SANS Live Training is Available In-Person OR Live Online! Explore Upcoming Events.

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
Monday, December 21, 2015
at 3:00 PM EDT
(2015-12-21 20:00 UTC)
Juniper ScreenOS Backdoor: What do you need to know Johannes Ullrich, PhD
Thursday, December 17, 2015
at 3:00 PM EST
(2015-12-17 20:00 UTC)
SANS VetSuccess Progress ReportJim Michaud, Arlin Halstead
Wednesday, December 16, 2015
at 1:00 PM EST
(2015-12-16 18:00 UTC)
Five Critical Factors Healthcare Providers Must Know When Partnering with a Cyber Security VendorBAE Systems Applied Intelligence
Fortinet, Inc.
Charlie Mallio, John McNeice, Barbara Filkins
Tuesday, December 15, 2015
at 11:00 AM EST
(2015-12-15 16:00 UTC)
Predicting Cyber Security Trends in 2016Lancope
Tim (TK) Keanani
Thursday, December 10, 2015
at 6:00 AM EDT
(2015-12-10 11:00 UTC)
The CIS Critical Security Controls: The International Standard for DefenseJames Tarala
Wednesday, December 09, 2015
at 3:00 PM EST
(2015-12-09 20:00 UTC)
The Top 20 Security Controls Adapted to ICSWm. Arthur Conklin
Wednesday, December 09, 2015
at 1:00 PM EST
(2015-12-09 18:00 UTC)
Guarding Beyond the Gateway: Modern Challenges of Email SecurityMimecast Services Limited
Orlando Scott-Cowley, Barbara Filkins
Tuesday, December 08, 2015
at 1:00 PM EST
(2015-12-08 18:00 UTC)
New Frontiers in Intrusion ProtectionTrend Micro Inc.
Dave Shackleford, Elisa Lippincott
Monday, December 07, 2015
at 3:00 PM EST
(2015-12-07 20:00 UTC)
How to speak to the board of directors about securityWhiteHat Security
Carol G. Mills, John Pescatore, Demetrios Lazarikos (Laz)
Wednesday, December 02, 2015
at 1:00 PM EST
(2015-12-02 18:00 UTC)
How to Detect and Respond to Specific Advanced Threats: Essential Use Cases with RSA Security AnalyticsRSA
Travis Dye, Robert M. Lee
Tuesday, November 24, 2015
at 10:00 AM EDT
(2015-11-24 15:00 UTC)
Cocktail de Malware: Estrategias de Ataque con Código Malicioso HoyJess García
Thursday, November 19, 2015
at 3:00 PM EST
(2015-11-19 20:00 UTC)
Cyber Insurance: What is Its Role in Your Security Program?PivotPoint Risk Analytics
Gary R. Hayslip , John Pescatore, Benjamin Wright
Thursday, November 19, 2015
at 1:00 PM EST
(2015-11-19 18:00 UTC)
Post-Breach Impact: A Cost CompendiumSpirion
Gabriel Gumbs, Barbara Filkins, Johannes Hoech
Wednesday, November 18, 2015
at 3:00 PM EST
(2015-11-18 20:00 UTC)
Mitigating the point of sale data breach threat: Strategies to put into place nowCarbon Black
Christopher Strand
Wednesday, November 18, 2015
at 1:00 PM EST
(2015-11-18 18:00 UTC)
Securing SSH Itself with the Critical Security Controls Venafi, Inc
Gavin Hill, Barbara Filkins, David Hoelzer
Tuesday, November 17, 2015
at 3:00 PM EST
(2015-11-17 20:00 UTC)
Think Like an Attacker: What You Must Know About Targeted Attack TechniquesLightCyber
John Pescatore
Friday, November 13, 2015
at 1:00 PM EST
(2015-11-13 18:00 UTC)
A New Paradigm of Monitoring and ResponseRaytheon Cyber Products
Dave Shackleford, Ashok Sankar
Thursday, November 12, 2015
at 1:00 PM EST
(2015-11-12 18:00 UTC)
Moving up the Analytics Maturation Curve: Part 2 of the 3rd Annual SANS Security Analytics and Intelligence Survey AlienVault
DomainTools
LogRhythm
Lookingglass Cyber Solutions, Inc.
SAS INSTITUTE INC
Anomali
Josh Lincoln, Tim Helming, Dave Shackleford, Colby DeRodeff
Wednesday, November 11, 2015
at 1:00 PM EST
(2015-11-11 18:00 UTC)
Security Analytics Maturation Curve: Part 1 of the 3rd Annual SANS Security Analytics and Intelligence Survey AlienVault
DomainTools
LogRhythm
Lookingglass Cyber Solutions, Inc.
SAS INSTITUTE INC
Anomali
Allan Thomson , James Carder, Javvad Malik, Dave Shackleford
Wednesday, November 11, 2015
at 11:00 AM EST
(2015-11-11 16:00 UTC)
Noise Matters in Every Industrial Control SystemDoug Wylie
Tuesday, November 10, 2015
at 1:00 PM EST
(2015-11-10 18:00 UTC)
How to Build a Cybersecurity Platform the Easy WaySophos Inc.
