Webcasts: Archive

Archive
Date Title Sponsor Type
Aug 28, 2015SIEM-plifying Security Monitoring: Making Sense of Security Intelligence AlienVaultAsk The Expert Webcast
Aug 27, 2015Cache Me If You Can!Special Webcast
Aug 26, 2015The Current Reality: Defending a Compromised NetworkAsia-Pacific Series
Aug 24, 2015Memory Forensic Baselines: Using Normal to Avoid "Red Herring"Special Webcast
Aug 21, 2015Detect, Contain, and Control CyberthreatsRaytheon | WebsenseAnalyst Webcast
Aug 20, 2015You Cant Respond If You Cant See: Building Sophisticated Detection Mechanisms Leveraging Patterns of CompromiseBit9 + Carbon BlackWednesday Webcast
Aug 20, 2015Part 2: Incident Response - How Can We Be More Proactive for the Future?AlienVault

Arbor Networks

Bit9 + Carbon Black

Hewlett Packard

McAfee. Part of Intel Security.

Rapid7 Inc.
Analyst Webcast
Aug 19, 2015The Value of Real-Time Pattern RecognitionRaytheon | WebsenseAnalyst Webcast
Aug 19, 2015CIP V6 NOPR What You Need to Think AboutWednesday Webcast
Aug 18, 2015How are Cybercriminals Threatening Security? Highlights from the 2015 Internet Security Threat ReportDLT Solutions

Symantec
Ask The Expert Webcast
Aug 18, 2015Part 1: Incident Response - What Is (and Isn't) Working Today AlienVault

Arbor Networks

Bit9 + Carbon Black

Hewlett Packard

McAfee. Part of Intel Security.

Rapid7 Inc.
Analyst Webcast
Aug 14, 2015Analyst Webcast: RASP vs. WAF: Comparing Capabilities and EfficienciesHP Analyst Webcast
Aug 14, 2015What you need to know about StagefrightVeracodeAsk The Expert Webcast
Aug 13, 2015Onboarding the ICS Mindset into Cyber Security ControlsSpecial Webcast
Aug 13, 2015The Return of the Malicious Macro, and the Economics of CybercrimeProofPointAnalyst Webcast
Aug 12, 2015The Race to Detection: IR Trends, Tools and Processes That Close the GapBit9 + Carbon BlackAnalyst Webcast
Aug 10, 2015What's New in Windows 10 and Server 2016?Special Webcast
Aug 5, 2015How to Be More Effective and Improve the Success Rates of Your IT ProjectsWednesday Webcast
Aug 4, 2015Secure the Endpoint to battle CyberthreatsSymantecSpecial Webcast
Aug 3, 2015Hacking for the MassesAsk The Expert Webcast
Jul 30, 2015Protecting Third Party Applications with RASPHewlett PackardAnalyst Webcast
Jul 29, 2015Tracking and Observation-How-To and What To Watch ForThreatStream Analyst Webcast
Jul 29, 20155 years after Stuxnet: What changed, what didn't and what lies aheadWednesday Webcast
Jul 28, 2015Analyst Webcast: Securing Retail Beyond the Cash Register--Insider Threats and Targeted AttacksPalo Alto NetworksAnalyst Webcast
Jul 24, 2015WhatWorks in AppSec: ASP.NET Identity and AntiForgery TokensSpecial Webcast
Jul 23, 2015Cyber Security Strategies: Protecting Your ICS Investments a discussion with Ultra-3eti and Mike Assante of SANSUltra Electronics, 3eTISpecial Webcast
Jul 22, 2015APTs in ICS - Understanding and Preparing for the Rising Threat Landscape in Critical InfrastructurePalo Alto NetworksAsk The Expert Webcast
Jul 22, 2015The Sliding Scale of Cyber SecuritySpecial Webcast
Jul 21, 2015File Security 2.0: Collaboration Controls, Considerations and Technology?Final CodeAsk The Expert Webcast
Jul 17, 2015Infosec Rock Star: How to be a More Effective Security ProfessionalSpecial Webcast
Jul 16, 2015Make it Hard for the Adversary: Learn Offensive Counter Measures with John StrandSpecial Webcast
Jul 15, 2015How to Detect SQL Injection & XSS Attacks with AlienVault USMAlienVaultWednesday Webcast
Jul 15, 2015Challenges and Strategies for Addressing the NERC CIP Version 5 Training RequirementsWednesday Webcast
Jul 14, 2015SANS NetWars: Building a Better InfoSec Pro with GamificationSpecial Webcast
Jul 13, 2015SANS VetSuccess Immersion Academy - The Fast Track to Top Skills and Top Jobs in Cyber. Guaranteed.Special Webcast
Jul 1, 201510 Biggest Mistakes in Implementing Continuous MonitoringWhatWorks Summit Series Webcast
Jun 29, 2015Securely Transition to the Cloud: Increase Agility and Reduce RiskBarracuda Networks

