SANS OnDemand: Extended Access, Hands-On Labs, and SME Support

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
December 21, 2015
3:00pm EDT
(20:00:00 UTC)
Juniper ScreenOS Backdoor: What do you need to know Johannes Ullrich, PhD
December 17, 2015
3:00pm EST
(20:00:00 UTC)
SANS VetSuccess Progress ReportJim Michaud, Arlin Halstead
December 16, 2015
1:00pm EST
(18:00:00 UTC)
Five Critical Factors Healthcare Providers Must Know When Partnering with a Cyber Security VendorBAE Systems Applied Intelligence

Fortinet, Inc.
Charlie Mallio, John McNeice, Barbara Filkins
December 15, 2015
11:00am EST
(16:00:00 UTC)
Predicting Cyber Security Trends in 2016LancopeTim (TK) Keanani
December 10, 2015
6:00am EDT
(11:00:00 UTC)
The CIS Critical Security Controls: The International Standard for DefenseJames Tarala
December 9, 2015
3:00pm EST
(20:00:00 UTC)
The Top 20 Security Controls Adapted to ICSWm. Arthur Conklin
December 9, 2015
1:00pm EST
(18:00:00 UTC)
Guarding Beyond the Gateway: Modern Challenges of Email SecurityMimecast Services LimitedOrlando Scott-Cowley, Barbara Filkins
December 8, 2015
1:00pm EST
(18:00:00 UTC)
New Frontiers in Intrusion ProtectionTrend Micro Inc.Dave Shackleford, Elisa Lippincott
December 7, 2015
3:00pm EST
(20:00:00 UTC)
How to speak to the board of directors about securityWhiteHat SecurityCarol G. Mills, John Pescatore, Demetrios Lazarikos (Laz)
December 2, 2015
1:00pm EST
(18:00:00 UTC)
How to Detect and Respond to Specific Advanced Threats: Essential Use Cases with RSA Security AnalyticsRSATravis Dye, Robert M. Lee
November 24, 2015
10:00am EDT
(15:00:00 UTC)
Cocktail de Malware: Estrategias de Ataque con Código Malicioso HoyJess García
November 19, 2015
3:00pm EST
(20:00:00 UTC)
Cyber Insurance: What is Its Role in Your Security Program?PivotPoint Risk AnalyticsGary R. Hayslip , John Pescatore, Benjamin Wright
November 19, 2015
1:00pm EST
(18:00:00 UTC)
Post-Breach Impact: A Cost CompendiumSpirionGabriel Gumbs, Barbara Filkins, Johannes Hoech
November 18, 2015
3:00pm EST
(20:00:00 UTC)
Mitigating the point of sale data breach threat: Strategies to put into place nowCarbon BlackChristopher Strand
November 18, 2015
1:00pm EST
(18:00:00 UTC)
Securing SSH Itself with the Critical Security Controls Venafi, IncGavin Hill, Barbara Filkins, David Hoelzer
November 17, 2015
3:00pm EST
(20:00:00 UTC)
Think Like an Attacker: What You Must Know About Targeted Attack TechniquesLightCyberJohn Pescatore
November 13, 2015
1:00pm EST
(18:00:00 UTC)
A New Paradigm of Monitoring and ResponseRaytheon Cyber ProductsDave Shackleford, Ashok Sankar
November 12, 2015
1:00pm EST
(18:00:00 UTC)
Moving up the Analytics Maturation Curve: Part 2 of the 3rd Annual SANS Security Analytics and Intelligence Survey AlienVault

DomainTools

LogRhythm

Lookingglass Cyber Solutions, Inc.

SAS INSTITUTE INC

Anomali
Josh Lincoln, Tim Helming, Dave Shackleford, Colby DeRodeff
November 11, 2015
1:00pm EST
(18:00:00 UTC)
Security Analytics Maturation Curve: Part 1 of the 3rd Annual SANS Security Analytics and Intelligence Survey AlienVault

DomainTools

LogRhythm

Lookingglass Cyber Solutions, Inc.

SAS INSTITUTE INC

Anomali
Allan Thomson , James Carder, Javvad Malik, Dave Shackleford
November 11, 2015
11:00am EST
(16:00:00 UTC)
Noise Matters in Every Industrial Control SystemDoug Wylie
November 10, 2015
1:00pm EST
(18:00:00 UTC)
How to Build a Cybersecurity Platform the Easy WaySophos Inc.Keith Palmgren
November 6, 2015
1:00pm EST
(18:00:00 UTC)
How to Detect System Compromise & Data Exfiltration with AlienVault USMAlienVaultTom D'Aquino
November 5, 2015
10:30am EST
(15:30:00 UTC)
SANS Threat Intelligence BriefingRecordedFuture

