Save $200 on Cyber Security Training at SANS Miami 2018. Ends 12/27.

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Dec 21, 2015Juniper ScreenOS Backdoor: What do you need to know Johannes Ullrich, PhD
Dec 17, 2015SANS VetSuccess Progress ReportJim Michaud, Arlin Halstead
Dec 16, 2015Five Critical Factors Healthcare Providers Must Know When Partnering with a Cyber Security VendorBAE Systems Applied Intelligence

Fortinet, Inc.
Charlie Mallio, John McNeice, Barbara Filkins
Dec 15, 2015Predicting Cyber Security Trends in 2016LancopeTim (TK) Keanani
Dec 10, 2015The CIS Critical Security Controls: The International Standard for DefenseJames Tarala
Dec 9, 2015The Top 20 Security Controls Adapted to ICSWm. Arthur Conklin
Dec 9, 2015Guarding Beyond the Gateway: Modern Challenges of Email SecurityMimecastOrlando Scott-Cowley, Barbara Filkins
Dec 8, 2015New Frontiers in Intrusion ProtectionTrend Micro Inc.Dave Shackleford, Elisa Lippincott
Dec 7, 2015How to speak to the board of directors about securityWhiteHat SecurityCarol G. Mills, John Pescatore, Demetrios Lazarikos (Laz)
Dec 2, 2015How to Detect and Respond to Specific Advanced Threats: Essential Use Cases with RSA Security AnalyticsRSATravis Dye, Robert M. Lee
Nov 24, 2015Cocktail de Malware: Estrategias de Ataque con Código Malicioso HoyJess García
Nov 19, 2015Cyber Insurance: What is Its Role in Your Security Program?PivotPoint Risk AnalyticsGary R. Hayslip , John Pescatore, Benjamin Wright
Nov 19, 2015Post-Breach Impact: A Cost CompendiumSpirionGabriel Gumbs, Barbara Filkins, Johannes Hoech
Nov 18, 2015Mitigating the point of sale data breach threat: Strategies to put into place nowCarbon BlackChristopher Strand
Nov 18, 2015Securing SSH Itself with the Critical Security Controls Venafi, IncGavin Hill, Barbara Filkins, David Hoelzer
Nov 17, 2015Think Like an Attacker: What You Must Know About Targeted Attack TechniquesLightCyberJohn Pescatore
Nov 13, 2015A New Paradigm of Monitoring and ResponseRaytheon Cyber ProductsDave Shackleford, Ashok Sankar
Nov 12, 2015Moving up the Analytics Maturation Curve: Part 2 of the 3rd Annual SANS Security Analytics and Intelligence Survey AlienVault

DomainTools

LogRhythm

Lookingglass Cyber Solutions, Inc.

SAS INSTITUTE INC

Anomali
Josh Lincoln, Tim Helming, Dave Shackleford, Colby DeRodeff
Nov 11, 2015Security Analytics Maturation Curve: Part 1 of the 3rd Annual SANS Security Analytics and Intelligence Survey AlienVault

DomainTools

LogRhythm

Lookingglass Cyber Solutions, Inc.

SAS INSTITUTE INC

Anomali
Allan Thomson , James Carder, Javvad Malik, Dave Shackleford
Nov 11, 2015Noise Matters in Every Industrial Control SystemDoug Wylie
Nov 10, 2015How to Build a Cybersecurity Platform the Easy WaySophos Inc.Keith Palmgren
Nov 6, 2015How to Detect System Compromise & Data Exfiltration with AlienVault USMAlienVaultTom D'Aquino
Nov 5, 2015SANS Threat Intelligence BriefingRecordedFuture

LogRhythm
Robert M. Lee
Nov 4, 2015Security Automation: Security Nirvana or Just A Fad?SymantecJanene Casella, Jerry Shenk
Nov 3, 20152015 Cloud Security & Risk Benchmarks Report SkyHigh NetworksBrandon Cook, John Pescatore
Nov 3, 2015How NERC and CIP are making a differenceTim Conway
Oct 30, 2015Security Best Practices for Implementing Network Segmentation in a Healthcare EnvironmentPalo Alto NetworksMatthew Mellen, James Tarala
Oct 29, 2015What Works for Fannie Maes Deputy CISO to Assess/Monitor Third Party Cybersecurity with BitSightBitsightJohn Pescatore
Oct 28, 2015What Are Their Vulnerabilities? A SANS Continuous Monitoring SurveyAlienVault

