Get the Skills you need from Home with SANS OnDemand

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
December 20, 2013
1:00pm EST
(18:00:00 UTC)
Performing Incident Response Inside Power SCADA Systems / Realizando Respuesta a Incidentes en Sistemas SCADA de EnergiaManuel Humberto Santander Peláez
December 18, 2013
1:00pm EST
(18:00:00 UTC)
SANS Survey of IT Security in Health Care Part II: About the DataOracleGeoff Schwartz, Barbara Filkins
December 12, 2013
1:00pm EST
(18:00:00 UTC)
FOR572 Network Forensics Preview: DHCP and DNS, 'The Correlators'Philip Hagen
December 10, 2013
8:00pm EST
(01:00:00 UTC)
First Things First The Top 4 Security Mitigation StrategiesPalo Alto NetworksEric Cole, PhD
December 10, 2013
1:00pm EST
(18:00:00 UTC)
SANS Survey Results on BYOD Security Policies and PracticesTrusted Computing Group

GIAC
Courtney Imbert, Lisa Lorenzin, Joshua Wright
December 9, 2013
1:00pm EST
(18:00:00 UTC)
Layered Security: Why It WorksSymantecKat Pelak, Jerry Shenk
December 6, 2013
1:00pm EST
(18:00:00 UTC)
Hunting Attackers with Network Audit TrailsLancopeTom Cross
December 4, 2013
11:00am EST
(16:00:00 UTC)
Safety in Numbers: The Value of Crowd-Sourced Threat IntelligenceAlienVaultJaime Blasco, Dave Shackleford
December 2, 2013
1:00pm EST
(18:00:00 UTC)
Prowling Peer-to-Peer BotnetsCrowdStrike, Inc.George Kurtz
November 25, 2013
1:00pm EST
(18:00:00 UTC)
ICS/SCADA Honeypot Pros & ConsBrent Huston
November 21, 2013
1:00pm EST
(18:00:00 UTC)
How Two Factor Authentication Defends Against User Targeted AttacksDuo SecurityDug Song, John Pescatore
November 20, 2013
1:00pm EST
(18:00:00 UTC)
FedRAMP Update: Secure Government Use of Cloud ServicesJohn Pescatore
November 19, 2013
1:00pm EST
(18:00:00 UTC)
2014 Security PredictionsWebsenseJeff Debrosse
November 15, 2013
1:00pm EST
(18:00:00 UTC)
FOR572 Network Forensics Preview: IT'S ALIVE!!! Investigating with Network-based EvidencePhilip Hagen
November 12, 2013
3:00pm EST
(20:00:00 UTC)
FOR585 Advanced Smartphone and Mobile Device Forensics Preview: Bypassing Locked Smartphones - Are you really locked out?Heather Mahalik
November 11, 2013
1:00pm EST
(18:00:00 UTC)
Managing Threats and Compliance While Automating the CSCs: EiQ SecureVue ReviewEiQnetworksJerry Shenk, Brian Mehlman
November 10, 2013
5:00am EST
(10:00:00 UTC)
SANS Asia-Pacific Series: ICS Attack SurfacesDr. Eric Cole
November 8, 2013
1:00pm EST
(18:00:00 UTC)
Finding Hidden Threats by Decrypting SSL/TLSBlue Coat Systems, Inc.David Wells, J. Michael Butler
November 7, 2013
12:00pm EST
(17:00:00 UTC)
"Reading the Security Tea Leaves" - The Story from 50 million VulnerabilitiesWhiteHat SecurityEd Bellis, Matt Johansen
November 6, 2013
8:00am EST
(13:00:00 UTC)
SANS DHS CDM Award WorkshopForescout Technologies BV

Knowledge Consulting Group, Inc.

IBM

Tripwire, Inc.

Lumeta Corp.

