6 Days Left to Save $200 on SANS South Florida 2015

Webcasts: Archive

Date Title Sponsor Speaker
Dec 17, 2009WhatWorks in Blocking Network-Based AttacksAlan Paller
Dec 16, 2009Transparent Data Encryption: New Technologies and Best Practices for Database EncryptionTanya Baccam, Roxana Bradescu
Dec 16, 2009Advanced Man-In-The-Middle Attacks & IDS/IPS/AV Evasion TechniquesBryce Galbraith
Dec 15, 2009Data Leakage Prevention: Laying the GroundworkChris Cronin
Dec 15, 2009What Happened After Conficker?John Strand
Dec 15, 2009SEC564 Security Architecture Threat Update: What Happened After Conficker?John Strand
Dec 14, 2009Encryption Prevents Data BreachesHal Hagan
Dec 11, 2009The Top 5 Fastest ROI Projects Around Identity AssuranceAndrew Hay, Benjamin Cunningham
Dec 10, 2009Best Practice Defense Against Socially Engineered MalwareJohannes Ullrich, Joseph Blankenship
Dec 9, 2009Johannes Ullrich, Michael Yaffe
Dec 8, 2009New Tools on the Bot War FrontJoshua McCarthy
Dec 3, 2009Content-Aware SIEM with Anton ChuvakinAnton Chuvakin
Dec 2, 2009Building Secure Applications: Avoiding the SANS Top 25 Most Dangerous Programming ErrorsChris Wysopal
Nov 24, 2009What is New For Security In Windows 7 and Server 2008-R2 Jason Fossen
Nov 19, 2009Cloud Security 101: Web Application Security Trends & Why It Should Be Top Priority Now!
Nov 19, 2009State of the HackRob Lee
Nov 18, 2009A Day In The Life Of A Configuration Compliance ExceptionKimber Spradlin
Nov 12, 2009Straight Talk with NSS Labs on Evaluating a Network IPSGreg Brown, Vikram Phatak
Nov 11, 2009Johannes Ullrich
Nov 4, 2009Making Database Security an IT Security PriorityTanya Baccam, Roxana Bradescu
Nov 2, 2009 Professional Incident Detection Richard Bejtlich, Ken Bradley
Oct 28, 2009Network Control Meets Endpoint SecuritySandy Hawke, Jack Marsal
Oct 27, 2009Mobile Device Forensics
Oct 27, 2009Protecting a Smarter Grid: Power Utility SecurityMatthew E. Luallen
Oct 26, 2009Achieving Web Application Integrity with WebDefend: Beyond Web Application FirewallsRyan C. Barnett
Oct 22, 2009What is New For Security In Windows 7 and Server 2008-R2Jason Fossen
Oct 22, 2009Application Whitelisting: Explanation and UsesEvelyn de Souza
Oct 21, 2009SANS 2010 Events and Sponsorship Options
Oct 21, 2009Automated Malware Threat Analysis: Getting actionable intelligence on attacks effectively and efficientlyChad Loeven, Brian Jack
Oct 20, 2009 Changing the Way We Manage Vulnerabilities & PatchingEvan Wheeler, Sheldon Malm
Oct 20, 2009SEC 526: Advanced Filesystem RecoveryRob Lee
Oct 14, 2009Internet Storm Center Threat Update Johannes Ullrich
Oct 12, 2009Top 10 Ways to Get the Most Out of Your Log Data
Oct 8, 2009IT Audit for the Virtual EnvironmentJ. Michael Butler, Rob Vandenbrink, Charu Chaubal
Oct 7, 2009What Course Should I Take at SANS London 2009? Question and Answer SessionJohannes Ullrich
Oct 7, 2009Windows Forensic Analysis: Dissecting the Windows RegistryRob Lee
Oct 6, 2009The Best Defense is a Good Offense: Using Correlation to Actively Fend off AttacksJason Arrington
Oct 2, 2009SEC566: 20 Critical Security Controls - In DepthJames Tarala
