10 Visibility Gaps Every CISO Must Fill | Russell Eubanks | December 13, 2019 |
Getting Your Head in the Cloud: Implementing Security Monitoring for Public Clouds | Sunil Amin | December 12, 2019 |
2019 SANS Survey on Next-Generation Endpoint Risks and Protections | Justin Henderson and John Hubbard | December 3, 2019 |
Maximizing Threat Hunting Efficiency with Automated Queries | Eric Hulse and Daniel Bates | November 21, 2019 |
Have You Taken The "Endpoint Blue Pill?" Debunking The Endpoint Protection Myth | Justin Henderson and Ismael Valenzuela | October 25, 2019 |
Lessons Learned from Over a Thousand Threat Hunting Workshops | Brandon Newport | October 23, 2019 |
Are you prepared for a Ransomware Attack? | Peter Romness and John Pescatore | October 22, 2019 |
SANS Cloud Security Operations Solutions Forum | Kenneth G. Hartman, Chris Bilodeau and Josh Rickard | October 18, 2019 |
Vulnerability Management Vendor Briefing: Decreasing the Attack Surface with Effective Vulnerability Management | Matt Bromiley | September 27, 2019 |
Meet Your New Best Friend: DNS Security | Rachel Ackerly | August 27, 2019 |
Leading Change for CISOs | Lance Spitzner | July 3, 2019 |
Building and Maturing Your Threat Hunt Program | David Szili | June 25, 2019 |
SANS 2019 State of OT/ICS Cybersecurity Survey | Jason Dely, Barbara Filkins, Doug Wylie | June 12, 2019 |
Cybersecurity Frameworks for CISOs | Frank Kim | June 12, 2019 |
Cryptojacking - What is it? Where is it? How to protect against it? | Brian McMahon and Brandon Helms | April 16, 2019 |
Empowering Incident Response via Automation | Matt Bromiley | March 22, 2019 |
Lessons learned after Hundreds of Breach Investigations | Robert Reyes, Gerard Johansen and Jake Williams | January 16, 2019 |
Gearing up for 2019 - Best Practices to Consider | John Pescatore, John Strand & Jake Williams | December 7, 2018 |
EPP or EDR? Why not both? Choose Next Generation Endpoint Security | Neil Patel and Jake Williams | December 5, 2018 |
We pass the costs to you! An analysis of cryptomining and cryptojacking | Ted Demopoulos and Josh Pyorre | May 31, 2018 |
Enhance Your Investigations with Network Data | Matt Bromiley and Brian Ford | October 26, 2017 |
Simplified Segmentation for a Stronger Threat Defense | Keti Kilcrease | October 5, 2017 |
Know Thy Network - Cisco Firepower and CIS Critical Security Controls 1 & 2 | Ryan Firth | August 15, 2017 |
Tackling Mobile Security with Cisco | Beth Barach | July 7, 2017 |