iPad Pro, Surface Pro 4, or $500 Off with SANS Online Training - Offer ends next week

Webcasts: Archive

Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.
Archive
Date (in UTC) Title Sponsor Speaker
Dec 22, 2014Build "Muscle Memory" with Rekall Memory Forensic FrameworkAlissa Torres
Dec 19, 2014How to Give the Best Pen Test of your LifeEd Skoudis
Dec 17, 2014Tis the Season for Data Breaches and Stolen IdentitySophos Inc.Chester Wisniewski
Dec 16, 2014Hands on USN Journal AnalysisDavid Cowen
Dec 15, 2014Analyst Webcast: Advanced Network Protection with McAfee Next Generation FirewallIntel SecurityDave Shackleford, Steven Smith
Dec 12, 2014A Managed Approach to Security Controls to Ensure Effective SecurityEiQnetworksKevin Landt
Dec 11, 2014If All Is Quiet, Are You Really Secure? Understanding Zero-Day VulnerabilitiesRisk I/O

VeriSign, Inc.
Jayson Jean , Michael Roytman
Dec 11, 2014SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 2Cigital, Inc.

CloudPassage

FireEye

Qualys

RiskIQ

Tenable Network Security

Trend Micro Inc.
Barbara Filkins, Nicholai Piagentini, Jonathan Trull, Jay Schulman
Dec 10, 2014The Bash Vulnerability: Practical Tips to Secure your EnvironmentAlienVaultVictor Obando, Garrett Gross
Dec 9, 2014SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 1Cigital, Inc.

CloudPassage

FireEye

Qualys

RiskIQ

Tenable Network Security

Trend Micro Inc.
Barbara Filkins, JD Sherry, Paul Crutchfield, Elias Manousos, Rajiv Raghunarayan
Dec 4, 2014Tis the Season for Data Breaches and Stolen IdentitySophos Inc.Chester Wisniewski
Dec 3, 2014Closing the Door on Web ShellsAnuj Soni
Dec 2, 2014BlackEnergy 2: ICS-Focused ThreatsMichael Assante, Tim Conway, Robert Huber
Nov 24, 2014The Value of On-Demand Endpoint VisibilityIntel SecurityDave Shackleford, Bret Lenmark
Nov 20, 2014Beating the Status Quo: Reinforce Your Defense to Detect & Resolve Evolving ThreatsNarus, Inc.John Pescatore, Mohan Sadashiva
Nov 19, 2014Top 10 1/2 Things That Can Undermine Your Security ProgramWhiteHat SecurityJohannes Ullrich, PhD, Jerry Hoff, Gabe Gumbs
Nov 18, 2014What's in your software? Reduce risk from third-party and open source components.VeracodeAdrian Lane, Phil Neray
Nov 17, 2014Thwarting Threat Actors With DomainToolsDomainToolsJohn Pescatore, Tim Helming
Nov 14, 2014Securing Personal and Mobile Device Use with Next-Gen Network Access ControlsForeScout TechnologiesJack Marsal, Joshua Wright, Matt Santill
Nov 13, 2014Protecting DNS: Securing Your Internet Address BookInfoBloxJohn Pescatore, Cricket Liu
Nov 12, 2014Mitigating Employee Risk - Keep Hires from Starting FiresVeriatoDominique Cultrera - GPHR/PHR/PHR-CA, Mike Tierney
Nov 12, 2014Continuous Ownage: Why you Need Continuous MonitoringEric Conrad
Nov 11, 2014CyberCity Hands-on Kinetic Cyber Range WebcastEd Skoudis, Tim Medin
Nov 6, 2014Be Ready for a Breach with Intelligent ResponseIntel SecurityJames Tarala, Ofir Arkin
Nov 5, 2014The Evolution of IDS: Why Context is KeyAlienVaultDave Shackleford, Joe Schreiber
Oct 30, 2014Ramping Up Your Phishing Program
Oct 29, 2014Zen and The Art of Network SegmentationTufin TechnologiesJohn Pescatore, Reuven Harrison
Oct 28, 2014Quantifying Security Performance: The Why, What and How of Security RatingsBitsightJohn Pescatore, Stephen Boyer
Oct 27, 2014You Can't Discover a Malware Pandemic by Diagnosing One PatientAndrew Hay
Oct 22, 2014Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneAlienVaultVictor Obando, Garrett Gross
Oct 21, 2014Top 3 Threats to Retail IT Security and How You Can Defend your DataDuo SecurityDave Shackleford, Brian Nuszkowski, Josh Daymont
Oct 20, 2014Demons, Monsters and Ghouls: Hunting Security Problems in Healthcare
Oct 17, 2014Next Generation Endpoint Security to Stay Ahead of Evolving Advanced Targeted ThreatsPromisecJohn Pescatore, Steve Lowing
Oct 16, 2014Measuring Human Risk: What is Your Organization's Security Score?Symantec
Oct 15, 2014What do you need to know about POODLE?Johannes Ullrich, PhD
Oct 15, 2014Breaches Happen: Be PreparedSymantecStephen Northcutt, Kat Pelak
Oct 14, 20142nd Annual Analytics and Intelligence Survey - Pt 2. Future State: Improving Intelligence and Threat ProtectionAlienVault