Symantec

Qualys
Tony Sager, John Pescatore
November 5, 2013
1:00pm EST
(18:00:00 UTC)
Enhancing Security Analytics with Endpoint ForensicsGuidance SoftwareJason Fredrickson, John Pescatore
November 1, 2013
1:00pm EDT
(17:00:00 UTC)
PCI DSS Simplified: What You Need to KnowAlienVaultSandy Hawke
October 30, 2013
1:00pm EDT
(17:00:00 UTC)
The SANS Survey of IT Security in Health CareOracle

Redspin

Tenable

Trend Micro Inc.
Pete Angstadt, JD Sherry, David Schreiber, Daniel Berger, Barbara Filkins
October 29, 2013
1:00pm EDT
(17:00:00 UTC)
Analyst Webcast: Not your Father's IPS: SANS Survey on Network Security ResultsHP Martha Aviles, Rob Vandenbrink
October 28, 2013
11:00am EDT
(15:00:00 UTC)
Web Application Security by ExampleFrank Kim
October 27, 2013
4:00pm EDT
(20:00:00 UTC)
Iowa Counties Paying IT ForwardAlan Paller
October 24, 2013
1:00pm EDT
(17:00:00 UTC)
Dumping in the Dark: Gaining Insight into your Memory Acquisition Tools and TechniquesAlissa Torres
October 23, 2013
1:00pm EDT
(17:00:00 UTC)
Identify & Eliminate Targeted Attack Activity with CrowdStrike Falcon Host Endpoint Activity Monitoring, Threat DetectionCrowdStrike, Inc.Dmitri Alperovitch
October 18, 2013
1:00pm EDT
(17:00:00 UTC)
Six Steps to SIEM SuccessAlienVaultTom D'Aquino, Sandy Hawke
October 17, 2013
1:00pm EDT
(17:00:00 UTC)
Utilizing Real-Time Analytics for Rapid Threat Detection and Increased Intelligence CapabilitiesBlue Coat Systems, Inc.John Vecchi, Dave Shackleford
October 16, 2013
1:00pm EDT
(17:00:00 UTC)
Take Control! 7 Steps to Prioritize Your Security ProgramRapid7 Inc.Matt Hathaway, John Pescatore
October 15, 2013
2:00am EDT
(06:00:00 UTC)
Absence of the Normal, Presence of the Abnormal
October 10, 2013
6:53pm EDT
(22:53:00 UTC)
First Things First The Top 4 Security Mitigation Strategies
October 10, 2013
1:00pm EDT
(17:00:00 UTC)
Securing Web Applications Made Simple and ScalableHP Gregory Leonard, Mark Painter, Stephen Sims
October 8, 2013
1:00pm EDT
(17:00:00 UTC)
Correlating Real-Time Event Data with SIEM for Forensics and Incident HandlingMcafee LLCJacob Williams, Bret Lenmark
October 7, 2013
9:00pm EDT
(01:00:00 UTC)
Finding Unknown MalwareAISAHal Pomeranz
October 4, 2013
1:00pm EDT
(17:00:00 UTC)
John Pescatore Analyst Webcast - Actionable Tools for Convincing Management to Fund Application Security WhiteHat SecurityJohn Pescatore, Jeremiah Grossman
October 3, 2013
1:00pm EDT
(17:00:00 UTC)
SANS Analytics and Intelligence Survey Results Part II: Tools and TechniquesLogRhythm

Hexis Cyber Solutions

HP

Guidance Software

SolarWinds
Katherine Lam, Nicole Pauls, Mike Reagan, Dave Shackleford
October 2, 2013
1:00pm EDT
(17:00:00 UTC)
Prioritizing Security ResourcesEric Cornelius
October 1, 2013
1:00pm EDT
(17:00:00 UTC)
SANS Analytics and Intelligence Survey Results Part I: The Risk LandscapeLogRhythm

Hexis Cyber Solutions

HP

Guidance Software

SolarWinds
Richard Park, Alfred Chung, Dave Shackleford
September 30, 2013
1:00pm EDT
(17:00:00 UTC)
Introduction to Behavioral Analysis of Malicious SoftwareLenny Zeltser
September 27, 2013
1:00pm EDT
(17:00:00 UTC)
Hacking Exposed Live Webcast Series: TOR ALL THE THINGSCrowdStrike, Inc.Jason Geffner, George Kurtz
September 26, 2013
1:00pm EDT
(17:00:00 UTC)
Testing Next Gen FirewallsFortinet, Inc.

