Greg Scheidel
Principal InstructorSecurity Program Lead at Iron Vine Security
Specialities
Cyber Defense
Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsCyber Defense
Greg Scheidel has over 30 years of hands-on experience in IT security and is experienced in desktop and server support, network design and implementation, application development and programming, IT service management, IT security, and information assurance. He currently leads a security program at Iron Vine Security. Greg firmly believes IT and security must serve business needs rather than exist for their own sake, and is passionate about teaching others while expanding and honing his own skills. He’s also a member of the ISACA CSX-P working group to develop objectives and content related to the certification and exam.
Very helpful instructor. He has been extremely thorough on each topic, going the extra mile to answer questions and provide real world examples.
Greg was really helpful and he really knows the content.
Greg was great all week. Really strong presenter, really easy to follow and listen to, offered constant opportunities for expanded learning. Can't say enough about him.
Authored Courses
Step into a world where cutting-edge defense meets practicality in cybersecurity! "SANS Secure Your Fortress" will teach you how to master the latest and most effective defense techniques. Whether you're a seasoned expert or just beginning your cyber journey, this event is for you.
Data can end up in the unlikeliest of places, even for those organizations that have developed formal data governance policies and implemented technical controls to (try to) keep data in central data stores. Especially troublesome is data stored and worked with on user endpoints—workstations, laptops, devices—such as original unstructured files or containing data extracted from structured data sources.
This presentation will gather top experts and vendors to help you navigate the complexities of implementing Zero Trust strategies effectively
To achieve their objectives in our environment, attackers must move beyond their initial compromise and interact with our environment. Which means that we have the home field advantage - *if* we enable appropriate auditing and monitoring. This session will dig into some specific tactics that leverage that home field advantage and make it easier for us to effectively detect and respond.
To achieve their objectives in our environment, attackers must move beyond their initial compromise and interact with our environment. Which means that we have the home field advantage - *if* we enable appropriate auditing and monitoring. This session will dig into some specific tactics that leverage that home field advantage and make it easier for us to effectively detect and respond.
Join Greg Scheidel as he demystifies the technical foundation of Zero Trust Architecture (ZTA) and outlines the key technologies that drive modern, mature implementations.