Last Day to Get an iPad mini, Surface Go 2, or Take $300 Off with OnDemand Training - Register Today!

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
Tuesday, December 20, 2016
at 1:00 PM EST
(2016-12-20 18:00 UTC)
2016 Security Awareness Year in Review - Looking Ahead to 2017Lance Spitzner
Monday, December 19, 2016
at 3:00 PM EST
(2016-12-19 20:00 UTC)
SEC555 - The Industry's First Neutral SIEM Training CourseJustin Henderson
Thursday, December 15, 2016
at 12:30 PM EST
(2016-12-15 17:30 UTC)
The Data Disconnect: Why All Security Ratings are Not Created EqualBitsight
Dave Shackleford, Stephen Boyer
Wednesday, December 14, 2016
at 3:00 PM EST
(2016-12-14 20:00 UTC)
Winning the Culture War: Infusing Security into the Software Development CultureWhiteHat Security
Setu Kulkarni, Mark Geeslin
Wednesday, December 14, 2016
at 1:00 PM EST
(2016-12-14 18:00 UTC)
Defending Against Fileless MalwareCybereason
Amit Serper, Matt Bromiley
Wednesday, December 14, 2016
at 11:00 AM EST
(2016-12-14 16:00 UTC)
Cyber Threat Intelligence: Hurricanes and EarthquakesThreatQuotient
Jonathan Couch
Tuesday, December 13, 2016
at 3:00 PM EST
(2016-12-13 20:00 UTC)
Secrets to a Successful Phishing ProgramLance Spitzner
Tuesday, December 13, 2016
at 1:00 PM EST
(2016-12-13 18:00 UTC)
2016 Cybersecurity Trends Year in Review: Avoiding the Threats and Mistakes of 2016 to Have a More Secure 2017Veracode
LightCyber
John Pescatore
Friday, December 09, 2016
at 3:00 PM EST
(2016-12-09 20:00 UTC)
A Case Study: Developing an Innovative ICS Security Program and Real-Time OT Monitoring Capability for Oil and Gas InfrastructuresClaroty Inc.
Greg Villano, Matt Morris, Patrick McBride
Friday, December 09, 2016
at 1:00 PM EST
(2016-12-09 18:00 UTC)
Hummingbad: Tools & Techniques To Use When Inspecting Android ApplicationsChris Crowley, Cindy Murphy
Thursday, December 08, 2016
at 3:00 PM EST
(2016-12-08 20:00 UTC)
Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM and Analytics PlatformLogRhythm
Dave Shackleford, Seth Goldhammer
Thursday, December 08, 2016
at 1:00 PM EST
(2016-12-08 18:00 UTC)
Part 2 | SANS Security Analytics Survey Results: What's Working? What's Not?AlienVault
Anomali
LogRhythm
Lookingglass Cyber Solutions, Inc.
Rapid7 Inc.
Dave Shackleford, Kinshuk Pahare, Mike Reagan
Thursday, December 08, 2016
at 11:00 AM EST
(2016-12-08 16:00 UTC)
Let's plan an APTJavelin Networks
Roi Abutbul
Wednesday, December 07, 2016
at 3:00 PM EST
(2016-12-07 20:00 UTC)
You Can't Stop What You Can’t SOCArctic Wolf Networks
John Pescatore, Sridhar Karnam
Wednesday, December 07, 2016
at 1:00 PM EST
(2016-12-07 18:00 UTC)
Security Analytics in Action: SANS Fourth Annual Security Analytics Survey - Part 1 AlienVault
Anomali
LogRhythm
Lookingglass Cyber Solutions, Inc.
Rapid7 Inc.
Travis Farral, Dave Shackleford, Matt Hathaway, Javvad Malik
Tuesday, December 06, 2016
at 3:00 PM EST
(2016-12-06 20:00 UTC)
Throwback: How Social Media has Ushered a Re-emergence of Traditional Espionage Tradecraft (and how defenders can exploit it)Michael Cloppert
Tuesday, December 06, 2016
at 1:00 PM EST
(2016-12-06 18:00 UTC)
Fight Advanced Persistent Threats in ICS with Applied TrickeryBryce Galbraith
Monday, December 05, 2016
at 3:00 PM EST
(2016-12-05 20:00 UTC)
Opening a can of Active Defense and Cyber Deception to confuse and frustrate attackersChris Pizor, Ed Skoudis, John Strand
Friday, December 02, 2016
at 1:00 PM EST
(2016-12-02 18:00 UTC)
Redefining Endpoint Incident Response with Behavioral AnalysisCounterTack
Michael Angelo Vien, John Pescatore
Friday, December 02, 2016
at 11:00 AM EST
(2016-12-02 16:00 UTC)
Closing the Cyber Skills Gap: The Security Team Force MultiplierRSA
Deron Grzetich, Louis Yeck, Amy Blackshaw
Thursday, December 01, 2016
at 11:00 AM EDT
(2016-12-01 16:00 UTC)
The Art of Blocking Never-Before-Seen RansomwareCybereason
Uri Sternfeld, Jake Williams
Tuesday, November 29, 2016
at 1:00 PM EST
(2016-11-29 18:00 UTC)
Top Methods Pen Testers Use to Socially Engineer Their Way InLance Spitzner, Dave Shackleford
Monday, November 21, 2016
at 3:00 PM EST
(2016-11-21 20:00 UTC)
Infosec Rock Star: Geek Will Only Get You So FarTed Demopoulos
Monday, November 21, 2016
at 1:00 PM EST
(2016-11-21 18:00 UTC)
FOR508 - Advanced Incident Response and Threat Hunting Course Updates: Hunting GuideRob Lee
Friday, November 18, 2016
at 8:25 AM EST
(2016-11-18 13:25 UTC)
SANS Federal Government Cyber Security Briefing: How to Avoid Being the Next Agency to Announce a Major BreachIBM
Cylance
Please Check Back
Wednesday, November 16, 2016
at 3:00 PM EST
(2016-11-16 20:00 UTC)
The Art of Risk Mitigation Through Holistic Security AnalyticsOracle
Russ Lowenthal
Wednesday, November 16, 2016
at 11:00 AM EST
(2016-11-16 16:00 UTC)
Physical Security - Everything That's Wrong With Your Typical DoorDeviant Ollam
Tuesday, November 15, 2016
at 3:00 PM EST
(2016-11-15 20:00 UTC)
