Ending Soon! Get a new iPad, Samsung Galaxy Tab A or take $350 Off Your OnDemand or vLive course by May 10!

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Dec 22, 2014Build "Muscle Memory" with Rekall Memory Forensic FrameworkAlissa Torres
Dec 19, 2014How to Give the Best Pen Test of your LifeEd Skoudis
Dec 17, 2014Tis the Season for Data Breaches and Stolen IdentitySophos Inc.Chester Wisniewski
Dec 16, 2014Hands on USN Journal AnalysisDavid Cowen
Dec 15, 2014Analyst Webcast: Advanced Network Protection with McAfee Next Generation FirewallMcAfee Steven Smith, Dave Shackleford
Dec 12, 2014A Managed Approach to Security Controls to Ensure Effective SecurityEiQnetworksKevin Landt
Dec 11, 2014If All Is Quiet, Are You Really Secure? Understanding Zero-Day VulnerabilitiesRisk I/O

VeriSign, Inc.
Michael Roytman, Jayson Jean
Dec 11, 2014SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 2Cigital, Inc.

CloudPassage

FireEye

Qualys

RiskIQ

Tenable Network Security

Trend Micro Inc.
Barbara Filkins, Nicholai Piagentini, Jay Schulman, Jonathan Trull
Dec 10, 2014The Bash Vulnerability: Practical Tips to Secure your EnvironmentAlienVaultGarrett Gross, Victor Obando
Dec 9, 2014SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 1Cigital, Inc.

CloudPassage

FireEye

Qualys

RiskIQ

Tenable Network Security

Trend Micro Inc.
Barbara Filkins, Paul Crutchfield, Elias Manousos, Rajiv Raghunarayan, JD Sherry
Dec 4, 2014Tis the Season for Data Breaches and Stolen IdentitySophos Inc.Chester Wisniewski
Dec 3, 2014Closing the Door on Web ShellsAnuj Soni
Dec 2, 2014BlackEnergy 2: ICS-Focused ThreatsRobert Huber, Tim Conway, Michael Assante
Nov 24, 2014The Value of On-Demand Endpoint VisibilityMcAfee Bret Lenmark, Dave Shackleford
Nov 20, 2014Beating the Status Quo: Reinforce Your Defense to Detect & Resolve Evolving ThreatsNarus, Inc.Mohan Sadashiva, John Pescatore
Nov 19, 2014Top 10 1/2 Things That Can Undermine Your Security ProgramWhiteHat SecurityGabe Gumbs, Jerry Hoff, Johannes Ullrich, PhD
Nov 18, 2014What's in your software? Reduce risk from third-party and open source components.VeracodePhil Neray, Adrian Lane
Nov 17, 2014Thwarting Threat Actors With DomainToolsDomainToolsTim Helming, John Pescatore
Nov 14, 2014Securing Personal and Mobile Device Use with Next-Gen Network Access ControlsForeScout TechnologiesJoshua Wright, Jack Marsal, Matt Santill
Nov 13, 2014Protecting DNS: Securing Your Internet Address BookInfoBloxCricket Liu, John Pescatore
Nov 12, 2014Mitigating Employee Risk - Keep Hires from Starting FiresVeriatoMike Tierney, Dominique Cultrera - GPHR/PHR/PHR-CA
Nov 12, 2014Continuous Ownage: Why you Need Continuous MonitoringEric Conrad
Nov 11, 2014CyberCity Hands-on Kinetic Cyber Range WebcastTim Medin, Ed Skoudis
Nov 6, 2014Be Ready for a Breach with Intelligent ResponseMcAfee Ofir Arkin, James Tarala
Nov 5, 2014The Evolution of IDS: Why Context is KeyAlienVaultJoe Schreiber, Dave Shackleford
Oct 30, 2014Ramping Up Your Phishing Program
Oct 29, 2014Zen and The Art of Network SegmentationTufin TechnologiesReuven Harrison, John Pescatore
Oct 28, 2014Quantifying Security Performance: The Why, What and How of Security RatingsBitsightStephen Boyer, John Pescatore
Oct 27, 2014You Can't Discover a Malware Pandemic by Diagnosing One PatientAndrew Hay
Oct 22, 2014Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneAlienVaultGarrett Gross, Victor Obando
Oct 21, 2014Top 3 Threats to Retail IT Security and How You Can Defend your DataDuo SecurityJosh Daymont, Brian Nuszkowski, Dave Shackleford
Oct 20, 2014Demons, Monsters and Ghouls: Hunting Security Problems in Healthcare
Oct 17, 2014Next Generation Endpoint Security to Stay Ahead of Evolving Advanced Targeted ThreatsPromisecSteve Lowing, John Pescatore
Oct 16, 2014Measuring Human Risk: What is Your Organization's Security Score?Symantec
Oct 15, 2014What do you need to know about POODLE?Johannes Ullrich, PhD
Oct 15, 2014Breaches Happen: Be PreparedSymantecKat Pelak, Stephen Northcutt
Oct 14, 20142nd Annual Analytics and Intelligence Survey - Pt 2. Future State: Improving Intelligence and Threat ProtectionAlienVault

