Title |
Speaker |
Publication Date |
10 Visibility Gaps Every CISO Must Fill |
Russell Eubanks |
December 13, 2019 |
Getting Your Head in the Cloud: Implementing Security Monitoring for Public Clouds |
Sunil Amin |
December 12, 2019 |
2019 SANS Survey on Next-Generation Endpoint Risks and Protections |
Justin Henderson and John Hubbard |
December 3, 2019 |
Maximizing Threat Hunting Efficiency with Automated Queries |
Eric Hulse and Daniel Bates |
November 21, 2019 |
Have You Taken The "Endpoint Blue Pill?" Debunking The Endpoint Protection Myth |
Justin Henderson and Ismael Valenzuela |
October 25, 2019 |
Lessons Learned from Over a Thousand Threat Hunting Workshops |
Brandon Newport |
October 23, 2019 |
Are you prepared for a Ransomware Attack? |
Peter Romness and John Pescatore |
October 22, 2019 |
SANS Cloud Security Operations Solutions Forum |
Kenneth G. Hartman, Chris Bilodeau and Josh Rickard |
October 18, 2019 |
Vulnerability Management Vendor Briefing: Decreasing the Attack Surface with Effective Vulnerability Management |
Matt Bromiley |
September 27, 2019 |
Meet Your New Best Friend: DNS Security |
Rachel Ackerly |
August 27, 2019 |
Leading Change for CISOs |
Lance Spitzner |
July 3, 2019 |
Building and Maturing Your Threat Hunt Program |
David Szili |
June 25, 2019 |
SANS 2019 State of OT/ICS Cybersecurity Survey |
Jason Dely, Barbara Filkins, Doug Wylie |
June 12, 2019 |
Cybersecurity Frameworks for CISOs |
Frank Kim |
June 12, 2019 |
Cryptojacking - What is it? Where is it? How to protect against it? |
Brian McMahon and Brandon Helms |
April 16, 2019 |
Empowering Incident Response via Automation |
Matt Bromiley |
March 22, 2019 |
Lessons learned after Hundreds of Breach Investigations |
Robert Reyes, Gerard Johansen and Jake Williams |
January 16, 2019 |
Gearing up for 2019 - Best Practices to Consider |
John Pescatore, John Strand & Jake Williams |
December 7, 2018 |
EPP or EDR? Why not both? Choose Next Generation Endpoint Security |
Neil Patel and Jake Williams |
December 5, 2018 |
We pass the costs to you! An analysis of cryptomining and cryptojacking |
Ted Demopoulos and Josh Pyorre |
May 31, 2018 |
Enhance Your Investigations with Network Data |
Matt Bromiley and Brian Ford |
October 26, 2017 |
Simplified Segmentation for a Stronger Threat Defense |
Keti Kilcrease |
October 5, 2017 |
Know Thy Network - Cisco Firepower and CIS Critical Security Controls 1 & 2 |
Ryan Firth |
August 15, 2017 |
Tackling Mobile Security with Cisco |
Beth Barach |
July 7, 2017 |