LogRhythm
Robert M. Lee
November 4, 2015
1:00pm EST
(18:00:00 UTC)
Security Automation: Security Nirvana or Just A Fad?SymantecJanene Casella, Jerry Shenk
November 3, 2015
1:00pm EST
(18:00:00 UTC)
2015 Cloud Security & Risk Benchmarks Report SkyHigh NetworksBrandon Cook, John Pescatore
November 3, 2015
11:00am EST
(16:00:00 UTC)
How NERC and CIP are making a differenceTim Conway
October 30, 2015
1:00pm EDT
(17:00:00 UTC)
Security Best Practices for Implementing Network Segmentation in a Healthcare EnvironmentPalo Alto NetworksMatthew Mellen, James Tarala
October 29, 2015
1:00pm EDT
(17:00:00 UTC)
What Works for Fannie Maes Deputy CISO to Assess/Monitor Third Party Cybersecurity with BitSightBitsightJohn Pescatore
October 28, 2015
1:00pm EDT
(17:00:00 UTC)
What Are Their Vulnerabilities? A SANS Continuous Monitoring SurveyAlienVault

Arbor Networks

HP

Tenable
Ted Gary, Mark Painter, Arabella Hallawell, Javvad Malik, David Hoelzer
October 27, 2015
3:00pm EDT
(19:00:00 UTC)
Easier Web App Pen Testing by Leveraging Plugins & ExtensionsMicah Hoffman
October 27, 2015
1:00pm EDT
(17:00:00 UTC)
The Expanding Role of Data Analytics in Threat DetectionVectra Networks Inc.Barbara Filkins, Wade Williamson
October 22, 2015
1:00pm EDT
(17:00:00 UTC)
Implementing Active Breach DetectionLightCyberDavid Thompson, Dave Shackleford
October 21, 2015
10:00pm EDT
(02:00:00 UTC)
Securing Your KidsLance Spitzner
October 21, 2015
10:00am EDT
(14:00:00 UTC)
Making Awareness StickLance Spitzner
October 16, 2015
8:30am EDT
(12:30:00 UTC)
SANS and CIS Critical Security Controls BriefingSymantecTony Sager, Jane Holl Lute, John Pescatore, James Tarala
October 15, 2015
1:00pm EDT
(17:00:00 UTC)
Dynamic Data Center SecurityIllumioChandra Sekar, Dave Shackleford
October 15, 2015
11:00am EDT
(15:00:00 UTC)
Threats 2.0: Get Ahead of them with Advanced AnalyticsTriumfantGreg Wessel, John Pescatore
October 14, 2015
1:00pm EDT
(17:00:00 UTC)
Securing Your KidsLance Spitzner
October 13, 2015
1:00pm EDT
(17:00:00 UTC)
Threats in the Unknown: Applied intelligence-driven approaches to real-time threat detectionDarktraceBrandon Mayer
October 13, 2015
10:00am EDT
(14:00:00 UTC)
Security Evaluation of Mobile Applications using 'App Report Cards'Raul Siles
October 9, 2015
1:00pm EDT
(17:00:00 UTC)
Complete Application pwnage via Multi-POST XSRFAdrien de Beaupre
October 8, 2015
3:00pm EDT
(19:00:00 UTC)
Certifications that Matter: Passing the CISSPDavid Miller
October 8, 2015
11:00am EDT
(15:00:00 UTC)
Master the Game of Who: Leveraging Network Intelligence and User Activity to Combat Insider ThreatsFlowTraqMike Tierney, Vince Berk, Dr. Eric Cole
October 7, 2015
11:00am EDT
(15:00:00 UTC)
Security Awareness Programs and NERC CIPTim Conway, Lance Spitzner
October 6, 2015
3:00pm EDT
(19:00:00 UTC)
Hacked, or Human Error in Fifteen Minutes or LessChris Crowley, Stephen Northcutt
October 6, 2015
1:00pm EDT
(17:00:00 UTC)
ICS Cybersecurity: Models for SuccessRobert M. Lee, Michael Assante
October 2, 2015
1:00pm EDT
(17:00:00 UTC)
Manual Testing is a Must, but Automation is Divine John Strand, Ed Skoudis
October 2, 2015
11:00am EDT
(15:00:00 UTC)
Automating the Hunt for Network IntrudersEndgameJamie Butler, Eric Cole
September 30, 2015
1:00pm EDT
(17:00:00 UTC)
Behind the Curve? Getting Started on Endpoint Security MaturityTripwire, Inc.G. Mark Hardy, Dwayne Melancon
September 30, 2015
11:00am EDT
(15:00:00 UTC)
How To Frustrate Your Adversary: Active Defense, Offensive Countermeasures & Cyber Deception with Bryce Galbraith - Part 1Bryce Galbraith
September 24, 2015
1:00pm EDT
(17:00:00 UTC)
Strategies to Address SANS Critical Controls 10 and 11 - Secure Configurations and Control of Network DevicesSkybox Security, Inc.John Pescatore, Michelle Johnson Cobb, Brian Kelly
September 23, 2015
1:00pm EDT
(17:00:00 UTC)
Orchestrating Security in the Cloud: A SANS SurveyCloudPassage