VMWare, Inc
Ask The Expert Webcast
Jun 26, 2015What the US government breach tells us about the state of securityVeracodeAsk The Expert Webcast
Jun 25, 2015The State of Security in Control Systems Today: A SANS Survey WebcastSurfWatch Labs

Tenable Network Security
Analyst Webcast
Jun 24, 2015Zero-Day Defense: The Power of Actionable Threat Intelligence and Continuous Endpoint Data CollectionBit9 + Carbon BlackSpecial Webcast
Jun 24, 2015Six Steps to Stronger Security for SMBsQualysAnalyst Webcast
Jun 23, 2015SANS 2nd Financial Sector Security SurveyAlienVault

Arbor Networks

LogRhythm

VSS Monitoring, Inc.
Special Webcast
Jun 22, 2015Blocking XSS attacks with Content Security PolicySpecial Webcast
Jun 22, 2015A Taste of SANS SEC660: Utilizing ROP on Windows 10Wednesday Webcast
Jun 22, 2015Automating DFIR Getting closer to the find evidence buttonWhatWorks Summit Series Webcast
Jun 18, 2015Big Data: Identifying Major Threats and Removing Security and Compliance BarriersClouderaSpecial Webcast
Jun 18, 2015Implementing an ICS Active Defense StrategySpecial Webcast
Jun 17, 2015Visibility, Analytics, & Action: A strategy to address Critical Control 4 - Continuous Vulnerability Assessment & RemediationSkybox Security, Inc.Wednesday Webcast
Jun 16, 2015Conquering Network Security Challenges in Distributed EnterprisesPalo Alto NetworksSpecial Webcast
Jun 9, 2015Five Key Things to Know About Cyber Threat IntelligenceWhatWorks Summit Series Webcast
Jun 9, 2015Node.js: Successful, exciting... and bares security risksCheckmarxWednesday Webcast
Jun 4, 2015Meeting New CSC Guidelines for SSL Certificate ManagementVenafi, IncAnalyst Webcast
Jun 3, 2015Continuous Monitoring and Real World AnalysisWednesday Webcast
Jun 2, 2015Passing the CISSPAsia-Pacific Series
Jun 2, 2015Industrial Control Systems Security Briefing 2015Palo Alto Networks

NexDefense, Inc.
Special Webcast
May 29, 2015Bringing DevOps to DFIRWhatWorks Summit Series Webcast
May 29, 2015The Value of Adopting and Improving Security Maturity ModelsHP Special Webcast
May 29, 2015¿En qué consiste SEC401: Security Essentials?Special Webcast
May 28, 2015Dont risk it - Using a risk-based approach to increase the security of web apps and other IT assets.WhiteHat SecuritySpecial Webcast
May 27, 2015Continuous Monitoring, Real World Analysis and Strategies to Mitigate Targeted Attacks; Bonus Story Behind The Top 4 MitigationsAsia-Pacific Series
May 27, 2015Achieving ICS Network Security Monitoring and Visibility with Flow DataWhatWorks Summit Series Webcast
May 21, 2015Securing Portable Data and Applications on Enterprise Mobile Workspaces: A SANS SurveyIronkey by Imation Analyst Webcast
May 20, 2015The Evolution of Network Security, and how Network Packet Brokers (NPBs) enable the Layered Security EraVSS Monitoring, Inc.Special Webcast
May 20, 2015Using an Open Source Threat Model for Implementing the Critical ControlsWednesday Webcast
May 19, 2015A Taste of What's New in SEC504 with John StrandSpecial Webcast
May 19, 2015How to Avoid a Phone Call from Brian Krebs - The Basics of Intrusion Detection and Prevention with Mike PoorAsk The Expert Webcast
May 18, 2015Application Security by ExampleSpecial Webcast
May 18, 2015Protecting the Things, including the ones you already have (and don't know about).ThreatSTOPSpecial Webcast
May 15, 2015Threat Intelligence: Going from Theory to PracticeAlienVaultSpecial Webcast
May 14, 2015Why Train?Special Webcast
May 14, 20152015 Application Security Survey, Part 2: Builder IssuesHewlett Packard

Qualys

Veracode

Waratek

WhiteHat Security
Special Webcast
May 13, 20152015 Application Security Survey, Part 1: Defender IssuesHewlett Packard