DevSecOps and the Cloud Security GapCloudPassage
Sami Laine, Dave Shackleford
Tuesday, November 15, 2016
at 1:00 PM EST
(2016-11-15 18:00 UTC)
Vulnerabilities, Controls and Continuous Monitoring: The SANS 2016 Continuous Monitoring SurveyForescout Technologies BV
IBM
Qualys
RiskIQ
Barbara Filkins, Scott Gordon, Dan Lamorena, Patrick Vowles, Martin Walker
Friday, November 11, 2016
at 11:00 AM EST
(2016-11-11 16:00 UTC)
Implementing the 5th Critical Security Control: Controlled Use of Administrative PrivilegePaul Ackerman
Thursday, November 10, 2016
at 1:00 PM EDT
(2016-11-10 18:00 UTC)
Endpoint Detection and Response - The Final Frontier: Why EDR is essential to your security operationsCybereason
Dan Chapman, Justin Lachesky
Wednesday, November 09, 2016
at 3:00 PM EST
(2016-11-09 20:00 UTC)
Taking Action: Effective Measures of DefenseForcepoint LLC
Richard Ford, Eric Cole
Wednesday, November 09, 2016
at 1:00 PM EST
(2016-11-09 18:00 UTC)
8 Ways To Watch The Invisible: Analyzing Encrypted Network TrafficJohannes Ullrich
Wednesday, November 09, 2016
at 11:00 AM EST
(2016-11-09 16:00 UTC)
FOR572 Course Update from the Future - Where We’re Going, We Don’t Need RoadsPhilip Hagen
Monday, November 07, 2016
at 1:00 PM EST
(2016-11-07 18:00 UTC)
Seeing Over the Horizon: Predictive and Preventive Security Based on the Kill-Chain ModelDomainTools
Tim Helming, Mike Cloppert
Thursday, November 03, 2016
at 1:00 PM EDT
(2016-11-03 17:00 UTC)
Ready to Replace AV? Criteria to Evaluate NGAV SolutionsCarbon Black
Neil Boland, Greg Notch, Barbara Filkins, J. Michael Butler
Wednesday, November 02, 2016
at 1:00 PM EDT
(2016-11-02 17:00 UTC)
The Fusion of IT and OT Security: What You Need to KnowGE
Rebecca Lawson, Derek Harp, Bengt Gregory-Brown
Wednesday, November 02, 2016
at 11:00 AM EDT
(2016-11-02 15:00 UTC)
Practical ICS Cyber Security for the Process IndustryJim Gilsinn, James McGlone
Thursday, October 27, 2016
at 1:00 PM EDT
(2016-10-27 17:00 UTC)
The Human Factor in the Age of Cyber ConflictArbor Networks
Sean Brady, Lance Spitzner
Wednesday, October 26, 2016
at 1:00 PM EDT
(2016-10-26 17:00 UTC)
Prioritizing and Planning to Ensure a High-Impact SOC RolloutLeidos
Brent Hambly, John Pescatore
Wednesday, October 26, 2016
at 11:00 AM EDT
(2016-10-26 15:00 UTC)
The Most Common Human Incidents - A Forensicator's TaleLance Spitzner, Matt Bromiley
Tuesday, October 25, 2016
at 1:00 PM EDT
(2016-10-25 17:00 UTC)
Packet Capture + Flow Analytics = Holistic Network VisibilityCisco Systems
Brian Ford
Monday, October 24, 2016
at 1:00 PM EDT
(2016-10-24 17:00 UTC)
Prioritizing the CIS Critical Controls for ICS: Learning from recent incidentsLeidos
Walt Sikora, Mike Assante, Tim Conway
Friday, October 21, 2016
at 3:00 PM EDT
(2016-10-21 19:00 UTC)
Intro to SDR Projects: Have Fun Before You Get SeriousLarry Pesce
Friday, October 21, 2016
at 1:00 PM EDT
(2016-10-21 17:00 UTC)
How Security Analysts Master Incident Response with Behavioral AnalyticsExabeam
Orion Cassetto, Andy Skrei
Friday, October 21, 2016
at 11:00 AM EDT
(2016-10-21 15:00 UTC)
The State of Vulnerability Discovery - How Bug Bounties Are Actually Making a DifferenceBugcrowd
David Baker, Casey Ellis, John Pescatore
Thursday, October 20, 2016
at 1:00 PM EDT
(2016-10-20 17:00 UTC)
From the Trenches, the SANS 2016 Survey on Security and Risk in the Financial Sector: Part 2 Securing Financial EnvironmentsArbor Networks
Forescout Technologies BV
Guidance Software
NSFOCUS
WhiteHat Security
Sandeep Kumar , Anthony Di Bello, G. Mark Hardy, Anil Nandigam
Wednesday, October 19, 2016
at 1:00 PM EDT
(2016-10-19 17:00 UTC)
From the Trenches, the SANS 2016 Survey on Security and Risk in the Financial Sector: Part 1 Incidents, Risks and PreparednessArbor Networks
Forescout Technologies BV
Guidance Software
NSFOCUS
WhiteHat Security
G. Mark Hardy, Mike Goldgof, Arabella Hallawell
Tuesday, October 18, 2016
at 1:00 PM EDT
(2016-10-18 17:00 UTC)
What's New for Security in Windows Server 2016?Jason Fossen
Tuesday, October 18, 2016
at 11:00 AM EDT
(2016-10-18 15:00 UTC)
They Can Run, But They Can't Hide: Real-Time Threat Hunting Using Passive DNSFarSight Security
Dr. Paul Vixie, Dave Shackleford
Monday, October 17, 2016
at 1:00 PM EDT
(2016-10-17 17:00 UTC)
Designing and Building a SOC: In-house vs. Out-SourcingChris Crowley
Friday, October 14, 2016
at 8:30 AM EDT
(2016-10-14 12:30 UTC)
SANS Financial Services Security Vendor BriefingRecordedFuture
Mcafee LLC
Malwarebytes
NSFOCUS
DomainTools
CYBERBIT Commercial Solutions
Please Check Back
Thursday, October 13, 2016
at 1:00 PM EST
(2016-10-13 17:00 UTC)
The Internet of Evil Things: How to Detect and Secure Your Vulnerable Devices from the Mirai BotnetJohannes Ullrich
Wednesday, October 12, 2016
at 1:00 PM EDT
(2016-10-12 17:00 UTC)
Security and Accountability in the Cloud, the SANS 2016 Cloud Security Survey: Part 2 - Changes in Cloud SecurityBitglass
CloudPassage
IBM
Rapid7 Inc.