Evident.io

HP

Mcafee LLC
Dave Shackleford, Farshad Ghazi, Sami Laine, Andrew Maguire, Swaroop Sayeram
September 22, 2015
10:00pm EDT
(02:00:00 UTC)
DIY vulnerability discovery with DLL Side LoadingJake Williams
September 22, 2015
1:00pm EDT
(17:00:00 UTC)
A Proactive Approach to Incident ResponseBlue Coat Systems, Inc.Alan Hall, Jacob Williams
September 16, 2015
1:00pm EDT
(17:00:00 UTC)
Critical Security Controls Update: How to Keep Pace with Advanced Endpoint ThreatsRSAHermes Bojaxhi, John Pescatore
September 15, 2015
3:30pm EDT
(19:30:00 UTC)
Turn on the Lights! Case Studies of Malware in MemoryFidelis Cybersecurity Tyler Halfpop
September 10, 2015
3:00pm EDT
(19:00:00 UTC)
What Works in Reducing Web Application Vulnerabilities: Using to WhiteHat Sentinel to Increase Application Security Before and After Production DeploymentWhiteHat SecurityJohn Pescatore
September 10, 2015
1:00pm EDT
(17:00:00 UTC)
Combatting Cyber Risks in the Supply ChainRaytheon | WebsenseJoshua Douglas, Dave Shackleford
September 9, 2015
1:00pm EDT
(17:00:00 UTC)
Retail Security: PCI DSS and Third Party InteractionsTenable Jeff Man, Dr. Eric Cole
September 9, 2015
11:00am EDT
(15:00:00 UTC)
NERC CIP: Hot TopicsTed Gutierrez, Tim Conway
September 9, 2015
7:00am EDT
(11:00:00 UTC)
Ubiquity Forensics - Your iCloud and YouSarah Edwards
September 8, 2015
1:00pm EDT
(17:00:00 UTC)
What Works in Vulnerability Management: Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 NexposeRapid7 Inc.John Pescatore
September 8, 2015
11:00am EDT
(15:00:00 UTC)
Hacking the HospitalBilly Rios
September 4, 2015
1:00pm EDT
(17:00:00 UTC)
Car Wars Episode I: Hacker MenaceMike Assante, Matthew Carpenter
September 3, 2015
1:30pm EDT
(17:30:00 UTC)
Making DNS Your Greatest Ally in Active DefenseDomainToolsDave Shackleford, Tim Helming
September 2, 2015
1:00pm EDT
(17:00:00 UTC)
Thwarting Advanced Threats with Trusted CryptoTHALES e-SecurityJohn Grimm, John Pescatore
September 1, 2015
1:00pm EDT
(17:00:00 UTC)
Securing Your Cloud Apps - Understanding the Shared Responsibility ModelPalerraJohn Yun, John Pescatore
August 28, 2015
1:00pm EDT
(17:00:00 UTC)
SIEM-plifying Security Monitoring: Making Sense of Security Intelligence AlienVaultDave Shackleford, Tom D'Aquino
August 27, 2015
11:00am EDT
(15:00:00 UTC)
Cache Me If You Can!Matt Bromiley
August 26, 2015
9:00pm EDT
(01:00:00 UTC)
The Current Reality: Defending a Compromised NetworkDr. Eric Cole
August 24, 2015
11:00am EDT
(15:00:00 UTC)
Memory Forensic Baselines: Using Normal to Avoid "Red Herring"Alissa Torres
August 21, 2015
2:00pm EDT
(18:00:00 UTC)
Detect, Contain, and Control CyberthreatsRaytheon | WebsenseAshok Sankar, Dr. Eric Cole
August 20, 2015
3:00pm EDT
(19:00:00 UTC)
You Cant Respond If You Cant See: Building Sophisticated Detection Mechanisms Leveraging Patterns of CompromiseCarbon BlackDave Shackleford
August 20, 2015
1:00pm EST
(17:00:00 UTC)
Part 2: Incident Response - How Can We Be More Proactive for the Future?AlienVault

Arbor Networks

Carbon Black

Hewlett Packard

Mcafee LLC

Rapid7 Inc.
Wade Woolwine, Gary Sockrider, Justin Falck , Alissa Torres
August 19, 2015
1:00pm EDT
(17:00:00 UTC)
The Value of Real-Time Pattern RecognitionRaytheon | WebsenseDave Shackleford, Michael Crouse
August 19, 2015
11:00am EDT
(15:00:00 UTC)
CIP V6 NOPR What You Need to Think AboutTim Conway, Michael Assante
August 18, 2015
3:00pm EDT
(19:00:00 UTC)
How are Cybercriminals Threatening Security? Highlights from the 2015 Internet Security Threat ReportDLT Solutions

Symantec
Don Maclean, David Hoelzer, Robert Myles, CISSP, CISM
August 18, 2015
1:00pm EST
(17:00:00 UTC)
Part 1: Incident Response - What Is (and Isn't) Working Today AlienVault

