerging-technologies-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2026-ai-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2026-identity-security-and-zero-trust-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/no-pain-no-gain-ai-osint-intelligence-cycle-dec-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-west-2026-back-to-lab-foundational-security-age-of-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/building-scaling-sbom-programs-navigating-challenges-effective-risk-management-part-2</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/enhanced-vendor-risk-assessments-maximizing-risk-reduction-strengthening-vendor-relations-part-1</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/supply-chain-security-incident-response-strategies-navigating-emerging-threats-part-3</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/offensive-operations-threat-landscape-how-ai-plays-role</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-cybercrime-how-criminals-weaponizing-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/comparing-ot-perimeters-defensible-security-architectures</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/inside-ics613-building-strong-offense-ics-ot</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-soc-survey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/data-analytics-continuous-risk-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/intro-windbg-part-3-call-me-maybe</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-make-mission-vision-your-security-team-60-minutes-less</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/drip-drip-drop-confronting-data-attacks-ics-ot-systems</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/how-easily-secure-every-connected-device-enterprise-iot-industrial-ot-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sansfire-2025-how-changed-way-use-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sansfire-2025-how-use-ai-design-c2-framework</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/basics-why-cybersecurity-fundamentals-still-rule-high-tech-world</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rethinking-the-weakest-link-human-roles-ai-driven-cybersecurity</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/keypad-safe-attack-using-side-channel-timing-pulseview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rocky-mountain-2025-keynote-vectoring-future-learning-all-about-vectors-building-block-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sansfire-2025-keynote-isc-squirrels-taming-ai-distractions</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/osint-malware-ecosystem</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/supply-chain-cybersecurity-forum</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dancing-cloud-clis-mastering-aws-azure-gcp-command-line</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/beyond-patch-measuring-unknown-vulnerability-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/scaling-compliance-grc-engineering-policy-code</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/uncover-truth-digging-windows-hidden-30-day-forensic-timeline</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/decoding-shared-responsibility-model-securing-cloud-environments-together</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rethinking-oversharing-risk-and-knowledge-segmentation-in-the-age-of-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/getting-started-infosec-consulting</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-oil-natural-energy-control-1-ics-specific-incident-response-plan</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-oil-natural-energy-control-5-risk-based-vulnerability-management</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-oil-natural-energy-control-2-defensible-control-system-network-architecture</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-oil-natural-energy-control-3-ics-network-visibility-monitoring</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-5-ics-critical-controls-oil-natural-energy-control-4-secure-remote-access</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/the-future-of-cloud-security-starts-with-runtime</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/combatting-stress-burnout-security-operations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/intro-windbg-back-future-using-ttd</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-ren-isac-educational-institutions-summer-2025-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/prevent-real-cloud-attacks-terraform</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/anomaly-detection-within-machine-learning-logs</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/anomaly-detection-within-machine-learning-logs-may-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/anomaly-detection-within-machine-learning-logs-may-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ics-summit-solutions-track-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-first-look-leveraging-dropzone-ai-to-handle-tier-1-alert-triage</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/same-findings-different-org-common-vulns-across-organizations-how-to-fix-them</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/modern-multi-factor-authentication-bypass-techniques-taste-sans-sec660</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-cis-sltt-summer-2025-program-overview</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/resiliency-and-business-continuity-in-the-cloud-era</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-leadership-nashville-2025-sans-night-security-culture-unleashed-transforming-mindsets-driving-change</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2025-cti-survey-navigating-uncertainty-in-today-s-threat-landscape</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/collaborative-mobile-security-analysis-with-corellium</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/acceleration-effect-what-ai-means-cyber-defense-teams</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/bubble-cyber-threat-intelligence-organic-artificial</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/living-bubble-cyber-threat-intelligence-organic-artificial</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/mysteries-cloud-baker221b-cyber-sleuth-challenge</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ransomware-summit-solutions-track-2025</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/unifying-security-across-hybrid-environments-power-mesh-firewalling</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/nashville-winter-2026-bootstrap-how-to-start-anything</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-cybersecurity-toolkit-refresh-policies-crf-updates</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-prompting-right-hitchhikers-guide-to-mastering-llms-vibe-coding</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/rocky-mountain-2026-indispensable-career-moves-protect-current-future-next-steps</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2026-cloud-security-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-remote-access-ot-critical-control-modern-risk</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-kubernetes-cnapp-forum</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-holiday-hack-challenge-2025-closing-ceremony</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-reactive-resilient-transform-cybersecurity-through-leadership-insight</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/three-keys-becoming-cyber-risk-officer-january-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/three-keys-becoming-cyber-risk-officer-january-2026-japanese</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/go-beyond-siem-transform-your-soc-ai-cortex-xsiam</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/beyond-the-breach-unified-dfir-future-of-enterprise-cyber-resilience</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-enterprise-data-ai-closing-gaps-dlp-data-risk-management-programs</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/current-trends-future-digital-investigative-analysis</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/mcp-question-authorization</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-human-collaboration-modern-socs</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/using-mitre-attck-operational-framework-prioritizing-testing-sustaining-defense</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cybercrime-how-criminals-are-weaponizing-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/stop-siem-cost-bloat-expand-visibility-without-expanding-your-budget</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/maturing-incident-response-program-updated-nist-sp80061-rev3-guidance</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/asia-pacific-webcast-with-mike-murr-boon-hean-low</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/workshop-cyber42-operational-cybersecurity-executive</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cyber42-make-security-culture-