Keith Palmgren
Friday, November 06, 2015
at 1:00 PM EST
(2015-11-06 18:00 UTC)
How to Detect System Compromise & Data Exfiltration with AlienVault USMAlienVault
Tom D'Aquino
Thursday, November 05, 2015
at 10:30 AM EST
(2015-11-05 15:30 UTC)
SANS Threat Intelligence BriefingRecordedFuture
LogRhythm
Robert M. Lee
Wednesday, November 04, 2015
at 1:00 PM EST
(2015-11-04 18:00 UTC)
Security Automation: Security Nirvana or Just A Fad?Symantec
Janene Casella, Jerry Shenk
Tuesday, November 03, 2015
at 1:00 PM EST
(2015-11-03 18:00 UTC)
2015 Cloud Security & Risk Benchmarks Report SkyHigh Networks
Brandon Cook, John Pescatore
Tuesday, November 03, 2015
at 11:00 AM EST
(2015-11-03 16:00 UTC)
How NERC and CIP are making a differenceTim Conway
Friday, October 30, 2015
at 1:00 PM EDT
(2015-10-30 17:00 UTC)
Security Best Practices for Implementing Network Segmentation in a Healthcare EnvironmentPalo Alto Networks
Matthew Mellen, James Tarala
Thursday, October 29, 2015
at 1:00 PM EDT
(2015-10-29 17:00 UTC)
What Works for Fannie Mae’s Deputy CISO to Assess/Monitor Third Party Cybersecurity with BitSightBitsight
John Pescatore
Wednesday, October 28, 2015
at 1:00 PM EDT
(2015-10-28 17:00 UTC)
What Are Their Vulnerabilities? A SANS Continuous Monitoring SurveyAlienVault
Arbor Networks
HP
Tenable
Ted Gary, Mark Painter, Arabella Hallawell, Javvad Malik, David Hoelzer
Tuesday, October 27, 2015
at 3:00 PM EDT
(2015-10-27 19:00 UTC)
Easier Web App Pen Testing by Leveraging Plugins & ExtensionsMicah Hoffman
Tuesday, October 27, 2015
at 1:00 PM EDT
(2015-10-27 17:00 UTC)
The Expanding Role of Data Analytics in Threat DetectionVectra Networks Inc.
Barbara Filkins, Wade Williamson
Thursday, October 22, 2015
at 1:00 PM EDT
(2015-10-22 17:00 UTC)
Implementing Active Breach DetectionLightCyber
David Thompson, Dave Shackleford
Wednesday, October 21, 2015
at 10:00 PM EDT
(2015-10-22 02:00 UTC)
Securing Your KidsLance Spitzner
Wednesday, October 21, 2015
at 10:00 AM EDT
(2015-10-21 14:00 UTC)
Making Awareness StickLance Spitzner
Friday, October 16, 2015
at 8:30 AM EDT
(2015-10-16 12:30 UTC)
SANS and CIS Critical Security Controls BriefingSymantec
Tony Sager, Jane Holl Lute, John Pescatore, James Tarala
Thursday, October 15, 2015
at 1:00 PM EDT
(2015-10-15 17:00 UTC)
Dynamic Data Center SecurityIllumio
Chandra Sekar, Dave Shackleford
Thursday, October 15, 2015
at 11:00 AM EDT
(2015-10-15 15:00 UTC)
Threats 2.0: Get Ahead of them with Advanced AnalyticsTriumfant
Greg Wessel, John Pescatore
Wednesday, October 14, 2015
at 1:00 PM EDT
(2015-10-14 17:00 UTC)
Securing Your KidsLance Spitzner
Tuesday, October 13, 2015
at 1:00 PM EDT
(2015-10-13 17:00 UTC)
Threats in the Unknown: Applied intelligence-driven approaches to real-time threat detectionDarktrace
Brandon Mayer
Tuesday, October 13, 2015
at 10:00 AM EDT
(2015-10-13 14:00 UTC)
Security Evaluation of Mobile Applications using 'App Report Cards'Raul Siles
Friday, October 09, 2015
at 1:00 PM EDT
(2015-10-09 17:00 UTC)
Complete Application pwnage via Multi-POST XSRFAdrien de Beaupre
Thursday, October 08, 2015
at 3:00 PM EDT
(2015-10-08 19:00 UTC)
Certifications that Matter: Passing the CISSPDavid Miller
Thursday, October 08, 2015
at 11:00 AM EDT
(2015-10-08 15:00 UTC)
Master the Game of “Who”: Leveraging Network Intelligence and User Activity to Combat Insider ThreatsFlowTraq
Mike Tierney, Vince Berk, Dr. Eric Cole
Wednesday, October 07, 2015
at 11:00 AM EDT
(2015-10-07 15:00 UTC)
Security Awareness Programs and NERC CIPTim Conway, Lance Spitzner
Tuesday, October 06, 2015
at 3:00 PM EDT
(2015-10-06 19:00 UTC)
Hacked, or Human Error in Fifteen Minutes or LessChris Crowley, Stephen Northcutt
Tuesday, October 06, 2015
at 1:00 PM EDT
(2015-10-06 17:00 UTC)
ICS Cybersecurity: Models for SuccessRobert M. Lee, Michael Assante
Friday, October 02, 2015
at 1:00 PM EDT
(2015-10-02 17:00 UTC)
Manual Testing is a Must, but Automation is Divine John Strand, Ed Skoudis
Friday, October 02, 2015
at 11:00 AM EDT
(2015-10-02 15:00 UTC)
Automating the Hunt for Network IntrudersEndgame
Jamie Butler, Eric Cole
Wednesday, September 30, 2015
at 1:00 PM EDT
(2015-09-30 17:00 UTC)
Behind the Curve? Getting Started on Endpoint Security MaturityTripwire, Inc.
G. Mark Hardy, Dwayne Melancon
Wednesday, September 30, 2015
at 11:00 AM EDT
(2015-09-30 15:00 UTC)
How To Frustrate Your Adversary: Active Defense, Offensive Countermeasures & Cyber Deception with Bryce Galbraith - Part 1Bryce Galbraith
Thursday, September 24, 2015
at 1:00 PM EDT
(2015-09-24 17:00 UTC)
Strategies to Address SANS Critical Controls 10 and 11 - Secure Configurations and Control of Network DevicesSkybox Security, Inc.
John Pescatore, Michelle Johnson Cobb, Brian Kelly
Wednesday, September 23, 2015
at 1:00 PM EDT
(2015-09-23 17:00 UTC)
Orchestrating Security in the Cloud: A SANS SurveyCloudPassage
Evident.io
HP
Mcafee LLC
Dave Shackleford, Farshad Ghazi, Sami Laine, Andrew Maguire, Swaroop Sayeram
Tuesday, September 22, 2015
at 10:00 PM EDT
(2015-09-23 02:00 UTC)
DIY vulnerability discovery with DLL Side LoadingJake Williams
Tuesday, September 22, 2015
at 1:00 PM EDT
(2015-09-22 17:00 UTC)
A Proactive Approach to Incident ResponseBlue Coat Systems, Inc.