Arbor Networks

Carbon Black

Hewlett Packard

Mcafee LLC

Rapid7 Inc.
Russell Meyers, Javvad Malik, Barbara G. Kay, Alissa Torres
August 14, 2015
3:00pm EDT
(19:00:00 UTC)
Analyst Webcast: RASP vs. WAF: Comparing Capabilities and EfficienciesHP Jake Williams
August 14, 2015
1:00pm EDT
(17:00:00 UTC)
What you need to know about StagefrightVeracodeBrian LaFlamme, Joshua Wright
August 13, 2015
3:00pm EDT
(19:00:00 UTC)
Onboarding the ICS Mindset into Cyber Security ControlsJason Dely
August 13, 2015
1:00pm EDT
(17:00:00 UTC)
The Return of the Malicious Macro, and the Economics of CybercrimeProofPointPatrick Wheeler, Jerry Shenk
August 12, 2015
1:00pm EDT
(17:00:00 UTC)
The Race to Detection: IR Trends, Tools and Processes That Close the GapCarbon BlackJim Raine, Alissa Torres
August 10, 2015
1:00pm EDT
(17:00:00 UTC)
What's New in Windows 10 and Server 2016?Jason Fossen
August 5, 2015
3:00pm EDT
(19:00:00 UTC)
How to Be More Effective and Improve the Success Rates of Your IT ProjectsJeff Frisk
August 4, 2015
1:00pm EDT
(17:00:00 UTC)
Secure the Endpoint to battle CyberthreatsSymantecKat Pelak, John Pescatore
August 3, 2015
3:00pm EDT
(19:00:00 UTC)
Hacking for the MassesMark Baggett
July 30, 2015
1:00pm EDT
(17:00:00 UTC)
Protecting Third Party Applications with RASPHewlett PackardCindy Blake, Eric Johnson
July 29, 2015
1:00pm EDT
(17:00:00 UTC)
Tracking and Observation-How-To and What To Watch ForAnomali Jason Trost, J. Michael Butler, Stephen Northcutt
July 29, 2015
11:00am EDT
(15:00:00 UTC)
5 years after Stuxnet: What changed, what didn't and what lies aheadThomas Brandstetter
July 28, 2015
1:00pm EDT
(17:00:00 UTC)
Analyst Webcast: Securing Retail Beyond the Cash Register--Insider Threats and Targeted AttacksPalo Alto NetworksG. Mark Hardy
July 24, 2015
11:00am EDT
(15:00:00 UTC)
WhatWorks in AppSec: ASP.NET Identity and AntiForgery TokensEric Johnson
July 23, 2015
1:00pm EST
(17:00:00 UTC)
Cyber Security Strategies: Protecting Your ICS Investments a discussion with Ultra-3eti and Mike Assante of SANSUltra Electronics, 3eTIAlex Tarter, Michael Assante
July 22, 2015
1:00pm EDT
(17:00:00 UTC)
APTs in ICS - Understanding and Preparing for the Rising Threat Landscape in Critical InfrastructurePalo Alto NetworksDel Rodillas, Michael Assante
July 22, 2015
11:00am EDT
(15:00:00 UTC)
The Sliding Scale of Cyber SecurityRobert M. Lee
July 21, 2015
1:00pm EDT
(17:00:00 UTC)
File Security 2.0: Collaboration Controls, Considerations and Technology?Final CodeScott Gordon, Barbara Filkins
July 17, 2015
11:00am EDT
(15:00:00 UTC)
Infosec Rock Star: How to be a More Effective Security ProfessionalTed Demopoulos
July 16, 2015
1:00pm EDT
(17:00:00 UTC)
Make it Hard for the Adversary: Learn Offensive Counter Measures with John StrandJohn Strand
July 15, 2015
1:00pm EDT
(17:00:00 UTC)
How to Detect SQL Injection & XSS Attacks with AlienVault USMAlienVaultGarrett Gross, Mark Allen
July 15, 2015
11:00am EDT
(15:00:00 UTC)
Challenges and Strategies for Addressing the NERC CIP Version 5 Training Requirements
July 14, 2015
3:00pm EDT
(19:00:00 UTC)
SANS NetWars: Building a Better InfoSec Pro with GamificationEd Skoudis, Joshua Wright
July 13, 2015
7:00pm EDT
(23:00:00 UTC)
SANS VetSuccess Immersion Academy - The Fast Track to Top Skills and Top Jobs in Cyber. Guaranteed.David. W. Brown, Charles Campbell, Donald W. Greene, Arlin Halstead
July 1, 2015
11:00am EDT
(15:00:00 UTC)
10 Biggest Mistakes in Implementing Continuous MonitoringIsmael Valenzuela
June 29, 2015
1:00pm EDT
(17:00:00 UTC)
Securely Transition to the Cloud: Increase Agility and Reduce RiskBarracuda Networks

VMWare, Inc
Yatin Chalke, Dave Shackleford, Amy Bray
June 26, 2015
3:00pm EDT
(19:00:00 UTC)
What the US government breach tells us about the state of securityVeracodeJohannes Ullrich, PhD
June 25, 2015
1:00pm EDT
(17:00:00 UTC)
The State of Security in Control Systems Today: A SANS Survey WebcastSurfWatch Labs

