Title |
Speaker |
Date |
Sponsor |
Gaining Critical Data-Driven Insight to Effectively Measure and Manage Human Risk |
Lance Spitzner |
May 3, 2021 |
The Shift to Cloud - Why SASE Changes Security Considerations |
Brian Tokuyoshi |
Apr 30, 2021 |
2021 Network Security Report – Three Key Security Trends You Need to Know |
John Pescatore, Steve McGregory, Scott Register |
Apr 27, 2021 |
Threat-Informed Defense and Purple Team Operations: Lessons from the Pentagon and U.S. Cyber Command |
Dave Shackleford, Jonathan Reiber |
Apr 16, 2021 |
XSOAR HANDS-ON WORKSHOP: Take Your SOC To The Next Level! |
Brad Green |
Mar 30, 2021 |
What if security vendors told the truth? |
Ron Schlecht, Jr, Dave Shackleford |
Mar 17, 2021 |
ExtraHop Reveal(x) Presents Hands-On Network Detection & Response |
Jesse Munos |
Mar 16, 2021 |
Skilling the Gap: Creative Ways to Recruit Top Cyber Talent |
Kevin Garvey |
Mar 11, 2021 |
Metrics for Managing Human Risk |
Lance Spitzner |
Mar 2, 2021 |
3-part series: PowerShell for Audit, Compliance and Security Automation and Visualization Part 3: Beyond CSVs - Visualization using PowerShell, Excel and Grafana |
Clay Risenhoover |
Jan 21, 2021 |
3-part series: PowerShell for Audit, Compliance and Security Automation and Visualization Part 2: Audit and Compliance Data Acquisition with PowerShell |
Clay Risenhoover |
Jan 14, 2021 |
Management View of How Cloud Security Services Help Your Organization Leapfrog on Security - SANS@MIC |
Jason Lam |
Jan 12, 2021 |
3-part series: PowerShell for Audit, Compliance and Security Automation and Visualization Part 1: Introduction to Automation with PowerShell |
Clay Risenhoover |
Jan 7, 2021 |
New Five Day Security Culture Course |
Lance Spitzner, Russell Eubanks |
Nov 12, 2020 |
SANS 2020 Vulnerability Management Survey: A Panel Discussion |
David Hazar, Jerry Caponera, Mehul Revankar |
Nov 11, 2020 |
SANS 2020 Vulnerability Management Survey |
David Hazar |
Nov 10, 2020 |
Beyond Compliance: Tips to Deliver Engaging Application Security Training |
Scott Russo |
Oct 30, 2020 |
Building a Cybersecurity Risk Management Program |
Matthew Webster |
Oct 6, 2020 |
Strategic Elements for a Next Gen SOC: A Leader’s Perspective |
Cory A. Mazzola |
Sep 28, 2020 |
SANS Vulnerability Management Maturity Model |
Jonathan Risto |
Aug 20, 2020 |
How to Show Business Benefit by Moving to Risk-Based Vulnerability Management |
John Pescatore, Nathan Wenzler |
Aug 11, 2020 |
SANS@MIC - 10 Visibility Gaps Every CISO Must Fill |
Russell Eubanks |
Jul 27, 2020 |
XSOAR HANDS-ON WORKSHOP: Take Your SOC To The Next Level! |
Andy Shepherd, Patrick Bayle |
Jul 23, 2020 |
Cyber Security 101 for Human Resource Professionals |
Kelli Tarala |
Jul 22, 2020 |
Force Multiplier: How we use SOAR to maximize our own SOC analyst efficiency while minimizing fatigue and burnout |
Chris Gebhardt, Chris Crowley |
Jul 16, 2020 |
Becoming a CISO: Leading Transformation |
Frank Kim |
Jul 8, 2020 |
Consulting: What Makes a Good Consultant, from the “Hiring One” and “Being One” perspectives |
Ted Demopoulos |
Jul 7, 2020 |
How to work in ways that will make your boss take notice! |
Russell Eubanks |
Jul 7, 2020 |
Leading the Cloud transformation - Building the Roadmap |
Jason Lam |
Jun 26, 2020 |
How to Present Cyber Security Risk to Senior Leadership |
James Tarala |
Jun 25, 2020 |
Leveraging Organizational Change to Build a Strong Security Culture |
Lance Spitzner |
Jun 19, 2020 |
2020 Asset Management Trends: As IT Complexity Increases, Visibility Plummets |
Dave Gruber, Nathan Burke, Chris Dale |
Jun 18, 2020 |
Cybersecurity: Why Asset Management Matters |
Andrew Senko |
Jun 15, 2020 |
Supercharge your security operations with the brand new MGT551 - Building and Leading Security Operations Centers! |