Mcafee LLC
Steve Grossenbacher, Dave Shackleford, Salim Hafid, Matt Hathaway
Wednesday, October 12, 2016
at 11:00 AM EDT
(2016-10-12 15:00 UTC)
Continuous Opportunity: DevOps & SecurityBen Allen
Tuesday, October 11, 2016
at 1:00 PM EDT
(2016-10-11 17:00 UTC)
Security and Accountability in the Cloud, the SANS 2016 Cloud Security Survey: Part 1 - Breach Landscape and the Top Threats and ChallengesBitglass
CloudPassage
IBM
Rapid7 Inc.
Mcafee LLC
Mark Campbell, Dave Shackleford, Sami Laine
Tuesday, October 11, 2016
at 11:00 AM EDT
(2016-10-11 15:00 UTC)
EHR Vulnerability Reporting – A Cause for Concern?Greg Porter
Monday, October 10, 2016
at 9:00 PM EDT
(2016-10-11 01:00 UTC)
Let’s Talk Cyber SecurityMy-Ngoc Nguyen, Dr. Eric Cole
Thursday, October 06, 2016
at 1:00 PM EDT
(2016-10-06 17:00 UTC)
Taking Action Against Insider ThreatsDtex Systems
Josh Ablett, Eric Cole
Wednesday, October 05, 2016
at 1:00 PM EDT
(2016-10-05 17:00 UTC)
2016 Office 365 Security & Risk Benchmarks ReportSkyHigh Networks
Brandon Cook, John Pescatore
Tuesday, October 04, 2016
at 1:00 PM EDT
(2016-10-04 17:00 UTC)
Bring 5 of the top CIS Critical Security Controls to Life!Tanium
Ken Robinson, Jennifer Ellard
Wednesday, September 28, 2016
at 1:00 PM EDT
(2016-09-28 17:00 UTC)
MobileIron Security Labs: Combatting Rising Mobile ThreatsMobileIron
James Plouffe
Tuesday, September 27, 2016
at 10:00 AM EDT
(2016-09-27 14:00 UTC)
Sneak Peek for the European Security Awareness SummitChris Boyd, Masha Sedova, Lance Spitzner
Monday, September 26, 2016
at 3:00 PM EDT
(2016-09-26 19:00 UTC)
Going Mobile: Are Your Apps Putting You at Risk?Eric Johnson
Thursday, September 22, 2016
at 3:00 PM EST
(2016-09-22 19:00 UTC)
Compliance Automation with OpenSCAPRed Hat
Intel
Robin Price II
Thursday, September 22, 2016
at 11:00 AM EDT
(2016-09-22 15:00 UTC)
Monitoring the Most Interesting Network in the World: Insights from the Black Hat NOCRSA
Scott Carter, Neil R. Wyler
Wednesday, September 21, 2016
at 1:00 PM EDT
(2016-09-21 17:00 UTC)
Hardening Microservices Security: Building a Layered Defense StrategyCloudFlare
Matthew Silverlock, David Hoelzer
Wednesday, September 21, 2016
at 11:00 AM EDT
(2016-09-21 15:00 UTC)
Process Hunting with Microsoft AppLocker: Application Whitelisting is the Killer AppJames Tarala
Tuesday, September 20, 2016
at 10:00 PM EDT
(2016-09-21 02:00 UTC)
Welcome Threat Hunters, Phishermen, and Other LiarsRob Lee
Tuesday, September 20, 2016
at 3:00 PM EDT
(2016-09-20 19:00 UTC)
SOC Fundamentals for Your Threat Intelligence ProgramRecordedFuture
Glenn Wong, Chris Crowley
Tuesday, September 20, 2016
at 1:00 PM EDT
(2016-09-20 17:00 UTC)
Threat Intelligence: What It Is, and How to Use It EffectivelyNSFOCUS
Stephen Gates, Matt Bromiley
Monday, September 19, 2016
at 11:00 AM EDT
(2016-09-19 15:00 UTC)
Evasive malware is everywhere: Learn how it works and how to prevent it.Minerva Labs
Omri Moyal, John Pescatore
Thursday, September 15, 2016
at 9:00 PM EST
(2016-09-16 01:00 UTC)
How to Target Critical Infrastructure: The Adversary Return on Investment from an Industrial Control SystemMatthew Hosburgh
Thursday, September 15, 2016
at 1:00 PM EDT
(2016-09-15 17:00 UTC)
Injecting a node.js app using NoSQL and Query Selector InjectionAaron Cure
Tuesday, September 13, 2016
at 1:00 PM EDT
(2016-09-13 17:00 UTC)
Breach Detected! Could It Have Been Prevented?Palo Alto Networks
Barbara Filkins, Scott Simkin
Thursday, September 08, 2016
at 8:00 PM EST
(2016-09-09 00:00 UTC)
Real World Phishing & ExploitationPhillip Bosco
Thursday, September 08, 2016
at 1:00 PM EDT
(2016-09-08 17:00 UTC)
Hunting 101 - Back to Basics: Implementing a Proactive Cyber Hunting Approach Cybereason
Brad Mecha, Dave Shackleford
Thursday, September 08, 2016
at 11:00 AM EDT
(2016-09-08 15:00 UTC)
Navigating SANS Pen Test Cheat Sheets for Fun and ProfitEd Skoudis
Wednesday, September 07, 2016
at 12:00 PM EDT
(2016-09-07 16:00 UTC)
CISO Hot Topic Lunch Session: Communicating Cybersecurity Effectively to CEOs and Boards of DirectorsEndgame
John Pescatore, Alan Paller
Wednesday, September 07, 2016
at 9:00 AM EDT
(2016-09-07 13:00 UTC)