HP

LogRhythm

McAfee

Rapid7 Inc.

Anomali
Dave Shackleford, Colby DeRodeff, Seth Goldhammer, Nicholas J. Percoco
Oct 9, 20142nd Annual Analytics and Intelligence SurveyAlienVault

HP

LogRhythm

McAfee

Rapid7 Inc.

Anomali
Sridhar Karnam, Dave Shackleford, Mark Allen, Ted Pan
Oct 9, 2014Enabling Network Monitoring to Become System IntelligenceGraham Speake
Oct 8, 2014Securing The Human in EMEA - Next Generation Awareness ProgramsLance Spitzner
Oct 8, 2014Patch Pwnage: Ripping Apart Microsoft Patches to Build ExploitsStephen Sims
Oct 6, 2014Log and Event Management SurveyVMWare, IncBill Roth, Jerry Shenk
Oct 3, 2014Detect Ransomware Before its Too Late with AlienVault USMAlienVaultVictor Obando
Oct 2, 2014How to Prevent One Hundred Percent of Browser-Borne MalwareSpikes Security Franklyn Jones
Oct 1, 2014Shell Shock - What you need to knowVeracodeChris Wysopal, Johannes Ullrich, PhD
Sep 30, 2014Network Segmentation Best Practices for DefensePalo Alto NetworksJames Tarala, Isabelle Dumont
Sep 26, 2014Detecting Risky Activity "Wherever" Before It Becomes A ProblemRapid7 Inc.Jay Roxe, Jerry Shenk
Sep 25, 2014Hardening Retail Security: Why and How to Prevent Breaches and AttacksLogRhythmErick Ingleby, John Pescatore
Sep 23, 2014Security for the People: End-User Authentication Security on the InternetDuo SecurityPaul Roberts, Mark Stanislav
Sep 19, 2014Database Encryption - Defining the Root of TrustUtimacoGreg Porter, Andreas Philipp
Sep 18, 2014Secure, Enterprise-Grade File Sharing and Mobile ProductivityWatchDoxTim Choi
Sep 17, 2014More web traffic, more problems. How CARFAX consolidated security concerns, saved money and grew their businessF5 Networks, Inc.Chris Thomas, Preston Hogue, John Pescatore
Sep 16, 2014Simplifying Data Encryption and Redaction Without Touching the CodeOracleDave Shackleford
Sep 15, 2014Speeding up the Investigation of Employee Policy ViolationsMagnet ForensicsJamie McQuaid, Jad Saliba, Rob Lee
Sep 11, 2014ICS 515: Active Defense and Response Sneak PeakRobert M. Lee
Sep 10, 2014Prepared for the WorstLifeLock Business SolutionsBill Dean, Eric Warbasse
Sep 9, 2014The Critical Security Controls: From Adoption to Implementation A SANS SurveyEiQnetworks