Tenable
Ted Gary, Adam Meyer, Derek Harp
June 24, 2015
3:00pm EDT
(19:00:00 UTC)
Zero-Day Defense: The Power of Actionable Threat Intelligence and Continuous Endpoint Data CollectionCarbon BlackBrent Midwood, Stephen Newman
June 24, 2015
1:00pm EDT
(17:00:00 UTC)
Six Steps to Stronger Security for SMBsQualysWolfgang Kandek, Dr. Eric Cole
June 23, 2015
1:00pm EDT
(17:00:00 UTC)
SANS 2nd Financial Sector Security SurveyAlienVault

Arbor Networks

LogRhythm

VSS Monitoring, Inc.
James Carder, Patrick Bedwell, G. Mark Hardy, Rakesh Shah, Ann Sun
June 22, 2015
3:00pm EDT
(19:00:00 UTC)
Blocking XSS attacks with Content Security PolicyGregory Leonard
June 22, 2015
1:00pm EDT
(17:00:00 UTC)
A Taste of SANS SEC660: Utilizing ROP on Windows 10Stephen Sims
June 22, 2015
11:00am EDT
(15:00:00 UTC)
Automating DFIR Getting closer to the find evidence buttonDavid Cowen
June 18, 2015
1:00pm EDT
(17:00:00 UTC)
Big Data: Identifying Major Threats and Removing Security and Compliance BarriersClouderaJohn Pescatore, Sam Heywood, Barbara Filkins
June 18, 2015
11:00am EDT
(15:00:00 UTC)
Implementing an ICS Active Defense StrategyRobert M. Lee
June 17, 2015
1:00pm EDT
(17:00:00 UTC)
Visibility, Analytics, & Action: A strategy to address Critical Control 4 - Continuous Vulnerability Assessment & RemediationSkybox Security, Inc.John Pescatore, Michelle Cobb, Sean Keef
June 16, 2015
1:00pm EDT
(17:00:00 UTC)
Conquering Network Security Challenges in Distributed EnterprisesPalo Alto NetworksJoerg Sieber, John Pescatore
June 9, 2015
3:00pm EDT
(19:00:00 UTC)
Five Key Things to Know About Cyber Threat IntelligenceRobert M. Lee
June 9, 2015
11:00am EDT
(15:00:00 UTC)
Node.js: Successful, exciting... and bares security risksCheckmarx Inc.Amit Ashbel
June 4, 2015
1:00pm EDT
(17:00:00 UTC)
Meeting New CSC Guidelines for SSL Certificate ManagementVenafi, IncKevin Bocek, Barbara Filkins
June 3, 2015
1:00pm EDT
(17:00:00 UTC)
Continuous Monitoring and Real World AnalysisSeth Misenar
June 2, 2015
10:00pm EDT
(02:00:00 UTC)
Passing the CISSPDr. Eric Cole
June 2, 2015
5:30pm EDT
(21:30:00 UTC)
Industrial Control Systems Security Briefing 2015Palo Alto Networks

NexDefense, Inc.
May 29, 2015
3:00pm EDT
(19:00:00 UTC)
Bringing DevOps to DFIRBarry Anderson
May 29, 2015
1:00pm EDT
(17:00:00 UTC)
The Value of Adopting and Improving Security Maturity ModelsHP Tony Sager , Eric Schou
May 29, 2015
10:00am EDT
(14:00:00 UTC)
¿En qué consiste SEC401: Security Essentials?Carlos Fragoso
May 28, 2015
3:00pm EDT
(19:00:00 UTC)
Dont risk it - Using a risk-based approach to increase the security of web apps and other IT assets.WhiteHat SecurityDemetrios Lazarikos (Laz) , John Pescatore
May 27, 2015
10:00pm EDT
(02:00:00 UTC)
Continuous Monitoring, Real World Analysis and Strategies to Mitigate Targeted Attacks; Bonus Story Behind The Top 4 MitigationsSeth Misenar, Alan Paller
May 27, 2015
3:00pm EDT
(19:00:00 UTC)
Achieving ICS Network Security Monitoring and Visibility with Flow DataChris Sanders, Robert M. Lee
May 21, 2015
1:00pm EDT
(17:00:00 UTC)
Securing Portable Data and Applications on Enterprise Mobile Workspaces: A SANS SurveyIronkey by Imation Leon Brown , Jacob Williams
May 20, 2015
3:00pm EDT
(19:00:00 UTC)
The Evolution of Network Security, and how Network Packet Brokers (NPBs) enable the Layered Security EraVSS Monitoring, Inc.Icaro Vazquez, David Hoelzer
May 20, 2015
1:00pm EDT
(17:00:00 UTC)
Using an Open Source Threat Model for Implementing the Critical ControlsJames Tarala
May 19, 2015
3:00pm EDT
(19:00:00 UTC)
A Taste of What's New in SEC504 with John StrandJohn Strand
May 19, 2015
1:00pm EDT
(17:00:00 UTC)
How to Avoid a Phone Call from Brian Krebs - The Basics of Intrusion Detection and Prevention with Mike PoorMike Poor
May 18, 2015
3:00pm EDT
(19:00:00 UTC)
Application Security by ExampleFrank Kim
May 18, 2015
1:00pm EDT
(17:00:00 UTC)
Protecting the Things, including the ones you already have (and don't know about).ThreatSTOPTom Byrnes, Johannes Ullrich
May 15, 2015
1:00pm EDT
(17:00:00 UTC)
Threat Intelligence: Going from Theory to PracticeAlienVaultAndy Manoske, Dave Shackleford
May 14, 2015
3:00pm EDT
(19:00:00 UTC)
Why Train?Lance Spitzner
May 14, 2015
1:00pm EDT
(17:00:00 UTC)
2015 Application Security Survey, Part 2: Builder IssuesHewlett Packard

