iPad Pro w/ Magic KB, Surface Go 2, or $350 Off with OnDemand Training - Register Now

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
Monday, December 22, 2014
at 1:00 PM EST
(2014-12-22 18:00 UTC)
Build "Muscle Memory" with Rekall Memory Forensic FrameworkAlissa Torres
Thursday, December 18, 2014
at 11:00 PM EST
(2014-12-19 04:00 UTC)
How to Give the Best Pen Test of your LifeEd Skoudis
Wednesday, December 17, 2014
at 1:00 PM EST
(2014-12-17 18:00 UTC)
Tis the Season for Data Breaches and Stolen IdentitySophos Inc.
Chester Wisniewski
Tuesday, December 16, 2014
at 1:00 PM EST
(2014-12-16 18:00 UTC)
Hands on USN Journal AnalysisDavid Cowen
Monday, December 15, 2014
at 3:00 PM EST
(2014-12-15 20:00 UTC)
Analyst Webcast: Advanced Network Protection with McAfee Next Generation FirewallMcafee LLC
Steven Smith, Dave Shackleford
Friday, December 12, 2014
at 3:00 PM EDT
(2014-12-12 20:00 UTC)
A Managed Approach to Security Controls to Ensure Effective SecurityEiQnetworks
Kevin Landt
Thursday, December 11, 2014
at 3:00 PM EST
(2014-12-11 20:00 UTC)
If All Is Quiet, Are You Really Secure? Understanding Zero-Day VulnerabilitiesRisk I/O
VeriSign, Inc.
Michael Roytman, Jayson Jean
Thursday, December 11, 2014
at 1:00 PM EST
(2014-12-11 18:00 UTC)
SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 2Cigital, Inc.
CloudPassage
FireEye
Qualys
RiskIQ
Tenable
Trend Micro Inc.
Barbara Filkins, Nicholai Piagentini, Jay Schulman, Jonathan Trull
Wednesday, December 10, 2014
at 1:00 PM EST
(2014-12-10 18:00 UTC)
The Bash Vulnerability: Practical Tips to Secure your EnvironmentAlienVault
Garrett Gross, Victor Obando
Tuesday, December 09, 2014
at 1:00 PM EST
(2014-12-09 18:00 UTC)
SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 1Cigital, Inc.
CloudPassage
FireEye
Qualys
RiskIQ
Tenable
Trend Micro Inc.
Barbara Filkins, Paul Crutchfield, Elias Manousos, Rajiv Raghunarayan, JD Sherry
Thursday, December 04, 2014
at 3:00 PM EST
(2014-12-04 20:00 UTC)
Tis the Season for Data Breaches and Stolen IdentitySophos Inc.
Chester Wisniewski
Wednesday, December 03, 2014
at 11:00 AM EST
(2014-12-03 16:00 UTC)
Closing the Door on Web ShellsAnuj Soni
Tuesday, December 02, 2014
at 1:00 PM EST
(2014-12-02 18:00 UTC)
BlackEnergy 2: ICS-Focused ThreatsRobert Huber, Tim Conway, Michael Assante
Monday, November 24, 2014
at 3:00 PM EST
(2014-11-24 20:00 UTC)
The Value of On-Demand Endpoint VisibilityMcafee LLC
Bret Lenmark, Dave Shackleford
Thursday, November 20, 2014
at 3:00 PM EDT
(2014-11-20 20:00 UTC)
Beating the Status Quo: Reinforce Your Defense to Detect & Resolve Evolving ThreatsNarus, Inc.
Mohan Sadashiva, John Pescatore
Wednesday, November 19, 2014
at 1:00 PM EDT
(2014-11-19 18:00 UTC)
Top 10 1/2 Things That Can Undermine Your Security ProgramWhiteHat Security
Gabe Gumbs, Jerry Hoff, Johannes Ullrich, PhD
Tuesday, November 18, 2014
at 11:00 AM EDT
(2014-11-18 16:00 UTC)
What's in your software? Reduce risk from third-party and open source components.Veracode
Phil Neray, Adrian Lane
Monday, November 17, 2014
at 1:00 PM EST
(2014-11-17 18:00 UTC)
Thwarting Threat Actors With DomainToolsDomainTools
Tim Helming, John Pescatore
Friday, November 14, 2014
at 1:00 PM EST
(2014-11-14 18:00 UTC)
Securing Personal and Mobile Device Use with Next-Gen Network Access ControlsForescout Technologies BV
Joshua Wright, Jack Marsal, Matt Santill
Thursday, November 13, 2014
at 1:00 PM EST
(2014-11-13 18:00 UTC)
Protecting DNS: Securing Your Internet Address BookInfoBlox
Cricket Liu, John Pescatore
Wednesday, November 12, 2014
at 1:00 PM EST
(2014-11-12 18:00 UTC)
Mitigating Employee Risk - Keep Hires from Starting FiresVeriato
Mike Tierney, Dominique Cultrera - GPHR/PHR/PHR-CA
Wednesday, November 12, 2014
at 10:00 AM EST
(2014-11-12 15:00 UTC)
Continuous Ownage: Why you Need Continuous MonitoringEric Conrad
Tuesday, November 11, 2014
at 1:00 PM EDT
(2014-11-11 18:00 UTC)