McAfee

Qualys

Tripwire, Inc.
Katherine Brocklehurst, Wolfgang Kandek, Tony Sager (moderator), James Tarala, Brian Mehlman, Barbara G. Kay
Sep 8, 2014Your App is Leaking! - Bypassing Exploit Mitigations for Pentesters...
Sep 8, 2014FOR572 Advanced Network Forensics and Analysis Preview: DHCP and DNS, "The Correlators"AISAPhilip Hagen
Sep 5, 2014Simple, Effective Patch Management: From Dilemma to Done DeedDell KACE
Sep 5, 2014Solving Insider Threats in Law EnforcementRaytheon | WebsenseMichael Crouse, Dr. Eric Cole
Sep 4, 2014Get Smart: Consuming Threat Intelligence to Advance your Cyber Security ProgramCarbon BlackHarry Sverdlove, Dave Shackleford
Sep 3, 2014How to Detect System Compromise & Data ExfiltrationAlienVaultTom D'Aquino
Aug 26, 2014Nine Steps toward a Successful Insider Threat ProgramRaytheon | WebsenseDaniel Velez, Tanya Baccam
Aug 25, 2014How Not To Fail at a Pen TestJohn Strand, Ed Skoudis
Aug 20, 2014Under Threat or Compromise: Every Detail CountsBlue Coat Systems, Inc.John Vecchi, Jacob Williams
Aug 19, 2014Building a Content Security PolicyEric Johnson
Aug 15, 2014Incident Response Part 2: Growing and Maturing An IR CapabilityAccessData Corp.

AlienVault

Arbor Networks

Carbon Black

HP

McAfee
Lucas Zaichkowsky, Jennifer Glenn, Jake Williams, Ben Johnson, Alissa Torres
Aug 14, 2014Incident Response Part 1: Incident Response Techniques and Processes: Where We Are in the Six-Step ProcessAccessData Corp.

AlienVault

Arbor Networks

Carbon Black

HP

McAfee
Dan Larson, Russ Meyers, Patrick Bedwell, Jake Williams, Alissa Torres
Aug 13, 2014Ghost In The Supply Chain: How Advanced Attackers Exploit Vulnerabilities In Your Supply ChainDuo SecurityPaul Roberts, James Lyne
Aug 12, 2014Cyber Security Metrics and Measuring VulnerabilityPeter Hannay, Dr. Andrew Woodward, Chandler Comerford
Aug 12, 2014What Works: Using Fidelis XPS to Detect and Block Advanced Targeted Threats and Foreign Espionage to Protect Trade SecretsFidelis Cybersecurity John Pescatore
Aug 11, 2014Security Awareness Webcast - Hosted by Lance Spitzner
Aug 8, 2014SQL Injection ExploitedMicah Hoffman
Aug 1, 2014SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART II Afternoon SessionFiremon

ForeScout Technologies

Xceedium

Trend Micro Inc.

IBM

Splunk

Tenable Network Security
Tony Sager, John Pescatore, Alan Paller
Aug 1, 2014SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART IIFiremon

ForeScout Technologies

Xceedium

Trend Micro Inc.

IBM

Splunk

Tenable Network Security
Tony Sager, John Pescatore, Alan Paller
Jul 31, 2014Demanding MOAR From Your Vulnerability Assessments & Pen Tests by Ed SkoudisBeyondTrustMorey J. Haber, Ed Skoudis
Jul 30, 2014An Incident Response Playbook: From Monitoring to OperationsAlienVaultJoe Schreiber, Dave Shackleford
Jul 29, 2014The Modern Incident Responder: Detect, Respond and Recover from a Data BreachCarbon BlackJeffrey (J.J.) Guy
Jul 22, 2014Industrial Control Systems Security BriefingWaterfall Security

