Last Day to Save $400 on SANS Chicago 2015

Webcasts: Archive

Archive
Date Title Sponsor Type
Dec 22, 2014Build "Muscle Memory" with Rekall Memory Forensic FrameworkSpecial Webcast
Dec 18, 2014How to Give the Best Pen Test of your LifeAsia-Pacific Series
Dec 17, 2014Tis the Season for Data Breaches and Stolen IdentitySophos Inc.Special Webcast
Dec 16, 2014Hands on USN Journal AnalysisSpecial Webcast
Dec 15, 2014Analyst Webcast: Advanced Network Protection with McAfee Next Generation FirewallMcAfee. Part of Intel Security.Analyst Webcast
Dec 12, 2014A Managed Approach to Security Controls to Ensure Effective SecurityEiQnetworksSpecial Webcast
Dec 11, 2014If All Is Quiet, Are You Really Secure? Understanding Zero-Day VulnerabilitiesRisk I/O

VeriSign, Inc.
Special Webcast
Dec 11, 2014SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 2Cigital, Inc.

CloudPassage

FireEye

Qualys

RiskIQ

Tenable Network Security

Trend Micro Inc.
Analyst Webcast
Dec 10, 2014The Bash Vulnerability: Practical Tips to Secure your EnvironmentAlienVaultWednesday Webcast
Dec 9, 2014SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 1Cigital, Inc.

CloudPassage

FireEye

Qualys

RiskIQ

Tenable Network Security

Trend Micro Inc.
Analyst Webcast
Dec 4, 2014Tis the Season for Data Breaches and Stolen IdentitySophos Inc.Special Webcast
Dec 3, 2014Closing the Door on Web ShellsWednesday Webcast
Dec 2, 2014BlackEnergy 2: ICS-Focused ThreatsSpecial Webcast
Nov 24, 2014The Value of On-Demand Endpoint VisibilityMcAfee. Part of Intel Security.Wednesday Webcast
Nov 20, 2014Beating the Status Quo: Reinforce Your Defense to Detect & Resolve Evolving ThreatsNarus, Inc.Special Webcast
Nov 19, 2014Top 10 1/2 Things That Can Undermine Your Security ProgramWhiteHat SecurityWednesday Webcast
Nov 18, 2014What's in your software? Reduce risk from third-party and open source components.VeracodeTool Talk Webcast
Nov 17, 2014Thwarting Threat Actors With DomainToolsDomainToolsSpecial Webcast
Nov 14, 2014Securing Personal and Mobile Device Use with Next-Gen Network Access ControlsForeScout TechnologiesAnalyst Webcast
Nov 13, 2014Protecting DNS: Securing Your Internet Address BookInfoBloxSpecial Webcast
Nov 12, 2014Mitigating Employee Risk - Keep Hires from Starting FiresSpectorSoftWednesday Webcast
Nov 12, 2014Continuous Ownage: Why you Need Continuous MonitoringWednesday Webcast
Nov 11, 2014CyberCity Hands-on Kinetic Cyber Range WebcastSpecial Webcast
Nov 6, 2014Be Ready for a Breach with Intelligent ResponseMcAfee. Part of Intel Security.Analyst Webcast
Nov 5, 2014The Evolution of IDS: Why Context is KeyAlienVaultAsk The Expert Webcast
Oct 30, 2014Ramping Up Your Phishing ProgramSpecial Webcast
Oct 29, 2014Zen and The Art of Network SegmentationTufin TechnologiesWednesday Webcast
Oct 28, 2014Quantifying Security Performance: The Why, What and How of Security RatingsBitsightSpecial Webcast
Oct 27, 2014You Can't Discover a Malware Pandemic by Diagnosing One PatientSpecial Webcast
Oct 22, 2014Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneAlienVaultWednesday Webcast
Oct 21, 2014Top 3 Threats to Retail IT Security and How You Can Defend your DataDuo SecuritySpecial Webcast
Oct 20, 2014Demons, Monsters and Ghouls: Hunting Security Problems in HealthcareSpecial Webcast
Oct 17, 2014Next Generation Endpoint Security to Stay Ahead of Evolving Advanced Targeted ThreatsPromisecSpecial Webcast
Oct 16, 2014Measuring Human Risk: What is Your Organization's Security Score?SymantecSpecial Webcast
Oct 15, 2014What do you need to know about POODLE?Special Webcast
Oct 15, 2014Breaches Happen: Be PreparedSymantecAnalyst Webcast
Oct 14, 20142nd Annual Analytics and Intelligence Survey - Pt 2. Future State: Improving Intelligence and Threat ProtectionAlienVault

HP

LogRhythm

McAfee. Part of Intel Security.