CyberCity Hands-on Kinetic Cyber Range WebcastTim Medin, Ed Skoudis
Thursday, November 06, 2014
at 1:00 PM EST
(2014-11-06 18:00 UTC)
Be Ready for a Breach with Intelligent ResponseMcafee LLC
Ofir Arkin, James Tarala
Wednesday, November 05, 2014
at 1:00 PM EST
(2014-11-05 18:00 UTC)
The Evolution of IDS: Why Context is KeyAlienVault
Joe Schreiber, Dave Shackleford
Thursday, October 30, 2014
at 9:00 AM EDT
(2014-10-30 13:00 UTC)
Ramping Up Your Phishing ProgramPlease Check Back
Wednesday, October 29, 2014
at 11:00 AM EDT
(2014-10-29 15:00 UTC)
Zen and The Art of Network SegmentationTufin Technologies
Reuven Harrison, John Pescatore
Tuesday, October 28, 2014
at 1:00 PM EDT
(2014-10-28 17:00 UTC)
Quantifying Security Performance: The Why, What and How of Security RatingsBitsight
Stephen Boyer, John Pescatore
Monday, October 27, 2014
at 1:00 PM EDT
(2014-10-27 17:00 UTC)
You Can't Discover a Malware Pandemic by Diagnosing One PatientAndrew Hay
Wednesday, October 22, 2014
at 1:00 PM EDT
(2014-10-22 17:00 UTC)
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneAlienVault
Garrett Gross, Victor Obando
Tuesday, October 21, 2014
at 3:30 PM EDT
(2014-10-21 19:30 UTC)
Top 3 Threats to Retail IT Security and How You Can Defend your DataDuo Security
Josh Daymont, Brian Nuszkowski, Dave Shackleford
Monday, October 20, 2014
at 1:00 PM EDT
(2014-10-20 17:00 UTC)
Demons, Monsters and Ghouls: Hunting Security Problems in HealthcarePlease Check Back
Friday, October 17, 2014
at 1:00 PM EDT
(2014-10-17 17:00 UTC)
Next Generation Endpoint Security to Stay Ahead of Evolving Advanced Targeted ThreatsPromisec
Steve Lowing, John Pescatore
Thursday, October 16, 2014
at 1:00 PM EDT
(2014-10-16 17:00 UTC)
Measuring Human Risk: What is Your Organization's Security Score?Symantec
Please Check Back
Wednesday, October 15, 2014
at 3:00 PM EDT
(2014-10-15 19:00 UTC)
What do you need to know about POODLE?Johannes Ullrich, PhD
Wednesday, October 15, 2014
at 1:00 PM EDT
(2014-10-15 17:00 UTC)
Breaches Happen: Be PreparedSymantec
Kat Pelak, Stephen Northcutt
Tuesday, October 14, 2014
at 1:00 PM EDT
(2014-10-14 17:00 UTC)
2nd Annual Analytics and Intelligence Survey - Pt 2. Future State: Improving Intelligence and Threat ProtectionAlienVault
HP
LogRhythm
Mcafee LLC
Rapid7 Inc.
Anomali
Dave Shackleford, Colby DeRodeff, Seth Goldhammer, Nicholas J. Percoco
Thursday, October 09, 2014
at 1:00 PM EDT
(2014-10-09 17:00 UTC)
2nd Annual Analytics and Intelligence SurveyAlienVault
HP
LogRhythm
Mcafee LLC
Rapid7 Inc.
Anomali
Sridhar Karnam, Dave Shackleford, Mark Allen, Ted Pan
Thursday, October 09, 2014
at 11:00 AM EDT
(2014-10-09 15:00 UTC)
Enabling Network Monitoring to Become System IntelligenceGraham Speake
Wednesday, October 08, 2014
at 10:00 AM EDT
(2014-10-08 14:00 UTC)
Securing The Human in EMEA - Next Generation Awareness ProgramsLance Spitzner
Wednesday, October 08, 2014
at 2:00 AM EDT
(2014-10-08 06:00 UTC)
Patch Pwnage: Ripping Apart Microsoft Patches to Build ExploitsStephen Sims
Monday, October 06, 2014
at 1:00 PM EDT
(2014-10-06 17:00 UTC)
Log and Event Management SurveyVMWare, Inc
Bill Roth, Jerry Shenk
Friday, October 03, 2014
at 1:00 PM EDT
(2014-10-03 17:00 UTC)
Detect Ransomware Before its Too Late with AlienVault USMAlienVault
Victor Obando
Thursday, October 02, 2014
at 1:00 PM EDT
(2014-10-02 17:00 UTC)
How to Prevent One Hundred Percent of Browser-Borne MalwareSpikes Security
Franklyn Jones
Wednesday, October 01, 2014
at 3:00 PM EDT
(2014-10-01 19:00 UTC)
Shell Shock - What you need to knowVeracode
Chris Wysopal, Johannes Ullrich, PhD
Tuesday, September 30, 2014
at 1:00 PM EDT
(2014-09-30 17:00 UTC)
Network Segmentation Best Practices for DefensePalo Alto Networks
James Tarala, Isabelle Dumont
Friday, September 26, 2014
at 1:00 PM EDT
(2014-09-26 17:00 UTC)
Detecting Risky Activity "Wherever" Before It Becomes A ProblemRapid7 Inc.