secret-weapon</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cti-ai-arms-race-building-resilient-adaptive-intelligence-platforms-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cti-ai-arms-race-building-resilient-adaptive-intelligence-platforms-2026-day-1</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-summit-solutions-track-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2026-government-survey-insights-public-sector-ready-next-cyber-threat</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/state-detection-engineering-2026-what-data-reveals-accuracy-automation-ai-adoption</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/vibe-hacking-ai-driven-c2-operations-mcp</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-west-2026-changing-role-security-leader-what-it-means</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-west-2026-securing-ai-focused-world</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/chopping-ai-down-size-paul-bunyan-guide-cyber-careers</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/security-central-2026-integrating-aiml-into-soc-detection-engineering</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/surge-2026-securing-your-ai-transformation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/where-ai-actually-helps-dfir-where-it-lies</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/inside-new-sec573-ai-powered-python-security-automation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-security-west-2026-deception-scale-exploring-internet-storm-center</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/black-history-month-ctf-orientation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-assisted-threat-intelligence-adversary-emulation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hackventures-josh-better-password-attacks-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/infosec-rock-star-accelerate-your-career-geek-will-only-get-you-so-far</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/vibe-coding-evasion-framework-ai-assisted-red-team-tool-development</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2026-soc-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/hispanic-latin-heritage-history-month-ctf-orientation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/winter-cyber-solutions-fest-2026-finance-banking</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/winter-cyber-solutions-fest-2026-healthcare</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/whats-new-2026-sans-cybersecurity-policy-templates</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/making-vulnerability-assessment-management-program-audit-compliance-ready</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/not-ready-for-a-pen-test-attackers-dont-care</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/winter-cyber-solutions-fest-2026-utilities-critical-infrastructure</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-ics-command-briefing-2026-preparing-for-what-comes-next</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/help-me-red-team-operators-youre-my-only-hope</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ml-rag-fine-tuning-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/government-forum-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-baker-221b-cyber-sleuth-challenge-session-3</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-baker-221b-cyber-sleuth-challenge-session-2</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/womens-history-month-ctf-orientation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/veterans-day-capture-flag-orientation-webinar</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/what-are-we-growing-trust-identity-education-age-of-generative-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cybersecurity-era-ai-mar-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/detecting-malware-via-https-analysis</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/secure-fortress-tools-tactics-tradecraft-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/enterprise-dfir-scale-investigation-response</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/air-gapped-security-connected-world</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/zta-unpacked-critical-technical-components-zero-trust-architecture</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/be-a-dlp-hero-how-to-quickly-deliver-value-from-your-dlp-program-and-set-it-up-for-future-success</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/defense-in-depth-multiple-layers-of-protection-fortifying-your-cyber-defenses</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/navigating-the-challenges-of-securing-hybrid-environments</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-native-application-protection-platforms-cnapps-buyers-guide</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/cloud-security-convergence-how-controls-models-for-a-robust-cloud-security-stack-are-changing</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/when-trusted-senders-become-threats-stopping-bec-supply-chain-attacks-selflearning-ai</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-dfir-summit-solutions-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-detection-response-survey-report</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/dont-trust-ai-verify-practical-discussion-ai-soc</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/getting-started-prompt-injection</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/risk-adaptive-dlp-strategy-guide</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/agile-incident-response-how-leading-teams-execute-fast</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/infosec-rock-star-5-critical-skills-infosec-professionals</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/whats-new-sec560-bonus-labs-cloud-attacks-bonus-range</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-cloud-security-survey-insights-threats-tools-priorities</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2026-exposure-management-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/next-generation-of-data-security</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2026-sans-ai-survey-insights</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/fall-cyber-solutions-fest-2026-threat-intelligence-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2026-insider-threat-malware-ransomware-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/airsnitch-how-worried-should-you-be</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/trust-your-vendors-do-you</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-soc-siem-soar-forum</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/current-state-ot-cyber-attacks</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-demo-day-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-enterprise-ai-innovation-operational-resilience</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/multicloud-blueprint-architecting-security-ai-era</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2026-emerging-technologies-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/beyond-backup-identity-resilience-modern-enterprise</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/spring-cyber-solutions-fest-2026-detection-response-track</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-summit-solutions-track-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-summit-solutions-track-2026-day-1</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ics-solutions-track-2026-otics-actionable-industrial-cyber-defense-live-demos-real-attack-case-studies-proven-countermeasures</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/leadership-summit-solutions-track-2026</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-driven-devsecops-part-3</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-driven-devsecops-part-2</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-driven-devsecops-part-1</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-driven-devsecops-part-4</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-cloud-security-exchange</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/ai-driven-devsecops-part-5</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2026-sans-state-identity-threats-defenses-survey-insights-event-how-identity-became-new-security-perimeter-whats-next</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/detection-engineering-scales-practical-strategies-resilient-maintainable-security-operations</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2026-sans-soc-survey-insights</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-threat-hunting-survey</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/2026-sans-cti-survey-insights-indicators-insights</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/sans-2026-exposure-management-survey-insights</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/webcasts/securing-branch-ot-environments-with-agentless-segmentation</loc>
    <lastmod>2026-03-11T17:04:45Z</lastmod>
  </url>

  </urlset>