2016 Threat Landscape Survey Report: Europe EditionCheck Point Software Technologies, Inc.
Polomi Batra, Lee Neely
Tuesday, September 06, 2016
at 1:00 PM EDT
(2016-09-06 17:00 UTC)
Incorporating ICS Cybersecurity Into Water Utility Master PlanningJason Dely
Wednesday, August 31, 2016
at 1:00 PM EDT
(2016-08-31 17:00 UTC)
Top Office 365 Mail Vulnerabilities: Attacks on your Users Right NowAvanan
Kip James, Michael Landewe
Tuesday, August 30, 2016
at 1:00 PM EDT
(2016-08-30 17:00 UTC)
National Cyber Security Awareness Month ToolkitCathy Click, Lance Spitzner
Monday, August 29, 2016
at 1:00 PM EDT
(2016-08-29 17:00 UTC)
CISO Success StrategiesFrank Kim
Thursday, August 25, 2016
at 8:00 PM EDT
(2016-08-26 00:00 UTC)
Prioritizing Cybersecurity with the Critical Security ControlsWes Whitteker
Thursday, August 25, 2016
at 1:00 PM EDT
(2016-08-25 17:00 UTC)
Intelligent Network SecurityThreatSTOP
Tom Byrnes, Jake Williams
Wednesday, August 24, 2016
at 1:00 PM EDT
(2016-08-24 17:00 UTC)
Using an Attacker Technique-Based Approach for PreventionEndgame
Mike Nichols, Dave Shackleford
Tuesday, August 23, 2016
at 1:00 PM EDT
(2016-08-23 17:00 UTC)
Cyber-Hygiene and Standards of Care: Practical Defenses for HealthcareJames Tarala
Tuesday, August 23, 2016
at 11:00 AM EDT
(2016-08-23 15:00 UTC)
A Credit Union Detected LAN Turtle Attacks in Seconds with Network Access Control from Great Bay Software BeaconGreat Bay Software
Jeremy Taylor, John Pescatore
Thursday, August 18, 2016
at 3:00 PM EDT
(2016-08-18 19:00 UTC)
Practical Open Source Intelligence: Six Tips for Starting an Effective InvestigationMicah Hoffman
Thursday, August 18, 2016
at 1:00 PM EDT
(2016-08-18 17:00 UTC)
In Detection, the Only Thing That Matters Is ResultsLightCyber
Kasey Cross, David Thompson, Dave Shackleford
Wednesday, August 17, 2016
at 1:00 PM EDT
(2016-08-17 17:00 UTC)
The State of Cyber Threat Intelligence: Part 2: The Value of CTIAlienVault
Anomali
Arbor Networks
HP Enterprise Security
NETSCOUT Systems, Inc.
Rapid7 Inc.
Rebekah Brown, Dave Shackleford, Mark Doering, Aaron Shelmire
Tuesday, August 16, 2016
at 10:00 PM EDT
(2016-08-17 02:00 UTC)
Designing and Building a SOC: Management FundamentalsChristopher Crowley
Tuesday, August 16, 2016
at 1:00 PM EDT
(2016-08-16 17:00 UTC)
The State of Cyber Threat Intelligence: Part 1: How Cyber Threat Intelligence Is Consumed and ProcessedAlienVault
Anomali
Arbor Networks
HP Enterprise Security
NETSCOUT Systems, Inc.
Rapid7 Inc.
Dave Shackleford, Arabella Hallawell, Javvad Malik, Chip Witt
Monday, August 15, 2016
at 11:00 AM EDT
(2016-08-15 15:00 UTC)
Establishing Street Cred: Fundamental Security Concepts (Hint: It’s Not About Technology)Ted Demopoulos
Friday, August 12, 2016
at 9:30 AM EDT
(2016-08-12 13:30 UTC)
SANS Threat Intelligence Vendor BriefingRecordedFuture
NSFOCUS
ThreatQuotient
DomainTools
Robert M. Lee
Thursday, August 11, 2016
at 1:00 PM EDT
(2016-08-11 17:00 UTC)
2016 Threat Landscape Survey ReportCheck Point Software Technologies, Inc.
Polomi Batra, Lee Neely
Wednesday, August 10, 2016
at 3:00 PM EDT
(2016-08-10 19:00 UTC)
Running a Better Red Team Through Understanding ICS/SCADA Adversary TacticsRobert M. Lee
Wednesday, August 10, 2016
at 1:00 PM EDT
(2016-08-10 17:00 UTC)
Time is on your side: username harvesting via timing attacksEric Conrad
Tuesday, August 09, 2016
at 1:00 PM EDT
(2016-08-09 17:00 UTC)
A Sneak Peek at Pokémon Go Forensic ArtifactsCindy Murphy
Friday, August 05, 2016
at 1:00 PM EDT
(2016-08-05 17:00 UTC)
Designing and Building a SOC: Management FundamentalsChristopher Crowley
Tuesday, August 02, 2016
at 11:00 AM EDT
(2016-08-02 15:00 UTC)
Demystifying Cyber Attacks on ICS: How They Work and How to Use Engineered and Cyber Layer of ProtectionsBryan L. Singer, CISSP, CAP
Friday, July 29, 2016
at 1:00 PM EDT
(2016-07-29 17:00 UTC)
Pokémon Go - What To Tell EmployeesJacob Wilson, Thomas McHahon, Jennifer Miller, Lance Spitzner
Thursday, July 28, 2016
at 1:00 PM EDT
(2016-07-28 17:00 UTC)
Get Ready for NCSAM 2016Michael Kaiser, Lance Spitzner
Thursday, July 28, 2016
at 11:00 AM EDT
(2016-07-28 15:00 UTC)
Illuminate Your Network with Security AnalyticsCisco Systems
Andrew Wild
Tuesday, July 26, 2016
at 5:20 PM EDT
(2016-07-26 21:20 UTC)
ICS-Houston Security BriefingPalo Alto Networks
Waterfall Security
Ultra Electronics, 3eTI
Please Check Back
Thursday, July 21, 2016
at 1:00 PM EDT
(2016-07-21 17:00 UTC)
Health Care Provider Breaches and Risk Management Roadmaps: Part 2 - Health Care Security from the Top DownAnomali
Carbon Black
Forescout Technologies BV
Great Bay Software
Trend Micro Inc.
