2 Days Left to Save $400 on SANS Security East 2016

Webcasts: Archive

Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.
Date Title Sponsor Speaker
Dec 14, 2011ISC WebcastJohannes Ullrich, PhD
Dec 13, 2011SANS360: Digital Forensics and Incident Response Lightning Talk Live Webcast!Jesse Kornblum, Ovie Carroll, Harlan Carvey, Jeff Hamm, Christopher Porter, Chris Taylor, Mary Horvath, Jon Stewart, Mike Cloppert, Jerod Alexander
Dec 12, 2011"Your Pad or Mine?" Enabling Personal and Mobile Device Use On the NetworkMark S. Kadrich, Shibu Pillai, Justin Webb, Scott Gordon
Dec 6, 2011The Spy in my Pocket: A View to a Kill - Attacks on Mobile Devices and UsersKevin Johnson, Chris Cuevas, Tony DeLaGrange
Dec 5, 2011Tools to Manage Security and Maximize Effectiveness: Worldwide Retailer Boosts Privacy with Security IntelligenceAlan Paller
Dec 2, 2011Critical Control System Vulnerabilities Demonstrated - And What to Do About ThemMatthew E. Luallen, Eric D. Knapp
Nov 22, 2011Secure Development and Test Environments with Oracle Data MaskingJagan Athreya
Nov 22, 2011Information Security for SME's with Jim HerbeckJim Herbeck
Nov 17, 2011An Introduction to the Hex Factor Challenge at SANS London 2011 With Pieter Danhieux and the Hex Factor TeamPieter Danhieux
Nov 15, 2011Who Do You Trust? SSL and TLS Under Attack with Eric ConradEric Conrad
Nov 10, 2011Java EE Web Security By ExampleFrank Kim
Nov 9, 2011ISC WebcastJohannes Ullrich, PhD
Nov 8, 2011An Introduction to the Hex Factor Challenge at SANS London 2011 With Pieter Danhieux, Koen Van Belrendonck and Erik Van Buggenhout
Nov 1, 2011Scapy, Packets, Fun: IPv4 and other dead protocols with Johannes Ullrich PhDJohannes Ullrich, PhD
Oct 26, 2011HTCIA and COINS are pleased to present "Super Timeline Analysis"Rob Lee
Oct 26, 2011Mobile Application Security with iOSJeremy Allen
Oct 18, 2011The Intersection of Cool Mobility and Corporate Protection: Practical Steps for Assessing the Security of Mobile Devices with James TaralaJames Tarala
Oct 17, 2011Module 1, Networking Part 3
Oct 13, 2011Module 1, Networking Part 2
Oct 13, 2011How Attackers Exploit Modern, Secure Wireless NetworksJoshua Wright, Jesse Frankel
Oct 12, 2011ISC WebcastJohannes Ullrich, PhD
Oct 11, 2011Module 1, Networking Part 1
Oct 11, 2011Attacking the Human: A Look at Client and Customer-side Attack Vectors with Stephen SimsStephen Sims
Oct 6, 2011Simplified Firewall Management: It's time to migrate to next-generation firewalls-and it's easier than you thinkChris King, Michelle Cobb
Oct 5, 2011Qatar Onsite exam refresher
Oct 4, 2011Defending Against APT: IT Audit Techniques In Action with David HoelzerDavid Hoelzer
Sep 29, 2011Network Forensics - A Critical Component in Digital Forensic InvestigationsPaul A. Henry
Sep 28, 2011Why Our Defenses Are Failing Us. One Click Is All It Takes... An Exclusive Live Webcast For The Attacks And Vulnerabilities Technical Track at GovWare 2011, Day 3Bryce Galbraith
Sep 28, 2011Protecting Federal Systems from Persistent, Layered ThreatsG. Mark Hardy, Jonathan George
Sep 27, 2011SANS NetWars Presentation with Ed Skoudis
Sep 21, 2011SANS Security 660 Series: Return-Oriented Programming and Exploitation
Sep 16, 2011The 20 Critical Controls and The Australian Top 4: Effective Utilization to Improve SecurityAlan Paller, Eric Cole, PhD.