Arbor Networks

HP

Tenable
Ted Gary, Mark Painter, Arabella Hallawell, Javvad Malik, David Hoelzer
Oct 27, 2015Easier Web App Pen Testing by Leveraging Plugins & ExtensionsMicah Hoffman
Oct 27, 2015The Expanding Role of Data Analytics in Threat DetectionVectra NetworksBarbara Filkins, Wade Williamson
Oct 22, 2015Implementing Active Breach DetectionLightCyberDavid Thompson, Dave Shackleford
Oct 22, 2015Securing Your KidsLance Spitzner
Oct 21, 2015Making Awareness StickLance Spitzner
Oct 16, 2015SANS and CIS Critical Security Controls BriefingSymantecTony Sager, Jane Holl Lute, John Pescatore, James Tarala
Oct 15, 2015Dynamic Data Center SecurityIllumioChandra Sekar, Dave Shackleford
Oct 15, 2015Threats 2.0: Get Ahead of them with Advanced AnalyticsTriumfantGreg Wessel, John Pescatore
Oct 14, 2015Securing Your KidsLance Spitzner
Oct 13, 2015Threats in the Unknown: Applied intelligence-driven approaches to real-time threat detectionDarktraceBrandon Mayer
Oct 13, 2015Security Evaluation of Mobile Applications using 'App Report Cards'Raul Siles
Oct 9, 2015Complete Application pwnage via Multi-POST XSRFAdrien de Beaupre
Oct 8, 2015Certifications that Matter: Passing the CISSPDavid Miller
Oct 8, 2015Master the Game of Who: Leveraging Network Intelligence and User Activity to Combat Insider ThreatsFlowTraqMike Tierney, Vince Berk, Dr. Eric Cole
Oct 7, 2015Security Awareness Programs and NERC CIPTim Conway, Lance Spitzner
Oct 6, 2015Hacked, or Human Error in Fifteen Minutes or LessChris Crowley, Stephen Northcutt
Oct 6, 2015ICS Cybersecurity: Models for SuccessRobert M. Lee, Michael Assante
Oct 2, 2015Manual Testing is a Must, but Automation is Divine John Strand, Ed Skoudis
Oct 2, 2015Automating the Hunt for Network IntrudersEndgameJamie Butler, Eric Cole
Sep 30, 2015Behind the Curve? Getting Started on Endpoint Security MaturityTripwire, Inc.G. Mark Hardy, Dwayne Melancon
Sep 30, 2015How To Frustrate Your Adversary: Active Defense, Offensive Countermeasures & Cyber Deception with Bryce Galbraith - Part 1Bryce Galbraith
Sep 24, 2015Strategies to Address SANS Critical Controls 10 and 11 - Secure Configurations and Control of Network DevicesSkybox Security, Inc.John Pescatore, Michelle Johnson Cobb, Brian Kelly
Sep 23, 2015Orchestrating Security in the Cloud: A SANS SurveyCloudPassage