WhiteHat Security
Sandeep Kumar , Ed Cabrera, Barbara Filkins, Christopher Strand
Wednesday, July 20, 2016
at 1:00 PM EDT
(2016-07-20 17:00 UTC)
Health Care Provider Breaches and Risk Management Roadmaps: Part 1 - Health Care Security from the Bottom UpAnomali
Carbon Black
Forescout Technologies BV
Great Bay Software
Trend Micro Inc.
WhiteHat Security
Mike Goldgof, Barbara Filkins, Hugh Njemanze, Ty Powers
Tuesday, July 19, 2016
at 3:00 PM EDT
(2016-07-19 19:00 UTC)
Incident or Breach?Hal Pomeranz, Benjamin Wright
Tuesday, July 19, 2016
at 11:00 AM EDT
(2016-07-19 15:00 UTC)
Why Layered Security Strategies Do Not Work and What You Can Do About ItPalo Alto Networks
Navneet Singh
Thursday, July 14, 2016
at 3:00 PM EDT
(2016-07-14 19:00 UTC)
Ransomware & Malvertising: Dominating the Threat LandscapeMalwarebytes
Adam Kujawa, Dana Torgersen, John Pescatore
Thursday, July 14, 2016
at 11:00 AM EDT
(2016-07-14 15:00 UTC)
Case Study: See How Aruba Networks Uses Bug Bounties to Discover Vulnerabilities, FasterBugcrowd
Leif Dreizler, John Pescatore, Jon Green
Wednesday, July 13, 2016
at 12:00 PM EDT
(2016-07-13 16:00 UTC)
Decision Criteria and Analysis for Hardware-Based EncryptionTHALES e-Security
Eric Cole, John Grimm
Tuesday, July 12, 2016
at 1:00 PM EDT
(2016-07-12 17:00 UTC)
Beyond Infiltration: Conquering all Stages of the Attack LifecycleCybereason
Lotem Guy , John Pescatore
Tuesday, July 05, 2016
at 1:00 PM EDT
(2016-07-05 17:00 UTC)
Internet of Things (IoT) and Embedded Device Security Research - A PrimerBilly Rios
Thursday, June 30, 2016
at 3:00 PM EST
(2016-06-30 19:00 UTC)
What You Need to Know: iOS 10 SecurityJoshua Wright
Thursday, June 30, 2016
at 1:00 PM EST
(2016-06-30 17:00 UTC)
Going Mobile: Are your apps putting you at risk?Gregory Leonard
Wednesday, June 29, 2016
at 1:00 PM EDT
(2016-06-29 17:00 UTC)
Where Are We Now?: The SANS 2016 ICS SurveyAnomali
Arbor Networks
Belden
Carbon Black
Derek Harp, Bengt Gregory-Brown, Arabella Hallawell, David Meltzer, Christopher Strand, Jason Trost
Wednesday, June 29, 2016
at 11:00 AM EST
(2016-06-29 15:00 UTC)
Continuous Opportunity: DevOps & SecurityBen Allen
Wednesday, June 22, 2016
at 1:00 PM EDT
(2016-06-22 17:00 UTC)
The End of IOCs: A Case Study on Resolving Persistent Attacks Using Tactics, Techniques, and Procedures (TTPs)Cybereason
Israel Barak, Dave Shackleford
Tuesday, June 21, 2016
at 1:00 PM EDT
(2016-06-21 17:00 UTC)
Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance SurveyPivotPoint Risk Analytics
Barbara Filkins, Benjamin Wright, Dave Bradford, Julian Waits
Monday, June 20, 2016
at 1:00 PM EDT
(2016-06-20 17:00 UTC)
Malware Analysis and Adversary Infrastructure Mapping: A One-Two PunchDomainTools
Tim Helming, Alissa Torres
Monday, June 20, 2016
at 11:00 AM EST
(2016-06-20 15:00 UTC)
What we all need to learn from recent ICS incidentsMike Assante, Tim Conway
Wednesday, June 15, 2016
at 3:00 PM EDT
(2016-06-15 19:00 UTC)
Warning: Email may be Hazardous to your businessBAE Systems Applied Intelligence
John Devenyns
Wednesday, June 15, 2016
at 1:00 PM EDT
(2016-06-15 17:00 UTC)
MobileIron Mobile Security and Risk Review Research ResultsMobileIron
David Schwartzberg
Tuesday, June 14, 2016
at 1:00 PM EDT
(2016-06-14 17:00 UTC)
The Case for PIM/PAM in Today's InfosecCA, Inc.
Ken Ammon, Barbara Filkins
Friday, June 10, 2016
at 11:00 AM EDT
(2016-06-10 15:00 UTC)
How is User Risk Mitigation achieved? Achieving user risk mitigation-stopping the insider threatForcepoint LLC
Daniel Velez, Dr. Eric Cole
Thursday, June 09, 2016
at 8:00 PM EDT
(2016-06-10 00:00 UTC)
No Python Allowed: learning a whole new language to sell the Critical Security ControlsPaul Hershberger
Thursday, June 09, 2016
at 1:00 PM EDT
(2016-06-09 17:00 UTC)
Incident Response Capabilities in 2016 - Part 2: Emerging Trends in Incident Response and Survey ResultsAlienVault
Arbor Networks
HP Enterprise Security
IBM
Mcafee LLC
LogRhythm
NETSCOUT Systems, Inc.
Veriato
Matt Bromiley, Jack Doyle, Rob Lee, Mark Painter, Arabella Hallawell, Ryan Sommers
Wednesday, June 08, 2016
at 1:00 PM EDT
(2016-06-08 17:00 UTC)
Incident Response Capabilities in 2016 - Part 1: The Current Threat Landscape and Survey ResultsAlienVault
Arbor Networks
HP Enterprise Security
IBM
Mcafee LLC
LogRhythm
NETSCOUT Systems, Inc.
