2 Days Left to Save $200 on SANS Seattle 2015

Webcasts: Archive

Date Title Sponsor Type
Dec 27, 2010Anatomy of the Advanced Persistent Threat (This webcast is a re-release of a previously aired webcast)Tool Talk Webcast
Dec 21, 2010The Virtualization Movement: Trends and Risks in Virtualization System Security and How to Prepare EffectivelyTool Talk Webcast
Dec 20, 2010Securing Services at the Network Edge - Combining Security Enforcement and GovernanceTool Talk Webcast
Dec 17, 2010CDI2010 - Security 580: Metasploit Kung Fu for Enterprise Pen TestingSpecial Webcast
Dec 17, 2010CDI2010 - Security 577: Virtualization Security FundamentalsSpecial Webcast
Dec 16, 2010Countdown to Compliance: Building Blocks for a PCI/PA DSSTool Talk Webcast
Dec 15, 2010Detect Data Loss and Fraud with Application Monitoring and SIEMTool Talk Webcast
Dec 14, 2010LIVE WEBCAST DIRECT FROM SANS Cyber Defense Initiative 2010! Core Security Lunch & Learn Presentation Efficient Vulnerability Management with Penetration TestingSpecial Webcast
Dec 13, 2010Continuous Vulnerability Testing and Remediation: The 20 Critical Security Controls PerspectiveWednesday Webcast
Dec 13, 2010Scared Straight: A Real-World Web App Attack and How to Prevent ItSpecial Webcast
Dec 12, 2010Knock, Knock! How Attackers Use Social Engineering to Bypass Your DefensesWednesday Webcast
Dec 11, 2010Indicators of Compromise: ABCs of IOCsWednesday Webcast
Dec 10, 2010Securing the HumanWednesday Webcast
Dec 10, 2010Beyond AV: Total Endpoint Security For Multi-Regulatory Compliance and Better SecurityTool Talk Webcast
Dec 9, 20107 Things You Didn't Know You Could Do With SIEM: Demonstrating How Organizations are Moving from SIEM to Security IntelligenceTool Talk Webcast
Dec 8, 2010Internet Storm Center UpdateISC Threat Update
Dec 7, 2010Taming the Social Network BeastAnalyst Webcast
Dec 2, 2010Endpoint Security: Stopping Stuxnet and other Blended Threats in the Real WorldTool Talk Webcast
Nov 26, 2010Special Webcast: What's Old is (Virtually) New: Secure virtual environments with established security practices and virtual-specific solutions (This webcast is a re-release of a previously aired webcast)Wednesday Webcast
Nov 17, 2010Breaking Out of Restricted Windows DesktopsSpecial Webcast
Nov 16, 2010PCI 2.0: What's new? What's important? What's missing?Special Webcast
Nov 16, 2010Social Engineering with Frame ControlSpecial Webcast
Nov 12, 2010Advanced Warning - Network Early Warning Systems Part IIWhatWorks Summit Series Webcast
Nov 10, 2010ISC Threat Update
Nov 8, 2010What every Network Forensics Analyst needs to know about IPv6Special Webcast
Nov 4, 2010WhatWorks in Vulnerability Management: Seeking Out Big Bugs in the State of MinnesotaWhatWorks Webcast
Nov 3, 2010Building a Better Bunker: Securing Energy Control Systems Against Terrorists and CyberwarriorsAnalyst Webcast
Nov 2, 2010Microsoft Patch Analysis and ExploitationSpecial Webcast
Nov 2, 2010Browser Exploitation for Fun and ProfitSpecial Webcast
Oct 29, 2010An inside look at StuxnetSpecial Webcast
Oct 28, 2010Firewall Change Management - Don't let one error change everything Special Webcast
Oct 27, 2010Securing Services at the Network Edge - Combining Security Enforcement and GovernanceTool Talk Webcast