HP

LogRhythm

Intel Security

Rapid7 Inc.

Anomali
Colby DeRodeff, Dave Shackleford, Seth Goldhammer, Nicholas J. Percoco
Oct 9, 20142nd Annual Analytics and Intelligence SurveyAlienVault

HP

LogRhythm

Intel Security

Rapid7 Inc.

Anomali
Dave Shackleford, Sridhar Karnam, Mark Allen, Ted Pan
Oct 9, 2014Enabling Network Monitoring to Become System IntelligenceGraham Speake
Oct 8, 2014Securing The Human in EMEA - Next Generation Awareness ProgramsLance Spitzner
Oct 8, 2014Patch Pwnage: Ripping Apart Microsoft Patches to Build ExploitsStephen Sims
Oct 6, 2014Log and Event Management SurveyVMWare, IncJerry Shenk, Bill Roth
Oct 3, 2014Detect Ransomware Before its Too Late with AlienVault USMAlienVaultVictor Obando
Oct 2, 2014How to Prevent One Hundred Percent of Browser-Borne MalwareSpikes Security Franklyn Jones
Oct 1, 2014Shell Shock - What you need to knowVeracodeJohannes Ullrich, PhD, Chris Wysopal
Sep 30, 2014Network Segmentation Best Practices for DefensePalo Alto NetworksIsabelle Dumont, James Tarala
Sep 26, 2014Detecting Risky Activity "Wherever" Before It Becomes A ProblemRapid7 Inc.Jerry Shenk, Jay Roxe
Sep 25, 2014Hardening Retail Security: Why and How to Prevent Breaches and AttacksLogRhythmJohn Pescatore, Erick Ingleby
Sep 23, 2014Security for the People: End-User Authentication Security on the InternetDuo SecurityMark Stanislav, Paul Roberts
Sep 19, 2014Database Encryption - Defining the Root of TrustUtimacoAndreas Philipp, Greg Porter
Sep 18, 2014Secure, Enterprise-Grade File Sharing and Mobile ProductivityWatchDoxTim Choi
Sep 17, 2014More web traffic, more problems. How CARFAX consolidated security concerns, saved money and grew their businessF5 Networks, Inc.John Pescatore, Preston Hogue, Chris Thomas
Sep 16, 2014Simplifying Data Encryption and Redaction Without Touching the CodeOracleDave Shackleford
Sep 15, 2014Speeding up the Investigation of Employee Policy ViolationsMagnet ForensicsRob Lee, Jad Saliba, Jamie McQuaid
Sep 11, 2014ICS 515: Active Defense and Response Sneak PeakRobert M. Lee
Sep 10, 2014Prepared for the WorstLifeLock Business SolutionsEric Warbasse, Bill Dean
Sep 9, 2014The Critical Security Controls: From Adoption to Implementation A SANS SurveyEiQnetworks