Rapid7 Inc.

ThreatStream
Analyst Webcast
Oct 9, 20142nd Annual Analytics and Intelligence SurveyAlienVault

HP

LogRhythm

McAfee. Part of Intel Security.

Rapid7 Inc.

ThreatStream
Analyst Webcast
Oct 9, 2014Enabling Network Monitoring to Become System IntelligenceSpecial Webcast
Oct 8, 2014Securing The Human in EMEA - Next Generation Awareness ProgramsWednesday Webcast
Oct 8, 2014Patch Pwnage: Ripping Apart Microsoft Patches to Build ExploitsAsia-Pacific Series
Oct 6, 2014Log and Event Management SurveyVMWare, IncSpecial Webcast
Oct 3, 2014Detect Ransomware Before its Too Late with AlienVault USMAlienVaultSpecial Webcast
Oct 2, 2014How to Prevent One Hundred Percent of Browser-Borne MalwareSpikes Security Tool Talk Webcast
Oct 1, 2014Shell Shock - What you need to knowVeracodeSANS Flash Webcast
Sep 30, 2014Network Segmentation Best Practices for DefensePalo Alto NetworksSpecial Webcast
Sep 26, 2014Detecting Risky Activity "Wherever" Before It Becomes A ProblemRapid7 Inc.Analyst Webcast
Sep 25, 2014Hardening Retail Security: Why and How to Prevent Breaches and AttacksLogRhythmAnalyst Webcast
Sep 23, 2014Security for the People: End-User Authentication Security on the InternetDuo SecurityWednesday Webcast
Sep 19, 2014Database Encryption - Defining the Root of TrustUtimacoSpecial Webcast
Sep 18, 2014Secure, Enterprise-Grade File Sharing and Mobile ProductivityWatchDoxTool Talk Webcast
Sep 17, 2014More web traffic, more problems. How CARFAX consolidated security concerns, saved money and grew their businessF5 Networks, Inc.Special Webcast
Sep 16, 2014Simplifying Data Encryption and Redaction Without Touching the CodeOracleAnalyst Webcast
Sep 15, 2014Speeding up the Investigation of Employee Policy ViolationsMagnet ForensicsAsk The Expert Webcast
Sep 11, 2014ICS 515: Active Defense and Response Sneak PeakSpecial Webcast
Sep 10, 2014Prepared for the WorstLifeLock Business SolutionsSpecial Webcast
Sep 9, 2014The Critical Security Controls: From Adoption to Implementation A SANS SurveyEiQnetworks

McAfee. Part of Intel Security.

Qualys

Tripwire, Inc.
Analyst Webcast
Sep 8, 2014Your App is Leaking! - Bypassing Exploit Mitigations for Pentesters...Special Webcast
Sep 8, 2014FOR572 Advanced Network Forensics and Analysis Preview: DHCP and DNS, "The Correlators"AISAAsia-Pacific Series
Sep 5, 2014Simple, Effective Patch Management: From Dilemma to Done DeedDell KACEWednesday Webcast
Sep 5, 2014Solving Insider Threats in Law EnforcementRaytheonAnalyst Webcast
Sep 4, 2014Get Smart: Consuming Threat Intelligence to Advance your Cyber Security ProgramBit9 + Carbon BlackAsk The Expert Webcast
Sep 3, 2014How to Detect System Compromise & Data ExfiltrationAlienVaultSpecial Webcast
Aug 26, 2014Nine Steps toward a Successful Insider Threat ProgramRaytheonSpecial Webcast
Aug 25, 2014How Not To Fail at a Pen TestSpecial Webcast
Aug 20, 2014Under Threat or Compromise: Every Detail CountsBlue Coat Systems, Inc.Analyst Webcast
Aug 19, 2014Building a Content Security PolicySpecial Webcast
Aug 15, 2014Incident Response Part 2: Growing and Maturing An IR CapabilityAccessData Corp.

AlienVault

Arbor Networks

Bit9 + Carbon Black

HP

McAfee. Part of Intel Security.
Analyst Webcast
Aug 14, 2014Incident Response Part 1: Incident Response Techniques and Processes: Where We Are in the Six-Step ProcessAccessData Corp.