Jay Roxe, Jerry Shenk
Thursday, September 25, 2014
at 1:00 PM EDT
(2014-09-25 17:00 UTC)
Hardening Retail Security: Why and How to Prevent Breaches and AttacksLogRhythm
Erick Ingleby, John Pescatore
Tuesday, September 23, 2014
at 3:00 PM EDT
(2014-09-23 19:00 UTC)
Security for the People: End-User Authentication Security on the InternetDuo Security
Paul Roberts, Mark Stanislav
Friday, September 19, 2014
at 1:00 PM EDT
(2014-09-19 17:00 UTC)
Database Encryption - Defining the Root of TrustUtimaco
Greg Porter, Andreas Philipp
Thursday, September 18, 2014
at 1:00 PM EDT
(2014-09-18 17:00 UTC)
Secure, Enterprise-Grade File Sharing and Mobile ProductivityWatchDox
Tim Choi
Wednesday, September 17, 2014
at 3:00 PM EDT
(2014-09-17 19:00 UTC)
More web traffic, more problems. How CARFAX consolidated security concerns, saved money and grew their businessF5 Networks, Inc.
Chris Thomas, Preston Hogue, John Pescatore
Tuesday, September 16, 2014
at 3:00 PM EDT
(2014-09-16 19:00 UTC)
Simplifying Data Encryption and Redaction Without Touching the CodeOracle
Dave Shackleford
Monday, September 15, 2014
at 1:00 PM EDT
(2014-09-15 17:00 UTC)
Speeding up the Investigation of Employee Policy ViolationsMagnet Forensics
Jamie McQuaid, Jad Saliba, Rob Lee
Thursday, September 11, 2014
at 1:00 PM EDT
(2014-09-11 17:00 UTC)
ICS 515: Active Defense and Response Sneak PeakRobert M. Lee
Wednesday, September 10, 2014
at 1:00 PM EDT
(2014-09-10 17:00 UTC)
Prepared for the WorstLifeLock Business Solutions
Bill Dean, Eric Warbasse
Tuesday, September 09, 2014
at 1:00 PM EDT
(2014-09-09 17:00 UTC)
The Critical Security Controls: From Adoption to Implementation A SANS SurveyEiQnetworks
Mcafee LLC
Qualys
Tripwire, Inc.
Katherine Brocklehurst, Wolfgang Kandek, Tony Sager (moderator), James Tarala, Brian Mehlman, Barbara G. Kay
Monday, September 08, 2014
at 1:00 PM EDT
(2014-09-08 17:00 UTC)
Your App is Leaking! - Bypassing Exploit Mitigations for Pentesters...Please Check Back
Monday, September 08, 2014
at 4:00 AM EDT
(2014-09-08 08:00 UTC)
FOR572 Advanced Network Forensics and Analysis Preview: DHCP and DNS, "The Correlators"AISA
Philip Hagen
Friday, September 05, 2014
at 3:00 PM EDT
(2014-09-05 19:00 UTC)
Simple, Effective Patch Management: From Dilemma to Done DeedDell KACE
Please Check Back
Friday, September 05, 2014
at 1:00 PM EDT
(2014-09-05 17:00 UTC)
Solving Insider Threats in Law EnforcementRaytheon | Websense
Michael Crouse, Dr. Eric Cole
Thursday, September 04, 2014
at 2:00 PM EDT
(2014-09-04 18:00 UTC)
Get Smart: Consuming Threat Intelligence to Advance your Cyber Security ProgramCarbon Black
Harry Sverdlove, Dave Shackleford
Wednesday, September 03, 2014
at 1:00 PM EDT
(2014-09-03 17:00 UTC)
How to Detect System Compromise & Data ExfiltrationAlienVault
Tom D'Aquino
Tuesday, August 26, 2014
at 1:00 PM EDT
(2014-08-26 17:00 UTC)
Nine Steps toward a Successful Insider Threat ProgramRaytheon | Websense
Daniel Velez, Tanya Baccam
Monday, August 25, 2014
at 1:00 PM EDT
(2014-08-25 17:00 UTC)
How Not To Fail at a Pen TestJohn Strand, Ed Skoudis
Wednesday, August 20, 2014
at 1:00 PM EDT
(2014-08-20 17:00 UTC)
Under Threat or Compromise: Every Detail CountsBlue Coat Systems, Inc.