Alan Hall, Jacob Williams
Wednesday, September 16, 2015
at 1:00 PM EDT
(2015-09-16 17:00 UTC)
Critical Security Controls Update: How to Keep Pace with Advanced Endpoint ThreatsRSA
Hermes Bojaxhi, John Pescatore
Tuesday, September 15, 2015
at 3:30 PM EDT
(2015-09-15 19:30 UTC)
Turn on the Lights! Case Studies of Malware in MemoryFidelis Cybersecurity
Tyler Halfpop
Thursday, September 10, 2015
at 3:00 PM EDT
(2015-09-10 19:00 UTC)
What Works in Reducing Web Application Vulnerabilities: Using to WhiteHat Sentinel to Increase Application Security Before and After Production DeploymentWhiteHat Security
John Pescatore
Thursday, September 10, 2015
at 1:00 PM EDT
(2015-09-10 17:00 UTC)
Combatting Cyber Risks in the Supply ChainRaytheon | Websense
Joshua Douglas, Dave Shackleford
Wednesday, September 09, 2015
at 1:00 PM EDT
(2015-09-09 17:00 UTC)
Retail Security: PCI DSS and Third Party InteractionsTenable
Jeff Man, Dr. Eric Cole
Wednesday, September 09, 2015
at 11:00 AM EDT
(2015-09-09 15:00 UTC)
NERC CIP: Hot TopicsTed Gutierrez, Tim Conway
Wednesday, September 09, 2015
at 7:00 AM EDT
(2015-09-09 11:00 UTC)
Ubiquity Forensics - Your iCloud and YouSarah Edwards
Tuesday, September 08, 2015
at 1:00 PM EDT
(2015-09-08 17:00 UTC)
What Works in Vulnerability Management: Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 NexposeRapid7 Inc.
John Pescatore
Tuesday, September 08, 2015
at 11:00 AM EDT
(2015-09-08 15:00 UTC)
Hacking the HospitalBilly Rios
Friday, September 04, 2015
at 1:00 PM EDT
(2015-09-04 17:00 UTC)
Car Wars Episode I: Hacker MenaceMike Assante, Matthew Carpenter
Thursday, September 03, 2015
at 1:30 PM EDT
(2015-09-03 17:30 UTC)
Making DNS Your Greatest Ally in Active DefenseDomainTools
Dave Shackleford, Tim Helming
Wednesday, September 02, 2015
at 1:00 PM EDT
(2015-09-02 17:00 UTC)
Thwarting Advanced Threats with Trusted CryptoTHALES e-Security
John Grimm, John Pescatore
Tuesday, September 01, 2015
at 1:00 PM EDT
(2015-09-01 17:00 UTC)
Securing Your Cloud Apps - Understanding the Shared Responsibility ModelPalerra
John Yun, John Pescatore
Friday, August 28, 2015
at 1:00 PM EDT
(2015-08-28 17:00 UTC)
SIEM-plifying Security Monitoring: Making Sense of Security Intelligence AlienVault
Dave Shackleford, Tom D'Aquino
Thursday, August 27, 2015
at 11:00 AM EDT
(2015-08-27 15:00 UTC)
Cache Me If You Can!Matt Bromiley
Wednesday, August 26, 2015
at 9:00 PM EDT
(2015-08-27 01:00 UTC)
The Current Reality: Defending a Compromised NetworkDr. Eric Cole
Monday, August 24, 2015
at 11:00 AM EDT
(2015-08-24 15:00 UTC)
Memory Forensic Baselines: Using Normal to Avoid "Red Herring"Alissa Torres
Friday, August 21, 2015
at 2:00 PM EDT
(2015-08-21 18:00 UTC)
Detect, Contain, and Control CyberthreatsRaytheon | Websense
Ashok Sankar, Dr. Eric Cole
Thursday, August 20, 2015
at 3:00 PM EDT
(2015-08-20 19:00 UTC)
You Can’t Respond If You Can’t See: Building Sophisticated Detection Mechanisms Leveraging Patterns of CompromiseCarbon Black
Dave Shackleford
Thursday, August 20, 2015
at 1:00 PM EST
(2015-08-20 17:00 UTC)
Part 2: Incident Response - How Can We Be More Proactive for the Future?AlienVault
Arbor Networks
Carbon Black
Hewlett Packard
Mcafee LLC
Rapid7 Inc.
Wade Woolwine, Gary Sockrider, Justin Falck , Alissa Torres
Wednesday, August 19, 2015
at 1:00 PM EDT
(2015-08-19 17:00 UTC)
The Value of Real-Time Pattern RecognitionRaytheon | Websense
Dave Shackleford, Michael Crouse
Wednesday, August 19, 2015
at 11:00 AM EDT
(2015-08-19 15:00 UTC)
CIP V6 NOPR What You Need to Think AboutTim Conway, Michael Assante
Tuesday, August 18, 2015
at 3:00 PM EDT
(2015-08-18 19:00 UTC)
How are Cybercriminals Threatening Security? Highlights from the 2015 Internet Security Threat ReportDLT Solutions
Symantec
Don Maclean, David Hoelzer, Robert Myles, CISSP, CISM
Tuesday, August 18, 2015
at 1:00 PM EST
(2015-08-18 17:00 UTC)
Part 1: Incident Response - What Is (and Isn't) Working Today AlienVault
Arbor Networks
Carbon Black
Hewlett Packard
Mcafee LLC
Rapid7 Inc.