Veriato
Matt Bromiley, Rob Lee, Don Shin, Tamar Shafler, Ismael Valenzuela, Ann Sun
Tuesday, June 07, 2016
at 1:00 PM EDT
(2016-06-07 17:00 UTC)
ICS Network SegmentationDan Morrow, Brett Young
Friday, June 03, 2016
at 1:00 PM EST
(2016-06-03 17:00 UTC)
(Am)Cache rules everything around meEric Zimmerman
Thursday, June 02, 2016
at 1:00 PM EDT
(2016-06-02 17:00 UTC)
A Blueprint to Secure SAP Applications Using CIS Controls As a GuideOnapsis
Barbara Filkins, Alex Horan
Tuesday, May 31, 2016
at 1:00 PM EDT
(2016-05-31 17:00 UTC)
Sneak Peek for the 2016 Security Awareness SummitLance Spitzner
Thursday, May 26, 2016
at 3:00 PM EDT
(2016-05-26 19:00 UTC)
Effective Monitoring and Defense in Financial ServicesPalo Alto Networks
Lawrence Chin, David Hoelzer
Thursday, May 26, 2016
at 1:00 PM EDT
(2016-05-26 17:00 UTC)
What Works in Threat Prevention: Detecting and Stopping Attacks more Accurately and Quickly with ThreatstopThreatSTOP
Kenneth Compres, John Pescatore
Wednesday, May 25, 2016
at 1:00 PM EDT
(2016-05-25 17:00 UTC)
Why So Many Endpoint Attacks Are Still Going Undetected - And What You Can Do About ItRSA
Mark Stacey, Chris Ahearn, John Pescatore
Tuesday, May 24, 2016
at 1:00 PM EDT
(2016-05-24 17:00 UTC)
A New Perspective on Patch ManagementFlexera Software
Marcelo Pereira, John Pescatore
Tuesday, May 24, 2016
at 11:00 AM EDT
(2016-05-24 15:00 UTC)
iOS Location ForensicsSarah Edwards
Friday, May 20, 2016
at 1:00 PM EDT
(2016-05-20 17:00 UTC)
Next Level in Cyber Threat Intelligence Training: New FOR578Robert M. Lee
Thursday, May 19, 2016
at 1:00 PM EDT
(2016-05-19 17:00 UTC)
How to Negotiate a Cyber Insurance Policy Amy Elizabeth Stewart, Benjamin Wright
Thursday, May 19, 2016
at 11:00 AM EDT
(2016-05-19 15:00 UTC)
systemd and You!Hal Pomeranz
Wednesday, May 18, 2016
at 1:00 PM EDT
(2016-05-18 17:00 UTC)
Scapy and Snort, Packet Peanut Butter and JellyJudy Novak, Mike Poor
Wednesday, May 18, 2016
at 11:00 AM EDT
(2016-05-18 15:00 UTC)
Are you serious? Now I have to worry about BYoD and IoT threats?Pwnie Express
Yolonda Smith, Paul Paget, John Pescatore
Tuesday, May 17, 2016
at 7:00 PM EDT
(2016-05-17 23:00 UTC)
2016 Security Awareness Report (Special APAC Edition)Lance Spitzner
Tuesday, May 17, 2016
at 3:00 PM EDT
(2016-05-17 19:00 UTC)
Practical and Open Source Threat IntelligenceJames Tarala
Tuesday, May 17, 2016
at 12:00 PM EDT
(2016-05-17 16:00 UTC)
Windows Exploratory Surgery with Process HackerJason Fossen
Monday, May 16, 2016
at 1:00 PM EDT
(2016-05-16 17:00 UTC)
Shell items, More than Meets the EyeDavid Cowen
Friday, May 13, 2016
at 1:00 PM EDT
(2016-05-13 17:00 UTC)
Know Normal, Find Evil: Windows 10 Memory Forensics OverviewAlissa Torres
Thursday, May 12, 2016
at 1:00 PM EDT
(2016-05-12 17:00 UTC)
Why Train and Who to Train for Education and GovernmentRandy Marchany, Lance Spitzner
Wednesday, May 11, 2016
at 1:00 PM EDT
(2016-05-11 17:00 UTC)
Using the Critical Security Controls to Prevent Ransomware in HealthcarePalo Alto Networks
Matthew Mellen, James Tarala
Wednesday, May 11, 2016
at 11:00 AM EDT
(2016-05-11 15:00 UTC)
This phish goes to 11, w/ Guest: “SNOW” [DEF CON 22 Social Engineering CtF - Black Badge Winner]Stephanie Carruthers
Tuesday, May 10, 2016
at 1:00 PM EDT
(2016-05-10 17:00 UTC)
Connecting the Dots Between Your Threat Intelligence Tradecraft and Business OperationsSurfWatch Labs
Adam Meyer, John Pescatore
Tuesday, May 03, 2016
at 1:00 PM EDT
(2016-05-03 17:00 UTC)
Learn to Trust Your Insecure ICS NetworksDavid Mattes, Lisa Lorenzin
Thursday, April 28, 2016
at 1:00 PM EDT
(2016-04-28 17:00 UTC)
Cracking the Code on SaaS Security & ComplianceSkyHigh Networks
Brandon Cook
Thursday, April 28, 2016
at 11:00 AM EDT
(2016-04-28 15:00 UTC)
Analyzing Analytics: Turning Big Data into Security IntelligenceCisco Systems
Tim (TK) Keanani
Wednesday, April 27, 2016
at 3:00 PM EDT
(2016-04-27 19:00 UTC)
How to Produce a World-Class Threat Intelligence Capability From ScratchRecordedFuture
Levi Gundert, John Pescatore
Wednesday, April 27, 2016
at 1:00 PM EDT
(2016-04-27 17:00 UTC)
Managing Applications Securely: A SANS SurveyCheckmarx Ltd.