Oct 1, 2009SEC542: Web Application Penetration Testing & Ethical HackingRaul Siles
Sep 30, 2009Is Your Organization Losing the Cyber-War? Alex Cox
Sep 30, 2009SEC508: Computer Forensics, Investigation & ResponseJess Garcia
Sep 30, 2009NRI Webcast: Pass-the-Hash Attack with MeterpreterBryce Galbraith
Sep 29, 2009What Every Pen Tester Should Know About Web ApplicationsJohannes Ullrich
Sep 29, 2009Identity-Aware Networking Done RightSanthosh Cheeniyil
Sep 29, 2009DEV541: Secure Coding in Java/JEE: Developing Defensible ApplicationsSahba Kazerooni
Sep 28, 2009WhatWorks in Firewalls, Enterprise Antivirus and Unified Threat Management: Virtualizing Server Security with the U.S. Army Human Resource CommandAlan Paller, Cliff Tohtz
Sep 28, 2009COINS: ISSA Members - Memory Analysis for Incident Responders and Forensic AnalystsRob Lee
Sep 25, 2009SEC401: SANS Security Essentials Bootcamp StyleDr. Eric Cole
Sep 24, 2009It All Starts with Log Management: Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve TransparencyMegan McGuire, Sudya Iyer
Sep 24, 2009SEC560: Network Penetration Testing & Ethical HackingJohn Strand
Sep 20, 2009SANS Technology Institute: Fourth Commencement Ceremony
Sep 17, 2009Staying Ahead of the Latest Endpoint Security Threats Featuring highlights from the IBM X-Force 2009 Mid-year Trend and Risk ReportSandy Hawke, Marc Van Zadelhoff
Sep 15, 2009SIEM and DLP - Strength in IntegrationPaul Stamp, Ron Kent
Sep 15, 2009SEC709: Developing Exploits for Penetration Testers and Security Researchers
Sep 14, 2009Stop Cache Poisoning Attacks With DNSSECStephan Lagerholm
Sep 11, 2009WhatWorks in Intrusion Detection and Prevention: Securing Servers for PCI Compliance with The White CompanyAlan Paller, Marc Harper
Sep 10, 2009Mitigating Insider Threats through Proactive Identity Management Jeff Crume, Jim Goddard
Sep 9, 2009Johannes Ullrich, Billy Austin
Sep 8, 2009What is New For Security In Windows 7 and Server 2008-R2Jason Fossen
Sep 2, 2009The Future of SIM and Log Management - Becoming a Part of the Mainstream, IT Operations and Service DeliveryPete Lindstrom - CISSP, Scott Gordon
Aug 27, 2009The 4 Laws of CyberSecurityDavid Rice
Aug 25, 2009Improving your Security Posture: Centralizing Traditional and non-traditional Security DataAlex Raitz
Aug 25, 2009APAC Webcast: Pass-the-Hash Attack with Meterpreter
Aug 21, 2009Exploiting and Defending Wireless ClientsJoshua Wright
Aug 20, 2009AV Migration - Should You Stay or Should You Go?Kimber Spradlin
Aug 18, 2009Top Ten Virtualization Security Mistakes and How to Avoid ThemMichael Berman, Jim Hietala, Lee Legnon
Aug 13, 2009"Three Keys To Understanding and Implementing the Twenty Critical Controls for Improved Security in Federal Agencies"James Tarala, Dr. Eric Cole, Alan Paller
Aug 12, 2009ISC Threat UpdateJohannes Ullrich
Aug 7, 2009Cyber Security in Critical Infrastructure: Responding to Incidents in the 21st CenturyMatthew E. Luallen
Aug 5, 2009Finding the Root Cause of Any Security Alert - FastMatthew Dieckman, Joe Levy
Jul 30, 2009Budget Wireless Assessment using Kismet-Newcore