Palo Alto Networks

Ioactive Inc.
Jul 17, 2014Get Real-time Threat Detection Starting on Day 1 with AlienVault USMAlienVaultTom D'Aquino
Jul 10, 2014SANS Securing The Human for HealthcareJames Tarala
Jul 10, 2014It's not about the number of filters-it's how effective they are.HP Joanna Burkey, Dave Shackleford
Jul 9, 2014How To Not Fail At PentestingJohn Strand
Jul 8, 2014USB Devices and Media Transfer Protocol: Identifying the Existence of Data Exfiltration Artifacts
Jul 3, 2014Designing and Implementing a Honeypot on a SCADA NetworkCharlie Scott, Master's Degree Candidate - Masters Presentation
Jul 2, 2014Stop Giving the Offense an Unfair AdvantageEric Cole, PhD.
Jun 30, 2014DFIR Advanced Smartphone ForensicsCindy Murphy
Jun 26, 2014Insider Threat Kill Chain: Detecting Human Indicators of CompromiseTripwire, Inc.Bryce Schroeder
Jun 25, 2014Using a SOC as a Security Force MultiplierHP Henri van Goethem, John Pescatore, Dr. Eric Cole
Jun 24, 2014Looking Beyond Layers: Why Authentication Security Matters MostDuo SecurityBrian Kelly, Dave Shackleford
Jun 23, 2014Health Care Data for Sale: Now What?Palo Alto NetworksIsabelle Dumont, Greg Porter
Jun 19, 2014Sensor and Intelligence Collaboration for Killing MalwareHP Elisa Lippincott, Rob Vandenbrink
Jun 18, 2014Reaping the Benefits of Continuous Monitoring and Mitigation At Pioneer InvestmentsForeScout TechnologiesKen Pfeil, John Pescatore
Jun 17, 2014Higher Education: Open and Secure? A SANS SurveyTenable Network Security

Trend Micro Inc.

AlienVault
Christopher Budd, Paul Asadoorian, Patrick Bedwell, Randy Marchany
Jun 13, 2014Practical Threat Management and Incident Response for the Small- to Medium-Sized EnterpriseAlienVaultJake Williams, Patrick Bedwell
Jun 12, 2014Endpoint Threat Detection, Response and Prevention for DummiesCarbon BlackHarry Sverdlove
Jun 11, 2014Needs of a Modern Incident Response ProgramLancopeBrandon Tansey, Tom Cross
Jun 10, 2014Fighting the Insider Threat: Privilege Management and Abuse Prevention StrategiesRaytheon | WebsenseMichael Crouse, John Pescatore
Jun 5, 2014Sneak Peek at the SANS San Francisco Cybersecurity Training Event
Jun 5, 2014Saving Time and Resources Managing Administrator Rights with a Process-based Whitelist ModelViewfinityJohn Pescatore
Jun 5, 2014Internet Storm Center Briefing on Today's OpenSSL Security PatchesJohannes Ullrich, PhD
Jun 4, 2014Best Practices for Leveraging Security Threat IntelligenceAlienVaultRussell Spitler, Dave Shackleford
May 28, 2014Transforming Your Security Investment into an Early Warning System Against Cyber ThreatsPromisecSteve Lowing, Eric Cole, PhD.
May 27, 2014Demystifying Security Controls for IT Risk & Audit ProfessionalsCarbon BlackChris Strand
May 23, 2014Threat Intelligence: What It Is, and Why Your Security Program Needs More of ItHP Dave Shackleford
May 22, 2014How Defense-In-Depth Helps Protect You From Unexpected Vulnerabilities Like HeartbleedDuo SecurityAdam Goodman, Jake Williams
May 21, 2014Securing Web Applications: Identifying and Managing Risks with Programming Languages and FrameworksWhiteHat SecurityJeremiah Grossman, Johannes Ullrich, PhD
May 20, 2014Towards a More Secure Public Cloud: What You Need to DoCloudLockKevin OBrien, John Pescatore
May 20, 2014Mobile Device ForensicsPaul A. Henry
May 15, 2014Effective Anti-malware in Virtualized EnvironmentsSophos Inc.Jeremiah Cornelius, Maxim Weinstein, John Pescatore
May 14, 2014Going 'All In' for Protection and Compliance with the Critical Security Controls at Sun Country AirlinesMcAfee John Pescatore
May 13, 2014FOR585 Advanced Smartphone and Mobile Device Forensics Preview: Android vs. iOS - Battle of the Smartphones: Data RetentionHeather Mahalik
May 9, 2014The Application Blind-spotHP Eric Schou
May 8, 2014SANS 2014 Salary Survey: The State of Security Professionals TodayArbor NetworksArabella Hallawell, Barbara Filkins, John Pescatore
May 7, 201410 Ways To Rock Your SOCFidelis Cybersecurity Shelly Giesbrecht
May 6, 2014Closing the Book on Heartbleed - and Avoiding Future Sad StoriesHP