Intel Security

Qualys

Tripwire, Inc.
Barbara G. Kay, Brian Mehlman, James Tarala, Tony Sager (moderator), Wolfgang Kandek, Katherine Brocklehurst
Sep 8, 2014Your App is Leaking! - Bypassing Exploit Mitigations for Pentesters...
Sep 8, 2014FOR572 Advanced Network Forensics and Analysis Preview: DHCP and DNS, "The Correlators"AISAPhilip Hagen
Sep 5, 2014Simple, Effective Patch Management: From Dilemma to Done DeedDell KACE
Sep 5, 2014Solving Insider Threats in Law EnforcementRaytheon | WebsenseDr. Eric Cole, Michael Crouse
Sep 4, 2014Get Smart: Consuming Threat Intelligence to Advance your Cyber Security ProgramCarbon BlackDave Shackleford, Harry Sverdlove
Sep 3, 2014How to Detect System Compromise & Data ExfiltrationAlienVaultTom D'Aquino
Aug 26, 2014Nine Steps toward a Successful Insider Threat ProgramRaytheon | WebsenseTanya Baccam, Daniel Velez
Aug 25, 2014How Not To Fail at a Pen TestEd Skoudis, John Strand
Aug 20, 2014Under Threat or Compromise: Every Detail CountsBlue Coat Systems, Inc.Jacob Williams, John Vecchi
Aug 19, 2014Building a Content Security PolicyEric Johnson
Aug 15, 2014Incident Response Part 2: Growing and Maturing An IR CapabilityAccessData Corp.

AlienVault

Arbor Networks

Carbon Black

HP

Intel Security
Alissa Torres, Ben Johnson, Jake Williams, Jennifer Glenn, Lucas Zaichkowsky
Aug 14, 2014Incident Response Part 1: Incident Response Techniques and Processes: Where We Are in the Six-Step ProcessAccessData Corp.

AlienVault

Arbor Networks

Carbon Black

HP

Intel Security
Alissa Torres, Jake Williams, Patrick Bedwell, Russ Meyers, Dan Larson
Aug 13, 2014Ghost In The Supply Chain: How Advanced Attackers Exploit Vulnerabilities In Your Supply ChainDuo SecurityJames Lyne, Paul Roberts
Aug 12, 2014Cyber Security Metrics and Measuring VulnerabilityChandler Comerford, Dr. Andrew Woodward, Peter Hannay
Aug 12, 2014What Works: Using Fidelis XPS to Detect and Block Advanced Targeted Threats and Foreign Espionage to Protect Trade SecretsFidelis Cybersecurity John Pescatore
Aug 11, 2014Security Awareness Webcast - Hosted by Lance Spitzner
Aug 8, 2014SQL Injection ExploitedMicah Hoffman
Aug 1, 2014SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART II Afternoon SessionFiremon

ForeScout Technologies

Xceedium

Trend Micro Inc.

IBM

Splunk

Tenable Network Security
Alan Paller, John Pescatore, Tony Sager
Aug 1, 2014SANS DHS Continuous Diagnostics & Mitigation Award Workshop PART IIFiremon

ForeScout Technologies

Xceedium

Trend Micro Inc.

IBM

Splunk

Tenable Network Security
Alan Paller, John Pescatore, Tony Sager
Jul 31, 2014Demanding MOAR From Your Vulnerability Assessments & Pen Tests by Ed SkoudisBeyondTrustEd Skoudis, Morey J. Haber
Jul 30, 2014An Incident Response Playbook: From Monitoring to OperationsAlienVaultDave Shackleford, Joe Schreiber
Jul 29, 2014The Modern Incident Responder: Detect, Respond and Recover from a Data BreachCarbon BlackJeffrey (J.J.) Guy
Jul 22, 2014Industrial Control Systems Security BriefingWaterfall Security