Russell Meyers, Javvad Malik, Barbara G. Kay, Alissa Torres
Friday, August 14, 2015
at 3:00 PM EDT
(2015-08-14 19:00 UTC)
Analyst Webcast: RASP vs. WAF: Comparing Capabilities and EfficienciesHP
Jake Williams
Friday, August 14, 2015
at 1:00 PM EDT
(2015-08-14 17:00 UTC)
What you need to know about StagefrightVeracode
Brian LaFlamme, Joshua Wright
Thursday, August 13, 2015
at 3:00 PM EDT
(2015-08-13 19:00 UTC)
Onboarding the ICS Mindset into Cyber Security ControlsJason Dely
Thursday, August 13, 2015
at 1:00 PM EDT
(2015-08-13 17:00 UTC)
The Return of the Malicious Macro, and the Economics of CybercrimeProofPoint
Patrick Wheeler, Jerry Shenk
Wednesday, August 12, 2015
at 1:00 PM EDT
(2015-08-12 17:00 UTC)
The Race to Detection: IR Trends, Tools and Processes That Close the GapCarbon Black
Jim Raine, Alissa Torres
Monday, August 10, 2015
at 1:00 PM EDT
(2015-08-10 17:00 UTC)
What's New in Windows 10 and Server 2016?Jason Fossen
Wednesday, August 05, 2015
at 3:00 PM EDT
(2015-08-05 19:00 UTC)
How to Be More Effective and Improve the Success Rates of Your IT ProjectsJeff Frisk
Tuesday, August 04, 2015
at 1:00 PM EDT
(2015-08-04 17:00 UTC)
Secure the Endpoint to battle CyberthreatsSymantec
Kat Pelak, John Pescatore
Monday, August 03, 2015
at 3:00 PM EDT
(2015-08-03 19:00 UTC)
Hacking for the MassesMark Baggett
Thursday, July 30, 2015
at 1:00 PM EDT
(2015-07-30 17:00 UTC)
Protecting Third Party Applications with RASPHewlett Packard
Cindy Blake, Eric Johnson
Wednesday, July 29, 2015
at 1:00 PM EDT
(2015-07-29 17:00 UTC)
Tracking and Observation-How-To and What To Watch ForAnomali
Jason Trost, J. Michael Butler, Stephen Northcutt
Wednesday, July 29, 2015
at 11:00 AM EDT
(2015-07-29 15:00 UTC)
5 years after Stuxnet: What changed, what didn't and what lies aheadThomas Brandstetter
Tuesday, July 28, 2015
at 1:00 PM EDT
(2015-07-28 17:00 UTC)
Analyst Webcast: Securing Retail Beyond the Cash Register--Insider Threats and Targeted AttacksPalo Alto Networks
G. Mark Hardy
Friday, July 24, 2015
at 11:00 AM EDT
(2015-07-24 15:00 UTC)
WhatWorks in AppSec: ASP.NET Identity and AntiForgery TokensEric Johnson
Thursday, July 23, 2015
at 1:00 PM EST
(2015-07-23 17:00 UTC)
Cyber Security Strategies: Protecting Your ICS Investments a discussion with Ultra-3eti and Mike Assante of SANSUltra Electronics, 3eTI
Alex Tarter, Michael Assante
Wednesday, July 22, 2015
at 1:00 PM EDT
(2015-07-22 17:00 UTC)
APTs in ICS - Understanding and Preparing for the Rising Threat Landscape in Critical InfrastructurePalo Alto Networks
Del Rodillas, Michael Assante
Wednesday, July 22, 2015
at 11:00 AM EDT
(2015-07-22 15:00 UTC)
The Sliding Scale of Cyber SecurityRobert M. Lee
Tuesday, July 21, 2015
at 1:00 PM EDT
(2015-07-21 17:00 UTC)
File Security 2.0: Collaboration Controls, Considerations and Technology?Final Code
Scott Gordon, Barbara Filkins
Friday, July 17, 2015
at 11:00 AM EDT
(2015-07-17 15:00 UTC)
Infosec Rock Star: How to be a More Effective Security ProfessionalTed Demopoulos
Thursday, July 16, 2015
at 1:00 PM EDT
(2015-07-16 17:00 UTC)
Make it Hard for the Adversary: Learn Offensive Counter Measures with John StrandJohn Strand
Wednesday, July 15, 2015
at 1:00 PM EDT
(2015-07-15 17:00 UTC)
How to Detect SQL Injection & XSS Attacks with AlienVault USMAlienVault
Garrett Gross, Mark Allen
Wednesday, July 15, 2015
at 11:00 AM EDT
(2015-07-15 15:00 UTC)
Challenges and Strategies for Addressing the NERC CIP Version 5 Training RequirementsPlease Check Back
Tuesday, July 14, 2015
at 3:00 PM EDT
(2015-07-14 19:00 UTC)
SANS NetWars: Building a Better InfoSec Pro with GamificationEd Skoudis, Joshua Wright
Monday, July 13, 2015
at 7:00 PM EDT
(2015-07-13 23:00 UTC)
SANS VetSuccess Immersion Academy - The Fast Track to Top Skills and Top Jobs in Cyber. Guaranteed.David. W. Brown, Charles Campbell, Donald W. Greene, Arlin Halstead
Wednesday, July 01, 2015
at 11:00 AM EDT
(2015-07-01 15:00 UTC)
10 Biggest Mistakes in Implementing Continuous MonitoringIsmael Valenzuela
Monday, June 29, 2015
at 1:00 PM EDT
(2015-06-29 17:00 UTC)
Securely Transition to the Cloud: Increase Agility and Reduce RiskBarracuda Networks
VMWare, Inc
Yatin Chalke, Dave Shackleford, Amy Bray
Friday, June 26, 2015
at 3:00 PM EDT
(2015-06-26 19:00 UTC)
What the US government breach tells us about the state of securityVeracode
Johannes Ullrich, PhD
Thursday, June 25, 2015
at 1:00 PM EDT
(2015-06-25 17:00 UTC)
The State of Security in Control Systems Today: A SANS Survey WebcastSurfWatch Labs
Tenable
Ted Gary, Adam Meyer, Derek Harp
Wednesday, June 24, 2015
at 3:00 PM EDT
(2015-06-24 19:00 UTC)
Zero-Day Defense: The Power of Actionable Threat Intelligence and Continuous Endpoint Data CollectionCarbon Black
Brent Midwood, Stephen Newman
Wednesday, June 24, 2015
at 1:00 PM EDT
(2015-06-24 17:00 UTC)
Six Steps to Stronger Security for SMBsQualys
Wolfgang Kandek, Dr. Eric Cole
Tuesday, June 23, 2015
at 1:00 PM EDT
(2015-06-23 17:00 UTC)
SANS 2nd Financial Sector Security SurveyAlienVault
Arbor Networks
LogRhythm
VSS Monitoring, Inc.