Veracode
WhiteHat Security
Johannes Ullrich, Amit Ashbel, Tim Jarrett, Ryan O'Leary
Wednesday, April 27, 2016
at 10:00 AM EDT
(2016-04-27 14:00 UTC)
Stopping CEO FraudFBI, Special Agent Cyber Crimes Division, Lance Spitzner
Tuesday, April 26, 2016
at 1:00 PM EDT
(2016-04-26 17:00 UTC)
2016 Security Awareness Report Findings - How STH is Helping YouDan deBeaubien, Danielle Ventre-Olson, Lisa Murray-Johnson, Lance Spitzner
Tuesday, April 26, 2016
at 11:00 AM EDT
(2016-04-26 15:00 UTC)
Overcome Privilege Management Obstacles with CSC v. 6Appsense
Jon Wallace, John Pescatore
Monday, April 25, 2016
at 3:00 PM EDT
(2016-04-25 19:00 UTC)
Are network-centric practices undermining your SOC?Brandie Anderson
Friday, April 22, 2016
at 1:00 PM EDT
(2016-04-22 17:00 UTC)
DNS Evidence: You Don’t Know What You’re MissingPhilip Hagen
Wednesday, April 20, 2016
at 2:00 PM EDT
(2016-04-20 18:00 UTC)
Securing the Internet of Old Things (IoOT)Malwarebytes
Jean-Philippe Taggart, Dana Torgersen, G.W. Ray Davidson, PhD
Tuesday, April 19, 2016
at 11:00 PM EDT
(2016-04-20 03:00 UTC)
SANS Asia-Pacific Webcast Series- Basic Mobile Application Reverse Engineering and a Free Trip to VegasTim Medin
Tuesday, April 19, 2016
at 3:00 PM EDT
(2016-04-19 19:00 UTC)
Security Leadership: How to Increase the Success of Your ProjectsJeff Frisk
Friday, April 15, 2016
at 1:00 PM EDT
(2016-04-15 17:00 UTC)
Open Season on Cyberthreats: Part 2- Threat Hunting Methodologies and ToolsCarbon Black
DomainTools
Endgame
HPE
Malwarebytes
Sqrrl Data, Inc.
Ely Kahn, Eric Cole, Tim Helming, Mike Nichols
Thursday, April 14, 2016
at 3:00 PM EDT
(2016-04-14 19:00 UTC)
2016 Awareness Report - Lessons Learned for Education and State / Local GovernmentAshley Sudderth, Mark Evans, Lance Spitzner
Thursday, April 14, 2016
at 1:00 PM EDT
(2016-04-14 17:00 UTC)
Open Season on Cyberthreats: Part I- Threat Hunting 101Carbon Black
DomainTools
Endgame
HPE
Malwarebytes
Sqrrl Data, Inc.
Ryan Cason, Eric Cole, Mark Painter, Dana Torgersen
Wednesday, April 13, 2016
at 1:00 PM EDT
(2016-04-13 17:00 UTC)
BadLock: What you need to knowVeracode
Chris Wysopal, Johannes Ullrich, PhD
Wednesday, April 13, 2016
at 11:00 AM EDT
(2016-04-13 15:00 UTC)
HTTP/2 & Websockets Are Gonna Change the Pen Test World. Are You Ready?Adrien de Beaupre, Justin Searle
Tuesday, April 12, 2016
at 1:15 PM EDT
(2016-04-12 17:15 UTC)
LIVE from THIR Summit in New Orleans: The Most Dangerous Game; Evolving Threat Hunting to Keep Up with Skilled AdversariesCarbon Black
Please Check Back
Friday, April 08, 2016
at 1:00 PM EDT
(2016-04-08 17:00 UTC)
To trust or not to trust: The relationship between you & your mobile forensics toolHeather Mahalik
Thursday, April 07, 2016
at 1:00 PM EDT
(2016-04-07 17:00 UTC)
Gamification of a Fortune 20 SOCHPE
Josh Stevens, Marcel Hoffmann
Thursday, March 31, 2016
at 1:00 PM EDT
(2016-03-31 17:00 UTC)
Mapping Attack Infrastructure: Leave Your Foe With Nowhere to HideRiskIQ
Stephen Ginty, John Pescatore
Tuesday, March 29, 2016
at 1:00 PM EDT
(2016-03-29 17:00 UTC)
Evolving from cyber Gatherers to cyber Hunters - Darwin was wrong about APTsArbor Networks
Darren Anstee, John Pescatore
Tuesday, March 29, 2016
at 11:00 AM EDT
(2016-03-29 15:00 UTC)
2016 Security Awareness Report Key FindingsLance Hayden, Bob Rudis, Lance Spitzner
Thursday, March 24, 2016
at 3:00 PM EDT
(2016-03-24 19:00 UTC)
Expect the Unexpected, Preparing for the Inevitable Cyber BreachLancope
Joseph Muniz
Thursday, March 24, 2016
at 1:00 PM EDT
(2016-03-24 17:00 UTC)
Mobile Data Loss - Threats & Countermeasures MobileIron
Michael T. Raggo
Thursday, March 24, 2016
at 11:00 AM EDT
(2016-03-24 15:00 UTC)
Facilitating Fluffy Forensics 2.0Andrew Hay
Wednesday, March 23, 2016
at 1:00 PM EDT
(2016-03-23 17:00 UTC)
What Works: Inspecting Encrypted Traffic with the Blue Coat SSL Visibility ApplianceBlue Coat Systems, Inc.
Michael Weinstein, John Pescatore
Tuesday, March 22, 2016
at 1:00 PM EDT
(2016-03-22 17:00 UTC)
Ensuring Compliance and Detecting Suspicious Activity with Promisec Endpoint ManagerPromisec
Noel Slane, Dave Shackleford
Friday, March 18, 2016
at 1:00 PM EDT
(2016-03-18 17:00 UTC)
SANS 2016 Endpoint Security Survey Part 2: Can We Say Next-Gen Yet? Guidance Software
Great Bay Software
IBM
Malwarebytes
Sophos Inc.
Marty Ward, Anthony Di Bello, G.W. Ray Davidson, PhD
Thursday, March 17, 2016
at 1:00 PM EDT
(2016-03-17 17:00 UTC)
SANS 2016 Endpoint Security Survey Part 1: The Evolving Definition of EndpointsGuidance Software
Great Bay Software
IBM
Malwarebytes
Sophos Inc.