Palo Alto Networks

Ioactive Inc.
Jul 17, 2014Get Real-time Threat Detection Starting on Day 1 with AlienVault USMAlienVaultTom D'Aquino
Jul 10, 2014SANS Securing The Human for HealthcareJames Tarala
Jul 10, 2014It's not about the number of filters-it's how effective they are.HP Dave Shackleford, Joanna Burkey
Jul 9, 2014How To Not Fail At PentestingJohn Strand
Jul 8, 2014USB Devices and Media Transfer Protocol: Identifying the Existence of Data Exfiltration Artifacts
Jul 3, 2014Designing and Implementing a Honeypot on a SCADA NetworkCharlie Scott, Master's Degree Candidate - Masters Presentation
Jul 2, 2014Stop Giving the Offense an Unfair AdvantageEric Cole, PhD.
Jun 30, 2014DFIR Advanced Smartphone ForensicsCindy Murphy
Jun 26, 2014Insider Threat Kill Chain: Detecting Human Indicators of CompromiseTripwire, Inc.Bryce Schroeder
Jun 25, 2014Using a SOC as a Security Force MultiplierHP Dr. Eric Cole, John Pescatore, Henri van Goethem
Jun 24, 2014Looking Beyond Layers: Why Authentication Security Matters MostDuo SecurityDave Shackleford, Brian Kelly
Jun 23, 2014Health Care Data for Sale: Now What?Palo Alto NetworksGreg Porter, Isabelle Dumont
Jun 19, 2014Sensor and Intelligence Collaboration for Killing MalwareHP Rob Vandenbrink, Elisa Lippincott
Jun 18, 2014Reaping the Benefits of Continuous Monitoring and Mitigation At Pioneer InvestmentsForeScout TechnologiesJohn Pescatore, Ken Pfeil
Jun 17, 2014Higher Education: Open and Secure? A SANS SurveyTenable Network Security

Trend Micro Inc.

AlienVault
Randy Marchany, Patrick Bedwell, Paul Asadoorian, Christopher Budd
Jun 13, 2014Practical Threat Management and Incident Response for the Small- to Medium-Sized EnterpriseAlienVaultPatrick Bedwell, Jake Williams
Jun 12, 2014Endpoint Threat Detection, Response and Prevention for DummiesCarbon BlackHarry Sverdlove
Jun 11, 2014Needs of a Modern Incident Response ProgramLancopeTom Cross, Brandon Tansey
Jun 10, 2014Fighting the Insider Threat: Privilege Management and Abuse Prevention StrategiesRaytheon | WebsenseJohn Pescatore, Michael Crouse
Jun 5, 2014Sneak Peek at the SANS San Francisco Cybersecurity Training Event
Jun 5, 2014Saving Time and Resources Managing Administrator Rights with a Process-based Whitelist ModelViewfinityJohn Pescatore
Jun 5, 2014Internet Storm Center Briefing on Today's OpenSSL Security PatchesJohannes Ullrich, PhD
Jun 4, 2014Best Practices for Leveraging Security Threat IntelligenceAlienVaultDave Shackleford, Russell Spitler
May 28, 2014Transforming Your Security Investment into an Early Warning System Against Cyber ThreatsPromisecEric Cole, PhD., Steve Lowing
May 27, 2014Demystifying Security Controls for IT Risk & Audit ProfessionalsCarbon BlackChris Strand
May 23, 2014Threat Intelligence: What It Is, and Why Your Security Program Needs More of ItHP Dave Shackleford
May 22, 2014How Defense-In-Depth Helps Protect You From Unexpected Vulnerabilities Like HeartbleedDuo SecurityJake Williams, Adam Goodman
May 21, 2014Securing Web Applications: Identifying and Managing Risks with Programming Languages and FrameworksWhiteHat SecurityJohannes Ullrich, PhD, Jeremiah Grossman
May 20, 2014Towards a More Secure Public Cloud: What You Need to DoCloudLockJohn Pescatore, Kevin OBrien
May 20, 2014Mobile Device ForensicsPaul A. Henry
May 15, 2014Effective Anti-malware in Virtualized EnvironmentsSophos Inc.John Pescatore, Maxim Weinstein, Jeremiah Cornelius
May 14, 2014Going 'All In' for Protection and Compliance with the Critical Security Controls at Sun Country AirlinesIntel SecurityJohn Pescatore
May 13, 2014FOR585 Advanced Smartphone and Mobile Device Forensics Preview: Android vs. iOS - Battle of the Smartphones: Data RetentionHeather Mahalik
May 9, 2014The Application Blind-spotHP Eric Schou
May 8, 2014SANS 2014 Salary Survey: The State of Security Professionals TodayArbor NetworksJohn Pescatore, Barbara Filkins, Arabella Hallawell
May 7, 201410 Ways To Rock Your SOCFidelis Cybersecurity Shelly Giesbrecht
May 6, 2014Closing the Book on Heartbleed - and Avoiding Future Sad StoriesHP