John Hubbard |
Jun 12, 2020 |
SANS @MIC Talk - Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish While Leadership Defines a Security Program |
Don C. Weber |
May 27, 2020 |
How to Better Understand HR to Accomplish our Cybersecurity Goals |
Jim Michaud |
May 21, 2020 |
What’s Next in Vulnerability Management |
Chris Carlson |
May 19, 2020 |
Arming your SOC with SOAR in Today’s Threat Landscape |
Jay Spann |
May 19, 2020 |
Security Leadership: Managing in Turbulent Times, presented by SANS Summits |
Frank Kim, Kathy Wang, Lance Spitzner, Lenny Zeltser, Russell Eubanks, Rick Holland |
May 5, 2020 |
SANS @MIC Talk - Reflections of a New CISO: 5 Lessons Learned |
Lenny Zeltser |
Apr 29, 2020 |
How Operational Technology (OT) Security is Redefining the CISO Role |
Dave Weinstein, Don C. Weber |
Apr 28, 2020 |
3 ways to advance your vulnerability management program TODAY! |
Jonathan Risto |
Apr 16, 2020 |
What’s Next in Vulnerability Management |
Prateek Bhajanka |
Apr 14, 2020 |
Cortex by Palo Alto Networks Presents: Journey to the Center of the SOC |
|
Apr 8, 2020 |
Cybersecurity: Why Asset Management Matters |
|
Apr 7, 2020 |
Seven Strategies for CISOs |
Richard Bejtlich |
Apr 6, 2020 |
CISO Priorities: Top Considerations for Rapidly Securing the Remote Workforce |
Malcolm Harkins |
Mar 26, 2020 |
Empower Your Security Team with Approachable Threat Intelligence |
Chris Crowley, Sonny Day |
Mar 18, 2020 |
Threat Actor Analysis and Strategic Security Investments |
Jackie Abrams, Chris Crowley |
Feb 20, 2020 |
Top Five Vulnerability Management Failures (and Best Practices) |
David Hazar |
Feb 11, 2020 |
SANS Automation & Orchestration Solutions Forum |
Chris Crowley, Jay Spann |
Jan 30, 2020 |
How to Communicate about Security Vulnerabilities |
Jonathan Risto |
Jan 16, 2020 |
Why as a DoD Contractor Do I Need to Be CMMC Compliant |
Katie Arrington |
Jan 14, 2020 |
Cloud Security Vulnerabilities, Management, and Communication |
David Hazar |
Dec 18, 2019 |
10 Visibility Gaps Every CISO Must Fill |
Russell Eubanks |
Dec 13, 2019 |
Workforce Development What Works – Jason Jury – Booz Allen Hamilton |
Jason Jury, John Pescatore |
Dec 4, 2019 |
Security Vulnerability Prioritization: Managing Millions of Vulns |
Jonathan Risto |
Nov 22, 2019 |
Hiring and retaining for the SOC: Recruit, Train, and Retain Talented and Dedicated Staff |
Chris Crowley |
Nov 14, 2019 |
What Works in SOC/NOC Integration: Improving Time to Detect, Respond and Contain with ExtraHop Reveal(x) |
John Pescatore, Mitch Roberson |
Nov 7, 2019 |
Vulnerability Management Vendor Briefing: Decreasing the Attack Surface with Effective Vulnerability Management |
Matt Bromiley |
Sep 27, 2019 |
Hacking Your Way to Business Knowledge |
Kevin Garvey |
Sep 20, 2019 |
Keeping the Technical in Technical Management |
Kevin Garvey |
Sep 16, 2019 |
Rethinking Vulnerability Management |
Kevin Garvey |
Jul 24, 2019 |
The Critical Security Controls and Some Recent Data Breaches |
|
Jul 10, 2019 |
Common and Best Practices for Security Operations Centers: Results of the 2019 SOC Survey |
Christopher Crowley |
Jul 10, 2019 |
Leading Change for CISOs |
Lance Spitzner |
Jul 3, 2019 |
Practical Approach to Vendor Risk Management & Data Privacy |
Norman Levine |
Jun 26, 2019 |
Live from the Security Operations Summit: Rethinking the SOC for Long-Term Success & 2019 SANS SOC Survey Preview |
John Hubbard, Chris Crowley |
Jun 24, 2019 |
Five Keys for Successful Vulnerability Management |
Jonathan Risto |
Jun 14, 2019 |
Cybersecurity Frameworks for CISOs |
Frank Kim |
Jun 12, 2019 |
The 20 Critical Security Controls: From Framework to Operational to Implementation |
