Get the Skills you need from Home with SANS OnDemand

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
December 22, 2014
1:00pm EST
(18:00:00 UTC)
Build "Muscle Memory" with Rekall Memory Forensic FrameworkAlissa Torres
December 18, 2014
11:00pm EST
(04:00:00 UTC)
How to Give the Best Pen Test of your LifeEd Skoudis
December 17, 2014
1:00pm EST
(18:00:00 UTC)
Tis the Season for Data Breaches and Stolen IdentitySophos Inc.Chester Wisniewski
December 16, 2014
1:00pm EST
(18:00:00 UTC)
Hands on USN Journal AnalysisDavid Cowen
December 15, 2014
3:00pm EST
(20:00:00 UTC)
Analyst Webcast: Advanced Network Protection with McAfee Next Generation FirewallMcafee LLCSteven Smith, Dave Shackleford
December 12, 2014
3:00pm EDT
(20:00:00 UTC)
A Managed Approach to Security Controls to Ensure Effective SecurityEiQnetworksKevin Landt
December 11, 2014
3:00pm EST
(20:00:00 UTC)
If All Is Quiet, Are You Really Secure? Understanding Zero-Day VulnerabilitiesRisk I/O

VeriSign, Inc.
Michael Roytman, Jayson Jean
December 11, 2014
1:00pm EST
(18:00:00 UTC)
SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 2Cigital, Inc.

CloudPassage

FireEye

Qualys

RiskIQ

Tenable

Trend Micro Inc.
Barbara Filkins, Nicholai Piagentini, Jay Schulman, Jonathan Trull
December 10, 2014
1:00pm EST
(18:00:00 UTC)
The Bash Vulnerability: Practical Tips to Secure your EnvironmentAlienVaultGarrett Gross, Victor Obando
December 9, 2014
1:00pm EST
(18:00:00 UTC)
SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 1Cigital, Inc.