Jul 29, 2009Six Things you Need to Consider Before Buying a Log Management Tool
Jul 23, 2009HP Tackles Cloud Application SecurityDennis Hurst
Jul 22, 2009SANS INFOSEC Leadership Communications Skills: How to Persuade Other Executives to Implement Security Controls When You Have No Authority Over ThemAlan Paller
Jul 21, 2009Managing Change and Event Monitoring for Sustainable NERC CIP ComplianceMatthew E. Luallen, Michael Leland, Toney Jennings
Jul 15, 2009When You're Holding a Hammer, Everything Looks Like a Nail: Avoiding the Hype and Making Good Technology DecisionsTom Liston
Jul 14, 2009Virtual RoundtableHal Pomeranz, Mike Poor
Jul 14, 2009SANS Atlanta Alumni LunchJohannes Ullrich
Jul 8, 2009Expert Briefing: Mobile Device Forensics Essentials
Jul 8, 2009Johannes Ullrich, Mike Yaffe
Jul 7, 2009Cyber Terrorism: Fact or FictionJohn Pirc
Jun 30, 2009Next-Generation Log Management: Optimized for the Broad Market - Five Distinct Advantages of the QRadar Log Management SolutionJason Corbin, Tom Turner
Jun 25, 2009Blocking the Covert Channels Used for Malicious Data TheftPhillip Lin, Alex Lanstein
Jun 24, 2009GIAC Paper of the Quarter: Mobile Device ForensicsAndrew Martin
Jun 23, 2009Network Forensics: No Hard Drive? No Problem!Jonathan Ham, Sherri Davidoff, Trent Heisler
Jun 19, 2009SANSFIRE 2009: How to be a SANS InstructorEric Conrad
Jun 18, 2009SANSFIRE 2009: Building an Automated Malware Behavioral Analysis Environment using Free and Open-source Tools.Jim Clausing
Jun 18, 2009SANSFIRE 2009: SANSvLive!Launch Party . . . SANS Goes VirtualDr. Eric Cole
Jun 18, 2009SANSFIRE 2009: Developing Cyber Threat IntelligenceAdrien de Beaupré
Jun 18, 2009The Security Implications of Web 2.0Sam Masiello
Jun 17, 2009SANSFIRE 2009: Malwares, Money and Criminal/Terror Activity. The Dangerous Relationship
Jun 17, 2009SANSFIRE 2009: SOA and XML securityMark Hofman
Jun 17, 2009SANSFIRE 2009: GeekonomicsDavid Rice
Jun 17, 2009How to Manage Endpoints in a Distributed, Cloud-based EnvironmentSandy Hawke
Jun 17, 2009InfraGard Security Academy Briefing
Jun 16, 2009SANSFIRE 2009: State of the Internet Panel DiscussionMarcus Sachs, Johannes Ullrich
Jun 16, 2009SANSFIRE 2009: Stimulus-Response Technical Tools for AuditorsTanya Baccam
Jun 15, 2009SANSFIRE 2009: Using passive DNS Data to Track Malicious Activities
Jun 15, 2009SANSFIRE 2009: IOScat - a Port of Netcat's TCP functions to Cisco IOS
Jun 15, 2009SANSFIRE 2009: Protecting Your Secret Sauce: Tips and Techniques in Protecting Your Intellectual PropertyJohn Bambenek
Jun 15, 2009SANSFIRE 2009: The Twenty Critical Security ControlsAlan Paller, Dr. Eric Cole
Jun 14, 2009SANSFIRE 2009: Iowa Floods and Tornados - Losses and IT Lessons Learned - Disaster Recovery and Restoration After the Storms.
Jun 10, 2009Johannes Ullrich
Jun 10, 2009The Three Faces of Cyber Crime.Alan Paller
Jun 9, 2009Fort Detrick - ReviewStephen Northcutt
Jun 9, 2009Novell ZENworks Endpoint Security Management- A Technical DemonstrationPete Green
Jun 8, 2009The Three Faces of Cyber Crime
Jun 8, 2009The Three Faces of Cyber Crime.