Qualys

Veracode

Waratek

WhiteHat Security
Wednesday Webcast
May 13, 2015Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat RisksPalo Alto NetworksWhatWorks Webcast
May 12, 2015Creating a Roadmap for Dramatically Improving Your Strategic Security OperationsRSASpecial Webcast
May 6, 2015Patient healthcare data is under constant attack: Steps you can take to mitigate the problemBit9 + Carbon BlackWednesday Webcast
May 6, 2015Assume Compromise and Protect Your Endpoints: SANS 2nd Survey on Endpoint SecurityGuidance SoftwareAnalyst Webcast
Apr 29, 2015Insider Threats and the Real Financial Impact to Organizations - A SANS SurveySpectorSoftWednesday Webcast
Apr 28, 2015Cyber Threat & Information Sharing in HealthcareSpecial Webcast
Apr 27, 2015The Crazy New World of Cyber Investigations: Law, Ethics, and EvidenceAsk The Expert Webcast
Apr 23, 2015If it fits, it sniffs: Adventures in WarShippingSpecial Webcast
Apr 22, 2015 Insider Threat - The Enemy WithinWednesday Webcast
Apr 21, 2015Saboreando SANS SEC575: Seguridad y pen-testing de dispositivos, apps, comunicaciones y entornos movilesSpecial Webcast
Apr 17, 2015Six Steps to SIEM SuccessAlienVaultSpecial Webcast
Apr 16, 2015Special Webcast: Microsoft Patch MS15-034ISC Threat Update
Apr 16, 2015Best Practices for Reducing Your Attack Surface: 5 Steps to Shrinking Your Window of VulnerabilitySkybox Security, Inc.Special Webcast
Apr 15, 2015Demystifying Targeted Attacks on Industrial Control SystemsWednesday Webcast
Apr 14, 2015LL / Simulcast Title - Advanced Threats Need Comprehensive DefenseFidelis Security Systems, Inc.Special Webcast
Apr 10, 2015Stop Cyber Attacks in Real Time: Modern Defense in DepthVectra NetworksSpecial Webcast
Apr 9, 2015Protecting Critical Infrastructure by Transforming Threat Intelligence into an Effective DefenseBAE Systems Applied IntelligenceSpecial Webcast
Apr 9, 2015Detecting Breaches through Security Investigations with PlatforaPlatforaSpecial Webcast
Apr 8, 2015A Successful Awareness Campaign Begins With 4 Key QuestionsWednesday Webcast
Apr 6, 2015Adventures in High-Value Pen Testing: A Taste of SANS Security 560" by Ed SkoudisSpecial Webcast
Apr 6, 2015Accelerate Your Cybercrime Investigations with OSINTDomainToolsSpecial Webcast
Apr 3, 2015How to Build Account Harvesters and Password Guessers with PythonSpecial Webcast
Apr 2, 2015Analyst Webcast: Simplifying Compliance and Forensic Requirements with HP ArcSight LoggerHP Special Webcast
Apr 1, 2015How to Deploy the Critical Controls in a Windows Environment with Jason FossenWednesday Webcast
Mar 31, 2015SANS 8 Mobile Device Security StepsMobileIronAsia-Pacific Series
Mar 31, 2015 Analyst Webcast: Enabling Enterprise Mobility With Security From The Ground UpSymantecAnalyst Webcast
Mar 27, 20152015 Security Awareness Report WebcastSpecial Webcast
Mar 26, 2015Live Panel Discussion: The Risk of Data Exposure through Application UsageObserveITSpecial Webcast
Mar 26, 2015Defending against advanced targeted threats with the SANS Critical ControlsAvectoSpecial Webcast
Mar 25, 2015Jumpstarting the Critical Security Controls with Intelligent Asset DiscoveryPwnie ExpressWednesday Webcast
Mar 24, 2015How SANS Critical Security Controls Lead to PCI DSS Quick WinsBit9 + Carbon BlackAsk The Expert Webcast
Mar 24, 2015Cybersecurity Collaboration: Leveraging a Trusted PartnerFireEyeSpecial Webcast
Mar 23, 2015Reverse Engineering Mac MalwareSpecial Webcast
Mar 23, 2015Unraveling the Threat: Expanding Response Processes and Procedures Beyond the Moment of DiscoveryBit9 + Carbon BlackSpecial Webcast
Mar 19, 2015Pillage the Village Redux: More Pen Test Adventures in Post ExploitationSpecial Webcast
Mar 18, 2015SANS Canada presents Defending Against Advanced Attacks With Dr. Eric ColeWednesday Webcast
Mar 18, 2015A risk-based approach to identification, impact estimation, and effective remediation of data breaches in web-based applicationsWhiteHat SecurityWednesday Webcast
Mar 17, 2015The Seamless Way Continuous Monitoring Can Defend Your Organization against Cyber AttacksSpecial Webcast
Mar 16, 2015Smartphone Security is Getting Stronger - Are Your Forensic Methods Getting Weaker?Special Webcast
Mar 13, 2015Taming Your Indicator Consumption PipelineSpecial Webcast
Mar 12, 2015Advanced ICS Cybersecurity: Moving Beyond Defense in-Depth to an Intelligence-Driven ApproachLockheed MartinSpecial Webcast
Mar 11, 2015Level Up Your Security Strategy with Cyber Threat IntelligenceAlienVaultWednesday Webcast
Mar 10, 2015Privileged Domain Account Protection: How to Limit Credentials ExposureAsk The Expert Webcast
Mar 10, 2015The Intersection of Enterprise SaaS Adoption and Information SecurityAdallomSpecial Webcast
Mar 6, 2015SANS Financial Services Cybersecurity BriefingSpecial Webcast
Mar 5, 2015The NEW 2015 CISSP exam is being implemented on April 15, 2015. Are you ready?Special Webcast
Mar 4, 2015Automating the Incident Response ProcessBit9 + Carbon BlackAnalyst Webcast
Mar 4, 2015Critical Controls Security BriefingSpecial Webcast
Feb 26, 2015Pillage the Village Redux: More Pen Test Adventures in Post ExploitationSpecial Webcast
Feb 26, 2015How Allianz Insurance ensures compliance and audits activity with outsourced private cloud initiativeObserveITSpecial Webcast
Feb 25, 2015Shellshock hands-onSpecial Webcast
Feb 24, 2015Anti-anti-forensics in action - Recovering from (USB) oblivionAsk The Expert Webcast
Feb 20, 2015Continuous Diagnostics and Mitigation for Government Agencies: Is It Working? A SANS SurveyFiremon