James Carder, Patrick Bedwell, G. Mark Hardy, Rakesh Shah, Ann Sun
Monday, June 22, 2015
at 3:00 PM EDT
(2015-06-22 19:00 UTC)
Blocking XSS attacks with Content Security PolicyGregory Leonard
Monday, June 22, 2015
at 1:00 PM EDT
(2015-06-22 17:00 UTC)
A Taste of SANS SEC660: Utilizing ROP on Windows 10Stephen Sims
Monday, June 22, 2015
at 11:00 AM EDT
(2015-06-22 15:00 UTC)
Automating DFIR Getting closer to the find evidence buttonDavid Cowen
Thursday, June 18, 2015
at 1:00 PM EDT
(2015-06-18 17:00 UTC)
Big Data: Identifying Major Threats and Removing Security and Compliance BarriersCloudera
John Pescatore, Sam Heywood, Barbara Filkins
Thursday, June 18, 2015
at 11:00 AM EDT
(2015-06-18 15:00 UTC)
Implementing an ICS Active Defense StrategyRobert M. Lee
Wednesday, June 17, 2015
at 1:00 PM EDT
(2015-06-17 17:00 UTC)
Visibility, Analytics, & Action: A strategy to address Critical Control 4 - Continuous Vulnerability Assessment & RemediationSkybox Security, Inc.
John Pescatore, Michelle Cobb, Sean Keef
Tuesday, June 16, 2015
at 1:00 PM EDT
(2015-06-16 17:00 UTC)
Conquering Network Security Challenges in Distributed EnterprisesPalo Alto Networks
Joerg Sieber, John Pescatore
Tuesday, June 09, 2015
at 3:00 PM EDT
(2015-06-09 19:00 UTC)
Five Key Things to Know About Cyber Threat IntelligenceRobert M. Lee
Tuesday, June 09, 2015
at 11:00 AM EDT
(2015-06-09 15:00 UTC)
Node.js: Successful, exciting... and bares security risksCheckmarx Inc.
Amit Ashbel
Thursday, June 04, 2015
at 1:00 PM EDT
(2015-06-04 17:00 UTC)
Meeting New CSC Guidelines for SSL Certificate ManagementVenafi, Inc
Kevin Bocek, Barbara Filkins
Wednesday, June 03, 2015
at 1:00 PM EDT
(2015-06-03 17:00 UTC)
Continuous Monitoring and Real World AnalysisSeth Misenar
Tuesday, June 02, 2015
at 10:00 PM EDT
(2015-06-03 02:00 UTC)
Passing the CISSPDr. Eric Cole
Tuesday, June 02, 2015
at 5:30 PM EDT
(2015-06-02 21:30 UTC)
Industrial Control Systems Security Briefing 2015Palo Alto Networks
NexDefense, Inc.
Please Check Back
Friday, May 29, 2015
at 3:00 PM EDT
(2015-05-29 19:00 UTC)
Bringing DevOps to DFIRBarry Anderson
Friday, May 29, 2015
at 1:00 PM EDT
(2015-05-29 17:00 UTC)
The Value of Adopting and Improving Security Maturity ModelsHP
Tony Sager , Eric Schou
Friday, May 29, 2015
at 10:00 AM EDT
(2015-05-29 14:00 UTC)
¿En qué consiste SEC401: Security Essentials?Carlos Fragoso
Thursday, May 28, 2015
at 3:00 PM EDT
(2015-05-28 19:00 UTC)
Dont risk it - Using a risk-based approach to increase the security of web apps and other IT assets.WhiteHat Security
Demetrios Lazarikos (Laz) , John Pescatore
Wednesday, May 27, 2015
at 10:00 PM EDT
(2015-05-28 02:00 UTC)
Continuous Monitoring, Real World Analysis and Strategies to Mitigate Targeted Attacks; Bonus Story Behind The Top 4 MitigationsSeth Misenar, Alan Paller
Wednesday, May 27, 2015
at 3:00 PM EDT
(2015-05-27 19:00 UTC)
Achieving ICS Network Security Monitoring and Visibility with Flow DataChris Sanders, Robert M. Lee
Thursday, May 21, 2015
at 1:00 PM EDT
(2015-05-21 17:00 UTC)
Securing Portable Data and Applications on Enterprise Mobile Workspaces: A SANS SurveyIronkey by Imation
Leon Brown , Jacob Williams
Wednesday, May 20, 2015
at 3:00 PM EDT
(2015-05-20 19:00 UTC)
The Evolution of Network Security, and how Network Packet Brokers (NPBs) enable the Layered Security EraVSS Monitoring, Inc.