Ixia
Phil Trainor, Patrick Bedwell, Eric Cole, PhD
September 17, 2013
9:45pm EDT
(01:45:00 UTC)
Have No Fear - DFIR Is Here!Lenny Zeltser , Chad Tilbury, Rob Lee
September 17, 2013
3:30pm EDT
(19:30:00 UTC)
How to Become a Certified SANS Instructor
September 16, 2013
9:00am EDT
(13:00:00 UTC)
Forensic Update: Whats New and Whats NextJess Garcia
September 10, 2013
7:30pm EDT
(23:30:00 UTC)
Applying the 32 Zombieland Rules to IT Security
September 10, 2013
1:00pm EDT
(17:00:00 UTC)
Under Pressure: Scaling Analytics to Meet Real-Time ThreatsLogRhythmDave Shackleford
September 9, 2013
10:00am EDT
(14:00:00 UTC)
Using the DHS Continuous Diagnostics and Mitigation Contract to Make Real Security AdvancesTony Sager, John Pescatore
September 5, 2013
12:30pm EDT
(16:30:00 UTC)
How to Fight the Real DDoS ThreatArbor NetworksRakesh Shah, John Pescatore
September 3, 2013
1:30pm EDT
(17:30:00 UTC)
Putting your security assessment budget on a leash while avoiding the Pentest Puppy MillJohn Strand, Paul Asadoorian
August 23, 2013
1:00pm EDT
(17:00:00 UTC)
Preparing for Effective Threat Detection and ResponseAlienVaultRussell Spitler, Dave Shackleford
August 22, 2013
1:00pm EDT
(17:00:00 UTC)
Essential Tools for Testing and Securing a Mobile Applications PortfolioHP Daniel Miessler
August 21, 2013
1:00pm EDT
(17:00:00 UTC)
Managing Identities in the Cloud Without Sacrificing Corporate Control: A Review of McAfeeMcafee LLCGraham Clarke, Dave Shackleford
August 9, 2013
1:00pm EDT
(17:00:00 UTC)
Security Visibility in Under An Hour with AlienVault USMAlienVaultChristopher Melie
August 6, 2013
1:00pm EDT
(17:00:00 UTC)
WhatWorks in Detecting and Blocking Advanced Threats at a Large Research OrganizationFireEyeJohn Pescatore
July 24, 2013
1:00pm EDT
(17:00:00 UTC)
Hacking Exposed Live Webcast SeriesCrowdStrike, Inc.Adam Meyers, George Kurtz
July 18, 2013
1:00pm EDT
(17:00:00 UTC)
Digital Forensics in Modern Times: A SANS SurveyCarbon Black

Cellebrite

FireEye
Ken Mizota, Rudolph Araujo, Buddy Tidwell, Ilana Goddess, Paul A. Henry, Ben Wright
July 16, 2013
1:00pm EDT
(17:00:00 UTC)
Securing Help Desks: A SANS SurveyRSAJeff Carpenter, Barbara Filkins
July 12, 2013
1:00pm EDT
(17:00:00 UTC)
APT: The threat is real, well funded, and coming for your dataGuidance Software
July 10, 2013
1:00pm EDT
(17:00:00 UTC)
Network and Endpoint Security "Get Hitched" for Better Visibility and ResponseCarbon BlackMichael Bilancieri, Jerry Shenk
July 8, 2013
1:00pm EDT
(17:00:00 UTC)
Architecting a Flexible Strategy for Securing Enterprise and Personal Mobile Devices (BYOD)Forescout Technologies BVScott Gordon, Phil Hochmuth
June 25, 2013
1:00pm EDT
(17:00:00 UTC)
Critical Security Controls SurveyFireEye

Symantec

Tenable
Tony Sager, Anil Nandigam, Kevin Skapinetz, John Bordwine, Ron Gula, John Pescatore
June 19, 2013
1:00pm EDT
(17:00:00 UTC)
Cast a Wider Net: Network-Based Approach to APTsFidelis Cybersecurity Kurt Bertone, John Pescatore
June 19, 2013
12:30pm EDT
(16:30:00 UTC)
What Matters in Your Chatter?IBMWestley McDuffie
June 18, 2013
1:00pm EDT
(17:00:00 UTC)
Implementing Hardware Roots of TrustTrusted Computing GroupStacy Cannady, Chris Hallum, John Pescatore, Gal Shpantzer
June 10, 2013
5:30pm EDT
(21:30:00 UTC)
SANS Industrial Control Systems Security Briefing - Live from Houston, TXWaterfall Security