Oct 26, 2010WhatWorks in Vulnerability Management: Wrangling Vulnerabilities in the Wild West of WebsitesWhatWorks Webcast
Oct 26, 2010Cyberwar or Business as Usual? - The State of International Cyber Security EffortsSpecial Webcast
Oct 26, 2010Super Timeline AnalysisSpecial Webcast
Oct 21, 2010ISC Threat Update
Oct 21, 2010How to Implement Practical Security with SEC401 - Solutions that WorkSpecial Webcast
Oct 20, 2010Baselines not Barriers: How Cross-Functional IT Baselines can create the Foundation for a Unified Security StrategyAsk The Expert Webcast
Oct 19, 2010Building a Better Bunker: Securing Energy Control Systems Against Terrorists and CyberwarriorsSpecial Webcast
Oct 19, 2010Pen-Testing a Proprietary Target Special Webcast
Oct 7, 2010Establishing real-time continuous visibility and control over all of your network endpoints in daysSpecial Webcast
Oct 5, 2010Magic Numbers: An In-depth guide to the five key metrics for application securityTool Talk Webcast
Sep 29, 2010What to Know about Laptop Encryption to Save Yourself from Future HasslesAsk The Expert Webcast
Sep 29, 2010Modern Web Application AttacksWednesday Webcast
Sep 23, 2010IPS in the Real World: Stopping the Latest Threats Without Sacrificing PerformanceSpecial Webcast
Sep 22, 2010The Security Risks and Trends You Must Consider in 2010: Highlights from the IBM X-Force 2010 Mid-Year Trend and Risk ReportTool Talk Webcast
Sep 22, 2010Contextual Encoding is the new Input ValidationWednesday Webcast
Sep 15, 2010ISC Threat Update
Sep 14, 2010Continuous Monitoring: What You Need to KnowAsk The Expert Webcast
Sep 3, 2010Examining the Global Underground of Malicious ActorsSpecial Webcast
Sep 2, 2010Operationalizing Security - Making the top 10 SIEM best practices work; Metrics, Processes and TechnologiesAsk The Expert Webcast
Sep 1, 2010Bad Boys, Bad Boys, Whatcha Gonna DoTool Talk Webcast
Aug 31, 2010Electronic Records Retention PolicySpecial Webcast
Aug 25, 2010The New Requirements for Your Network IPS SolutionsWednesday Webcast
Aug 23, 2010PCI & Encryption: Limiting Legal Exposure & Maintaining ComplianceSpecial Webcast
Aug 12, 2010Detecting Advanced Threats and Malware with SIEMAsk The Expert Webcast
Jul 30, 2010Virtualization and PCI: 5 Things to Know and CheckSpecial Webcast
Jul 28, 2010Predictive Cyber Security-Using Risk Modeling and Attack Simulation to Reduce Network Security Exposures and Avoid Cyber AttacksTool Talk Webcast
Jul 27, 2010The Emergence of Content Aware SIEMSpecial Webcast
Jul 26, 2010How Outsiders become Insider Threats: Client-Side and Content-Focused AttacksAsk The Expert Webcast
Jul 22, 2010Measuring Network Performance, Security and Stability Under Hostile Conditions: SANS Network Security Survey Results Analyst Webcast
Jul 20, 2010Making the Case for SIEMAsk The Expert Webcast
Jul 15, 2010Moving 100 percent into the Cloud...SecurelyWhatWorks Webcast
Jul 14, 2010ISC Threat Update
Jul 13, 2010Hardening your Virtual Linux and Solaris AssetsAsk The Expert Webcast
Jul 8, 2010Live Forensic 4Cast Awards CeremonySpecial Webcast
Jul 8, 2010SANS Forensic Challenge Winners PresentationSpecial Webcast
Jul 7, 2010Sequencing the IT Genome: Agent-less IT Asset Visibility for an Enhanced Security StrategyTool Talk Webcast
Jun 30, 2010A Primer to Compliance and Security in the CloudAnalyst Webcast
