David Hazar
Certified InstructorCo-Founder & Chief Information Security Officer at Next Level3 Software
Specialities
Cybersecurity Leadership, Cloud Security
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsCybersecurity Leadership, Cloud Security
David is a security consultant based in Salt Lake City, Utah focused on vulnerability management, application security, cloud security, and DevOps. David has 20+ years of broad, deep technical experience gained from a wide variety of IT functions held throughout his career, including: Developer, Server Admin, Network Admin, Domain Admin, Telephony Admin, Database Admin/Developer, Security Engineer, Risk Manager, and AppSec Engineer. David is a co-author and instructor for LDR516: Building and Leading Vulnerability Management Programs and SEC549: Cloud Security Architecture, as well as an instructor for and contributor to SEC540: Cloud Native Security and DevSecOps Automation, and has also developed and led technical security training initiatives at many of the companies for which he has worked.
David has been great in explaining things and interjecting personal experience into the lectures. He's also been very accommodating and available to help out with troubles with the labs, quickly identifying mistakes and helping to remedy them.
David is a solid instructor and moves through the content expertly.
David is well informed in all areas of vulnerability management & the cloud especially.
Here are upcoming opportunities to train with this expert instructor.
Explore content featuring this instructor’s insights and expertise.
In this CloudSecNext 2022 session of Cyber42 Vulnerability Management you will play to win! In this 90-minute game day you will play individually to improve the state of a fictional organization and more effectively handle the vulnerability management.
If you have ever needed to analyze data in your Azure cloud environment, chances are you have run across the Kusto Query Language. Join me as we go over the basics of Kusto and the Kusto Query Language, discuss how it is leveraged in Azure, and learn how to get started if you are unfamiliar with the language and syntax.
Vulnerability management can at times seem like a problem with no solution. While there is no simple solution to vulnerability management and our work will never be done, there are solutions, and we can successfully reduce the vulnerabilities in our environment to a much more manageable level. Every week will bring new vulnerabilities, but with the right processes and procedures, out technology and development organizations will know how to respond. The biggest secret to vulnerability management is recognizing that vulnerability management isn’t the problem. Join us to discover the secret to vulnerability management.
Content delivery networks provide a valuable service and make the Internet a better place. Without them, streaming services would overwhelm entire networks. Mobile and single-paged web applications would take forever to load. But, what about sensitive data? Do we have to avoid caching sensitive data at all costs or are there ways we can secure it? Join me to learn more about origin protection and signature enforcement with custom policy in Amazon CloudFront. Get a behind-the-scenes peak at one of the labs from SEC540: Cloud Security & DevSecOps Automation.
Enhance your proficiency in operational cybersecurity decision-making through immersive team-based simulations with Cyber42. Practice agile decision-making and information synthesis, key skills required for success in leadership roles. Engage in thought-provoking discussions and gain practical insights to improve your cybersecurity competencies. As cyber-attacks become more common and more expensive, many organizations are making a foundational shift to view operations from the point of view of an adversary in order to protect their most sensitive information. Despite vulnerability tools and programs being available for several decades, breaches still happen regularly from known vulnerabilities. Complicating the matter more are a wide range of modern technologies requiring more time and knowledge to manage, more known vulnerabilities than ever before, an unprecedented migration to cloud, and ever-increasing legal and regulatory compliance standards. Information Assurance Engineers, Auditors, SOC Analysts, and Cybersecurity Managers need more to better defend an organization’s data systems. Cyber42 is a leadership simulation game that puts you in the driver’s seat of making tough leadership calls on behalf of a fictitious organization that needs your expertise. Each outcome will be followed by thoughtfully group discussion. The winning team will be decided by who makes the strongest security cultural impact to the fictitious organization. Requirements: A laptop with a current, modern web-browser and administrative rights. Learning Objectives: You will work through different scenarios, each focusing on different elements needed as an Operational Cybersecurity Executive: Vulnerability Management, Security Operations and Defensive Controls. Walk away after the even having advanced the following 5:Gain insight into the cybersecurity landscape from the operational executive perspective Strategically balancing competing priorities for successful outcomesRapid data synthesis and analysis for informed decision-makingRisk-free decision-making in a simulated environment for optimal business outcomesBuilding valuable connections with peers in a dynamic and enjoyable setting
Join us as we discuss how organizations can gain back some of the visibility and control in their cloud environments by implementing repeatable architectural patterns.
クラウドはオンプレミス環境よりも本質的に安全というわけではありませんが、そもそも一般的に組織がクラウドに移行する理由はセキュリティではありません。
Our applications and APIs are the gateways to our most sensitive and valuable data. As such, application and API security has become more and more essential to protecting our organizations. On this webcast, SANS certified instructor David Hazar will review the results of our 2024 AppSec/DevSecOps survey, and provide insight into:The best way to provide API securityInvestment trends in automated testing technologiesWhich tests are more important or more effective for APIsRegister for this webcast now, and you will automatically receive the companion white paper upon publication.
Join David Hazar for a critical session on identity and access management, network security, data security, and response patterns in the cloud.
Review relevant educational resources made with contribution from this instructor.