Jun 4, 2009Stopping Bad Guys and Satisfying Auditors with Pragmatic Database SecurityRich Mogull, Brian Contos
Jun 3, 2009Enabling a Productive, Mobile Workforce with Endpoint SecurityLaurence Pitt
May 28, 2009Lessons Learned: Understanding the Recent Rash of Security IncidentsTracy Hulver
May 27, 2009WhatWorks in Firewalls, Enterprise Antivirus and Unified Threat Management: Better Firewall Functionality and Cost Savings at HaworthAlan Paller, Chad Clement
May 20, 2009Zero-Day Correlation Part 2, Rule-Building Demonstration Michael Leland
May 20, 2009Common Attack Techniques and Defenses
May 19, 2009Webcast Panel: Essential Incident Response Techniques
May 13, 2009Johannes Ullrich
Apr 30, 2009Columbo Meets Jack Bauer: Detecting Fraud through Correlation AnalysisRick Caccia, Jon Oltsik
Apr 29, 2009Memory Analysis for Incident Responders and Forensic AnalystsRob Lee
Apr 28, 2009SANS SEC709: Custom Exploitation Techniques to Optimize Your Penetration TestingStephen Sims
Apr 23, 2009Virtualization Security 101Todd Ignasiak
Apr 21, 2009"The 20 Coolest Jobs in Information Security"Eric Conrad
Apr 20, 2009Security 504: Hacker Techniques, Exploits & Incident Handling : Preview
Apr 20, 2009Security 508: Computer Forensics, Investigation & Response : Preview
Apr 20, 2009Security 401: SANS Security Essentials Bootcamp Style : Preview
Apr 15, 2009Bridging the Assessment - Remediation GapKimber Spradlin
Apr 8, 2009Internet Storm Center Threat Update Johannes Ullrich, Mike Yaffe
Apr 7, 2009SANS Fifth Annual Log Management Survey Ansh Patnaik, Chima Njaka, Sunil Bhargava
Apr 2, 2009Protecting Essential Cardholder DataChris McKie
Apr 1, 2009Is Log Management the Killer App for Cloud Computing?Randy Rosenbaum, Matthew Harkrider
Mar 26, 2009Zero Day CorrelationMichael Leland
Mar 24, 2009The Pen Testing Perfect Storm Part III: Network Reconstructive SurgeryJoshua Wright
Mar 18, 2009Mid-Market PCI Survival Guide: Strategies for Securing Your Web ApplicationsJustin Searle, Brian Contos
Mar 18, 2009Build Your Own Army of Darkness: XSS Frameworks for Zombies and ProfitSeth Misenar
Mar 17, 2009Building a Business Justification for Data SecurityRich Mogull, Chris Parkerson, Adrian Lane
Mar 12, 2009Federal Desktop Core Configuration (FDCC): What is It? Should Enterprises Adopt It?Sandy Hawke
Mar 11, 2009Johannes Ullrich
Feb 27, 2009test webcast
Feb 24, 2009Pillage the Village: Pilfering & Plundering for better Penetration TestsMike Poor
Feb 19, 2009The New Security Reality: The Need to Look Beyond Log Management and SIEMRaffael Marty
Feb 17, 2009Virtual Roundtable with Ed Skoudis and Surprise Panel
Feb 17, 2009Preview of Security 509 - Securing Oracle
Feb 11, 2009Internet Storm Center Threat Update Johannes Ullrich
Feb 5, 2009Benchmarking SIEMJ. Michael Butler
Feb 4, 2009What can we learn from the web attacks of 2008?Johannes Ullrich, Paul Judge
Jan 21, 2009The Pen Testing Perfect Storm Part II: Anatomy of a Client-Side MutinyJoshua Wright
Jan 20, 2009Log Management Drivers, Requirements, and TrendsAnsh Patnaik
Jan 15, 2009How To Stop New Threats That Target ApplicationsNir Zuk
Jan 14, 200912 Laws of IT Security PowerStephen Northcutt
Jan 14, 2009Internet Storm CenterJohannes Ullrich, Michael Yaffe
Jan 8, 2009Maximizing Your Risk Reduction: Data Leakage Prevention on the NetworkChris Brenton

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, email sales@sans.org for more information.