Jun 29, 2010Advanced Network Forensics: Finding the Needle in the HaystackAsk The Expert Webcast
Jun 25, 2010A Revolution in Federal Cyber Security: Continuous Automated FISMA Reporting - What's Required By OMB? What Works?Special Webcast
Jun 22, 2010Trust and verify: securing client side code in web services oriented applications.Special Webcast
Jun 17, 2010Web Application Threats: Combining XSS and CSRF to own the world!Ask The Expert Webcast
Jun 17, 2010Reserved for AndyWednesday Webcast
Jun 16, 2010Innovation in Application Security: Application Risk ManagementWednesday Webcast
Jun 15, 2010Industry Analysts Program - A Guide to Virtual Hardening GuidesSpecial Webcast
Jun 9, 2010ISC Threat Update
Jun 8, 2010Identifying Patterns in Events: Reducing Risk and Improving SecurityAsk The Expert Webcast
Jun 4, 2010elm test 2Wednesday Webcast
Jun 4, 2010elm testWednesday Webcast
Jun 3, 2010Report: The State of Software SecurityTool Talk Webcast
Jun 1, 2010WhatWorks in Log Management and Security Information and Event Management: Log Management and SIEM for the Rest of Us (Non-Fortune 100s)WhatWorks Webcast
Jun 1, 2010Prioritizing an Audit Program Using the Consensus Audit Guidelines (CAG)Special Webcast
May 28, 2010Anatomy of the Advanced Persistent Threat - RecordingSpecial Webcast
May 28, 2010Ann's Aurora: The 2010 Digital Forensics and IR Summit Challenge!Special Webcast
May 27, 2010Evolve or Die - Trends in Malware DevelopmentAsk The Expert Webcast
May 27, 2010What's new for security in Windows 7 and Windows Server 2008-R2?Special Webcast
May 26, 2010Introduction to Malware AnalysisSpecial Webcast
May 26, 2010Privileged Users: Compliance Dictates Their Monitoring, Even with Separation of DutiesAnalyst Webcast
May 25, 2010Prioritizing an Audit Program Using the Consensus Audit Guidelines (CAG)Special Webcast
May 24, 2010Operating System Security ... a "Fireside Chat"Tool Talk Webcast
May 20, 2010Improved Database Threat Management with Oracle Audit Vault and ArcSight Enterprise Security ManagerTool Talk Webcast
May 20, 2010Introducing Fuzzing to your Pen-Testing RegimenSpecial Webcast
May 19, 2010Anatomy of the Advanced Persistent ThreatTool Talk Webcast
May 18, 2010iPhone InsecuritySpecial Webcast
May 13, 2010A Revolution in Federal Cyber Security: Continuous Automated FISMA Reporting - What's Required By OMB? What Works?Special Webcast
May 12, 2010ISC Threat Update
May 11, 2010What's New for Security in Windows 7 and Windows Server 2008-R2Special Webcast
May 11, 2010Simplifying Fine-Grained Security for Enterprise Applications with Entitlements ManagementTool Talk Webcast
May 8, 2010Emerging Trends Panel Discussion (SANS Security West 2010)Special Webcast
May 7, 2010The State of Security Architecture Practices TodaySpecial Webcast
May 6, 2010Moving Beyond Archival - Tips and Tricks for Taking the Next Step with Log ManagementAsk The Expert Webcast
Apr 29, 2010The Growing Threat and Impact of Web-Based MalwareAsk The Expert Webcast
Apr 28, 2010Catching Hackers Through Network Log ForensicsAsk The Expert Webcast
Apr 28, 2010Defending Web Applications: Going Back to First PrinciplesSpecial Webcast
Apr 27, 2010Cisco TrustSec Technical OverviewSpecial Webcast
Apr 27, 2010SQL Injection for the Penetration TesterSpecial Webcast
Apr 26, 2010Pen Test & Vuln Assessment Summit Preview: Essential Crypto for Pen Testers: No Math Required!Special Webcast