Icaro Vazquez, David Hoelzer
Wednesday, May 20, 2015
at 1:00 PM EDT
(2015-05-20 17:00 UTC)
Using an Open Source Threat Model for Implementing the Critical ControlsJames Tarala
Tuesday, May 19, 2015
at 3:00 PM EDT
(2015-05-19 19:00 UTC)
A Taste of What's New in SEC504 with John StrandJohn Strand
Tuesday, May 19, 2015
at 1:00 PM EDT
(2015-05-19 17:00 UTC)
How to Avoid a Phone Call from Brian Krebs - The Basics of Intrusion Detection and Prevention with Mike PoorMike Poor
Monday, May 18, 2015
at 3:00 PM EDT
(2015-05-18 19:00 UTC)
Application Security by ExampleFrank Kim
Monday, May 18, 2015
at 1:00 PM EDT
(2015-05-18 17:00 UTC)
Protecting the Things, including the ones you already have (and don't know about).ThreatSTOP
Tom Byrnes, Johannes Ullrich
Friday, May 15, 2015
at 1:00 PM EDT
(2015-05-15 17:00 UTC)
Threat Intelligence: Going from Theory to PracticeAlienVault
Andy Manoske, Dave Shackleford
Thursday, May 14, 2015
at 3:00 PM EDT
(2015-05-14 19:00 UTC)
Why Train?Lance Spitzner
Thursday, May 14, 2015
at 1:00 PM EDT
(2015-05-14 17:00 UTC)
2015 Application Security Survey, Part 2: Builder IssuesHewlett Packard
Qualys
Veracode
Waratek
WhiteHat Security
Bruce Jenkins, Maria Loughlin, Eric Johnson
Wednesday, May 13, 2015
at 1:00 PM EDT
(2015-05-13 17:00 UTC)
2015 Application Security Survey, Part 1: Defender IssuesHewlett Packard
Qualys
Veracode
Waratek
WhiteHat Security
Eric Johnson, Will Bechtel, Robert Hansen, Brian Maccaba
Wednesday, May 13, 2015
at 11:00 AM EDT
(2015-05-13 15:00 UTC)
Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat RisksPalo Alto Networks
Lance Spencer, John Pescatore
Tuesday, May 12, 2015
at 1:00 PM EDT
(2015-05-12 17:00 UTC)
Creating a Roadmap for Dramatically Improving Your Strategic Security OperationsRSA
Tim Rand, Alissa Torres
Wednesday, May 06, 2015
at 3:00 PM EDT
(2015-05-06 19:00 UTC)
Patient healthcare data is under constant attack: Steps you can take to mitigate the problemCarbon Black
Christopher Strand, Barbara Filkins
Wednesday, May 06, 2015
at 1:00 PM EDT
(2015-05-06 17:00 UTC)
Assume Compromise and Protect Your Endpoints: SANS 2nd Survey on Endpoint SecurityGuidance Software
Roger Angarita, Jake Williams
Wednesday, April 29, 2015
at 2:00 PM EDT
(2015-04-29 18:00 UTC)
Insider Threats and the Real Financial Impact to Organizations - A SANS SurveyVeriato
Mike Tierney, Dr. Eric Cole
Tuesday, April 28, 2015
at 3:00 PM EDT
(2015-04-28 19:00 UTC)
Cyber Threat & Information Sharing in HealthcareSpencer Mott, Terry Rice, Jim Routh, John Pescatore
Monday, April 27, 2015
at 1:00 PM EDT
(2015-04-27 17:00 UTC)
The Crazy New World of Cyber Investigations: Law, Ethics, and EvidenceBen Wright
Thursday, April 23, 2015
at 10:00 AM EST
(2015-04-23 14:00 UTC)
If it fits, it sniffs: Adventures in WarShippingLarry Pesce
Wednesday, April 22, 2015
at 3:00 PM EDT
(2015-04-22 19:00 UTC)
Insider Threat - The Enemy WithinDr. Eric Cole
Tuesday, April 21, 2015
at 10:00 AM EDT
(2015-04-21 14:00 UTC)
Saboreando SANS SEC575: Seguridad y pen-testing de dispositivos, apps, comunicaciones y entornos movilesRaúl Siles
Friday, April 17, 2015
at 1:00 PM EDT
(2015-04-17 17:00 UTC)
Six Steps to SIEM SuccessAlienVault
Tom D'Aquino
Thursday, April 16, 2015
at 6:00 PM EDT
(2015-04-16 22:00 UTC)
Special Webcast: Microsoft Patch MS15-034Johannes Ullrich, PhD
Thursday, April 16, 2015
at 1:00 PM EDT
(2015-04-16 17:00 UTC)
Best Practices for Reducing Your Attack Surface: 5 Steps to Shrinking Your Window of VulnerabilitySkybox Security, Inc.
Michael Bruchanski
Wednesday, April 15, 2015
at 1:00 PM EDT
(2015-04-15 17:00 UTC)
Demystifying Targeted Attacks on Industrial Control SystemsScott King, Graham Speake, Eric Cornelius, Derek Harp (Moderator)
Tuesday, April 14, 2015
at 12:30 PM EST
(2015-04-14 16:30 UTC)
LL / Simulcast Title - Advanced Threats Need Comprehensive DefenseFidelis Security Systems, Inc.
Please Check Back
Friday, April 10, 2015
at 1:00 PM EST
(2015-04-10 17:00 UTC)
Stop Cyber Attacks in Real Time: Modern Defense in DepthVectra Networks Inc.