Randy Marchany |
Jun 11, 2019 |
How SOC Superheroes Win |
Salvatore Sinno, Ismael Cervantes |
Jun 5, 2019 |
A CISO\'s Perspective on Presenting OT Risk to the Board |
Ilan Abadi, Daniel Shugrue |
May 1, 2019 |
Why Your Vulnerability Management Strategy Is Not Working – and What to Do About It |
Brandon Helms, Eric Olson |
Apr 24, 2019 |
Vulnerability Practices of Tomorrow: Part 2 of the SANS Vulnerability Management Survey Results |
Andrew Laman, David Hoelzer, Gaurav Banga, Nate Dyer |
Apr 10, 2019 |
Current State of Vulnerability Management: Part 1 of the SANS Vulnerability Management Survey Results |
Andrew Laman, David Hoelzer, RJ Gazarek, Michael Rosen |
Apr 9, 2019 |
Vulnerability Management for the Enterprise and Cloud |
Jonathan Risto |
Apr 2, 2019 |
Maximizing SOC Effectiveness and Efficiency with Integrated Operations and Defense |
John Pescatore, Arabella Hallawell |
Mar 12, 2019 |
SANS Security Operations Center Briefing: Knowledge Retention, Staff Training, Automation & Operationalization 2018 |
Chris Crowley, Karen Buffo, Tim Helming |
Nov 16, 2018 |
How to do Vulnerability Management for Containers |
Apurva Dave, Dave Shackleford |
Oct 26, 2018 |
Powering IR/SOC with Code Reuse Detection - The Emotet Case Study |
Matt Bromiley, Itai Tevet |
Sep 21, 2018 |
Cloud Services - Look before you Leap |
David R. Miller |
Sep 19, 2018 |
What the CISO REALLY wants out of your SOC |
Russell Eubanks |
Sep 10, 2018 |
It\'s All About Your Assets: Inline Vulnerability and Event Management |
David Hazar |
Sep 5, 2018 |
How Network Traffic Analytics Eliminates Darkspace for the SOC |
Barbara Kay, Chris Crowley |
Aug 23, 2018 |
SOC Capabilities and Usefulness: Part II of the SANS SOC Survey Results Webcast |
Christopher Crowley, Gary Golomb, Lital Grossman, John Moran, John Pescatore |
Aug 16, 2018 |
No Single Definition of a SOC: Part I of the SANS 2018 SOC Survey Results Webcast |
Chris Brazdziunas, Christopher Crowley, Barbara G. Kay, John Klassen, John Pescatore |
Aug 14, 2018 |
World-Class Cyber Security Operations |
Carson Zimmerman |
Aug 14, 2018 |
Security Essentials Core Concepts |
Ted Demopoulos |
Jul 30, 2018 |
Managing vulnerabilities with the PIACT process |
Jonathan Risto |
Jul 18, 2018 |
Fundamentals of Security Operations |
Chris Crowley |
Jul 12, 2018 |
Understanding the 2018 Updates to the CIS Critical Security Controls |
James Tarala |
Jun 18, 2018 |
Ten Tenets of CISO Success |
Frank Kim |
May 29, 2018 |
The Myths and Best Practices Surrounding SOC Automation: Use Cases and Success Stories |
John Pescatore, John Moran |
May 3, 2018 |
Security Visibility in the Enterprise: SOC, SIEM, Managed Security and Visibility - A Master\'s Degree Presentation |
James Hendrick |
Feb 28, 2018 |
Canadian Webcast Series Part 1: Managing Vulnerabilities in the Enterprise and an Overview of the PIACT Process & Frameworks: What Are They Good For? |
Kenton Smith, Jonathan Risto |
Feb 22, 2018 |
Walk, Run, Fly: Key Characteristics of Attaining an Advanced SOC Best practice tips on how to enter the advanced SOC dimension |
Rishi Bhargava, Christopher Crowley |
Feb 22, 2018 |
Use Case Development for Security Operations |
Christopher Crowley |
Jan 17, 2018 |
Lessons Learned from the TalkTalk Breach - A Master\'s Candidate Webcast |
Ed Yuwono |
Dec 18, 2017 |
Integrated Security Operations - The Difference between Knowing and Guessing |
Matthew O'Brien, Piero DePaoli, John Pescatore |
Nov 14, 2017 |
SANS Asia-Pacific Webcast Series- 2017 SANS SOC Survey Discussion |
Christopher Crowley |
Sep 28, 2017 |
Sensitive Data Everywhere: Results of SANS 2017 Data Protection Survey |
Barbara Filkins, Benjamin Wright, Cindy Chen, Sam Kumarsamy |
Sep 6, 2017 |