LogRhythm

Qualys
David Pack, John Pescatore, Joanna Burkey, Joe Sechman, Wolfgang Kandek
May 5, 2014When Macs get HackedSarah Edwards
May 2, 2014Why Train?Lance Spitzner
May 2, 2014Extracting Windows Credentials using Memory ForensicsAlissa Torres
May 1, 2014Logs, Logs, Every Where / Nor Any Byte to GrokPhilip Hagen
Apr 30, 2014Need to defeat APTs? Tony Sager Explains Where We're At With Live Threat Detection AutomationPalo Alto NetworksTony Sager, Scott Simkin
Apr 30, 2014Secrets of Exploiting Blind SQL InjectionHP Justin Searle
Apr 29, 2014Defending ICS Against Cyberthreats with Next Generation SecurityPalo Alto NetworksMichael Assante, Del Rodillas
Apr 23, 2014SIEM, Security Intelligence and the Critical Security ControlsLogRhythmDave Shackleford
Apr 22, 2014The 2014 Security Trends Forecast: What Does 2014 Hold for Security and Its Impact on Business Professionals?Cisco Systems Inc. John Pescatore, CP Morey
Apr 18, 2014Heartbleed Update: Making Sure You Have Stopped the Bleeding and Reducing the Chance of Future Blood-lettingVeracodeChris Wysopal, John Pescatore
Apr 17, 2014Malware Analysis Essentials Using REMnux w/ Lenny ZeltserSymantecLenny Zeltser
Apr 16, 2014How to Limit the Risk of Attack on your XP AssetsAlienVaultTom D'Aquino
Apr 15, 2014Reconstructing User Activity with Memory ForensicsAlissa Torres
Apr 11, 2014The Other Side of Heartbleed - Clientside Heartbleed Vulnerabilities ExplainedJohannes Ullrich, PhD
Apr 10, 2014HeartBleed Vulnerability, Part 2
Apr 10, 2014What Your CISO WantsViewfinityFrank Kim
Apr 10, 2014OpenSSL "Heartbleed" VulnerabilityCloudPassage

Veracode
Apr 8, 2014Best Finds in DFIR for 2014David Cowen
Apr 3, 2014Detecting Evil on Windows Systems - An In-Depth Look at the DFIR PosterRob Lee, Mike Pilkington
Apr 1, 2014SANS Survey on Control Systems SecurityQualys

Raytheon | Websense

Cisco Systems Inc.

Tenable Network Security
Matthew Luallen, Derek Harp , Marc Blackmer, Paul Asadoorian, Jason Ostermann, Billy Rios
Mar 27, 2014Security Program Drivers and Wish Lists: SANS Financial Services Survey Results Part IIBlueCoat

FireEye

ForeScout Technologies

Raytheon Cyber Products

Cisco Systems Inc.

Tenable Network Security
G. Mark Hardy, John Pescatore, John Vecchi, Marc Blackmer, Michael Crouse
Mar 26, 2014Risks, Threats and Preparedness: Part I of the SANS Financial Services SurveyBlue Coat Systems, Inc.

FireEye

ForeScout Technologies

Raytheon Cyber Products

Cisco Systems Inc.

Tenable Network Security
G. Mark Hardy, John Pescatore, Jack Daniel, Ed Dembowski, Scott Gordon
Mar 25, 2014IP Theft: Collecting Artifact Evidence from the Cloud and MobileMagnet ForensicsHeather Mahalik, Jad Saliba, Jamie McQuaid
Mar 24, 2014The Power of Lossless Packet Capture (1G-100G) & Real-time NetflowEmulexSonny Singh, Boni Bruno, CISSP, CISM, CGEIT
Mar 20, 2014SANS Survey on Distributed Denial of ServiceCorero Ashley Stephenson
Mar 18, 2014Finding Advanced Threats Before They Strike: Advanced Threat Protection and ContainmentDamballa, Inc.Jerry Shenk, Stephen Newman
Mar 13, 2014Visibility at the Endpoint: The SANS 2014 Survey of Endpoint IntelligenceGuidance SoftwareJacob Williams, Jason Fredrickson
Mar 12, 2014Grand Theft Data: Why Are So Many Organizations Being Compromised?BeyondTrustMike Poor, Eric Cole, PhD.
Mar 12, 2014Making Log and Event Management Easy for SMBsSolarWindsJerry Shenk, Rob Johnson
Mar 11, 2014Server Security: A Reality CheckCarbon BlackJake Williams, Michael Bilancieri
Mar 10, 2014Your Pen-Test has a Glaring Weakness - Emulating the Attackers Better with Social EngineeringDave Shackleford, James Lyne
Mar 7, 2014SANS Financial Services Cyber Security Trends and Challenges BriefingInvincea