CloudPassage

FireEye

Qualys

RiskIQ

Tenable

Trend Micro Inc.
Barbara Filkins, Paul Crutchfield, Elias Manousos, Rajiv Raghunarayan, JD Sherry
December 4, 2014
3:00pm EST
(20:00:00 UTC)
Tis the Season for Data Breaches and Stolen IdentitySophos Inc.Chester Wisniewski
December 3, 2014
11:00am EST
(16:00:00 UTC)
Closing the Door on Web ShellsAnuj Soni
December 2, 2014
1:00pm EST
(18:00:00 UTC)
BlackEnergy 2: ICS-Focused ThreatsRobert Huber, Tim Conway, Michael Assante
November 24, 2014
3:00pm EST
(20:00:00 UTC)
The Value of On-Demand Endpoint VisibilityMcafee LLCBret Lenmark, Dave Shackleford
November 20, 2014
3:00pm EDT
(20:00:00 UTC)
Beating the Status Quo: Reinforce Your Defense to Detect & Resolve Evolving ThreatsNarus, Inc.Mohan Sadashiva, John Pescatore
November 19, 2014
1:00pm EDT
(18:00:00 UTC)
Top 10 1/2 Things That Can Undermine Your Security ProgramWhiteHat SecurityGabe Gumbs, Jerry Hoff, Johannes Ullrich, PhD
November 18, 2014
11:00am EDT
(16:00:00 UTC)
What's in your software? Reduce risk from third-party and open source components.VeracodePhil Neray, Adrian Lane
November 17, 2014
1:00pm EST
(18:00:00 UTC)
Thwarting Threat Actors With DomainToolsDomainToolsTim Helming, John Pescatore
November 14, 2014
1:00pm EST
(18:00:00 UTC)
Securing Personal and Mobile Device Use with Next-Gen Network Access ControlsForescout Technologies BVJoshua Wright, Jack Marsal, Matt Santill
November 13, 2014
1:00pm EST
(18:00:00 UTC)
Protecting DNS: Securing Your Internet Address BookInfoBloxCricket Liu, John Pescatore
November 12, 2014
1:00pm EST
(18:00:00 UTC)
Mitigating Employee Risk - Keep Hires from Starting FiresVeriatoMike Tierney, Dominique Cultrera - GPHR/PHR/PHR-CA
November 12, 2014
10:00am EST
(15:00:00 UTC)
Continuous Ownage: Why you Need Continuous MonitoringEric Conrad
November 11, 2014
1:00pm EDT
(18:00:00 UTC)
CyberCity Hands-on Kinetic Cyber Range WebcastTim Medin, Ed Skoudis
November 6, 2014
1:00pm EST
(18:00:00 UTC)
Be Ready for a Breach with Intelligent ResponseMcafee LLCOfir Arkin, James Tarala
November 5, 2014
1:00pm EST
(18:00:00 UTC)
The Evolution of IDS: Why Context is KeyAlienVaultJoe Schreiber, Dave Shackleford
October 30, 2014
9:00am EDT
(13:00:00 UTC)
Ramping Up Your Phishing Program
October 29, 2014
11:00am EDT
(15:00:00 UTC)
Zen and The Art of Network SegmentationTufin TechnologiesReuven Harrison, John Pescatore
October 28, 2014
1:00pm EDT
(17:00:00 UTC)
Quantifying Security Performance: The Why, What and How of Security RatingsBitsightStephen Boyer, John Pescatore
October 27, 2014
1:00pm EDT
(17:00:00 UTC)
You Can't Discover a Malware Pandemic by Diagnosing One PatientAndrew Hay
October 22, 2014
1:00pm EDT
(17:00:00 UTC)
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneAlienVaultGarrett Gross, Victor Obando
October 21, 2014
3:30pm EDT
(19:30:00 UTC)
Top 3 Threats to Retail IT Security and How You Can Defend your DataDuo SecurityJosh Daymont, Brian Nuszkowski, Dave Shackleford
October 20, 2014
1:00pm EDT
(17:00:00 UTC)
Demons, Monsters and Ghouls: Hunting Security Problems in Healthcare
October 17, 2014
1:00pm EDT
(17:00:00 UTC)
Next Generation Endpoint Security to Stay Ahead of Evolving Advanced Targeted ThreatsPromisecSteve Lowing, John Pescatore
October 16, 2014
1:00pm EDT
(17:00:00 UTC)
Measuring Human Risk: What is Your Organization's Security Score?Symantec
October 15, 2014
3:00pm EDT
(19:00:00 UTC)
What do you need to know about POODLE?Johannes Ullrich, PhD
October 15, 2014
1:00pm EDT
(17:00:00 UTC)
Breaches Happen: Be PreparedSymantecKat Pelak, Stephen Northcutt
October 14, 2014
1:00pm EDT
(17:00:00 UTC)
2nd Annual Analytics and Intelligence Survey - Pt 2. Future State: Improving Intelligence and Threat ProtectionAlienVault

HP

LogRhythm

Mcafee LLC

Rapid7 Inc.

Anomali
Dave Shackleford, Colby DeRodeff, Seth Goldhammer, Nicholas J. Percoco
October 9, 2014
1:00pm EDT
(17:00:00 UTC)
2nd Annual Analytics and Intelligence SurveyAlienVault

HP

LogRhythm

Mcafee LLC

Rapid7 Inc.