AlienVault

Arbor Networks

Bit9 + Carbon Black

HP

McAfee. Part of Intel Security.
Analyst Webcast
Aug 13, 2014Ghost In The Supply Chain: How Advanced Attackers Exploit Vulnerabilities In Your Supply ChainDuo SecurityWednesday Webcast
Aug 12, 2014Cyber Security Metrics and Measuring VulnerabilitySpecial Webcast
Aug 12, 2014What Works: Using Fidelis XPS to Detect and Block Advanced Targeted Threats and Foreign Espionage to Protect Trade SecretsGeneral Dynamics Fidelis Cybersecurity WhatWorks Webcast
Aug 11, 2014Security Awareness Webcast - Hosted by Lance SpitznerSpecial Webcast
Aug 8, 2014SQL Injection ExploitedSpecial Webcast
Aug 1, 2014SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART II Afternoon SessionFiremon

ForeScout Technologies

Xceedium

Trend Micro Inc.

IBM

Splunk

Tenable Network Security
Special Webcast
Aug 1, 2014SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART IIFiremon

ForeScout Technologies

Xceedium

Trend Micro Inc.

IBM

Splunk

Tenable Network Security
Special Webcast
Jul 31, 2014Demanding MOAR From Your Vulnerability Assessments & Pen Tests by Ed SkoudisBeyondTrustAsk The Expert Webcast
Jul 30, 2014An Incident Response Playbook: From Monitoring to OperationsAlienVaultAsk The Expert Webcast
Jul 29, 2014The Modern Incident Responder: Detect, Respond and Recover from a Data BreachBit9 + Carbon BlackSpecial Webcast
Jul 22, 2014Industrial Control Systems Security BriefingWaterfall Security

Palo Alto Networks

Ioactive Inc.
Special Webcast
Jul 17, 2014Get Real-time Threat Detection Starting on Day 1 with AlienVault USMAlienVaultTool Talk Webcast
Jul 10, 2014SANS Securing The Human for HealthcareSpecial Webcast
Jul 10, 2014It's not about the number of filters-it's how effective they are.HP Ask The Expert Webcast
Jul 9, 2014How To Not Fail At PentestingSpecial Webcast
Jul 8, 2014USB Devices and Media Transfer Protocol: Identifying the Existence of Data Exfiltration ArtifactsSpecial Webcast
Jul 2, 2014Designing and Implementing a Honeypot on a SCADA NetworkWednesday Webcast
Jul 2, 2014Stop Giving the Offense an Unfair AdvantageAsia-Pacific Series
Jun 30, 2014DFIR Advanced Smartphone ForensicsSpecial Webcast
Jun 26, 2014Insider Threat Kill Chain: Detecting Human Indicators of CompromiseTripwire, Inc.Wednesday Webcast
Jun 25, 2014Using a SOC as a Security Force MultiplierHP Ask The Expert Webcast
Jun 24, 2014Looking Beyond Layers: Why Authentication Security Matters MostDuo SecurityWednesday Webcast
Jun 23, 2014Health Care Data for Sale: Now What?Palo Alto NetworksSpecial Webcast
Jun 19, 2014Sensor and Intelligence Collaboration for Killing MalwareHP Analyst Webcast
Jun 18, 2014Reaping the Benefits of Continuous Monitoring and Mitigation At Pioneer InvestmentsForeScout TechnologiesWhatWorks Webcast
Jun 17, 2014Higher Education: Open and Secure? A SANS SurveyTenable Network Security

Trend Micro Inc.

AlienVault
Analyst Webcast
Jun 13, 2014Practical Threat Management and Incident Response for the Small- to Medium-Sized EnterpriseAlienVaultAnalyst Webcast
Jun 12, 2014Endpoint Threat Detection, Response and Prevention for DummiesBit9 + Carbon BlackSpecial Webcast
Jun 11, 2014Needs of a Modern Incident Response ProgramLancopeWednesday Webcast
Jun 10, 2014Fighting the Insider Threat: Privilege Management and Abuse Prevention StrategiesRaytheonAsk The Expert Webcast
Jun 5, 2014Sneak Peek at the SANS San Francisco Cybersecurity Training EventSpecial Webcast
Jun 5, 2014Saving Time and Resources Managing Administrator Rights with a Process-based Whitelist ModelViewfinityWhatWorks Webcast
Jun 5, 2014Internet Storm Center Briefing on Today's OpenSSL Security PatchesISC Threat Update
Jun 4, 2014Best Practices for Leveraging Security Threat IntelligenceAlienVaultWednesday Webcast
May 28, 2014Transforming Your Security Investment into an Early Warning System Against Cyber ThreatsPromisecSpecial Webcast
May 27, 2014Demystifying Security Controls for IT Risk & Audit ProfessionalsBit9 + Carbon BlackSpecial Webcast
May 23, 2014Threat Intelligence: What It Is, and Why Your Security Program Needs More of ItHP Special Webcast
May 22, 2014How Defense-In-Depth Helps Protect You From Unexpected Vulnerabilities Like HeartbleedDuo SecuritySpecial Webcast
May 21, 2014Securing Web Applications: Identifying and Managing Risks with Programming Languages and FrameworksWhiteHat SecurityWednesday Webcast
May 20, 2014Towards a More Secure Public Cloud: What You Need to DoCloudLockAsk The Expert Webcast
May 20, 2014Mobile Device ForensicsAsia-Pacific Series
May 15, 2014Effective Anti-malware in Virtualized EnvironmentsSophos Inc.Ask The Expert Webcast
May 14, 2014Going 'All In' for Protection and Compliance with the Critical Security Controls at Sun Country AirlinesMcAfee. Part of Intel Security.WhatWorks Webcast
May 13, 2014FOR585 Advanced Smartphone and Mobile Device Forensics Preview: Android vs. iOS - Battle of the Smartphones: Data RetentionWednesday Webcast
May 9, 2014The Application Blind-spotHP Special Webcast
May 8, 2014SANS 2014 Salary Survey: The State of Security Professionals TodayArbor NetworksWednesday Webcast
May 7, 201410 Ways To Rock Your SOCGeneral Dynamics Fidelis Cybersecurity Wednesday Webcast
May 6, 2014Closing the Book on Heartbleed - and Avoiding Future Sad StoriesHP