Evident.io

HP

McAfee
Dave Shackleford, Farshad Ghazi, Sami Laine, Andrew Maguire, Swaroop Sayeram
Sep 23, 2015DIY vulnerability discovery with DLL Side LoadingJake Williams
Sep 22, 2015A Proactive Approach to Incident ResponseBlue Coat Systems, Inc.Alan Hall, Jacob Williams
Sep 16, 2015Critical Security Controls Update: How to Keep Pace with Advanced Endpoint ThreatsRSAHermes Bojaxhi, John Pescatore
Sep 15, 2015Turn on the Lights! Case Studies of Malware in MemoryFidelis Cybersecurity Tyler Halfpop
Sep 10, 2015What Works in Reducing Web Application Vulnerabilities: Using to WhiteHat Sentinel to Increase Application Security Before and After Production DeploymentWhiteHat SecurityJohn Pescatore
Sep 10, 2015Combatting Cyber Risks in the Supply ChainRaytheon | WebsenseJoshua Douglas, Dave Shackleford
Sep 9, 2015Retail Security: PCI DSS and Third Party InteractionsTenableJeff Man, Dr. Eric Cole
Sep 9, 2015NERC CIP: Hot TopicsTed Gutierrez, Tim Conway
Sep 9, 2015Ubiquity Forensics - Your iCloud and YouSarah Edwards
Sep 8, 2015What Works in Vulnerability Management: Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 NexposeRapid7 Inc.John Pescatore
Sep 8, 2015Hacking the HospitalBilly Rios
Sep 4, 2015Car Wars Episode I: Hacker MenaceMike Assante, Matthew Carpenter
Sep 3, 2015Making DNS Your Greatest Ally in Active DefenseDomainToolsDave Shackleford, Tim Helming
Sep 2, 2015Thwarting Advanced Threats with Trusted CryptoTHALES e-SecurityJohn Grimm, John Pescatore
Sep 1, 2015Securing Your Cloud Apps - Understanding the Shared Responsibility ModelPalerraJohn Yun, John Pescatore
Aug 28, 2015SIEM-plifying Security Monitoring: Making Sense of Security Intelligence AlienVaultDave Shackleford, Tom D'Aquino
Aug 27, 2015Cache Me If You Can!Matt Bromiley
Aug 27, 2015The Current Reality: Defending a Compromised NetworkDr. Eric Cole
Aug 24, 2015Memory Forensic Baselines: Using Normal to Avoid "Red Herring"Alissa Torres
Aug 21, 2015Detect, Contain, and Control CyberthreatsRaytheon | WebsenseAshok Sankar, Dr. Eric Cole
Aug 20, 2015You Cant Respond If You Cant See: Building Sophisticated Detection Mechanisms Leveraging Patterns of CompromiseCarbon BlackDave Shackleford
Aug 20, 2015Part 2: Incident Response - How Can We Be More Proactive for the Future?AlienVault

Arbor Networks

Carbon Black

Hewlett Packard

McAfee

Rapid7 Inc.
Wade Woolwine, Gary Sockrider, Justin Falck , Alissa Torres
Aug 19, 2015The Value of Real-Time Pattern RecognitionRaytheon | WebsenseDave Shackleford, Michael Crouse
Aug 19, 2015CIP V6 NOPR What You Need to Think AboutTim Conway, Michael Assante
Aug 18, 2015How are Cybercriminals Threatening Security? Highlights from the 2015 Internet Security Threat ReportDLT Solutions

Symantec
Don Maclean, David Hoelzer, Robert Myles, CISSP, CISM
Aug 18, 2015Part 1: Incident Response - What Is (and Isn't) Working Today AlienVault

Arbor Networks

Carbon Black

Hewlett Packard

McAfee

Rapid7 Inc.
Russell Meyers, Javvad Malik, Barbara G. Kay, Alissa Torres
Aug 14, 2015Analyst Webcast: RASP vs. WAF: Comparing Capabilities and EfficienciesHP Jake Williams
Aug 14, 2015What you need to know about StagefrightVeracodeBrian LaFlamme, Joshua Wright
Aug 13, 2015Onboarding the ICS Mindset into Cyber Security ControlsJason Dely
Aug 13, 2015The Return of the Malicious Macro, and the Economics of CybercrimeProofPointPatrick Wheeler, Jerry Shenk
Aug 12, 2015The Race to Detection: IR Trends, Tools and Processes That Close the GapCarbon BlackJim Raine, Alissa Torres
Aug 10, 2015What's New in Windows 10 and Server 2016?Jason Fossen
Aug 5, 2015How to Be More Effective and Improve the Success Rates of Your IT ProjectsJeff Frisk
Aug 4, 2015Secure the Endpoint to battle CyberthreatsSymantecKat Pelak, John Pescatore
Aug 3, 2015Hacking for the MassesMark Baggett
Jul 30, 2015Protecting Third Party Applications with RASPHewlett PackardCindy Blake, Eric Johnson
Jul 29, 2015Tracking and Observation-How-To and What To Watch ForAnomali Jason Trost, J. Michael Butler, Stephen Northcutt
Jul 29, 20155 years after Stuxnet: What changed, what didn't and what lies aheadThomas Brandstetter
Jul 28, 2015Analyst Webcast: Securing Retail Beyond the Cash Register--Insider Threats and Targeted AttacksPalo Alto NetworksG. Mark Hardy
Jul 24, 2015WhatWorks in AppSec: ASP.NET Identity and AntiForgery TokensEric Johnson
Jul 23, 2015Cyber Security Strategies: Protecting Your ICS Investments a discussion with Ultra-3eti and Mike Assante of SANSUltra Electronics, 3eTIAlex Tarter, Michael Assante
Jul 22, 2015APTs in ICS - Understanding and Preparing for the Rising Threat Landscape in Critical InfrastructurePalo Alto NetworksDel Rodillas, Michael Assante
Jul 22, 2015The Sliding Scale of Cyber SecurityRobert M. Lee
Jul 21, 2015File Security 2.0: Collaboration Controls, Considerations and Technology?Final CodeScott Gordon, Barbara Filkins
Jul 17, 2015Infosec Rock Star: How to be a More Effective Security ProfessionalTed Demopoulos
Jul 16, 2015Make it Hard for the Adversary: Learn Offensive Counter Measures with John StrandJohn Strand
Jul 15, 2015How to Detect SQL Injection & XSS Attacks with AlienVault USMAlienVaultGarrett Gross, Mark Allen
Jul 15, 2015Challenges and Strategies for Addressing the NERC CIP Version 5 Training Requirements
Jul 14, 2015SANS NetWars: Building a Better InfoSec Pro with GamificationEd Skoudis, Joshua Wright
Jul 13, 2015SANS VetSuccess Immersion Academy - The Fast Track to Top Skills and Top Jobs in Cyber. Guaranteed.David. W. Brown, Charles Campbell, Donald W. Greene, Arlin Halstead
Jul 1, 201510 Biggest Mistakes in Implementing Continuous MonitoringIsmael Valenzuela
Jun 29, 2015Securely Transition to the Cloud: Increase Agility and Reduce RiskBarracuda Networks