Anomali
Sridhar Karnam, Dave Shackleford, Mark Allen, Ted Pan
October 9, 2014
11:00am EDT
(15:00:00 UTC)
Enabling Network Monitoring to Become System IntelligenceGraham Speake
October 8, 2014
10:00am EDT
(14:00:00 UTC)
Securing The Human in EMEA - Next Generation Awareness ProgramsLance Spitzner
October 8, 2014
2:00am EDT
(06:00:00 UTC)
Patch Pwnage: Ripping Apart Microsoft Patches to Build ExploitsStephen Sims
October 6, 2014
1:00pm EDT
(17:00:00 UTC)
Log and Event Management SurveyVMWare, IncBill Roth, Jerry Shenk
October 3, 2014
1:00pm EDT
(17:00:00 UTC)
Detect Ransomware Before its Too Late with AlienVault USMAlienVaultVictor Obando
October 2, 2014
1:00pm EDT
(17:00:00 UTC)
How to Prevent One Hundred Percent of Browser-Borne MalwareSpikes Security Franklyn Jones
October 1, 2014
3:00pm EDT
(19:00:00 UTC)
Shell Shock - What you need to knowVeracodeChris Wysopal, Johannes Ullrich, PhD
September 30, 2014
1:00pm EDT
(17:00:00 UTC)
Network Segmentation Best Practices for DefensePalo Alto NetworksJames Tarala, Isabelle Dumont
September 26, 2014
1:00pm EDT
(17:00:00 UTC)
Detecting Risky Activity "Wherever" Before It Becomes A ProblemRapid7 Inc.Jay Roxe, Jerry Shenk
September 25, 2014
1:00pm EDT
(17:00:00 UTC)
Hardening Retail Security: Why and How to Prevent Breaches and AttacksLogRhythmErick Ingleby, John Pescatore
September 23, 2014
3:00pm EDT
(19:00:00 UTC)
Security for the People: End-User Authentication Security on the InternetDuo SecurityPaul Roberts, Mark Stanislav
September 19, 2014
1:00pm EDT
(17:00:00 UTC)
Database Encryption - Defining the Root of TrustUtimacoGreg Porter, Andreas Philipp
September 18, 2014
1:00pm EDT
(17:00:00 UTC)
Secure, Enterprise-Grade File Sharing and Mobile ProductivityWatchDoxTim Choi
September 17, 2014
3:00pm EDT
(19:00:00 UTC)
More web traffic, more problems. How CARFAX consolidated security concerns, saved money and grew their businessF5 Networks, Inc.Chris Thomas, Preston Hogue, John Pescatore
September 16, 2014
3:00pm EDT
(19:00:00 UTC)
Simplifying Data Encryption and Redaction Without Touching the CodeOracleDave Shackleford
September 15, 2014
1:00pm EDT
(17:00:00 UTC)
Speeding up the Investigation of Employee Policy ViolationsMagnet ForensicsJamie McQuaid, Jad Saliba, Rob Lee
September 11, 2014
1:00pm EDT
(17:00:00 UTC)
ICS 515: Active Defense and Response Sneak PeakRobert M. Lee
September 10, 2014
1:00pm EDT
(17:00:00 UTC)
Prepared for the WorstLifeLock Business SolutionsBill Dean, Eric Warbasse
September 9, 2014
1:00pm EDT
(17:00:00 UTC)
The Critical Security Controls: From Adoption to Implementation A SANS SurveyEiQnetworks

Mcafee LLC

Qualys

Tripwire, Inc.
Katherine Brocklehurst, Wolfgang Kandek, Tony Sager (moderator), James Tarala, Brian Mehlman, Barbara G. Kay
September 8, 2014
1:00pm EDT
(17:00:00 UTC)
Your App is Leaking! - Bypassing Exploit Mitigations for Pentesters...
September 8, 2014
4:00am EDT
(08:00:00 UTC)
FOR572 Advanced Network Forensics and Analysis Preview: DHCP and DNS, "The Correlators"AISAPhilip Hagen
September 5, 2014
3:00pm EDT
(19:00:00 UTC)
Simple, Effective Patch Management: From Dilemma to Done DeedDell KACE
September 5, 2014
1:00pm EDT
(17:00:00 UTC)
Solving Insider Threats in Law EnforcementRaytheon | WebsenseMichael Crouse, Dr. Eric Cole
September 4, 2014
2:00pm EDT
(18:00:00 UTC)
Get Smart: Consuming Threat Intelligence to Advance your Cyber Security ProgramCarbon BlackHarry Sverdlove, Dave Shackleford
September 3, 2014
1:00pm EDT
(17:00:00 UTC)
How to Detect System Compromise & Data ExfiltrationAlienVaultTom D'Aquino
August 26, 2014
1:00pm EDT
(17:00:00 UTC)
Nine Steps toward a Successful Insider Threat ProgramRaytheon | WebsenseDaniel Velez, Tanya Baccam
August 25, 2014
1:00pm EDT
(17:00:00 UTC)
How Not To Fail at a Pen TestJohn Strand, Ed Skoudis
August 20, 2014
1:00pm EDT
(17:00:00 UTC)
Under Threat or Compromise: Every Detail CountsBlue Coat Systems, Inc.John Vecchi, Jacob Williams
August 19, 2014
1:00pm EDT
(17:00:00 UTC)
Building a Content Security PolicyEric Johnson
August 15, 2014
1:00pm EDT
(17:00:00 UTC)
Incident Response Part 2: Growing and Maturing An IR CapabilityAccessData Corp.