Qualys

Veracode

Waratek

WhiteHat Security
Bruce Jenkins, Maria Loughlin, Eric Johnson
May 13, 2015
1:00pm EDT
(17:00:00 UTC)
2015 Application Security Survey, Part 1: Defender IssuesHewlett Packard

Qualys

Veracode

Waratek

WhiteHat Security
Eric Johnson, Will Bechtel, Robert Hansen, Brian Maccaba
May 13, 2015
11:00am EDT
(15:00:00 UTC)
Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat RisksPalo Alto NetworksLance Spencer, John Pescatore
May 12, 2015
1:00pm EDT
(17:00:00 UTC)
Creating a Roadmap for Dramatically Improving Your Strategic Security OperationsRSATim Rand, Alissa Torres
May 6, 2015
3:00pm EDT
(19:00:00 UTC)
Patient healthcare data is under constant attack: Steps you can take to mitigate the problemCarbon BlackChristopher Strand, Barbara Filkins
May 6, 2015
1:00pm EDT
(17:00:00 UTC)
Assume Compromise and Protect Your Endpoints: SANS 2nd Survey on Endpoint SecurityGuidance SoftwareRoger Angarita, Jake Williams
April 29, 2015
2:00pm EDT
(18:00:00 UTC)
Insider Threats and the Real Financial Impact to Organizations - A SANS SurveyVeriatoMike Tierney, Dr. Eric Cole
April 28, 2015
3:00pm EDT
(19:00:00 UTC)
Cyber Threat & Information Sharing in HealthcareSpencer Mott, Terry Rice, Jim Routh, John Pescatore
April 27, 2015
1:00pm EDT
(17:00:00 UTC)
The Crazy New World of Cyber Investigations: Law, Ethics, and EvidenceBen Wright
April 23, 2015
10:00am EST
(14:00:00 UTC)
If it fits, it sniffs: Adventures in WarShippingLarry Pesce
April 22, 2015
3:00pm EDT
(19:00:00 UTC)
Insider Threat - The Enemy WithinDr. Eric Cole
April 21, 2015
10:00am EDT
(14:00:00 UTC)
Saboreando SANS SEC575: Seguridad y pen-testing de dispositivos, apps, comunicaciones y entornos movilesRaúl Siles
April 17, 2015
1:00pm EDT
(17:00:00 UTC)
Six Steps to SIEM SuccessAlienVaultTom D'Aquino
April 16, 2015
6:00pm EDT
(22:00:00 UTC)
Special Webcast: Microsoft Patch MS15-034Johannes Ullrich, PhD
April 16, 2015
1:00pm EDT
(17:00:00 UTC)
Best Practices for Reducing Your Attack Surface: 5 Steps to Shrinking Your Window of VulnerabilitySkybox Security, Inc.Michael Bruchanski
April 15, 2015
1:00pm EDT
(17:00:00 UTC)
Demystifying Targeted Attacks on Industrial Control SystemsScott King, Graham Speake, Eric Cornelius, Derek Harp (Moderator)
April 14, 2015
12:30pm EST
(16:30:00 UTC)
LL / Simulcast Title - Advanced Threats Need Comprehensive DefenseFidelis Security Systems, Inc.
April 10, 2015
1:00pm EST
(17:00:00 UTC)
Stop Cyber Attacks in Real Time: Modern Defense in DepthVectra Networks Inc.Wade Williamson, John Pescatore
April 9, 2015
3:00pm EST
(19:00:00 UTC)
Protecting Critical Infrastructure by Transforming Threat Intelligence into an Effective DefenseBAE Systems Applied IntelligenceMark Trump, Michael Assante
April 9, 2015
1:00pm EST
(17:00:00 UTC)
Detecting Breaches through Security Investigations with PlatforaPlatforaMustafa Rassiwala, John Pescatore
April 8, 2015
9:00am EDT
(13:00:00 UTC)
A Successful Awareness Campaign Begins With 4 Key QuestionsLance Spitzner
April 6, 2015
3:00pm EDT
(19:00:00 UTC)
Adventures in High-Value Pen Testing: A Taste of SANS Security 560" by Ed SkoudisEd Skoudis
April 6, 2015
1:00pm EDT
(17:00:00 UTC)
Accelerate Your Cybercrime Investigations with OSINTDomainToolsTim Helming, Lenny Zeltser
April 3, 2015
3:00pm EDT
(19:00:00 UTC)
How to Build Account Harvesters and Password Guessers with PythonMichael Murr, Ed Skoudis
April 2, 2015
1:00pm EST
(17:00:00 UTC)
Analyst Webcast: Simplifying Compliance and Forensic Requirements with HP ArcSight LoggerHP Sridhar Karnam, Dave Shackleford
April 1, 2015
1:00pm EST
(17:00:00 UTC)
How to Deploy the Critical Controls in a Windows Environment with Jason FossenJason Fossen
March 31, 2015
9:00pm EDT
(01:00:00 UTC)
SANS 8 Mobile Device Security StepsMobileIronChristopher Crowley
March 31, 2015