John Vecchi, Jacob Williams
Tuesday, August 19, 2014
at 1:00 PM EDT
(2014-08-19 17:00 UTC)
Building a Content Security PolicyEric Johnson
Friday, August 15, 2014
at 1:00 PM EDT
(2014-08-15 17:00 UTC)
Incident Response Part 2: Growing and Maturing An IR CapabilityAccessData Corp.
AlienVault
Arbor Networks
Carbon Black
HP
Mcafee LLC
Lucas Zaichkowsky, Jennifer Glenn, Jake Williams, Ben Johnson, Alissa Torres
Thursday, August 14, 2014
at 1:00 PM EDT
(2014-08-14 17:00 UTC)
Incident Response Part 1: Incident Response Techniques and Processes: Where We Are in the Six-Step ProcessAccessData Corp.
AlienVault
Arbor Networks
Carbon Black
HP
Mcafee LLC
Dan Larson, Russ Meyers, Patrick Bedwell, Jake Williams, Alissa Torres
Wednesday, August 13, 2014
at 1:00 PM EDT
(2014-08-13 17:00 UTC)
Ghost In The Supply Chain: How Advanced Attackers Exploit Vulnerabilities In Your Supply ChainDuo Security
Paul Roberts, James Lyne
Tuesday, August 12, 2014
at 3:00 PM EDT
(2014-08-12 19:00 UTC)
Cyber Security Metrics and Measuring VulnerabilityPeter Hannay, Dr. Andrew Woodward, Chandler Comerford
Tuesday, August 12, 2014
at 1:00 PM EDT
(2014-08-12 17:00 UTC)
What Works: Using Fidelis XPS to Detect and Block Advanced Targeted Threats and Foreign Espionage to Protect Trade SecretsFidelis Cybersecurity
John Pescatore
Monday, August 11, 2014
at 1:00 PM EDT
(2014-08-11 17:00 UTC)
Security Awareness Webcast - Hosted by Lance SpitznerPlease Check Back
Friday, August 08, 2014
at 1:00 PM EDT
(2014-08-08 17:00 UTC)
SQL Injection ExploitedMicah Hoffman
Friday, August 01, 2014
at 1:30 PM EDT
(2014-08-01 17:30 UTC)
SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART II Afternoon SessionFiremon
Forescout Technologies BV
Xceedium
Trend Micro Inc.
IBM Security
Splunk
Tenable
Tony Sager, John Pescatore, Alan Paller
Friday, August 01, 2014
at 8:00 AM EDT
(2014-08-01 12:00 UTC)
SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART IIFiremon
Forescout Technologies BV
Xceedium
Trend Micro Inc.
IBM
Splunk
Tenable
Tony Sager, John Pescatore, Alan Paller
Thursday, July 31, 2014
at 1:00 PM EDT
(2014-07-31 17:00 UTC)
Demanding MOAR From Your Vulnerability Assessments & Pen Tests by Ed SkoudisBeyondTrust
Morey J. Haber, Ed Skoudis
Wednesday, July 30, 2014
at 1:00 PM EDT
(2014-07-30 17:00 UTC)
An Incident Response Playbook: From Monitoring to OperationsAlienVault
Joe Schreiber, Dave Shackleford
Tuesday, July 29, 2014
at 1:00 PM EDT
(2014-07-29 17:00 UTC)
The Modern Incident Responder: Detect, Respond and Recover from a Data BreachCarbon Black
Jeffrey (J.J.) Guy
Tuesday, July 22, 2014
at 5:30 PM EDT
(2014-07-22 21:30 UTC)
Industrial Control Systems Security BriefingWaterfall Security
Palo Alto Networks
Ioactive Inc.
Please Check Back
Thursday, July 17, 2014
at 1:00 PM EDT
(2014-07-17 17:00 UTC)
Get Real-time Threat Detection Starting on Day 1 with AlienVault USMAlienVault
Tom D'Aquino
Thursday, July 10, 2014
at 3:00 PM EDT
(2014-07-10 19:00 UTC)
SANS Securing The Human for HealthcareJames Tarala
Thursday, July 10, 2014
at 11:00 AM EDT
(2014-07-10 15:00 UTC)
It's not about the number of filters-it's how effective they are.HP
Joanna Burkey, Dave Shackleford
Wednesday, July 09, 2014
at 8:00 AM EDT
(2014-07-09 12:00 UTC)
How To Not Fail At PentestingJohn Strand
Tuesday, July 08, 2014
at 1:00 PM EDT
(2014-07-08 17:00 UTC)
USB Devices and Media Transfer Protocol: Identifying the Existence of Data Exfiltration ArtifactsPlease Check Back
Wednesday, July 02, 2014
at 8:00 PM EDT
(2014-07-03 00:00 UTC)
Designing and Implementing a Honeypot on a SCADA NetworkCharlie Scott, Master's Degree Candidate - Masters Presentation
Wednesday, July 02, 2014
at 6:00 AM EDT
(2014-07-02 10:00 UTC)
Stop Giving the Offense an Unfair AdvantageEric Cole, PhD
Monday, June 30, 2014
at 1:00 PM EDT
(2014-06-30 17:00 UTC)
DFIR Advanced Smartphone ForensicsCindy Murphy
Thursday, June 26, 2014
at 12:30 PM EDT
(2014-06-26 16:30 UTC)
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseTripwire, Inc.