AlienVault

Arbor Networks

Carbon Black

HP

Mcafee LLC
Lucas Zaichkowsky, Jennifer Glenn, Jake Williams, Ben Johnson, Alissa Torres
August 14, 2014
1:00pm EDT
(17:00:00 UTC)
Incident Response Part 1: Incident Response Techniques and Processes: Where We Are in the Six-Step ProcessAccessData Corp.

AlienVault

Arbor Networks

Carbon Black

HP

Mcafee LLC
Dan Larson, Russ Meyers, Patrick Bedwell, Jake Williams, Alissa Torres
August 13, 2014
1:00pm EDT
(17:00:00 UTC)
Ghost In The Supply Chain: How Advanced Attackers Exploit Vulnerabilities In Your Supply ChainDuo SecurityPaul Roberts, James Lyne
August 12, 2014
3:00pm EDT
(19:00:00 UTC)
Cyber Security Metrics and Measuring VulnerabilityPeter Hannay, Dr. Andrew Woodward, Chandler Comerford
August 12, 2014
1:00pm EDT
(17:00:00 UTC)
What Works: Using Fidelis XPS to Detect and Block Advanced Targeted Threats and Foreign Espionage to Protect Trade SecretsFidelis Cybersecurity John Pescatore
August 11, 2014
1:00pm EDT
(17:00:00 UTC)
Security Awareness Webcast - Hosted by Lance Spitzner
August 8, 2014
1:00pm EDT
(17:00:00 UTC)
SQL Injection ExploitedMicah Hoffman
August 1, 2014
1:30pm EDT
(17:30:00 UTC)
SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART II Afternoon SessionFiremon

Forescout Technologies BV

Xceedium

Trend Micro Inc.

IBM Security

Splunk

Tenable
Tony Sager, John Pescatore, Alan Paller
August 1, 2014
8:00am EDT
(12:00:00 UTC)
SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART IIFiremon

Forescout Technologies BV

Xceedium

Trend Micro Inc.

IBM

Splunk

Tenable
Tony Sager, John Pescatore, Alan Paller
July 31, 2014
1:00pm EDT
(17:00:00 UTC)
Demanding MOAR From Your Vulnerability Assessments & Pen Tests by Ed SkoudisBeyondTrustMorey J. Haber, Ed Skoudis
July 30, 2014
1:00pm EDT
(17:00:00 UTC)
An Incident Response Playbook: From Monitoring to OperationsAlienVaultJoe Schreiber, Dave Shackleford
July 29, 2014
1:00pm EDT
(17:00:00 UTC)
The Modern Incident Responder: Detect, Respond and Recover from a Data BreachCarbon BlackJeffrey (J.J.) Guy
July 22, 2014
5:30pm EDT
(21:30:00 UTC)
Industrial Control Systems Security BriefingWaterfall Security

Palo Alto Networks

Ioactive Inc.
July 17, 2014
1:00pm EDT
(17:00:00 UTC)
Get Real-time Threat Detection Starting on Day 1 with AlienVault USMAlienVaultTom D'Aquino
July 10, 2014
3:00pm EDT
(19:00:00 UTC)
SANS Securing The Human for HealthcareJames Tarala
July 10, 2014
11:00am EDT
(15:00:00 UTC)
It's not about the number of filters-it's how effective they are.HP Joanna Burkey, Dave Shackleford
July 9, 2014
8:00am EDT
(12:00:00 UTC)
How To Not Fail At PentestingJohn Strand
July 8, 2014
1:00pm EDT
(17:00:00 UTC)
USB Devices and Media Transfer Protocol: Identifying the Existence of Data Exfiltration Artifacts
July 2, 2014
8:00pm EDT
(00:00:00 UTC)
Designing and Implementing a Honeypot on a SCADA NetworkCharlie Scott, Master's Degree Candidate - Masters Presentation
July 2, 2014
6:00am EDT
(10:00:00 UTC)
Stop Giving the Offense an Unfair AdvantageEric Cole, PhD
June 30, 2014
1:00pm EDT
(17:00:00 UTC)
DFIR Advanced Smartphone ForensicsCindy Murphy
June 26, 2014
12:30pm EDT
(16:30:00 UTC)
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseTripwire, Inc.Bryce Schroeder
June 25, 2014
1:00pm EDT
(17:00:00 UTC)
Using a SOC as a Security Force MultiplierHP Henri van Goethem, John Pescatore, Dr. Eric Cole
June 24, 2014
12:30pm EDT
(16:30:00 UTC)
Looking Beyond Layers: Why Authentication Security Matters MostDuo SecurityBrian Kelly, Dave Shackleford
June 23, 2014
1:00pm EDT
(17:00:00 UTC)
Health Care Data for Sale: Now What?Palo Alto NetworksIsabelle Dumont, Greg Porter
June 19, 2014
3:00pm EDT
(19:00:00 UTC)
Sensor and Intelligence Collaboration for Killing MalwareHP Elisa Lippincott, Rob Vandenbrink
June 18, 2014
3:00pm EDT
(19:00:00 UTC)
Reaping the Benefits of Continuous Monitoring and Mitigation At Pioneer InvestmentsForescout Technologies BVKen Pfeil, John Pescatore
June 17, 2014
1:00pm EDT
(17:00:00 UTC)
Higher Education: Open and Secure? A SANS SurveyTenable