LogRhythm

Qualys
Special Webcast
May 5, 2014When Macs get HackedSpecial Webcast
May 2, 2014Why Train?Special Webcast
May 2, 2014Extracting Windows Credentials using Memory ForensicsSpecial Webcast
May 1, 2014Logs, Logs, Every Where / Nor Any Byte to GrokWednesday Webcast
Apr 30, 2014Need to defeat APTs? Tony Sager Explains Where We're At With Live Threat Detection AutomationPalo Alto NetworksAnalyst Webcast
Apr 30, 2014Secrets of Exploiting Blind SQL InjectionHP Ask The Expert Webcast
Apr 29, 2014Defending ICS Against Cyberthreats with Next Generation SecurityPalo Alto NetworksAsk The Expert Webcast
Apr 23, 2014SIEM, Security Intelligence and the Critical Security ControlsLogRhythmAnalyst Webcast
Apr 22, 2014The 2014 Security Trends Forecast: What Does 2014 Hold for Security and Its Impact on Business Professionals?Cisco Systems Inc. Special Webcast
Apr 18, 2014Heartbleed Update: Making Sure You Have Stopped the Bleeding and Reducing the Chance of Future Blood-lettingVeracodeAsk The Expert Webcast
Apr 17, 2014Malware Analysis Essentials Using REMnux w/ Lenny ZeltserSymantecSpecial Webcast
Apr 16, 2014How to Limit the Risk of Attack on your XP AssetsAlienVaultSpecial Webcast
Apr 14, 2014Reconstructing User Activity with Memory ForensicsAsia-Pacific Series
Apr 11, 2014The Other Side of Heartbleed - Clientside Heartbleed Vulnerabilities ExplainedSpecial Webcast
Apr 10, 2014HeartBleed Vulnerability, Part 2Special Webcast
Apr 10, 2014What Your CISO WantsViewfinitySpecial Webcast
Apr 9, 2014OpenSSL "Heartbleed" VulnerabilityCloudPassage

Veracode
Special Webcast
Apr 8, 2014Best Finds in DFIR for 2014Wednesday Webcast
Apr 3, 2014Detecting Evil on Windows Systems - An In-Depth Look at the DFIR PosterSpecial Webcast
Apr 1, 2014SANS Survey on Control Systems SecurityQualys

Raytheon

Cisco Systems Inc.

Tenable Network Security
Ask The Expert Webcast
Mar 27, 2014Security Program Drivers and Wish Lists: SANS Financial Services Survey Results Part IIBlueCoat

FireEye

ForeScout Technologies

Raytheon Cyber Products

Cisco Systems Inc.

Tenable Network Security
Analyst Webcast
Mar 26, 2014Risks, Threats and Preparedness: Part I of the SANS Financial Services SurveyBlue Coat Systems, Inc.

FireEye

ForeScout Technologies

Raytheon Cyber Products

Cisco Systems Inc.