IBM

Symantec

ForeScout Technologies
Special Webcast
Feb 19, 2015Who's Using Cyberthreat Intelligence and How? Part 2: Best Practices to Improve Incident Detection and ResponseAlienVault

Arbor Networks

BeyondTrust

Bit9 + Carbon Black

SurfWatch Labs

ThreatStream
Analyst Webcast
Feb 18, 2015What Works Increasing Vulnerability Management Effectiveness While Reducing CostTenable Network SecurityWhatWorks Summit Series Webcast
Feb 17, 2015Who's Using Cyberthreat Intelligence and How? Part 1: Definitions, Tools and StandardsAlienVault

Arbor Networks

BeyondTrust

Bit9 + Carbon Black

SurfWatch Labs

ThreatStream
Analyst Webcast
Feb 12, 2015A Security Geek's Guide to SAPOnapsisSpecial Webcast
Feb 11, 2015Going Phishing?Asia-Pacific Series
Feb 11, 2015Creating quick wins by optimizing Operational Technology and Informational Technology process controls.KPMGWednesday Webcast
Feb 10, 2015SANS WhatWorks: How VCU uses FireEye for Advanced Threat Detection and PreventionFireEyeWhatWorks Webcast
Feb 6, 2015Wrapping Up The GHOST: Lessons Learned From The Ghost VulnerabilityVeracodeSpecial Webcast
Feb 5, 2015Wrapping Up The GHOST: Lessons Learned From The Ghost Vulnerability - Asia PacificVeracodeAsia-Pacific Series
Feb 5, 2015Mapping Next-Generation NAC to the Critical Security ControlsForeScout TechnologiesAnalyst Webcast
Feb 4, 2015Best Practices for Eliminating SSL Encrypted Traffic Blind SpotsBlueCoatWednesday Webcast
Feb 3, 2015An Overview of ICS 515 - Active DefenseSpecial Webcast
Feb 2, 2015IR Event Log AnalysisAsk The Expert Webcast
Jan 28, 2015Avoid Making the Headlines Protect Your Retail Business from Cyber AttacksPalo Alto NetworksWednesday Webcast
Jan 27, 2015 The Year of Cyber Defense with Dr. Eric ColeSpecial Webcast
Jan 26, 2015Data Center Server Security: A SANS SurveyIBM

McAfee. Part of Intel Security.
Analyst Webcast
Jan 26, 2015The Few, The Proud, The Privileged: Controlling the Use of Administrator Passwords to Achieve Critical Security Control #12BeyondTrustSpecial Webcast
Jan 22, 2015Don't be the next victim: Cloak and secure your critical infrastructure and devicesTempered NetworksSpecial Webcast
Jan 21, 2015Analyst Webcast: Securing Oracle Databases Made EasyOracleWednesday Webcast
Jan 20, 2015Simplify PCI DSS Compliance with AlienVault USMAlienVaultSpecial Webcast
Jan 13, 2015The 20 Critical Controls: A Security StrategySpecial Webcast
Jan 12, 2015Fun with CISSP Questions: "The Absurd, The Drink the Kool-Aid, and The Ugly"Special Webcast
Jan 8, 2015State of Cyber Threat Intelligence AddressSpecial Webcast
Jan 5, 2015How to Run Linux Malware Analysis Apps as Docker ContainersSpecial Webcast

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, email sales@sans.org for more information.