Trend Micro Inc.

AlienVault
Christopher Budd, Paul Asadoorian, Patrick Bedwell, Randy Marchany
June 13, 2014
1:00pm EDT
(17:00:00 UTC)
Practical Threat Management and Incident Response for the Small- to Medium-Sized EnterpriseAlienVaultJake Williams, Patrick Bedwell
June 12, 2014
1:00pm EDT
(17:00:00 UTC)
Endpoint Threat Detection, Response and Prevention for DummiesCarbon BlackHarry Sverdlove
June 11, 2014
1:00pm EDT
(17:00:00 UTC)
Needs of a Modern Incident Response ProgramLancopeBrandon Tansey, Tom Cross
June 10, 2014
1:00pm EDT
(17:00:00 UTC)
Fighting the Insider Threat: Privilege Management and Abuse Prevention StrategiesRaytheon | WebsenseMichael Crouse, John Pescatore
June 5, 2014
3:00pm EDT
(19:00:00 UTC)
Sneak Peek at the SANS San Francisco Cybersecurity Training Event
June 5, 2014
1:00pm EDT
(17:00:00 UTC)
Saving Time and Resources Managing Administrator Rights with a Process-based Whitelist ModelViewfinityJohn Pescatore
June 5, 2014
12:00pm EST
(16:00:00 UTC)
Internet Storm Center Briefing on Today's OpenSSL Security PatchesJohannes Ullrich, PhD
June 4, 2014
1:00pm EDT
(17:00:00 UTC)
Best Practices for Leveraging Security Threat IntelligenceAlienVaultRussell Spitler, Dave Shackleford
May 28, 2014
11:00am EDT
(15:00:00 UTC)
Transforming Your Security Investment into an Early Warning System Against Cyber ThreatsPromisecSteve Lowing, Eric Cole, PhD
May 27, 2014
1:00pm EDT
(17:00:00 UTC)
Demystifying Security Controls for IT Risk & Audit ProfessionalsCarbon BlackChris Strand
May 23, 2014
12:30pm EDT
(16:30:00 UTC)
Threat Intelligence: What It Is, and Why Your Security Program Needs More of ItHP Dave Shackleford
May 22, 2014
1:00pm EDT
(17:00:00 UTC)
How Defense-In-Depth Helps Protect You From Unexpected Vulnerabilities Like HeartbleedDuo SecurityAdam Goodman, Jake Williams
May 21, 2014
1:00pm EDT
(17:00:00 UTC)
Securing Web Applications: Identifying and Managing Risks with Programming Languages and FrameworksWhiteHat SecurityJeremiah Grossman, Johannes Ullrich, PhD
May 20, 2014
1:00pm EDT
(17:00:00 UTC)
Towards a More Secure Public Cloud: What You Need to DoCloudLockKevin OBrien, John Pescatore
May 20, 2014
12:00am EDT
(04:00:00 UTC)
Mobile Device ForensicsPaul A. Henry
May 15, 2014
1:00pm EDT
(17:00:00 UTC)
Effective Anti-malware in Virtualized EnvironmentsSophos Inc.Jeremiah Cornelius, Maxim Weinstein, John Pescatore
May 14, 2014
1:00pm EDT
(17:00:00 UTC)
Going 'All In' for Protection and Compliance with the Critical Security Controls at Sun Country AirlinesMcafee LLCJohn Pescatore
May 13, 2014
1:00pm EDT
(17:00:00 UTC)
FOR585 Advanced Smartphone and Mobile Device Forensics Preview: Android vs. iOS - Battle of the Smartphones: Data RetentionHeather Mahalik
May 9, 2014
1:00pm EDT
(17:00:00 UTC)
The Application Blind-spotHP Eric Schou
May 8, 2014
1:00pm EDT
(17:00:00 UTC)
SANS 2014 Salary Survey: The State of Security Professionals TodayArbor NetworksArabella Hallawell, Barbara Filkins, John Pescatore
May 7, 2014
1:00pm EDT
(17:00:00 UTC)
10 Ways To Rock Your SOCFidelis Cybersecurity Shelly Giesbrecht
May 6, 2014
1:00pm EDT
(17:00:00 UTC)
Closing the Book on Heartbleed - and Avoiding Future Sad StoriesHP