VMWare, Inc
Yatin Chalke, Dave Shackleford, Amy Bray
Jun 26, 2015What the US government breach tells us about the state of securityVeracodeJohannes Ullrich, PhD
Jun 25, 2015The State of Security in Control Systems Today: A SANS Survey WebcastSurfWatch Labs

Tenable
Ted Gary, Adam Meyer, Derek Harp
Jun 24, 2015Zero-Day Defense: The Power of Actionable Threat Intelligence and Continuous Endpoint Data CollectionCarbon BlackBrent Midwood, Stephen Newman
Jun 24, 2015Six Steps to Stronger Security for SMBsQualysWolfgang Kandek, Dr. Eric Cole
Jun 23, 2015SANS 2nd Financial Sector Security SurveyAlienVault

Arbor Networks

LogRhythm

VSS Monitoring, Inc.
James Carder, Patrick Bedwell, G. Mark Hardy, Rakesh Shah, Ann Sun
Jun 22, 2015Blocking XSS attacks with Content Security PolicyGregory Leonard
Jun 22, 2015A Taste of SANS SEC660: Utilizing ROP on Windows 10Stephen Sims
Jun 22, 2015Automating DFIR Getting closer to the find evidence buttonDavid Cowen
Jun 18, 2015Big Data: Identifying Major Threats and Removing Security and Compliance BarriersClouderaJohn Pescatore, Sam Heywood, Barbara Filkins
Jun 18, 2015Implementing an ICS Active Defense StrategyRobert M. Lee
Jun 17, 2015Visibility, Analytics, & Action: A strategy to address Critical Control 4 - Continuous Vulnerability Assessment & RemediationSkybox Security, Inc.John Pescatore, Michelle Cobb, Sean Keef
Jun 16, 2015Conquering Network Security Challenges in Distributed EnterprisesPalo Alto NetworksJoerg Sieber, John Pescatore
Jun 9, 2015Five Key Things to Know About Cyber Threat IntelligenceRobert M. Lee
Jun 9, 2015Node.js: Successful, exciting... and bares security risksCheckmarx Inc.Amit Ashbel
Jun 4, 2015Meeting New CSC Guidelines for SSL Certificate ManagementVenafi, IncKevin Bocek, Barbara Filkins
Jun 3, 2015Continuous Monitoring and Real World AnalysisSeth Misenar
Jun 3, 2015Passing the CISSPDr. Eric Cole
Jun 2, 2015Industrial Control Systems Security Briefing 2015Palo Alto Networks

