Last Chance for a MacBook Air or $650 Off with SANS Online Training - Ends August 3


Help SANS determine how organizations conduct continuous vulnerability assessment and remediation related to the CIS Critical Security Controls. Take the survey HERE:

Next Webcast

By now you have heard about the Pokémon Go craze, the game that gets you outside and combines the physical world with the virtual world (called... Read More

SANS Information Security Webcasts are live web broadcasts combining knowledgeable speakers with presentation slides. SANS offers several types of webcasts designed to provide valuable information and enhance your security education.

  • Ask The Expert Webcasts: SANS Experts bring current and timely information on relevant topics in IT Security. ATE webcasts are the go-to online format to obtain actionable information to help you in your security goals.
  • Analyst Webcasts: A follow-on to the SANS Analyst Program, Analyst webcasts provide key information from our whitepapers and surveys.
  • WhatWorks Webcasts: The SANS WhatWorks webcasts bring powerful customer experiences showing how end users resolved specific IT Security issues. These webcasts feature actual customers telling their story and what product worked for them to resolve their issue.
  • Tool Talks: These special webcasts offer an opportunity for you to hear from Information Security Vendors. Tool Talks are designed to give you a solid understanding of a problem, and how a vendor's commercial tool can be used to solve or mitigate that problem.
  • HOT TOPICS! Webcast Series: This webcast series, featuring SANS experts, provides viewers with insight to trending hot topics in the security industry.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.

Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Jul 29, 2016Pokémon Go - What To Tell EmployeesLance Spitzner, Jennifer Miller, Thomas McHahon
Aug 2, 2016Demystifying Cyber Attacks on ICS: How They Work and How to Use Engineered and Cyber Layer of ProtectionsBryan L. Singer, CISSP, CAP
Aug 5, 2016Designing and Building a SOC: Management FundamentalsChristopher Crowley
Aug 9, 2016 A Sneak Peek at Pokémon Go Forensic ArtifactsCindy Murphy
Aug 10, 2016Running a Better Red Team Through Understanding ICS/SCADA Adversary TacticsRobert M. Lee
View all Upcoming Webcasts