Bryce Schroeder
Wednesday, June 25, 2014
at 1:00 PM EDT
(2014-06-25 17:00 UTC)
Using a SOC as a Security Force MultiplierHP
Henri van Goethem, John Pescatore, Dr. Eric Cole
Tuesday, June 24, 2014
at 12:30 PM EDT
(2014-06-24 16:30 UTC)
Looking Beyond Layers: Why Authentication Security Matters MostDuo Security
Brian Kelly, Dave Shackleford
Monday, June 23, 2014
at 1:00 PM EDT
(2014-06-23 17:00 UTC)
Health Care Data for Sale: Now What?Palo Alto Networks
Isabelle Dumont, Greg Porter
Thursday, June 19, 2014
at 3:00 PM EDT
(2014-06-19 19:00 UTC)
Sensor and Intelligence Collaboration for Killing MalwareHP
Elisa Lippincott, Rob Vandenbrink
Wednesday, June 18, 2014
at 3:00 PM EDT
(2014-06-18 19:00 UTC)
Reaping the Benefits of Continuous Monitoring and Mitigation At Pioneer InvestmentsForescout Technologies BV
Ken Pfeil, John Pescatore
Tuesday, June 17, 2014
at 1:00 PM EDT
(2014-06-17 17:00 UTC)
Higher Education: Open and Secure? A SANS SurveyTenable
Trend Micro Inc.
AlienVault
Christopher Budd, Paul Asadoorian, Patrick Bedwell, Randy Marchany
Friday, June 13, 2014
at 1:00 PM EDT
(2014-06-13 17:00 UTC)
Practical Threat Management and Incident Response for the Small- to Medium-Sized EnterpriseAlienVault
Jake Williams, Patrick Bedwell
Thursday, June 12, 2014
at 1:00 PM EDT
(2014-06-12 17:00 UTC)
Endpoint Threat Detection, Response and Prevention for DummiesCarbon Black
Harry Sverdlove
Wednesday, June 11, 2014
at 1:00 PM EDT
(2014-06-11 17:00 UTC)
Needs of a Modern Incident Response ProgramLancope
Brandon Tansey, Tom Cross
Tuesday, June 10, 2014
at 1:00 PM EDT
(2014-06-10 17:00 UTC)
Fighting the Insider Threat: Privilege Management and Abuse Prevention StrategiesRaytheon | Websense
Michael Crouse, John Pescatore
Thursday, June 05, 2014
at 3:00 PM EDT
(2014-06-05 19:00 UTC)
Sneak Peek at the SANS San Francisco Cybersecurity Training EventPlease Check Back
Thursday, June 05, 2014
at 1:00 PM EDT
(2014-06-05 17:00 UTC)
Saving Time and Resources Managing Administrator Rights with a Process-based Whitelist ModelViewfinity
John Pescatore
Thursday, June 05, 2014
at 12:00 PM EST
(2014-06-05 16:00 UTC)
Internet Storm Center Briefing on Today's OpenSSL Security PatchesJohannes Ullrich, PhD
Wednesday, June 04, 2014
at 1:00 PM EDT
(2014-06-04 17:00 UTC)
Best Practices for Leveraging Security Threat IntelligenceAlienVault
Russell Spitler, Dave Shackleford
Wednesday, May 28, 2014
at 11:00 AM EDT
(2014-05-28 15:00 UTC)
Transforming Your Security Investment into an Early Warning System Against Cyber ThreatsPromisec
Steve Lowing, Eric Cole, PhD
Tuesday, May 27, 2014
at 1:00 PM EDT
(2014-05-27 17:00 UTC)
Demystifying Security Controls for IT Risk & Audit ProfessionalsCarbon Black
Chris Strand
Friday, May 23, 2014
at 12:30 PM EDT
(2014-05-23 16:30 UTC)
Threat Intelligence: What It Is, and Why Your Security Program Needs More of ItHP
Dave Shackleford
Thursday, May 22, 2014
at 1:00 PM EDT
(2014-05-22 17:00 UTC)
How Defense-In-Depth Helps Protect You From Unexpected Vulnerabilities Like HeartbleedDuo Security
Adam Goodman, Jake Williams
Wednesday, May 21, 2014
at 1:00 PM EDT
(2014-05-21 17:00 UTC)
Securing Web Applications: Identifying and Managing Risks with Programming Languages and FrameworksWhiteHat Security
Jeremiah Grossman, Johannes Ullrich, PhD
Tuesday, May 20, 2014
at 1:00 PM EDT
(2014-05-20 17:00 UTC)
Towards a More Secure Public Cloud: What You Need to DoCloudLock
Kevin O’Brien, John Pescatore
Tuesday, May 20, 2014
at 12:00 AM EDT
(2014-05-20 04:00 UTC)
Mobile Device ForensicsPaul A. Henry
Thursday, May 15, 2014
at 1:00 PM EDT
(2014-05-15 17:00 UTC)
Effective Anti-malware in Virtualized EnvironmentsSophos Inc.