NexDefense, Inc.
May 29, 2015Bringing DevOps to DFIRBarry Anderson
May 29, 2015The Value of Adopting and Improving Security Maturity ModelsHP Tony Sager , Eric Schou
May 29, 2015¿En qué consiste SEC401: Security Essentials?Carlos Fragoso
May 28, 2015Dont risk it - Using a risk-based approach to increase the security of web apps and other IT assets.WhiteHat SecurityDemetrios Lazarikos (Laz) , John Pescatore
May 28, 2015Continuous Monitoring, Real World Analysis and Strategies to Mitigate Targeted Attacks; Bonus Story Behind The Top 4 MitigationsSeth Misenar, Alan Paller
May 27, 2015Achieving ICS Network Security Monitoring and Visibility with Flow DataChris Sanders, Robert M. Lee
May 21, 2015Securing Portable Data and Applications on Enterprise Mobile Workspaces: A SANS SurveyIronkey by Imation Leon Brown , Jacob Williams
May 20, 2015The Evolution of Network Security, and how Network Packet Brokers (NPBs) enable the Layered Security EraVSS Monitoring, Inc.Icaro Vazquez, David Hoelzer
May 20, 2015Using an Open Source Threat Model for Implementing the Critical ControlsJames Tarala
May 19, 2015A Taste of What's New in SEC504 with John StrandJohn Strand
May 19, 2015How to Avoid a Phone Call from Brian Krebs - The Basics of Intrusion Detection and Prevention with Mike PoorMike Poor
May 18, 2015Application Security by ExampleFrank Kim
May 18, 2015Protecting the Things, including the ones you already have (and don't know about).ThreatSTOPTom Byrnes, Johannes Ullrich
May 15, 2015Threat Intelligence: Going from Theory to PracticeAlienVaultAndy Manoske, Dave Shackleford
May 14, 2015Why Train?Lance Spitzner
May 14, 20152015 Application Security Survey, Part 2: Builder IssuesHewlett Packard

Qualys

Veracode

Waratek

WhiteHat Security
Bruce Jenkins, Maria Loughlin, Eric Johnson
May 13, 20152015 Application Security Survey, Part 1: Defender IssuesHewlett Packard