Complying with Data Protection Law in a Changing World |
Neil Thacker, Benjamin Wright |
Jun 29, 2017 |
SANS Finance Briefing: Practical Threat Modeling for Financial Organizations |
|
Jun 16, 2017 |
You Have 24 Hours to Comply: Lessons Learned from Implementing a Behavioral Ransomware Detection Framework |
Mark Mager |
Jun 12, 2017 |
Influencing and Effectively Communicating to CEOs and Boards of Directors |
John Pescatore, Alan Paller |
Apr 18, 2017 |
MobileIron Security Labs: Combatting the Current State of Mobile Enterprise Security |
James Plouffe |
Mar 23, 2017 |
Complying with the General Data Protection Regulation: A Guide for Security Practitioners |
Kevin Flynn, Benjamin Wright |
Mar 8, 2017 |
Go Beyond Incident Response: The Benefits of a Complete Incident Management Platform |
Bob Day, Fraser Retallack, Jim Pflaging, Chris Crowley |
Feb 8, 2017 |
Using Cisco Stealthwatch to Increase Security By Enhancing Critical Security Control Performance |
Jamison Budacki, John Pescatore |
Jan 13, 2017 |
Implementing the 5th Critical Security Control: Controlled Use of Administrative Privilege |
Paul Ackerman |
Nov 11, 2016 |
SANS 2016 IT Security Spending Strategies Survey |
Simon Gibson, Barbara Filkins, G. Mark Hardy, Gary Sockrider |
Feb 3, 2016 |
How to Leverage The Critical Controls in 2016 |
Randy Marchany |
Jan 19, 2016 |
How to speak to the board of directors about security |
John Pescatore, Carol G. Mills, Demetrios Lazarikos (Laz) |
Dec 7, 2015 |
Cyber Insurance: What is Its Role in Your Security Program? |
Gary R. Hayslip , John Pescatore, Benjamin Wright |
Nov 19, 2015 |
Post-Breach Impact: A Cost Compendium |
Barbara Filkins, Gabriel Gumbs, Johannes Hoech |
Nov 19, 2015 |
2015 Cloud Security & Risk Benchmarks Report |
Brandon Cook, John Pescatore |
Nov 3, 2015 |
Security Best Practices for Implementing Network Segmentation in a Healthcare Environment |
Matthew Mellen, James Tarala |
Oct 30, 2015 |
Securing Your Kids |
Lance Spitzner |
Oct 21, 2015 |
Making Awareness Stick |
Lance Spitzner |
Oct 21, 2015 |
SANS and CIS Critical Security Controls Briefing |
Tony Sager, Jane Holl Lute, John Pescatore, James Tarala |
Oct 16, 2015 |
Securing Your Kids |
Lance Spitzner |
Oct 14, 2015 |
Certifications that Matter: Passing the CISSP |
David Miller |
Oct 8, 2015 |
Hacked, or Human Error in Fifteen Minutes or Less |
Chris Crowley, Stephen Northcutt |
Oct 6, 2015 |
Strategies to Address SANS Critical Controls 10 and 11 - Secure Configurations and Control of Network Devices |
John Pescatore, Michelle Johnson Cobb, Brian Kelly |
Sep 24, 2015 |
Critical Security Controls Update: How to Keep Pace with Advanced Endpoint Threats |
Hermes Bojaxhi, John Pescatore |
Sep 16, 2015 |
How are Cybercriminals Threatening Security? Highlights from the 2015 Internet Security Threat Report |
Don Maclean, David Hoelzer, Robert Myles, CISSP, CISM |
Aug 18, 2015 |
How to Be More Effective and Improve the Success Rates of Your IT Projects |
Jeff Frisk |
Aug 5, 2015 |
Infosec Rock Star: How to be a More Effective Security Professional |
Ted Demopoulos |
Jul 17, 2015 |
SANS 2nd Financial Sector Security Survey |
James Carder, Patrick Bedwell, G. Mark Hardy, Rakesh Shah, Ann Sun |
Jun 23, 2015 |
Visibility, Analytics, & Action: A strategy to address Critical Control 4 - Continuous Vulnerability Assessment & Remediation |
John Pescatore, Michelle Cobb, Sean Keef |
Jun 17, 2015 |
Passing the CISSP |
Dr. Eric Cole |
Jun 2, 2015 |
The Value of Adopting and Improving Security Maturity Models |
Tony Sager , Eric Schou |
May 29, 2015 |
Why Train? |
Lance Spitzner |
May 14, 2015 |
Patient healthcare data is under constant attack: Steps you can take to mitigate the problem |
Christopher Strand, Barbara Filkins |