LogRhythm

Qualys
Wolfgang Kandek, Joe Sechman, Joanna Burkey, John Pescatore, David Pack
May 5, 2014
3:00pm EDT
(19:00:00 UTC)
When Macs get HackedSarah Edwards
May 2, 2014
3:00pm EDT
(19:00:00 UTC)
Why Train?Lance Spitzner
May 2, 2014
1:00pm EDT
(17:00:00 UTC)
Extracting Windows Credentials using Memory ForensicsAlissa Torres
May 1, 2014
1:00pm EDT
(17:00:00 UTC)
Logs, Logs, Every Where / Nor Any Byte to GrokPhilip Hagen
April 30, 2014
3:00pm EDT
(19:00:00 UTC)
Need to defeat APTs? Tony Sager Explains Where We're At With Live Threat Detection AutomationPalo Alto NetworksScott Simkin, Tony Sager
April 30, 2014
1:00pm EDT
(17:00:00 UTC)
Secrets of Exploiting Blind SQL InjectionHP Justin Searle
April 29, 2014
1:00pm EDT
(17:00:00 UTC)
Defending ICS Against Cyberthreats with Next Generation SecurityPalo Alto NetworksDel Rodillas, Michael Assante
April 23, 2014
1:00pm EDT
(17:00:00 UTC)
SIEM, Security Intelligence and the Critical Security ControlsLogRhythmDave Shackleford
April 22, 2014
10:00am EDT
(14:00:00 UTC)
The 2014 Security Trends Forecast: What Does 2014 Hold for Security and Its Impact on Business Professionals?Cisco Systems Inc. CP Morey, John Pescatore
April 18, 2014
1:00pm EDT
(17:00:00 UTC)
Heartbleed Update: Making Sure You Have Stopped the Bleeding and Reducing the Chance of Future Blood-lettingVeracodeJohn Pescatore, Chris Wysopal
April 17, 2014
1:00pm EDT
(17:00:00 UTC)
Malware Analysis Essentials Using REMnux w/ Lenny ZeltserSymantecLenny Zeltser
April 16, 2014
1:00pm EDT
(17:00:00 UTC)
How to Limit the Risk of Attack on your XP AssetsAlienVaultTom D'Aquino
April 14, 2014
11:00pm EDT
(03:00:00 UTC)
Reconstructing User Activity with Memory ForensicsAlissa Torres
April 11, 2014
5:30pm EDT
(21:30:00 UTC)
The Other Side of Heartbleed - Clientside Heartbleed Vulnerabilities ExplainedJohannes Ullrich, PhD
April 10, 2014
5:30pm EDT
(21:30:00 UTC)
HeartBleed Vulnerability, Part 2
April 10, 2014
1:00pm EDT
(17:00:00 UTC)
What Your CISO WantsViewfinityFrank Kim
April 9, 2014
8:15pm EDT
(00:15:00 UTC)
OpenSSL "Heartbleed" VulnerabilityCloudPassage

Veracode
April 8, 2014
1:00pm EDT
(17:00:00 UTC)
Best Finds in DFIR for 2014David Cowen
April 3, 2014
11:00am EDT
(15:00:00 UTC)
Detecting Evil on Windows Systems - An In-Depth Look at the DFIR PosterMike Pilkington, Rob Lee
April 1, 2014
1:00pm EDT
(17:00:00 UTC)
SANS Survey on Control Systems SecurityQualys

Raytheon | Websense

Cisco Systems Inc.