Wade Williamson, John Pescatore
Thursday, April 09, 2015
at 3:00 PM EST
(2015-04-09 19:00 UTC)
Protecting Critical Infrastructure by Transforming Threat Intelligence into an Effective DefenseBAE Systems Applied Intelligence
Mark Trump, Michael Assante
Thursday, April 09, 2015
at 1:00 PM EST
(2015-04-09 17:00 UTC)
Detecting Breaches through Security Investigations with PlatforaPlatfora
Mustafa Rassiwala, John Pescatore
Wednesday, April 08, 2015
at 9:00 AM EDT
(2015-04-08 13:00 UTC)
A Successful Awareness Campaign Begins With 4 Key QuestionsLance Spitzner
Monday, April 06, 2015
at 3:00 PM EDT
(2015-04-06 19:00 UTC)
Adventures in High-Value Pen Testing: A Taste of SANS Security 560" by Ed SkoudisEd Skoudis
Monday, April 06, 2015
at 1:00 PM EDT
(2015-04-06 17:00 UTC)
Accelerate Your Cybercrime Investigations with OSINTDomainTools
Tim Helming, Lenny Zeltser
Friday, April 03, 2015
at 3:00 PM EDT
(2015-04-03 19:00 UTC)
How to Build Account Harvesters and Password Guessers with PythonMichael Murr, Ed Skoudis
Thursday, April 02, 2015
at 1:00 PM EST
(2015-04-02 17:00 UTC)
Analyst Webcast: Simplifying Compliance and Forensic Requirements with HP ArcSight LoggerHP
Sridhar Karnam, Dave Shackleford
Wednesday, April 01, 2015
at 1:00 PM EST
(2015-04-01 17:00 UTC)
How to Deploy the Critical Controls in a Windows Environment with Jason FossenJason Fossen
Tuesday, March 31, 2015
at 9:00 PM EDT
(2015-04-01 01:00 UTC)
SANS 8 Mobile Device Security StepsMobileIron
Christopher Crowley
Tuesday, March 31, 2015
at 1:00 PM EDT
(2015-03-31 17:00 UTC)
Analyst Webcast: Enabling Enterprise Mobility With Security From The Ground UpSymantec
Cheryl Tang, Lee Neely
Friday, March 27, 2015
at 11:00 AM EST
(2015-03-27 15:00 UTC)
2015 Security Awareness Report WebcastBob Rudis, Lance Spitzner
Thursday, March 26, 2015
at 1:00 PM EST
(2015-03-26 17:00 UTC)
Live Panel Discussion: The Risk of Data Exposure through Application UsageObserveIT
Michael Santarcangelo, Gabriel Friedlander , David Monahan, Peter Hesse
Thursday, March 26, 2015
at 11:00 AM EST
(2015-03-26 15:00 UTC)
Defending against advanced targeted threats with the SANS Critical ControlsAvecto
Andrew Avanessian, John Pescatore
Wednesday, March 25, 2015
at 1:00 PM EDT
(2015-03-25 17:00 UTC)
Jumpstarting the Critical Security Controls with Intelligent Asset DiscoveryPwnie Express
Kevin Reilly, John Pescatore
Tuesday, March 24, 2015
at 3:00 PM EDT
(2015-03-24 19:00 UTC)
How SANS Critical Security Controls Lead to PCI DSS Quick WinsCarbon Black
John Pescatore, Chris Strand
Tuesday, March 24, 2015
at 1:00 PM EDT
(2015-03-24 17:00 UTC)
Cybersecurity Collaboration: Leveraging a Trusted PartnerFireEye
Joshua Goldfarb
Monday, March 23, 2015
at 7:00 PM EST
(2015-03-23 23:00 UTC)
Reverse Engineering Mac MalwareSarah Edwards
Monday, March 23, 2015
at 3:00 PM EDT
(2015-03-23 19:00 UTC)
Unraveling the Threat: Expanding Response Processes and Procedures Beyond the Moment of DiscoveryCarbon Black
Ben Johnson
Thursday, March 19, 2015
at 9:00 AM EDT
(2015-03-19 13:00 UTC)
Pillage the Village Redux: More Pen Test Adventures in Post ExploitationJohn Strand
Wednesday, March 18, 2015
at 8:00 PM EST
(2015-03-19 00:00 UTC)
SANS Canada presents Defending Against Advanced Attacks With Dr. Eric ColeDr. Eric Cole
Wednesday, March 18, 2015
at 1:00 PM EST
(2015-03-18 17:00 UTC)
A risk-based approach to identification, impact estimation, and effective remediation of data breaches in web-based applicationsWhiteHat Security
Demetrios Lazarikos (Laz) , Dr. Eric Cole
Tuesday, March 17, 2015
at 1:00 PM EDT
(2015-03-17 17:00 UTC)
The Seamless Way Continuous Monitoring Can Defend Your Organization against Cyber AttacksEric Conrad
Monday, March 16, 2015
at 3:00 PM EST
(2015-03-16 19:00 UTC)
Smartphone Security is Getting Stronger - Are Your Forensic Methods Getting Weaker?Heather Mahalik
Friday, March 13, 2015
at 1:00 PM EST
(2015-03-13 17:00 UTC)
Taming Your Indicator Consumption PipelineRyan Stillions
Thursday, March 12, 2015
at 1:00 PM EDT
(2015-03-12 17:00 UTC)
Advanced ICS Cybersecurity: Moving Beyond Defense in-Depth to an Intelligence-Driven ApproachLeidos
Rich Mahler, Robert M. Lee, Michael Assante
Wednesday, March 11, 2015
at 1:00 PM EDT
(2015-03-11 17:00 UTC)
Level Up Your Security Strategy with Cyber Threat IntelligenceAlienVault
Joe Schreiber, Dave Shackleford
Tuesday, March 10, 2015
at 3:00 PM EDT
(2015-03-10 19:00 UTC)
Privileged Domain Account Protection: How to Limit Credentials ExposureMike Pilkington
Tuesday, March 10, 2015
at 1:00 PM EDT
(2015-03-10 17:00 UTC)
The Intersection of Enterprise SaaS Adoption and Information SecurityAdallom
Danelle Au, Dave Shackleford
Friday, March 06, 2015
at 8:30 AM EST
(2015-03-06 13:30 UTC)
SANS Financial Services Cybersecurity BriefingPlease Check Back
Thursday, March 05, 2015
at 1:00 PM EST
(2015-03-05 18:00 UTC)
The NEW 2015 CISSP exam is being implemented on April 15, 2015. Are you ready?David P. Miller
Wednesday, March 04, 2015
at 1:00 PM EST
(2015-03-04 18:00 UTC)
Automating the Incident Response ProcessCarbon Black