Apr 21, 2010What's Old is (Virtually) New: Secure virtual environments with established security practices and virtual-specific solutionsSpecial Webcast
Apr 19, 2010Manipulating Web Application InterfacesSpecial Webcast
Apr 14, 2010ISC Threat Update
Apr 13, 2010Application Whitelisting: Stop Tomorrow's Malware TodayAsk The Expert Webcast
Apr 8, 2010SANS Sixth Annual Log Management Survey, Part II: Deriving More Value from More DataAnalyst Webcast
Apr 7, 2010Database Monitoring - Beyond Compliance to Pro-active Information ProtectionSpecial Webcast
Apr 7, 2010Top 7 Trends in Incident Response and Computer Forensics Special Webcast
Apr 6, 2010SANS Sixth Annual Log Management Survey, Part I More Log Data, More UsesAnalyst Webcast
Mar 29, 2010State of the Hack Special Webcast
Mar 25, 2010Automating firewall assessment and audits- Keep your firewalls secure and compliant in a fraction of the time Special Webcast
Mar 24, 2010Social Zombies: Your Friends Want to Eat your BrainsSpecial Webcast
Mar 24, 2010Fighting Back with Computer ForensicsSpecial Webcast
Mar 23, 2010Automated Operating System Lockdown: Security Blanket 4.0 ReviewAnalyst Webcast
Mar 19, 2010Digging Deeper Into The Advanced Persistent ThreatSpecial Webcast
Mar 18, 2010Calculating TCO with Adaptive IPSAnalyst Webcast
Mar 17, 2010Privileged user monitoring - Automating compliance and managing riskAsk The Expert Webcast
Mar 16, 2010Monitoring Administrators Activity in a Virtual EnvironmentTool Talk Webcast
Mar 11, 2010Security Architecture Disasters: And what you can do to avoid them!Special Webcast
Mar 10, 2010ISC Threat Update
Mar 9, 2010Smart Strategies for Securing Extranet AccessAnalyst Webcast
Mar 9, 2010A Peek into Linux Forensic AnalysisSpecial Webcast
Mar 2, 2010The Internet is Evil!! And what you can do about it.Special Webcast
Feb 25, 2010Mobile Application Security: Challenges and OpportunitiesSpecial Webcast
Feb 24, 2010Identifying and Understanding Advanced Persistent ThreatsTool Talk Webcast
Feb 16, 2010Oracle Database Security: A Defense in Depth ApproachAnalyst Webcast
Feb 11, 2010Cybersecurity: Back to the FutureTool Talk Webcast
Feb 10, 2010ISC Threat Update
Feb 9, 2010Prioritizing an Audit Program Using the Consensus Audit Guidelines (CAG)Special Webcast
Feb 3, 2010WhatWorks in Intrusion Prevention and Detection: Tapping Unexpected Benefits of IPS + Next-Gen Firewall at Farm Credit Financial PartnersWhatWorks Webcast
Jan 27, 2010Advanced Methods for Finding Malware Special Webcast
Jan 26, 2010Using Scapy to Test a Snort RuleSpecial Webcast
Jan 26, 2010The Wireless Threat: Introducing Wireless Security Misconceptions, Attacks and VulnerabilitiesSpecial Webcast
Jan 26, 2010Reserved - KatrinaTool Talk Webcast
Jan 22, 2010The Impact of BSI-MM in Software Development ProgramsSpecial Webcast
Jan 20, 2010Memory Analysis for Incident Responders and Forensic AnalystsSpecial Webcast
Jan 18, 2010The Porous Castle: Next Generation Application AttacksSpecial Webcast
Jan 14, 2010Novell Sentinel Log Manager ReviewSpecial Webcast
Jan 13, 2010ISC Threat Update
Jan 12, 2010Federal Desktop Core Configuration (FDCC): What is It? Should Enterprises Adopt It?Tool Talk Webcast

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, email sales@sans.org for more information.