Tenable
Billy Rios, Jason Ostermann, Paul Asadoorian, Marc Blackmer, Derek Harp , Matthew Luallen
March 27, 2014
1:00pm EDT
(17:00:00 UTC)
Security Program Drivers and Wish Lists: SANS Financial Services Survey Results Part IIBlueCoat

FireEye

Forescout Technologies BV

Raytheon Cyber Products

Cisco Systems Inc.

Tenable
Michael Crouse, Marc Blackmer, John Vecchi, John Pescatore, G. Mark Hardy
March 26, 2014
1:00pm EDT
(17:00:00 UTC)
Risks, Threats and Preparedness: Part I of the SANS Financial Services SurveyBlue Coat Systems, Inc.

FireEye

Forescout Technologies BV

Raytheon Cyber Products

Cisco Systems Inc.

Tenable
Scott Gordon, Ed Dembowski, Jack Daniel, John Pescatore, G. Mark Hardy
March 25, 2014
1:00pm EDT
(17:00:00 UTC)
IP Theft: Collecting Artifact Evidence from the Cloud and MobileMagnet ForensicsJamie McQuaid, Jad Saliba, Heather Mahalik
March 24, 2014
1:00pm EDT
(17:00:00 UTC)
The Power of Lossless Packet Capture (1G-100G) & Real-time NetflowEmulexBoni Bruno, CISSP, CISM, CGEIT, Sonny Singh
March 20, 2014
1:00pm EDT
(17:00:00 UTC)
SANS Survey on Distributed Denial of ServiceCorero Ashley Stephenson
March 18, 2014
1:00pm EDT
(17:00:00 UTC)
Finding Advanced Threats Before They Strike: Advanced Threat Protection and ContainmentDamballa, Inc.Stephen Newman, Jerry Shenk
March 13, 2014
1:00pm EDT
(17:00:00 UTC)
Visibility at the Endpoint: The SANS 2014 Survey of Endpoint IntelligenceGuidance SoftwareJason Fredrickson, Jacob Williams
March 12, 2014
3:00pm EDT
(19:00:00 UTC)
Grand Theft Data: Why Are So Many Organizations Being Compromised?BeyondTrustEric Cole, PhD, Mike Poor
March 12, 2014
1:00pm EDT
(17:00:00 UTC)
Making Log and Event Management Easy for SMBsSolarWindsRob Johnson, Jerry Shenk
March 11, 2014
1:00pm EDT
(17:00:00 UTC)
Server Security: A Reality CheckCarbon BlackMichael Bilancieri, Jake Williams
March 10, 2014
1:00pm EDT
(17:00:00 UTC)
Your Pen-Test has a Glaring Weakness - Emulating the Attackers Better with Social EngineeringJames Lyne, Dave Shackleford
March 7, 2014
8:30am EST
(13:30:00 UTC)
SANS Financial Services Cyber Security Trends and Challenges BriefingInvincea