Jeremiah Cornelius, Maxim Weinstein, John Pescatore
Wednesday, May 14, 2014
at 1:00 PM EDT
(2014-05-14 17:00 UTC)
Going 'All In' for Protection and Compliance with the Critical Security Controls at Sun Country AirlinesMcafee LLC
John Pescatore
Tuesday, May 13, 2014
at 1:00 PM EDT
(2014-05-13 17:00 UTC)
FOR585 Advanced Smartphone and Mobile Device Forensics Preview: Android vs. iOS - Battle of the Smartphones: Data RetentionHeather Mahalik
Friday, May 09, 2014
at 1:00 PM EDT
(2014-05-09 17:00 UTC)
The Application Blind-spotHP
Eric Schou
Thursday, May 08, 2014
at 1:00 PM EDT
(2014-05-08 17:00 UTC)
SANS 2014 Salary Survey: The State of Security Professionals TodayArbor Networks
Arabella Hallawell, Barbara Filkins, John Pescatore
Wednesday, May 07, 2014
at 1:00 PM EDT
(2014-05-07 17:00 UTC)
10 Ways To Rock Your SOCFidelis Cybersecurity
Shelly Giesbrecht
Tuesday, May 06, 2014
at 1:00 PM EDT
(2014-05-06 17:00 UTC)
Closing the Book on Heartbleed - and Avoiding Future Sad StoriesHP
LogRhythm
Qualys
Wolfgang Kandek, Joe Sechman, Joanna Burkey, John Pescatore, David Pack
Monday, May 05, 2014
at 3:00 PM EDT
(2014-05-05 19:00 UTC)
When Macs get HackedSarah Edwards
Friday, May 02, 2014
at 3:00 PM EDT
(2014-05-02 19:00 UTC)
Why Train?Lance Spitzner
Friday, May 02, 2014
at 1:00 PM EDT
(2014-05-02 17:00 UTC)
Extracting Windows Credentials using Memory ForensicsAlissa Torres
Thursday, May 01, 2014
at 1:00 PM EDT
(2014-05-01 17:00 UTC)
Logs, Logs, Every Where / Nor Any Byte to GrokPhilip Hagen
Wednesday, April 30, 2014
at 3:00 PM EDT
(2014-04-30 19:00 UTC)
Need to defeat APTs? Tony Sager Explains Where We're At With Live Threat Detection AutomationPalo Alto Networks
Scott Simkin, Tony Sager
Wednesday, April 30, 2014
at 1:00 PM EDT
(2014-04-30 17:00 UTC)
Secrets of Exploiting Blind SQL InjectionHP
Justin Searle
Tuesday, April 29, 2014
at 1:00 PM EDT
(2014-04-29 17:00 UTC)
Defending ICS Against Cyberthreats with Next Generation SecurityPalo Alto Networks
Del Rodillas, Michael Assante
Wednesday, April 23, 2014
at 1:00 PM EDT
(2014-04-23 17:00 UTC)
SIEM, Security Intelligence and the Critical Security ControlsLogRhythm
Dave Shackleford
Tuesday, April 22, 2014
at 10:00 AM EDT
(2014-04-22 14:00 UTC)
The 2014 Security Trends Forecast: What Does 2014 Hold for Security and Its Impact on Business Professionals?Cisco Systems Inc.
CP Morey, John Pescatore
Friday, April 18, 2014
at 1:00 PM EDT
(2014-04-18 17:00 UTC)
Heartbleed Update: Making Sure You Have Stopped the Bleeding and Reducing the Chance of Future Blood-lettingVeracode
John Pescatore, Chris Wysopal
Thursday, April 17, 2014
at 1:00 PM EDT
(2014-04-17 17:00 UTC)
Malware Analysis Essentials Using REMnux w/ Lenny ZeltserSymantec
Lenny Zeltser
Wednesday, April 16, 2014
at 1:00 PM EDT
(2014-04-16 17:00 UTC)
How to Limit the Risk of Attack on your XP AssetsAlienVault
Tom D'Aquino
Monday, April 14, 2014
at 11:00 PM EDT
(2014-04-15 03:00 UTC)
Reconstructing User Activity with Memory ForensicsAlissa Torres
Friday, April 11, 2014
at 5:30 PM EDT
(2014-04-11 21:30 UTC)
The Other Side of Heartbleed - Clientside Heartbleed Vulnerabilities ExplainedJohannes Ullrich, PhD
Thursday, April 10, 2014
at 5:30 PM EDT
(2014-04-10 21:30 UTC)
HeartBleed Vulnerability, Part 2Please Check Back
Thursday, April 10, 2014
at 1:00 PM EDT
(2014-04-10 17:00 UTC)
What Your CISO WantsViewfinity
Frank Kim
Wednesday, April 09, 2014
at 8:15 PM EDT
(2014-04-10 00:15 UTC)
OpenSSL "Heartbleed" VulnerabilityCloudPassage
Veracode
Please Check Back
Tuesday, April 08, 2014
at 1:00 PM EDT
(2014-04-08 17:00 UTC)
Best Finds in DFIR for 2014David Cowen
Thursday, April 03, 2014
at 11:00 AM EDT
(2014-04-03 15:00 UTC)
Detecting Evil on Windows Systems - An In-Depth Look at the DFIR PosterMike Pilkington, Rob Lee
Tuesday, April 01, 2014
at 1:00 PM EDT
(2014-04-01 17:00 UTC)
SANS Survey on Control Systems SecurityQualys
Raytheon | Websense
Cisco Systems Inc.