LogRhythm

Qualys
Wolfgang Kandek, Joe Sechman, Joanna Burkey, John Pescatore, David Pack
May 5, 2014When Macs get HackedSarah Edwards
May 2, 2014Why Train?Lance Spitzner
May 2, 2014Extracting Windows Credentials using Memory ForensicsAlissa Torres
May 1, 2014Logs, Logs, Every Where / Nor Any Byte to GrokPhilip Hagen
Apr 30, 2014Need to defeat APTs? Tony Sager Explains Where We're At With Live Threat Detection AutomationPalo Alto NetworksScott Simkin, Tony Sager
Apr 30, 2014Secrets of Exploiting Blind SQL InjectionHP Justin Searle
Apr 29, 2014Defending ICS Against Cyberthreats with Next Generation SecurityPalo Alto NetworksDel Rodillas, Michael Assante
Apr 23, 2014SIEM, Security Intelligence and the Critical Security ControlsLogRhythmDave Shackleford
Apr 22, 2014The 2014 Security Trends Forecast: What Does 2014 Hold for Security and Its Impact on Business Professionals?Cisco Systems Inc. CP Morey, John Pescatore
Apr 18, 2014Heartbleed Update: Making Sure You Have Stopped the Bleeding and Reducing the Chance of Future Blood-lettingVeracodeJohn Pescatore, Chris Wysopal
Apr 17, 2014Malware Analysis Essentials Using REMnux w/ Lenny ZeltserSymantecLenny Zeltser
Apr 16, 2014How to Limit the Risk of Attack on your XP AssetsAlienVaultTom D'Aquino
Apr 15, 2014Reconstructing User Activity with Memory ForensicsAlissa Torres
Apr 11, 2014The Other Side of Heartbleed - Clientside Heartbleed Vulnerabilities ExplainedJohannes Ullrich, PhD
Apr 10, 2014HeartBleed Vulnerability, Part 2
Apr 10, 2014What Your CISO WantsViewfinityFrank Kim
Apr 10, 2014OpenSSL "Heartbleed" VulnerabilityCloudPassage

Veracode
Apr 8, 2014Best Finds in DFIR for 2014David Cowen
Apr 3, 2014Detecting Evil on Windows Systems - An In-Depth Look at the DFIR PosterMike Pilkington, Rob Lee
Apr 1, 2014SANS Survey on Control Systems SecurityQualys

Raytheon | Websense

Cisco Systems Inc.

Tenable Network Security
Billy Rios, Jason Ostermann, Paul Asadoorian, Marc Blackmer, Derek Harp , Matthew Luallen
Mar 27, 2014Security Program Drivers and Wish Lists: SANS Financial Services Survey Results Part IIBlueCoat

FireEye

ForeScout Technologies

Raytheon Cyber Products

Cisco Systems Inc.

Tenable Network Security
Michael Crouse, Marc Blackmer, John Vecchi, John Pescatore, G. Mark Hardy
Mar 26, 2014Risks, Threats and Preparedness: Part I of the SANS Financial Services SurveyBlue Coat Systems, Inc.

FireEye

ForeScout Technologies

Raytheon Cyber Products

Cisco Systems Inc.

Tenable Network Security
Scott Gordon, Ed Dembowski, Jack Daniel, John Pescatore, G. Mark Hardy
Mar 25, 2014IP Theft: Collecting Artifact Evidence from the Cloud and MobileMagnet ForensicsJamie McQuaid, Jad Saliba, Heather Mahalik
Mar 24, 2014The Power of Lossless Packet Capture (1G-100G) & Real-time NetflowEmulexBoni Bruno, CISSP, CISM, CGEIT, Sonny Singh
Mar 20, 2014SANS Survey on Distributed Denial of ServiceCorero Ashley Stephenson
Mar 18, 2014Finding Advanced Threats Before They Strike: Advanced Threat Protection and ContainmentDamballa, Inc.Stephen Newman, Jerry Shenk
Mar 13, 2014Visibility at the Endpoint: The SANS 2014 Survey of Endpoint IntelligenceGuidance SoftwareJason Fredrickson, Jacob Williams
Mar 12, 2014Grand Theft Data: Why Are So Many Organizations Being Compromised?BeyondTrustEric Cole, PhD., Mike Poor
Mar 12, 2014Making Log and Event Management Easy for SMBsSolarWindsRob Johnson, Jerry Shenk
Mar 11, 2014Server Security: A Reality CheckCarbon BlackMichael Bilancieri, Jake Williams
Mar 10, 2014Your Pen-Test has a Glaring Weakness - Emulating the Attackers Better with Social EngineeringJames Lyne, Dave Shackleford
Mar 7, 2014SANS Financial Services Cyber Security Trends and Challenges BriefingInvincea

