SANS Institute

Hacking as an Act of War

SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet’s early warning system – the Internet Storm Center.

We’ve had the pleasure of working with SANS for many years, and we’ve listed over 2,000 of their training events and conferences since 2012!


Company Mission ("Tagline"): SANS is the most trusted resource for information security training, cyber security certifications and research

Industry Classification: Computer & Network Security

Cybersecurity Specializations: Information Security Training, Digital Forensics Courses, Cyber Security Training, Security Awareness Training, Penetration Testing Courses, Application Security Courses, IT Audit, Security Leadership Courses, Industrial Control Systems Security Courses, cloud security courses, blue team operations courses, cyber security certifications, security awareness training, cyber security white papers, cyber security webcasts, and cyber security policies

Address/Location: Rockville, Maryland
This oganization might be multinational; we list their HQ.

Company Size: 201-500 employees

Year of Incorporation: 1989

Main Website: SANS Institute

Discovered SANS Institute Social Media Accounts

Hacker Hotshot Speaker: G Mark Hardy

Date of Recording: November 16th, 2012

About G Mark Hardy:

G. Mark Hardy has been providing information security expertise to government, military, and commercial clients for over 30 years. A long-standing industry veteran, he provides virtual CISO services and is a perennial speaker at major industry trade shows. As president of National Security Corporation, he directs the efforts of the information security consulting firm he founded in 1988.

Mr. Hardy’s professional background includes information security planning and policy development, managing security assessment and penetration teams, data encryption and authentication (including “breaking” commercial cryptographic algorithms), software development and strategic planning for e-commerce, and writing commercial risk assessment software. He has developed information security plans for four U.S. Military commands, and wrote the communications security encryption requirements for an experimental military satellite program.