1:00pm EDT
(17:00:00 UTC)
Analyst Webcast: Enabling Enterprise Mobility With Security From The Ground UpSymantecCheryl Tang, Lee Neely
March 27, 2015
11:00am EST
(15:00:00 UTC)
2015 Security Awareness Report WebcastBob Rudis, Lance Spitzner
March 26, 2015
1:00pm EST
(17:00:00 UTC)
Live Panel Discussion: The Risk of Data Exposure through Application UsageObserveITMichael Santarcangelo, Gabriel Friedlander , David Monahan, Peter Hesse
March 26, 2015
11:00am EST
(15:00:00 UTC)
Defending against advanced targeted threats with the SANS Critical ControlsAvectoAndrew Avanessian, John Pescatore
March 25, 2015
1:00pm EDT
(17:00:00 UTC)
Jumpstarting the Critical Security Controls with Intelligent Asset DiscoveryPwnie ExpressKevin Reilly, John Pescatore
March 24, 2015
3:00pm EDT
(19:00:00 UTC)
How SANS Critical Security Controls Lead to PCI DSS Quick WinsCarbon BlackJohn Pescatore, Chris Strand
March 24, 2015
1:00pm EDT
(17:00:00 UTC)
Cybersecurity Collaboration: Leveraging a Trusted PartnerFireEyeJoshua Goldfarb
March 23, 2015
7:00pm EST
(23:00:00 UTC)
Reverse Engineering Mac MalwareSarah Edwards
March 23, 2015
3:00pm EDT
(19:00:00 UTC)
Unraveling the Threat: Expanding Response Processes and Procedures Beyond the Moment of DiscoveryCarbon BlackBen Johnson
March 19, 2015
9:00am EDT
(13:00:00 UTC)
Pillage the Village Redux: More Pen Test Adventures in Post ExploitationJohn Strand
March 18, 2015
8:00pm EST
(00:00:00 UTC)
SANS Canada presents Defending Against Advanced Attacks With Dr. Eric ColeDr. Eric Cole
March 18, 2015
1:00pm EST
(17:00:00 UTC)
A risk-based approach to identification, impact estimation, and effective remediation of data breaches in web-based applicationsWhiteHat SecurityDemetrios Lazarikos (Laz) , Dr. Eric Cole
March 17, 2015
1:00pm EDT
(17:00:00 UTC)
The Seamless Way Continuous Monitoring Can Defend Your Organization against Cyber AttacksEric Conrad
March 16, 2015
3:00pm EST
(19:00:00 UTC)
Smartphone Security is Getting Stronger - Are Your Forensic Methods Getting Weaker?Heather Mahalik
March 13, 2015
1:00pm EST
(17:00:00 UTC)
Taming Your Indicator Consumption PipelineRyan Stillions
March 12, 2015
1:00pm EDT
(17:00:00 UTC)
Advanced ICS Cybersecurity: Moving Beyond Defense in-Depth to an Intelligence-Driven ApproachLeidosRich Mahler, Robert M. Lee, Michael Assante
March 11, 2015
1:00pm EDT
(17:00:00 UTC)
Level Up Your Security Strategy with Cyber Threat IntelligenceAlienVaultJoe Schreiber, Dave Shackleford
March 10, 2015
3:00pm EDT
(19:00:00 UTC)
Privileged Domain Account Protection: How to Limit Credentials ExposureMike Pilkington
March 10, 2015
1:00pm EDT
(17:00:00 UTC)
The Intersection of Enterprise SaaS Adoption and Information SecurityAdallomDanelle Au, Dave Shackleford
March 6, 2015
8:30am EST
(13:30:00 UTC)
SANS Financial Services Cybersecurity Briefing
March 5, 2015
1:00pm EST
(18:00:00 UTC)
The NEW 2015 CISSP exam is being implemented on April 15, 2015. Are you ready?David P. Miller
March 4, 2015
1:00pm EST
(18:00:00 UTC)
Automating the Incident Response ProcessCarbon BlackJeffrey (J.J.) Guy, Alissa Torres
March 4, 2015
8:30am EDT
(13:30:00 UTC)
Critical Controls Security Briefing
February 26, 2015
3:00pm EST
(20:00:00 UTC)
Pillage the Village Redux: More Pen Test Adventures in Post ExploitationJohn Strand, Ed Skoudis
February 26, 2015
1:00pm EST
(18:00:00 UTC)
How Allianz Insurance ensures compliance and audits activity with outsourced private cloud initiativeObserveITDr. Michael Holder
February 25, 2015
3:00pm EST
(20:00:00 UTC)
Shellshock hands-onEric Conrad
February 24, 2015
3:00pm EST
(20:00:00 UTC)
Anti-anti-forensics in action - Recovering from (USB) oblivionNick Klein
February 20, 2015
1:00pm EST
(18:00:00 UTC)
Continuous Diagnostics and Mitigation for Government Agencies: Is It Working? A SANS SurveyFiremon