FireEye

ForeScout Technologies

Tenable Network Security
John Pescatore
Mar 6, 2014SANS Securing The Human for ICS EngineersMichael Assante
Mar 6, 2014Exposing Malicious Threats to Health Care ITNorseJeff Harrell, Barbara Filkins
Mar 5, 2014How to Strengthen the "Weakest Link" with Two-Factor AuthenticationDuo SecurityDavid Kennedy, Mark Stanislav
Mar 5, 2014SANS Asia-Pacific Series: A Taste of SANS SEC660 - Advanced Penetration Testing: Attacking Network DevicesStephen Sims
Mar 4, 2014Cybersecuring DOD ICS SystemsMichael Chipley
Mar 4, 2014ICS Attack SurfacesEric Cole, PhD.
Feb 26, 2014Mobile Malware and Spyware - Working Through the BugsCindy Murphy
Feb 21, 2014Successful Mitigation Techniques for 4 Common Web App VulnerabilitiesSteve Kosten
Feb 20, 2014The Critical Security Controls and the StealthWatch SystemLancopeCharles Herring, John Pescatore
Feb 18, 2014Secrets of Exploiting Local and Remote File InclusionJustin Searle
Feb 14, 2014Security Without Scanning for Today's Hybrid DatacenterMcAfee Ben Andrew, Dave Shackleford
Feb 13, 2014SIEM-plifying security monitoring: A different approach to security visibilityAlienVaultJoe Schreiber, Dave Shackleford
Feb 12, 2014Application Security Programs On the Rise, Skills Lacking: A SANS SurveyHP

Veracode

Qualys
Ryan English, Erik Peterson, Frank Kim, Will Bechtel
Feb 11, 2014SANS Asia-Pacific Series: APT Investigations HOWTO - The Forensic SideAISAJess Garcia
Feb 7, 2014Leveraging the Critical Security Controls to Mitigate User and Asset-based RiskBeyondTrustMichael Yaffe, Eric Cole, PhD.
Feb 6, 2014Continuous Monitoring and Mitigation: Responding to Emerging ThreatsIBMMark Hafner
Feb 6, 2014SANS Asia-Pacific Webcast Series: Mobile Device ForensicsPaul A. Henry
Feb 6, 2014SANS Asia-Pacific Series: Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To GuideMichael Assante
Feb 5, 2014Secure, enterprise-grade file sharing and mobile productivityWatchDoxTim Choi
Feb 4, 2014Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To GuideAlert EnterpriseMichael Assante
Jan 31, 20143 Tips to Fund Your Security Initiatives by Leveraging Business ObjectivesHP Michi Kossowsky, Katherine Lam
Jan 22, 2014Security Analytics: Moving From Collecting Threat Data and Continuous Monitoring into Security ActionJohn Pescatore
Jan 21, 2014Overcoming Barriers to Making Cyber Security AdvancesEiQnetworksBrian Mehlman, John Pescatore
Jan 17, 2014Sneak Peek at the Cyber Threat Intelligence SummitMike Cloppert
Jan 16, 2014How to Detect SQL Injection & XSS Attacks using SIEM Event CorrelationAlienVaultTom D'Aquino
Jan 15, 2014SANS Analyst Webcast: SANS Survey on Securing The Internet of ThingsCodenomicon

Norse
Mike Jawetz, Bart Pestarino, John Pescatore
Jan 14, 2014Using Oracle Audit Vault and Database Firewall for Data ProtectionOracleTanya Baccam
Jan 13, 2014HTML5: Risky Business or Hidden Security Tool Chest for Mobile Web App AuthenticationJohannes Ullrich, PhD
Jan 7, 2014Improving Security Through IT/OT CollaborationGraham Speake

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.