Jeffrey (J.J.) Guy, Alissa Torres
Wednesday, March 04, 2015
at 8:30 AM EDT
(2015-03-04 13:30 UTC)
Critical Controls Security BriefingPlease Check Back
Thursday, February 26, 2015
at 3:00 PM EST
(2015-02-26 20:00 UTC)
Pillage the Village Redux: More Pen Test Adventures in Post ExploitationJohn Strand, Ed Skoudis
Thursday, February 26, 2015
at 1:00 PM EST
(2015-02-26 18:00 UTC)
How Allianz Insurance ensures compliance and audits activity with outsourced private cloud initiativeObserveIT
Dr. Michael Holder
Wednesday, February 25, 2015
at 3:00 PM EST
(2015-02-25 20:00 UTC)
Shellshock hands-onEric Conrad
Tuesday, February 24, 2015
at 3:00 PM EST
(2015-02-24 20:00 UTC)
Anti-anti-forensics in action - Recovering from (USB) oblivionNick Klein
Friday, February 20, 2015
at 1:00 PM EST
(2015-02-20 18:00 UTC)
Continuous Diagnostics and Mitigation for Government Agencies: Is It Working? A SANS SurveyFiremon
IBM
Symantec
Forescout Technologies BV
Wallace Sann, Tony Sager, Tim Woods, Kenneth Durbin, Joshua Stegall
Thursday, February 19, 2015
at 1:00 PM EST
(2015-02-19 18:00 UTC)
Who's Using Cyberthreat Intelligence and How? Part 2: Best Practices to Improve Incident Detection and ResponseAlienVault
Arbor Networks
BeyondTrust
Carbon Black
SurfWatch Labs
Anomali
Dave Shackleford, Will Gragido, Morey Haber, Adam Meyer
Wednesday, February 18, 2015
at 1:00 PM EST
(2015-02-18 18:00 UTC)
What Works Increasing Vulnerability Management Effectiveness While Reducing CostTenable
John Pescatore
Tuesday, February 17, 2015
at 1:00 PM EST
(2015-02-17 18:00 UTC)
Who's Using Cyberthreat Intelligence and How? Part 1: Definitions, Tools and StandardsAlienVault
Arbor Networks
BeyondTrust
Carbon Black
SurfWatch Labs
Anomali
Dave Shackleford, Patrick Bedwell, Jennifer Glenn, Colby DeRodeff
Thursday, February 12, 2015
at 1:00 PM EST
(2015-02-12 18:00 UTC)
A Security Geek's Guide to SAPOnapsis
Alex Horan
Wednesday, February 11, 2015
at 9:00 PM EDT
(2015-02-12 02:00 UTC)
Going Phishing?Lance Spitzner
Wednesday, February 11, 2015
at 1:00 PM EDT
(2015-02-11 18:00 UTC)
Creating quick wins by optimizing Operational Technology and Informational Technology process controls.KPMG
Michael Gomez, Dietz Ellis
Tuesday, February 10, 2015
at 1:00 PM EST
(2015-02-10 18:00 UTC)
SANS WhatWorks: How VCU uses FireEye for Advanced Threat Detection and PreventionFireEye
John Pescatore
Friday, February 06, 2015
at 1:00 PM EDT
(2015-02-06 18:00 UTC)
Wrapping Up The GHOST: Lessons Learned From The Ghost VulnerabilityVeracode
Chris Wysopal, Johannes Ullrich
Thursday, February 05, 2015
at 8:00 PM EDT
(2015-02-06 01:00 UTC)
Wrapping Up The GHOST: Lessons Learned From The Ghost Vulnerability - Asia PacificVeracode
Chris Wysopal, Johannes Ullrich
Thursday, February 05, 2015
at 1:00 PM EST
(2015-02-05 18:00 UTC)
Mapping Next-Generation NAC to the Critical Security ControlsForescout Technologies BV
James Tarala, Scott Gordon
Wednesday, February 04, 2015
at 1:00 PM EST
(2015-02-04 18:00 UTC)
Best Practices for Eliminating SSL Encrypted Traffic Blind SpotsBlueCoat
Greg Mayfield, David Wells, John Pescatore
Tuesday, February 03, 2015
at 11:00 AM EST
(2015-02-03 16:00 UTC)
An Overview of ICS 515 - Active DefenseRobert M. Lee
Monday, February 02, 2015
at 1:00 PM EST
(2015-02-02 18:00 UTC)
IR Event Log AnalysisHal Pomeranz
Wednesday, January 28, 2015
at 1:00 PM EST
(2015-01-28 18:00 UTC)
Avoid Making the Headlines Protect Your Retail Business from Cyber AttacksPalo Alto Networks
Isabelle Dumont, Dave Shackleford
Tuesday, January 27, 2015
at 3:00 PM EST
(2015-01-27 20:00 UTC)
The Year of Cyber Defense with Dr. Eric ColeDr. Eric Cole
Monday, January 26, 2015
at 3:00 PM EST
(2015-01-26 20:00 UTC)
Data Center Server Security: A SANS SurveyIBM
Mcafee LLC
Jake Williams, Michael Gare, Joakim Lialias
Monday, January 26, 2015
at 1:00 PM EST
(2015-01-26 18:00 UTC)
The Few, The Proud, The Privileged: Controlling the Use of Administrator Passwords to Achieve Critical Security Control #12BeyondTrust
Scott Lang, G. Mark Hardy
Thursday, January 22, 2015
at 1:00 PM EDT
(2015-01-22 18:00 UTC)
Don't be the next victim: Cloak and secure your critical infrastructure and devicesTempered
David Mattes
Wednesday, January 21, 2015
at 1:00 PM EST
(2015-01-21 18:00 UTC)
Analyst Webcast: Securing Oracle Databases Made EasyOracle
Pete Finnigan
Tuesday, January 20, 2015
at 1:00 PM EST
(2015-01-20 18:00 UTC)
Simplify PCI DSS Compliance with AlienVault USMAlienVault
Mark Allen
Tuesday, January 13, 2015
at 3:00 PM EST
(2015-01-13 20:00 UTC)
The 20 Critical Controls: A Security StrategyRandy Marchany
Monday, January 12, 2015
at 2:00 PM EST
(2015-01-12 19:00 UTC)
Fun with CISSP Questions: "The Absurd, The Drink the Kool-Aid, and The Ugly"Ted Demopoulos
Thursday, January 08, 2015
at 1:00 PM EST
(2015-01-08 18:00 UTC)
State of Cyber Threat Intelligence AddressRick Holland
Monday, January 05, 2015
at 1:00 PM EST
(2015-01-05 18:00 UTC)
How to Run Linux Malware Analysis Apps as Docker ContainersLenny Zeltser

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.