IBM

Symantec

Forescout Technologies BV
Wallace Sann, Tony Sager, Tim Woods, Kenneth Durbin, Joshua Stegall
February 19, 2015
1:00pm EST
(18:00:00 UTC)
Who's Using Cyberthreat Intelligence and How? Part 2: Best Practices to Improve Incident Detection and ResponseAlienVault

Arbor Networks

BeyondTrust

Carbon Black

SurfWatch Labs

Anomali
Dave Shackleford, Will Gragido, Morey Haber, Adam Meyer
February 18, 2015
1:00pm EST
(18:00:00 UTC)
What Works Increasing Vulnerability Management Effectiveness While Reducing CostTenable John Pescatore
February 17, 2015
1:00pm EST
(18:00:00 UTC)
Who's Using Cyberthreat Intelligence and How? Part 1: Definitions, Tools and StandardsAlienVault

Arbor Networks

BeyondTrust

Carbon Black

SurfWatch Labs

Anomali
Dave Shackleford, Patrick Bedwell, Jennifer Glenn, Colby DeRodeff
February 12, 2015
1:00pm EST
(18:00:00 UTC)
A Security Geek's Guide to SAPOnapsisAlex Horan
February 11, 2015
9:00pm EDT
(02:00:00 UTC)
Going Phishing?Lance Spitzner
February 11, 2015
1:00pm EDT
(18:00:00 UTC)
Creating quick wins by optimizing Operational Technology and Informational Technology process controls.KPMGMichael Gomez, Dietz Ellis
February 10, 2015
1:00pm EST
(18:00:00 UTC)
SANS WhatWorks: How VCU uses FireEye for Advanced Threat Detection and PreventionFireEyeJohn Pescatore
February 6, 2015
1:00pm EDT
(18:00:00 UTC)
Wrapping Up The GHOST: Lessons Learned From The Ghost VulnerabilityVeracodeChris Wysopal, Johannes Ullrich
February 5, 2015
8:00pm EDT
(01:00:00 UTC)
Wrapping Up The GHOST: Lessons Learned From The Ghost Vulnerability - Asia PacificVeracodeChris Wysopal, Johannes Ullrich
February 5, 2015
1:00pm EST
(18:00:00 UTC)
Mapping Next-Generation NAC to the Critical Security ControlsForescout Technologies BVJames Tarala, Scott Gordon
February 4, 2015
1:00pm EST
(18:00:00 UTC)
Best Practices for Eliminating SSL Encrypted Traffic Blind SpotsBlueCoatGreg Mayfield, David Wells, John Pescatore
February 3, 2015
11:00am EST
(16:00:00 UTC)
An Overview of ICS 515 - Active DefenseRobert M. Lee
February 2, 2015
1:00pm EST
(18:00:00 UTC)
IR Event Log AnalysisHal Pomeranz
January 28, 2015
1:00pm EST
(18:00:00 UTC)
Avoid Making the Headlines Protect Your Retail Business from Cyber AttacksPalo Alto NetworksIsabelle Dumont, Dave Shackleford
January 27, 2015
3:00pm EST
(20:00:00 UTC)
The Year of Cyber Defense with Dr. Eric ColeDr. Eric Cole
January 26, 2015
3:00pm EST
(20:00:00 UTC)
Data Center Server Security: A SANS SurveyIBM

Mcafee LLC
Jake Williams, Michael Gare, Joakim Lialias
January 26, 2015
1:00pm EST
(18:00:00 UTC)
The Few, The Proud, The Privileged: Controlling the Use of Administrator Passwords to Achieve Critical Security Control #12BeyondTrustScott Lang, G. Mark Hardy
January 22, 2015
1:00pm EDT
(18:00:00 UTC)
Don't be the next victim: Cloak and secure your critical infrastructure and devicesTemperedDavid Mattes
January 21, 2015
1:00pm EST
(18:00:00 UTC)
Analyst Webcast: Securing Oracle Databases Made EasyOraclePete Finnigan
January 20, 2015
1:00pm EST
(18:00:00 UTC)
Simplify PCI DSS Compliance with AlienVault USMAlienVaultMark Allen
January 13, 2015
3:00pm EST
(20:00:00 UTC)
The 20 Critical Controls: A Security StrategyRandy Marchany
January 12, 2015
2:00pm EST
(19:00:00 UTC)
Fun with CISSP Questions: "The Absurd, The Drink the Kool-Aid, and The Ugly"Ted Demopoulos
January 8, 2015
1:00pm EST
(18:00:00 UTC)
State of Cyber Threat Intelligence AddressRick Holland
January 5, 2015
1:00pm EST
(18:00:00 UTC)
How to Run Linux Malware Analysis Apps as Docker ContainersLenny Zeltser

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.