Sep 15, 20115 Massive Web Security Breaches - the Companies, Vulnerabilities, Attacks and Fallout EffectsScott Bradley, Rudra Kamal Sinha Roy
Sep 14, 2011ISC WebcastJohannes Ullrich, PhD
Sep 7, 2011Network Forensics - A Critical Component in Digital Forensic InvestigationsPaul A. Henry
Aug 31, 2011Leveraging SSL to Battle Emerging Security ThreatsDave Shackleford, Ryan White
Aug 23, 2011Cloudy With a Chance of Better Healthcare: Security and Compliance Fundamentals for Healthcare Data in the CloudBarbara Filkins, Ryan Kalember, Julie Smith
Aug 17, 2011Keys to Making Sure You Get a Seat at the TableMichele Guel
Aug 16, 2011Optimized Network Monitoring for Real-World ThreatsDave Shackleford, Tony Zirnoon
Aug 10, 2011ISC WebcastJohannes Ullrich, PhD
Aug 3, 2011Baking Security into Applications and Networks: A Roadmap for Improving Your Enterprise Security PresenceMichele Guel
Aug 2, 2011IBM: Social Media: A Security and Privacy PerspectiveMarne E. Gordan
Jul 27, 2011Outwit sophisticated attacks before they strike - don't be the next cyber casualtyMichelle Cobb
Jul 26, 2011Guidance for PCI compliance of the virtualized datacenterKurt Roemer, Hemma Prafullchandra, Mark Weiner, Philip Cox
Jul 26, 2011How to Avoid Being Compromised?Eric Cole, PhD.
Jul 21, 2011WhatWorks in Blocking Network-based Attacks: Automating Network Access, Endpoint Compliance and Threat Management ControlsAlan Paller, Waqas Akkawi
Jul 15, 2011Cyber Quests Challenge Development
Jul 14, 2011Protecting Access and Data: A Review of DigitalPersona Pro Version 5.1Jim Hietala, Tom Grissinger
Jul 13, 2011ISC WebcastJohannes Ullrich, PhD
Jun 30, 2011Practical Use of the Next-Generation Firewall to Control Advanced MalwareWade Williamson
Jun 29, 2011Securing The Human
Jun 16, 2011The Rise of Web Malware: The Impact for Your Website, Social Media, and Ad Networks and How You Can Protect Your BusinessNeil Daswani
Jun 8, 2011ISC WebcastJohannes Ullrich, PhD
Jun 6, 2011It's Time to Rethink Everything: A Governance, Risk, & Compliance (GRC) PrimerJames Tarala
May 25, 2011Moving Past the Hype: SIEM Best Practices for Daily Security OperationsJeremy Conway, Eric D. Knapp
May 24, 2011Security of Applications: It Takes a Village Featuring Dave Shackleford and Brad ArkinDave Shackleford, Brad Arkin
May 23, 2011Auditing Routers: Lurking Risks, Hidden HorrorsDavid Hoelzer
May 19, 2011Application Whitelisting Stops Stuxnet, APTs, and the Common Cold! (Time for a Reality Check)John Strand, Daniel Teal
May 17, 2011Continuous Monitoring: What it is, Why it's needed, and How to Use itSteve Johnston
May 13, 2011XSS and XSRF: Combining Flaws to Own the WorldKevin Johnson
May 11, 2011ISC WebcastJohannes Ullrich, PhD
May 4, 2011Balancing Strong Authentication and Context-aware SecurityMark Karlstrand
Apr 29, 2011Digital Forensic Challenges: A Law Enforcement PerspectiveChristopher G. Kollmann
Apr 28, 2011Transparent Data Encryption for Oracle DatabasesRoxana Bradescu
Apr 26, 2011SANS 7th Annual Log Management Survey Part II: Users Want Better Log Data and More of It!Andy Morris, Mark Seward
Apr 26, 2011Evolving VoIP Threats with Paul HenryPaul A. Henry
Apr 25, 2011SANS 7th Annual Log Management Survey, Part I: More Logs, More UsesPaul Carman, Dave Shackleford
Apr 20, 2011AISA Forensic Interest Group: Windows 7 Digital Forensic Investigations WebcastRob Lee
Apr 19, 2011Extensible Role-based Access Controls (XRBAC)J. Michael Butler, Dave Shackleford, Tommy Magnusson
Apr 19, 2011iPhone Insecurity: 2011 UpdateJim Herbeck
Apr 15, 2011Roadmap to Achieving Cloud Security and Leveraging Web Application Security in the CloudDave Shackleford, Mandeep Khera
Apr 14, 2011Addressing the 20 Critical Security Controls with SIEMJames Tarala, Ansh Patnaik