Tenable
Billy Rios, Jason Ostermann, Paul Asadoorian, Marc Blackmer, Derek Harp , Matthew Luallen
Thursday, March 27, 2014
at 1:00 PM EDT
(2014-03-27 17:00 UTC)
Security Program Drivers and Wish Lists: SANS Financial Services Survey Results Part IIBlueCoat
FireEye
Forescout Technologies BV
Raytheon Cyber Products
Cisco Systems Inc.
Tenable
Michael Crouse, Marc Blackmer, John Vecchi, John Pescatore, G. Mark Hardy
Wednesday, March 26, 2014
at 1:00 PM EDT
(2014-03-26 17:00 UTC)
Risks, Threats and Preparedness: Part I of the SANS Financial Services SurveyBlue Coat Systems, Inc.
FireEye
Forescout Technologies BV
Raytheon Cyber Products
Cisco Systems Inc.
Tenable
Scott Gordon, Ed Dembowski, Jack Daniel, John Pescatore, G. Mark Hardy
Tuesday, March 25, 2014
at 1:00 PM EDT
(2014-03-25 17:00 UTC)
IP Theft: Collecting Artifact Evidence from the Cloud and MobileMagnet Forensics
Jamie McQuaid, Jad Saliba, Heather Mahalik
Monday, March 24, 2014
at 1:00 PM EDT
(2014-03-24 17:00 UTC)
The Power of Lossless Packet Capture (1G-100G) & Real-time NetflowEmulex
Boni Bruno, CISSP, CISM, CGEIT, Sonny Singh
Thursday, March 20, 2014
at 1:00 PM EDT
(2014-03-20 17:00 UTC)
SANS Survey on Distributed Denial of ServiceCorero
Ashley Stephenson
Tuesday, March 18, 2014
at 1:00 PM EDT
(2014-03-18 17:00 UTC)
Finding Advanced Threats Before They Strike: Advanced Threat Protection and ContainmentDamballa, Inc.
Stephen Newman, Jerry Shenk
Thursday, March 13, 2014
at 1:00 PM EDT
(2014-03-13 17:00 UTC)
Visibility at the Endpoint: The SANS 2014 Survey of Endpoint IntelligenceGuidance Software
Jason Fredrickson, Jacob Williams
Wednesday, March 12, 2014
at 3:00 PM EDT
(2014-03-12 19:00 UTC)
Grand Theft Data: Why Are So Many Organizations Being Compromised?BeyondTrust
Eric Cole, PhD, Mike Poor
Wednesday, March 12, 2014
at 1:00 PM EDT
(2014-03-12 17:00 UTC)
Making Log and Event Management Easy for SMBsSolarWinds
Rob Johnson, Jerry Shenk
Tuesday, March 11, 2014
at 1:00 PM EDT
(2014-03-11 17:00 UTC)
Server Security: A Reality CheckCarbon Black
Michael Bilancieri, Jake Williams
Monday, March 10, 2014
at 1:00 PM EDT
(2014-03-10 17:00 UTC)
Your Pen-Test has a Glaring Weakness - Emulating the Attackers Better with Social EngineeringJames Lyne, Dave Shackleford
Friday, March 07, 2014
at 8:30 AM EST
(2014-03-07 13:30 UTC)
SANS Financial Services Cyber Security Trends and Challenges BriefingInvincea
FireEye
Forescout Technologies BV
Tenable
John Pescatore
Thursday, March 06, 2014
at 3:00 PM EST
(2014-03-06 20:00 UTC)
SANS Securing The Human for ICS EngineersMichael Assante
Thursday, March 06, 2014
at 1:00 PM EST
(2014-03-06 18:00 UTC)
Exposing Malicious Threats to Health Care ITNorse
Jeff Harrell, Barbara Filkins
Wednesday, March 05, 2014
at 1:00 PM EST
(2014-03-05 18:00 UTC)
How to Strengthen the "Weakest Link" with Two-Factor AuthenticationDuo Security
David Kennedy, Mark Stanislav
Wednesday, March 05, 2014
at 2:00 AM EST
(2014-03-05 07:00 UTC)
SANS Asia-Pacific Series: A Taste of SANS SEC660 - Advanced Penetration Testing: Attacking Network DevicesStephen Sims
Tuesday, March 04, 2014
at 1:00 PM EDT
(2014-03-04 18:00 UTC)
Cybersecuring DOD ICS SystemsMichael Chipley
Monday, March 03, 2014
at 8:00 PM EST
(2014-03-04 01:00 UTC)
ICS Attack SurfacesEric Cole, PhD
Wednesday, February 26, 2014
at 1:00 PM EDT
(2014-02-26 18:00 UTC)
Mobile Malware and Spyware - Working Through the BugsCindy Murphy
Friday, February 21, 2014
at 1:00 PM EST
(2014-02-21 18:00 UTC)