FireEye

Forescout Technologies BV

Tenable
John Pescatore
March 6, 2014
3:00pm EST
(20:00:00 UTC)
SANS Securing The Human for ICS EngineersMichael Assante
March 6, 2014
1:00pm EST
(18:00:00 UTC)
Exposing Malicious Threats to Health Care ITNorseJeff Harrell, Barbara Filkins
March 5, 2014
1:00pm EST
(18:00:00 UTC)
How to Strengthen the "Weakest Link" with Two-Factor AuthenticationDuo SecurityDavid Kennedy, Mark Stanislav
March 5, 2014
2:00am EST
(07:00:00 UTC)
SANS Asia-Pacific Series: A Taste of SANS SEC660 - Advanced Penetration Testing: Attacking Network DevicesStephen Sims
March 4, 2014
1:00pm EDT
(18:00:00 UTC)
Cybersecuring DOD ICS SystemsMichael Chipley
March 3, 2014
8:00pm EST
(01:00:00 UTC)
ICS Attack SurfacesEric Cole, PhD
February 26, 2014
1:00pm EDT
(18:00:00 UTC)
Mobile Malware and Spyware - Working Through the BugsCindy Murphy
February 21, 2014
1:00pm EST
(18:00:00 UTC)
Successful Mitigation Techniques for 4 Common Web App VulnerabilitiesSteve Kosten
February 20, 2014
1:00pm EST
(18:00:00 UTC)
The Critical Security Controls and the StealthWatch SystemLancopeCharles Herring, John Pescatore
February 18, 2014
1:00pm EST
(18:00:00 UTC)
Secrets of Exploiting Local and Remote File InclusionJustin Searle
February 14, 2014
1:00pm EST
(18:00:00 UTC)
Security Without Scanning for Today's Hybrid DatacenterMcafee LLCBen Andrew, Dave Shackleford
February 13, 2014
1:00pm EST
(18:00:00 UTC)
SIEM-plifying security monitoring: A different approach to security visibilityAlienVaultJoe Schreiber, Dave Shackleford
February 12, 2014
1:00pm EST
(18:00:00 UTC)
Application Security Programs On the Rise, Skills Lacking: A SANS SurveyHP

Veracode

Qualys
Ryan English, Erik Peterson, Frank Kim, Will Bechtel
February 10, 2014
7:00pm EST
(00:00:00 UTC)
SANS Asia-Pacific Series: APT Investigations HOWTO - The Forensic SideAISAJess Garcia
February 7, 2014
1:00pm EST
(18:00:00 UTC)
Leveraging the Critical Security Controls to Mitigate User and Asset-based RiskBeyondTrustMichael Yaffe, Eric Cole, PhD
February 6, 2014
1:00pm EST
(18:00:00 UTC)
Continuous Monitoring and Mitigation: Responding to Emerging ThreatsIBMMark Hafner
February 6, 2014
5:00am EST
(10:00:00 UTC)
SANS Asia-Pacific Webcast Series: Mobile Device ForensicsPaul A. Henry
February 5, 2014
9:00pm EST
(02:00:00 UTC)
SANS Asia-Pacific Series: Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To GuideMichael Assante
February 5, 2014
1:00pm EST
(18:00:00 UTC)
Secure, enterprise-grade file sharing and mobile productivityWatchDoxTim Choi
February 4, 2014
1:00pm EST
(18:00:00 UTC)
Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To GuideAlert EnterpriseMichael Assante
January 31, 2014
1:00pm EST
(18:00:00 UTC)
3 Tips to Fund Your Security Initiatives by Leveraging Business ObjectivesHP Michi Kossowsky, Katherine Lam
January 22, 2014
1:00pm EST
(18:00:00 UTC)
Security Analytics: Moving From Collecting Threat Data and Continuous Monitoring into Security ActionJohn Pescatore
January 21, 2014
1:00pm EST
(18:00:00 UTC)
Overcoming Barriers to Making Cyber Security AdvancesEiQnetworksBrian Mehlman, John Pescatore
January 17, 2014
1:00pm EST
(18:00:00 UTC)
Sneak Peek at the Cyber Threat Intelligence SummitMike Cloppert
January 16, 2014
1:00pm EST
(18:00:00 UTC)
How to Detect SQL Injection & XSS Attacks using SIEM Event CorrelationAlienVaultTom D'Aquino
January 15, 2014
1:00pm EST
(18:00:00 UTC)
SANS Analyst Webcast: SANS Survey on Securing The Internet of ThingsCodenomicon

Norse
Mike Jawetz, Bart Pestarino, John Pescatore
January 14, 2014
1:00pm EST
(18:00:00 UTC)
Using Oracle Audit Vault and Database Firewall for Data ProtectionOracleTanya Baccam
January 13, 2014
1:00pm EST
(18:00:00 UTC)
HTML5: Risky Business or Hidden Security Tool Chest for Mobile Web App AuthenticationJohannes Ullrich, PhD
January 7, 2014
1:00pm EST
(18:00:00 UTC)
Improving Security Through IT/OT CollaborationGraham Speake

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.