Codenomicon
June 7, 2013
1:00pm EDT
(17:00:00 UTC)
Meeting the Need for Speed (and Resiliency) in Security Management SystemsMcafee LLCBret Lenmark, J. Michael Butler
June 6, 2013
1:00pm EDT
(17:00:00 UTC)
Mobile Application Security Survey ResultsBox

Veracode

SAP Global Marketing
Alex Pozin, Chris Wysopal, James Jardine, Adam Stein, Kevin Johnson
June 5, 2013
1:00pm EDT
(17:00:00 UTC)
WhatWorks in Intrusion Prevention and Detection: Innovating and Evolving at a Managed Security Services ProviderFortinet, Inc.John Pescatore
May 30, 2013
1:00pm EDT
(17:00:00 UTC)
Why Defense, Why Now?Tripwire, Inc.Eric Cole, PhD
May 24, 2013
1:00pm EDT
(17:00:00 UTC)
The Intractable Problem of Software SecurityVeracodeChris Wysopal
May 23, 2013
1:00pm EDT
(17:00:00 UTC)
20 Critical Security ControlsBeyondTrustRandy Marchany
May 22, 2013
1:00pm EDT
(17:00:00 UTC)
Advanced Intelligence in Action: Review of McAfee Enterprise Security Manager 9.2Mcafee LLCDave Shackleford
May 22, 2013
4:00am EDT
(08:00:00 UTC)
The Secrets of Exploiting Local and Remote File InclusionRSA ConferenceJustin Searle
May 21, 2013
1:00pm EDT
(17:00:00 UTC)
Delivering Situational Awareness - Putting Continuous Monitoring and the Critical Security Controls to WorkEiQnetworksJohn Pescatore, Brian Mehlman
May 20, 2013
1:00pm EDT
(17:00:00 UTC)
Best Practices for Leveraging Security Threat IntelligenceAlienVaultRussell Spitler, Dave Shackleford
May 1, 2013
1:00pm EDT
(17:00:00 UTC)
Datacenter Virtualization from a Security PerspectiveMcafee LLCDave Shackleford, Greg Brown
May 1, 2013
11:30am EDT
(15:30:00 UTC)
Understanding Control System Cyber SecurityCodenomicon
April 30, 2013
1:00pm EDT
(17:00:00 UTC)
Stop 64 Percent More Malware TodaySymantecJohn Harrison, Kari Ann Christensen
April 30, 2013
4:00am EDT
(08:00:00 UTC)
The Secrets of Exploiting Local and Remote File InclusionRSA ConferenceJustin Searle
April 5, 2013
1:00pm EDT
(17:00:00 UTC)
Continuous Monitoring: Ready for Prime Time or Still Just HypeFireEye

Forescout Technologies BV

Tripwire, Inc.
John Pescatore
April 3, 2013
1:00pm EDT
(17:00:00 UTC)
NAC Applied to the Critical Security ControlsForescout Technologies BVScott Gordon, Brian Meyer, G. Mark Hardy
March 26, 2013
1:00pm EDT
(17:00:00 UTC)
Secure Configuration in Action (and How to Apply It)Tripwire, Inc.Logan Kleier, Jim D. Hietala, Michael Thelander
February 26, 2013
1:00pm EST
(18:00:00 UTC)
Mobile Evidence in Modern E-Discovery: Risks, Techniques and OpportunitiesCellebriteYuval Ben-Moshe, Ben Wright, Paul A. Henry
February 20, 2013
1:00pm EST
(18:00:00 UTC)
Results of the SANS SCADA Security SurveyABB

Industrial Defender

Splunk
Markus Braendle, Walter Sikora, Mark Seward, Matthew E. Luallen
February 19, 2013
4:00pm EST
(21:00:00 UTC)
Java Web Security By ExampleCoverity, Inc.Andy Chou, Frank Kim
February 6, 2013
1:00pm EST
(18:00:00 UTC)
The Hidden Risk of Component Based Software DevelopmentSonatypeRyan Berg
February 5, 2013
1:00pm EST
(18:00:00 UTC)
Continuous Monitoring using the Critical ControlsQualys

FireEye
Wes Medley, Eric Cole, PhD

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.