Apr 13, 2011April Threat Update
Apr 13, 2011April Threat Update
Apr 13, 2011ISC WebcastJohannes Ullrich, PhD
Apr 12, 2011System Load Test
Apr 12, 2011A Taste of SANS Security 660 - Network Attacks and ManipulationStephen Sims
Apr 8, 2011vLive! - Debugging Unix Systems using SELinux toolsRik Farrow
Apr 7, 2011Improve firewall security odds: Prevent misconfigurations and compliance concerns by automating firewall auditsMichelle Cobb
Apr 5, 2011Evolving VoIP ThreatsPaul A. Henry
Mar 29, 2011Windows 7 Digital Forensic InvestigationsJess Garcia
Mar 24, 2011Web 2.0 Security: Same old but differentJohannes Ullrich, PhD, Eric Crutchlow
Mar 23, 2011Managing Insiders (Contractors, Vendors, and Employees) in SCADA EnvironmentsMatthew E. Luallen, Jonathan Pollet, Ansh Patnaik, Walter Sikora, Lior Frenkel
Mar 22, 2011Guidance for PCI compliance of the virtualized datacenter.Kurt Roemer, Hemma Prafullchandra
Mar 18, 2011Legal Practices and Expectations for Data Security and Investigations
Mar 15, 2011A Taste of SANS Security 660 - Exploit-Writing in a Modern World (Part III of III)Stephen Sims
Mar 8, 2011ISC WebcastJohannes Ullrich, PhD, Marc Maiffret
Mar 3, 2011Oracle Database Firewall: Your First Line of DefenseRoxana Bradescu
Mar 2, 2011Internal Investigation Best Practices: How Automated Analysis Streamlines Digital InvestigationsMatthew Nelson, Teddy Cha
Mar 1, 2011Bullseye on the Back: Adobe's Product Security ProgramDave Shackleford, Brad Arkin
Feb 25, 2011The Human Sensor ProjectJohn Strand
Feb 24, 2011Continuous Monitoring: NOT Harder Than It LooksSteve Johnston
Feb 23, 2011How to Avoid Being Compromised? Featuring Dr. Eric ColeDr. Eric Cole
Feb 15, 2011A Taste of SANS Security 660 - Network Access, Manipulation and Exploitation (Oh My!) (Part II of III)Joshua Wright
Feb 11, 2011Proactive Compliance for new PCI-DSS 2.0Anton Chuvakin, Mel Shakir
Feb 9, 2011ISC WebcastJohannes Ullrich, PhD
Feb 3, 2011Improve firewall security odds: Prevent misconfigurations and compliance concerns by automating firewall audits.Michelle Cobb, David Witkowski
Feb 2, 2011Pre-flight Checklists & Seatbelts for Your Applications Trip to the CloudChris Wysopal
Feb 1, 2011Remote Administration and Security ComplianceKent Madsen
Jan 31, 2011From Exposure to Closure - The life and times of an exploitable Vulnerability An Industrial Control Systems ViewMark Weatherford, Tim E Roxey
Jan 28, 2011Ninja Developers: Penetration Testing and Your SDLCKevin Johnson
Jan 27, 2011A Real-Time Approach to Continuous MonitoringJames Tarala, Eddie Schwartz, Mark Seward, David Rice
Jan 25, 2011Oracle Database Vault: Increasing Application and Data SecurityRoxana Bradescu
Jan 24, 2011SCADA APAC Summit: Advanced Methodologies for Whitebox and Blackbox testing of Critical EnvironmentsJonathan Pollet, Joe Cummins, PCIP
Jan 19, 2011Extranet Security: 5 Steps to a Comprehensive Strategy
Jan 19, 2011Why Your End Users Are Your Weakest Link Bryce Galbraith
Jan 18, 2011A Taste of SANS Security 660 - Advanced Penetration Testing, Exploits, and Ethical Hacking (Part I of III)Bryce Galbraith
Jan 17, 2011Quick Wins for Effective System & Network SecurityDavid Hoelzer
Jan 13, 2011A Primer to AJAX SecurityJohannes Ullrich, PhD
Jan 12, 2011ISC WebcastJohannes Ullrich, PhD
Jan 11, 2011Beyond AV: Total Endpoint Security For Multi-Regulatory Compliance and Better Security (This webcast is a re-release of a previously aired webcast)Kimber Spradlin
Jan 7, 2011Emerging Threats: Advanced Persistent Threats (APT) and How they Impact SCADA: APT Disection, Detection, Remediation, and RecoveryJonathan Pollet, Joe Cummins, PCIP

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, email sales@sans.org for more information.