Qualys

Veracode

Waratek

WhiteHat Security
Eric Johnson, Will Bechtel, Robert Hansen, Brian Maccaba
May 13, 2015Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat RisksPalo Alto NetworksLance Spencer, John Pescatore
May 12, 2015Creating a Roadmap for Dramatically Improving Your Strategic Security OperationsRSATim Rand, Alissa Torres
May 6, 2015Patient healthcare data is under constant attack: Steps you can take to mitigate the problemCarbon BlackChristopher Strand, Barbara Filkins
May 6, 2015Assume Compromise and Protect Your Endpoints: SANS 2nd Survey on Endpoint SecurityGuidance SoftwareRoger Angarita, Jake Williams
Apr 29, 2015Insider Threats and the Real Financial Impact to Organizations - A SANS SurveyVeriatoMike Tierney, Dr. Eric Cole
Apr 28, 2015Cyber Threat & Information Sharing in HealthcareSpencer Mott, Terry Rice, Jim Routh, John Pescatore
Apr 27, 2015The Crazy New World of Cyber Investigations: Law, Ethics, and EvidenceBen Wright
Apr 23, 2015If it fits, it sniffs: Adventures in WarShippingLarry Pesce
Apr 22, 2015 Insider Threat - The Enemy WithinDr. Eric Cole
Apr 21, 2015Saboreando SANS SEC575: Seguridad y pen-testing de dispositivos, apps, comunicaciones y entornos movilesRaúl Siles
Apr 17, 2015Six Steps to SIEM SuccessAlienVaultTom D'Aquino
Apr 16, 2015Special Webcast: Microsoft Patch MS15-034Johannes Ullrich, PhD
Apr 16, 2015Best Practices for Reducing Your Attack Surface: 5 Steps to Shrinking Your Window of VulnerabilitySkybox Security, Inc.Michael Bruchanski
Apr 15, 2015Demystifying Targeted Attacks on Industrial Control SystemsScott King, Graham Speake, Eric Cornelius, Derek Harp (Moderator)
Apr 14, 2015LL / Simulcast Title - Advanced Threats Need Comprehensive DefenseFidelis Security Systems, Inc.
Apr 10, 2015Stop Cyber Attacks in Real Time: Modern Defense in DepthVectra NetworksWade Williamson, John Pescatore
Apr 9, 2015Protecting Critical Infrastructure by Transforming Threat Intelligence into an Effective DefenseBAE Systems Applied IntelligenceMark Trump, Michael Assante
Apr 9, 2015Detecting Breaches through Security Investigations with PlatforaPlatforaMustafa Rassiwala, John Pescatore
Apr 8, 2015A Successful Awareness Campaign Begins With 4 Key QuestionsLance Spitzner
Apr 6, 2015Adventures in High-Value Pen Testing: A Taste of SANS Security 560" by Ed SkoudisEd Skoudis
Apr 6, 2015Accelerate Your Cybercrime Investigations with OSINTDomainToolsTim Helming, Lenny Zeltser
Apr 3, 2015How to Build Account Harvesters and Password Guessers with PythonMichael Murr, Ed Skoudis
Apr 2, 2015Analyst Webcast: Simplifying Compliance and Forensic Requirements with HP ArcSight LoggerHP Sridhar Karnam, Dave Shackleford
Apr 1, 2015How to Deploy the Critical Controls in a Windows Environment with Jason FossenJason Fossen
Apr 1, 2015SANS 8 Mobile Device Security StepsMobileIronChristopher Crowley
Mar 31, 2015 Analyst Webcast: Enabling Enterprise Mobility With Security From The Ground UpSymantecCheryl Tang, Lee Neely
Mar 27, 20152015 Security Awareness Report WebcastBob Rudis, Lance Spitzner
Mar 26, 2015Live Panel Discussion: The Risk of Data Exposure through Application UsageObserveITMichael Santarcangelo, Gabriel Friedlander , David Monahan, Peter Hesse
Mar 26, 2015Defending against advanced targeted threats with the SANS Critical ControlsAvectoAndrew Avanessian, John Pescatore
Mar 25, 2015Jumpstarting the Critical Security Controls with Intelligent Asset DiscoveryPwnie ExpressKevin Reilly, John Pescatore
Mar 24, 2015How SANS Critical Security Controls Lead to PCI DSS Quick WinsCarbon BlackJohn Pescatore, Chris Strand
Mar 24, 2015Cybersecurity Collaboration: Leveraging a Trusted PartnerFireEyeJoshua Goldfarb
Mar 23, 2015Reverse Engineering Mac MalwareSarah Edwards
Mar 23, 2015Unraveling the Threat: Expanding Response Processes and Procedures Beyond the Moment of DiscoveryCarbon BlackBen Johnson
Mar 19, 2015Pillage the Village Redux: More Pen Test Adventures in Post ExploitationJohn Strand
Mar 19, 2015SANS Canada presents Defending Against Advanced Attacks With Dr. Eric ColeDr. Eric Cole
Mar 18, 2015A risk-based approach to identification, impact estimation, and effective remediation of data breaches in web-based applicationsWhiteHat SecurityDemetrios Lazarikos (Laz) , Dr. Eric Cole
Mar 17, 2015The Seamless Way Continuous Monitoring Can Defend Your Organization against Cyber AttacksEric Conrad
Mar 16, 2015Smartphone Security is Getting Stronger - Are Your Forensic Methods Getting Weaker?Heather Mahalik
Mar 13, 2015Taming Your Indicator Consumption PipelineRyan Stillions
Mar 12, 2015Advanced ICS Cybersecurity: Moving Beyond Defense in-Depth to an Intelligence-Driven ApproachLeidosRich Mahler, Robert M. Lee, Michael Assante
Mar 11, 2015Level Up Your Security Strategy with Cyber Threat IntelligenceAlienVaultJoe Schreiber, Dave Shackleford
Mar 10, 2015Privileged Domain Account Protection: How to Limit Credentials ExposureMike Pilkington
Mar 10, 2015The Intersection of Enterprise SaaS Adoption and Information SecurityAdallomDanelle Au, Dave Shackleford
Mar 6, 2015SANS Financial Services Cybersecurity Briefing
Mar 5, 2015The NEW 2015 CISSP exam is being implemented on April 15, 2015. Are you ready?David P. Miller
Mar 4, 2015Automating the Incident Response ProcessCarbon BlackJeffrey (J.J.) Guy, Alissa Torres
Mar 4, 2015Critical Controls Security Briefing
Feb 26, 2015Pillage the Village Redux: More Pen Test Adventures in Post ExploitationJohn Strand, Ed Skoudis
Feb 26, 2015How Allianz Insurance ensures compliance and audits activity with outsourced private cloud initiativeObserveITDr. Michael Holder
Feb 25, 2015Shellshock hands-onEric Conrad
Feb 24, 2015Anti-anti-forensics in action - Recovering from (USB) oblivionNick Klein
Feb 20, 2015Continuous Diagnostics and Mitigation for Government Agencies: Is It Working? A SANS SurveyFiremon