Successful Mitigation Techniques for 4 Common Web App VulnerabilitiesSteve Kosten
Thursday, February 20, 2014
at 1:00 PM EST
(2014-02-20 18:00 UTC)
The Critical Security Controls and the StealthWatch SystemLancope
Charles Herring, John Pescatore
Tuesday, February 18, 2014
at 1:00 PM EST
(2014-02-18 18:00 UTC)
Secrets of Exploiting Local and Remote File InclusionJustin Searle
Friday, February 14, 2014
at 1:00 PM EST
(2014-02-14 18:00 UTC)
Security Without Scanning for Today's Hybrid DatacenterMcafee LLC
Ben Andrew, Dave Shackleford
Thursday, February 13, 2014
at 1:00 PM EST
(2014-02-13 18:00 UTC)
SIEM-plifying security monitoring: A different approach to security visibilityAlienVault
Joe Schreiber, Dave Shackleford
Wednesday, February 12, 2014
at 1:00 PM EST
(2014-02-12 18:00 UTC)
Application Security Programs On the Rise, Skills Lacking: A SANS SurveyHP
Veracode
Qualys
Ryan English, Erik Peterson, Frank Kim, Will Bechtel
Monday, February 10, 2014
at 7:00 PM EST
(2014-02-11 00:00 UTC)
SANS Asia-Pacific Series: APT Investigations HOWTO - The Forensic SideAISA
Jess Garcia
Friday, February 07, 2014
at 1:00 PM EST
(2014-02-07 18:00 UTC)
Leveraging the Critical Security Controls to Mitigate User and Asset-based RiskBeyondTrust
Michael Yaffe, Eric Cole, PhD
Thursday, February 06, 2014
at 1:00 PM EST
(2014-02-06 18:00 UTC)
Continuous Monitoring and Mitigation: Responding to Emerging ThreatsIBM
Mark Hafner
Thursday, February 06, 2014
at 5:00 AM EST
(2014-02-06 10:00 UTC)
SANS Asia-Pacific Webcast Series: Mobile Device ForensicsPaul A. Henry
Wednesday, February 05, 2014
at 9:00 PM EST
(2014-02-06 02:00 UTC)
SANS Asia-Pacific Series: Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To GuideMichael Assante
Wednesday, February 05, 2014
at 1:00 PM EST
(2014-02-05 18:00 UTC)
Secure, enterprise-grade file sharing and mobile productivityWatchDox
Tim Choi
Tuesday, February 04, 2014
at 1:00 PM EST
(2014-02-04 18:00 UTC)
Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To GuideAlert Enterprise
Michael Assante
Friday, January 31, 2014
at 1:00 PM EST
(2014-01-31 18:00 UTC)
3 Tips to Fund Your Security Initiatives by Leveraging Business ObjectivesHP
Michi Kossowsky, Katherine Lam
Wednesday, January 22, 2014
at 1:00 PM EST
(2014-01-22 18:00 UTC)
Security Analytics: Moving From Collecting Threat Data and Continuous Monitoring into Security ActionJohn Pescatore
Tuesday, January 21, 2014
at 1:00 PM EST
(2014-01-21 18:00 UTC)
Overcoming Barriers to Making Cyber Security AdvancesEiQnetworks
Brian Mehlman, John Pescatore
Friday, January 17, 2014
at 1:00 PM EST
(2014-01-17 18:00 UTC)
Sneak Peek at the Cyber Threat Intelligence SummitMike Cloppert
Thursday, January 16, 2014
at 1:00 PM EST
(2014-01-16 18:00 UTC)
How to Detect SQL Injection & XSS Attacks using SIEM Event CorrelationAlienVault
Tom D'Aquino
Wednesday, January 15, 2014
at 1:00 PM EST
(2014-01-15 18:00 UTC)
SANS Analyst Webcast: SANS Survey on Securing The Internet of ThingsCodenomicon
Norse
Mike Jawetz, Bart Pestarino, John Pescatore
Tuesday, January 14, 2014
at 1:00 PM EST
(2014-01-14 18:00 UTC)
Using Oracle Audit Vault and Database Firewall for Data ProtectionOracle
Tanya Baccam
Monday, January 13, 2014
at 1:00 PM EST
(2014-01-13 18:00 UTC)
HTML5: Risky Business or Hidden Security Tool Chest for Mobile Web App AuthenticationJohannes Ullrich, PhD
Tuesday, January 07, 2014
at 1:00 PM EST
(2014-01-07 18:00 UTC)
Improving Security Through IT/OT CollaborationGraham Speake

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.