Tenable Network Security
Ask The Expert Webcast
Mar 25, 2014IP Theft: Collecting Artifact Evidence from the Cloud and MobileMagnet ForensicsAsk The Expert Webcast
Mar 24, 2014The Power of Lossless Packet Capture (1G-100G) & Real-time NetflowEmulexTool Talk Webcast
Mar 20, 2014SANS Survey on Distributed Denial of ServiceCorero Analyst Webcast
Mar 18, 2014Finding Advanced Threats Before They Strike: Advanced Threat Protection and ContainmentDamballa, Inc.Special Webcast
Mar 13, 2014Visibility at the Endpoint: The SANS 2014 Survey of Endpoint IntelligenceGuidance SoftwareAnalyst Webcast
Mar 12, 2014Grand Theft Data: Why Are So Many Organizations Being Compromised?BeyondTrustWednesday Webcast
Mar 12, 2014Making Log and Event Management Easy for SMBsSolarWindsAnalyst Webcast
Mar 11, 2014Server Security: A Reality CheckBit9 + Carbon BlackSpecial Webcast
Mar 10, 2014Your Pen-Test has a Glaring Weakness - Emulating the Attackers Better with Social EngineeringSpecial Webcast
Mar 7, 2014SANS Financial Services Cyber Security Trends and Challenges BriefingInvincea

FireEye

ForeScout Technologies

Tenable Network Security
Special Webcast
Mar 6, 2014SANS Securing The Human for ICS EngineersSpecial Webcast
Mar 6, 2014Exposing Malicious Threats to Health Care ITNorseAnalyst Webcast
Mar 5, 2014How to Strengthen the "Weakest Link" with Two-Factor AuthenticationDuo SecurityWednesday Webcast
Mar 5, 2014SANS Asia-Pacific Series: A Taste of SANS SEC660 - Advanced Penetration Testing: Attacking Network DevicesAsia-Pacific Series
Mar 4, 2014Cybersecuring DOD ICS SystemsSpecial Webcast
Mar 3, 2014ICS Attack SurfacesAsia-Pacific Series
Feb 26, 2014Mobile Malware and Spyware - Working Through the BugsWednesday Webcast
Feb 21, 2014Successful Mitigation Techniques for 4 Common Web App VulnerabilitiesSpecial Webcast
Feb 20, 2014The Critical Security Controls and the StealthWatch SystemLancopeSpecial Webcast
Feb 18, 2014Secrets of Exploiting Local and Remote File InclusionSpecial Webcast
Feb 14, 2014Security Without Scanning for Today's Hybrid DatacenterMcAfee. Part of Intel Security.Analyst Webcast
Feb 13, 2014SIEM-plifying security monitoring: A different approach to security visibilityAlienVaultSpecial Webcast
Feb 12, 2014Application Security Programs On the Rise, Skills Lacking: A SANS SurveyHP

Veracode

Qualys
Wednesday Webcast
Feb 10, 2014SANS Asia-Pacific Series: APT Investigations HOWTO - The Forensic SideAISAAsia-Pacific Series
Feb 7, 2014Leveraging the Critical Security Controls to Mitigate User and Asset-based RiskBeyondTrustSpecial Webcast
Feb 6, 2014Continuous Monitoring and Mitigation: Responding to Emerging ThreatsIBMSpecial Webcast
Feb 6, 2014SANS Asia-Pacific Webcast Series: Mobile Device ForensicsAsk The Expert Webcast
Feb 5, 2014SANS Asia-Pacific Series: Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To GuideAsia-Pacific Series
Feb 5, 2014Secure, enterprise-grade file sharing and mobile productivityWatchDoxTool Talk Webcast
Feb 4, 2014Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To GuideAlert EnterpriseSpecial Webcast
Jan 31, 20143 Tips to Fund Your Security Initiatives by Leveraging Business ObjectivesHP Tool Talk Webcast
Jan 22, 2014Security Analytics: Moving From Collecting Threat Data and Continuous Monitoring into Security ActionWednesday Webcast
Jan 21, 2014Overcoming Barriers to Making Cyber Security AdvancesEiQnetworksAsk The Expert Webcast
Jan 17, 2014Sneak Peek at the Cyber Threat Intelligence SummitWhatWorks Summit Series Webcast
Jan 16, 2014How to Detect SQL Injection & XSS Attacks using SIEM Event CorrelationAlienVaultSpecial Webcast
Jan 15, 2014SANS Analyst Webcast: SANS Survey on Securing The Internet of ThingsCodenomicon

Norse
Analyst Webcast
Jan 14, 2014Using Oracle Audit Vault and Database Firewall for Data ProtectionOracleAnalyst Webcast
Jan 13, 2014HTML5: Risky Business or Hidden Security Tool Chest for Mobile Web App AuthenticationSpecial Webcast
Jan 7, 2014Improving Security Through IT/OT CollaborationSpecial Webcast

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, email sales@sans.org for more information.