FireEye

ForeScout Technologies

Tenable Network Security
John Pescatore
Mar 6, 2014SANS Securing The Human for ICS EngineersMichael Assante
Mar 6, 2014Exposing Malicious Threats to Health Care ITNorseBarbara Filkins, Jeff Harrell
Mar 5, 2014How to Strengthen the "Weakest Link" with Two-Factor AuthenticationDuo SecurityMark Stanislav, David Kennedy
Mar 5, 2014SANS Asia-Pacific Series: A Taste of SANS SEC660 - Advanced Penetration Testing: Attacking Network DevicesStephen Sims
Mar 4, 2014Cybersecuring DOD ICS SystemsMichael Chipley
Mar 4, 2014ICS Attack SurfacesEric Cole, PhD.
Feb 26, 2014Mobile Malware and Spyware - Working Through the BugsCindy Murphy
Feb 21, 2014Successful Mitigation Techniques for 4 Common Web App VulnerabilitiesSteve Kosten
Feb 20, 2014The Critical Security Controls and the StealthWatch SystemLancopeJohn Pescatore, Charles Herring
Feb 18, 2014Secrets of Exploiting Local and Remote File InclusionJustin Searle
Feb 14, 2014Security Without Scanning for Today's Hybrid DatacenterIntel SecurityDave Shackleford, Ben Andrew
Feb 13, 2014SIEM-plifying security monitoring: A different approach to security visibilityAlienVaultDave Shackleford, Joe Schreiber
Feb 12, 2014Application Security Programs On the Rise, Skills Lacking: A SANS SurveyHP

Veracode

Qualys
Will Bechtel, Frank Kim, Erik Peterson, Ryan English
Feb 11, 2014SANS Asia-Pacific Series: APT Investigations HOWTO - The Forensic SideAISAJess Garcia
Feb 7, 2014Leveraging the Critical Security Controls to Mitigate User and Asset-based RiskBeyondTrustEric Cole, PhD., Michael Yaffe
Feb 6, 2014Continuous Monitoring and Mitigation: Responding to Emerging ThreatsIBMMark Hafner
Feb 6, 2014SANS Asia-Pacific Webcast Series: Mobile Device ForensicsPaul A. Henry
Feb 6, 2014SANS Asia-Pacific Series: Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To GuideMichael Assante
Feb 5, 2014Secure, enterprise-grade file sharing and mobile productivityWatchDoxTim Choi
Feb 4, 2014Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To GuideAlert EnterpriseMichael Assante
Jan 31, 20143 Tips to Fund Your Security Initiatives by Leveraging Business ObjectivesHP Katherine Lam, Michi Kossowsky
Jan 22, 2014Security Analytics: Moving From Collecting Threat Data and Continuous Monitoring into Security ActionJohn Pescatore
Jan 21, 2014Overcoming Barriers to Making Cyber Security AdvancesEiQnetworksJohn Pescatore, Brian Mehlman
Jan 17, 2014Sneak Peek at the Cyber Threat Intelligence SummitMike Cloppert
Jan 16, 2014How to Detect SQL Injection & XSS Attacks using SIEM Event CorrelationAlienVaultTom D'Aquino
Jan 15, 2014SANS Analyst Webcast: SANS Survey on Securing The Internet of ThingsCodenomicon

Norse
John Pescatore, Bart Pestarino, Mike Jawetz
Jan 14, 2014Using Oracle Audit Vault and Database Firewall for Data ProtectionOracleTanya Baccam
Jan 13, 2014HTML5: Risky Business or Hidden Security Tool Chest for Mobile Web App AuthenticationJohannes Ullrich, PhD
Jan 7, 2014Improving Security Through IT/OT CollaborationGraham Speake

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, email sales@sans.org for more information.