May 6, 2015 |
The Crazy New World of Cyber Investigations: Law, Ethics, and Evidence |
Ben Wright |
Apr 27, 2015 |
2015 Security Awareness Report Webcast |
Bob Rudis, Lance Spitzner |
Mar 27, 2015 |
Defending against advanced targeted threats with the SANS Critical Controls |
Andrew Avanessian, John Pescatore |
Mar 26, 2015 |
How SANS Critical Security Controls Lead to PCI DSS Quick Wins |
John Pescatore, Chris Strand |
Mar 24, 2015 |
A risk-based approach to identification, impact estimation, and effective remediation of data breaches in web-based applications |
Dr. Eric Cole, Demetrios Lazarikos (Laz) |
Mar 18, 2015 |
SANS Financial Services Cybersecurity Briefing |
|
Mar 6, 2015 |
Critical Controls Security Briefing |
|
Mar 4, 2015 |
Mapping Next-Generation NAC to the Critical Security Controls |
James Tarala, Scott Gordon |
Feb 5, 2015 |
The 20 Critical Controls: A Security Strategy |
Randy Marchany |
Jan 13, 2015 |
Fun with CISSP Questions: "The Absurd, The Drink the Kool-Aid, and The Ugly" |
Ted Demopoulos |
Jan 12, 2015 |
A Managed Approach to Security Controls to Ensure Effective Security |
Kevin Landt |
Dec 12, 2014 |
SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 2 |
Barbara Filkins, Nicholai Piagentini, Jay Schulman, Jonathan Trull |
Dec 11, 2014 |
SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 1 |
Barbara Filkins, Paul Crutchfield, Elias Manousos, Rajiv Raghunarayan, JD Sherry |
Dec 9, 2014 |
Top 10 1/2 Things That Can Undermine Your Security Program |
Jerry Hoff, Johannes Ullrich, PhD, Gabe Gumbs |
Nov 19, 2014 |
Measuring Human Risk: What is Your Organization's Security Score? |
|
Oct 16, 2014 |
2nd Annual Analytics and Intelligence Survey - Pt 2. Future State: Improving Intelligence and Threat Protection |
Dave Shackleford, Colby DeRodeff, Seth Goldhammer, Nicholas J. Percoco |
Oct 14, 2014 |
Securing The Human in EMEA - Next Generation Awareness Programs |
Lance Spitzner |
Oct 8, 2014 |
The Critical Security Controls: From Adoption to Implementation A SANS Survey |
Tony Sager (moderator), James Tarala, Brian Mehlman, Barbara G. Kay, Katherine Brocklehurst, Wolfgang Kandek |
Sep 9, 2014 |
Cyber Security Metrics and Measuring Vulnerability |
Chandler Comerford, Peter Hannay, Dr. Andrew Woodward |
Aug 12, 2014 |
Security Awareness Webcast - Hosted by Lance Spitzner |
|
Aug 11, 2014 |
The Modern Incident Responder: Detect, Respond and Recover from a Data Breach |
Jeffrey (J.J.) Guy |
Jul 29, 2014 |
SANS Securing The Human for Healthcare |
James Tarala |
Jul 10, 2014 |
Health Care Data for Sale: Now What? |
Isabelle Dumont, Greg Porter |
Jun 23, 2014 |
SANS 2014 Salary Survey: The State of Security Professionals Today |
Arabella Hallawell, Barbara Filkins, John Pescatore |
May 8, 2014 |
Why Train? |
Lance Spitzner |
May 2, 2014 |
The 2014 Security Trends Forecast: What Does 2014 Hold for Security and Its Impact on Business Professionals? |
CP Morey, John Pescatore |
Apr 22, 2014 |
What Your CISO Wants |
Frank Kim |
Apr 10, 2014 |
Risks, Threats and Preparedness: Part I of the SANS Financial Services Survey |
G. Mark Hardy, Scott Gordon, Ed Dembowski, Jack Daniel, John Pescatore |
Mar 26, 2014 |
SANS Financial Services Cyber Security Trends and Challenges Briefing |
John Pescatore |
Mar 7, 2014 |
Exposing Malicious Threats to Health Care IT |
Jeff Harrell, Barbara Filkins |
Mar 6, 2014 |
The Critical Security Controls and the StealthWatch System |
Charles Herring, John Pescatore |
Feb 20, 2014 |
3 Tips to Fund Your Security Initiatives by Leveraging Business Objectives |
Katherine Lam, Michi Kossowsky |
Jan 31, 2014 |
Overcoming Barriers to Making Cyber Security Advances |
Brian Mehlman, John Pescatore |
Jan 21, 2014 |