IBM

Symantec

ForeScout Technologies
Wallace Sann, Tony Sager, Tim Woods, Kenneth Durbin, Joshua Stegall
Feb 19, 2015Who's Using Cyberthreat Intelligence and How? Part 2: Best Practices to Improve Incident Detection and ResponseAlienVault

Arbor Networks

BeyondTrust

Carbon Black

SurfWatch Labs

Anomali
Dave Shackleford, Will Gragido, Morey Haber, Adam Meyer
Feb 18, 2015What Works Increasing Vulnerability Management Effectiveness While Reducing CostTenableJohn Pescatore
Feb 17, 2015Who's Using Cyberthreat Intelligence and How? Part 1: Definitions, Tools and StandardsAlienVault

Arbor Networks

BeyondTrust

Carbon Black

SurfWatch Labs

Anomali
Dave Shackleford, Patrick Bedwell, Jennifer Glenn, Colby DeRodeff
Feb 12, 2015A Security Geek's Guide to SAPOnapsisAlex Horan
Feb 12, 2015Going Phishing?Lance Spitzner
Feb 11, 2015Creating quick wins by optimizing Operational Technology and Informational Technology process controls.KPMGMichael Gomez, Dietz Ellis
Feb 10, 2015SANS WhatWorks: How VCU uses FireEye for Advanced Threat Detection and PreventionFireEyeJohn Pescatore
Feb 6, 2015Wrapping Up The GHOST: Lessons Learned From The Ghost VulnerabilityVeracodeChris Wysopal, Johannes Ullrich
Feb 6, 2015Wrapping Up The GHOST: Lessons Learned From The Ghost Vulnerability - Asia PacificVeracodeChris Wysopal, Johannes Ullrich
Feb 5, 2015Mapping Next-Generation NAC to the Critical Security ControlsForeScout TechnologiesJames Tarala, Scott Gordon
Feb 4, 2015Best Practices for Eliminating SSL Encrypted Traffic Blind SpotsBlueCoatGreg Mayfield, David Wells, John Pescatore
Feb 3, 2015An Overview of ICS 515 - Active DefenseRobert M. Lee
Feb 2, 2015IR Event Log AnalysisHal Pomeranz
Jan 28, 2015Avoid Making the Headlines Protect Your Retail Business from Cyber AttacksPalo Alto NetworksIsabelle Dumont, Dave Shackleford
Jan 27, 2015 The Year of Cyber Defense with Dr. Eric ColeDr. Eric Cole
Jan 26, 2015Data Center Server Security: A SANS SurveyIBM

McAfee
Jake Williams, Michael Gare, Joakim Lialias
Jan 26, 2015The Few, The Proud, The Privileged: Controlling the Use of Administrator Passwords to Achieve Critical Security Control #12BeyondTrustScott Lang, G. Mark Hardy
Jan 22, 2015Don't be the next victim: Cloak and secure your critical infrastructure and devicesTempered NetworksDavid Mattes
Jan 21, 2015Analyst Webcast: Securing Oracle Databases Made EasyOraclePete Finnigan
Jan 20, 2015Simplify PCI DSS Compliance with AlienVault USMAlienVaultMark Allen
Jan 13, 2015The 20 Critical Controls: A Security StrategyRandy Marchany
Jan 12, 2015Fun with CISSP Questions: "The Absurd, The Drink the Kool-Aid, and The Ugly"Ted Demopoulos
Jan 8, 2015State of Cyber Threat Intelligence AddressRick Holland
Jan 5, 2015How to Run Linux Malware Analysis Apps as Docker ContainersLenny Zeltser

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.