SANS Analyst Papers

TitleAuthorPublication Date
2019 SANS Survey on Next-Generation Endpoint Risks and Protections

Justin Henderson and John Hubbard

December 3, 2019

Building and Maturing Your Threat Hunting Program

David Szili

June 24, 2019

SANS 2019 State of OT/ICS Cybersecurity Survey

Barbara Filkins and Doug Wylie

June 11, 2019

Empowering Incident Response via Automation

Matt Bromiley

March 20, 2019

Enhance Your Investigations with Network Data

Matt Bromiley

October 19, 2017

SANS Webcasts

TitleSpeakerPublication Date
10 Visibility Gaps Every CISO Must Fill

Russell Eubanks

December 13, 2019

Getting Your Head in the Cloud: Implementing Security Monitoring for Public Clouds

Sunil Amin

December 12, 2019

2019 SANS Survey on Next-Generation Endpoint Risks and Protections

Justin Henderson and John Hubbard

December 3, 2019

Maximizing Threat Hunting Efficiency with Automated Queries

Eric Hulse and Daniel Bates

November 21, 2019

Have You Taken The "Endpoint Blue Pill?" Debunking The Endpoint Protection Myth

Justin Henderson and Ismael Valenzuela

October 25, 2019

Lessons Learned from Over a Thousand Threat Hunting Workshops

Brandon Newport

October 23, 2019

Are you prepared for a Ransomware Attack?

Peter Romness and John Pescatore

October 22, 2019

SANS Cloud Security Operations Solutions Forum

Kenneth G. Hartman, Chris Bilodeau and Josh Rickard

October 18, 2019

Vulnerability Management Vendor Briefing: Decreasing the Attack Surface with Effective Vulnerability Management

Matt Bromiley

September 27, 2019

Meet Your New Best Friend: DNS Security

Rachel Ackerly

August 27, 2019

Leading Change for CISOs

Lance Spitzner

July 3, 2019

Building and Maturing Your Threat Hunt Program

David Szili

June 25, 2019

SANS 2019 State of OT/ICS Cybersecurity Survey

Jason Dely, Barbara Filkins, Doug Wylie

June 12, 2019

Cybersecurity Frameworks for CISOs

Frank Kim

June 12, 2019

Cryptojacking - What is it? Where is it? How to protect against it?

Brian McMahon and Brandon Helms

April 16, 2019

Empowering Incident Response via Automation

Matt Bromiley

March 22, 2019

Lessons learned after Hundreds of Breach Investigations

Robert Reyes, Gerard Johansen and Jake Williams

January 16, 2019

Gearing up for 2019 - Best Practices to Consider

John Pescatore, John Strand & Jake Williams

December 7, 2018

EPP or EDR? Why not both? Choose Next Generation Endpoint Security

Neil Patel and Jake Williams

December 5, 2018

We pass the costs to you! An analysis of cryptomining and cryptojacking

Ted Demopoulos and Josh Pyorre

May 31, 2018

Enhance Your Investigations with Network Data

Matt Bromiley and Brian Ford

October 26, 2017

Simplified Segmentation for a Stronger Threat Defense

Keti Kilcrease

October 5, 2017

Know Thy Network - Cisco Firepower and CIS Critical Security Controls 1 & 2

Ryan Firth

August 15, 2017

Tackling Mobile Security with Cisco

Beth Barach

July 7, 2017