G.W. Ray Davidson, PhD, Sara Lofgren, Dana Torgersen, Lee Wei
Wednesday, March 16, 2016
at 1:00 PM EDT
(2016-03-16 17:00 UTC)
Bring Your Own Collaboration – Technical Control TradeoffsFinal Code
Dave Shackleford, Scott Gordon
Tuesday, March 15, 2016
at 1:00 PM EDT
(2016-03-15 17:00 UTC)
Benchmarking AppSec: A Metrics PyramidVeracode
Tim Jarrett, Jim Bird
Monday, March 14, 2016
at 7:15 PM EDT
(2016-03-14 23:15 UTC)
Analyzing the Ukrainian Power Grid Cyber-AttacksWaterfall Security
Jake Williams
Thursday, March 10, 2016
at 3:00 PM EST
(2016-03-10 20:00 UTC)
10 Quick Win, Industry Agnostic SIEM DashboardsCraig Bowser
Thursday, March 10, 2016
at 1:00 PM EST
(2016-03-10 18:00 UTC)
Is Active Breach Detection the Next-Generation Security Technology?EastWind Networks
Paul Kraus, Dave Shackleford
Wednesday, March 09, 2016
at 2:00 PM EST
(2016-03-09 19:00 UTC)
Security Awareness: Understanding and Managing Your Top Seven Human RisksLance Spitzner
Tuesday, March 08, 2016
at 1:00 PM EST
(2016-03-08 18:00 UTC)
A DevSecOps PlaybookCloudPassage
Amrit Williams, Dave Shackleford
Monday, March 07, 2016
at 9:00 PM EST
(2016-03-08 02:00 UTC)
Passive DNS Logs: The Pulse of the NetworkPhilip Hagen
Wednesday, March 02, 2016
at 1:00 PM EST
(2016-03-02 18:00 UTC)
How To Become A SANS InstructorEric Conrad
Friday, February 26, 2016
at 1:00 PM EST
(2016-02-26 18:00 UTC)
SIFT and REMnux: Wonder Twin Powers Activate!Lenny Zeltser, Rob Lee
Friday, February 26, 2016
at 11:00 AM EST
(2016-02-26 16:00 UTC)
Predicting Future Attacks and Breaches: Analytics in ActionSAS INSTITUTE INC
Christopher Smith, Dave Shackleford
Thursday, February 25, 2016
at 9:00 PM EST
(2016-02-26 02:00 UTC)
Security Leadership For Everyone: Personal Authority and BeyondTed Demopoulos
Thursday, February 25, 2016
at 3:00 PM EST
(2016-02-25 20:00 UTC)
SANS VetSuccess Academy sponsored by Solutionary - open now!Solutionary, Inc.
Maxwell Shuftan, Arlin Halstead
Wednesday, February 24, 2016
at 1:00 PM EST
(2016-02-24 18:00 UTC)
Hunting and Farming : Concepts and Strategies to Improve Your Cyber DefensesCarbon Black
Ben Johnson
Wednesday, February 24, 2016
at 6:00 AM EST
(2016-02-24 11:00 UTC)
Making Risk Assessment UsefulDavid Hoelzer
Tuesday, February 23, 2016
at 1:00 PM EST
(2016-02-23 18:00 UTC)
The Effectiveness of Microsoft's EMETStephen Sims
Tuesday, February 23, 2016
at 11:00 AM EDT
(2016-02-23 16:00 UTC)
iPhone Forensics - Separating the Facts from Fiction. A Technical Autopsy of the Apple/FBI DebateCindy Murphy, Sarah Edwards, Heather Mahalik
Friday, February 19, 2016
at 3:00 PM EDT
(2016-02-19 20:00 UTC)
GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerabilityVeracode
Johannes Ullrich, PhD, Chris Eng
Friday, February 19, 2016
at 10:00 AM EDT
(2016-02-19 15:00 UTC)
GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerabilityVeracode
Johannes Ullrich, PhD, Chris Eng
Thursday, February 18, 2016
at 1:00 PM EST
(2016-02-18 18:00 UTC)
Dizzy New World of Cyber Investigations: Law, Ethics and EvidenceBenjamin Wright
Thursday, February 18, 2016
at 12:00 AM EST
(2016-02-18 05:00 UTC)
How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...Bryce Galbraith
Wednesday, February 17, 2016
at 11:00 AM EDT
(2016-02-17 16:00 UTC)
Case Study: How the City of Lewiston Improved Threat Detection with AlienVault USMAlienVault
Dave Shackleford
Friday, February 12, 2016
at 3:00 PM EST
(2016-02-12 20:00 UTC)
Implementing a Successful Continuous Monitoring program with Open Source / Free ToolsIsmael Valenzuela
Thursday, February 11, 2016
at 1:00 PM EST
(2016-02-11 18:00 UTC)
Getting Started with Web Application Security Veracode
Joseph Feiman, Gregory Leonard
Tuesday, February 09, 2016
at 6:00 PM EST
(2016-02-09 23:00 UTC)
CISO Hot Topic: Communicating to and Influencing CEOs and Boards of Directors: What Works and What to AvoidPalo Alto Networks
John Pescatore, Alan Paller
Tuesday, February 09, 2016
at 1:00 PM EST
(2016-02-09 18:00 UTC)
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and DevicesSkycure
Mic McCully, Lee Neely
Monday, February 08, 2016
at 1:00 PM EST
(2016-02-08 18:00 UTC)
Risky Business: Evaluating the True Risk to your Security ProgramWhiteHat Security
Jenna McAuley, Mike Goldgof, Demetrios Lazarikos (Laz) , Johannes Ullrich, PhD
Friday, February 05, 2016
at 3:00 PM EST
(2016-02-05 20:00 UTC)
Scaling Big Data Analytics: SANS Review of LogRhythm 7 Analytics and Intelligence UpgradesLogRhythm
Dave Shackleford, Erick Ingleby
Thursday, February 04, 2016
at 1:00 PM EST
(2016-02-04 18:00 UTC)
Security Leadership: Strategies for SuccessFrank Kim
Wednesday, February 03, 2016
at 1:00 PM EST
(2016-02-03 18:00 UTC)
SANS 2016 IT Security Spending Strategies SurveyArbor Networks
Gigamon
Simon Gibson, G. Mark Hardy, Barbara Filkins, Gary Sockrider
Tuesday, February 02, 2016
at 1:00 PM EST
(2016-02-02 18:00 UTC)
Threat HuntingSqrrl Data, Inc.
Luis Maldonado, Robert M. Lee, Rob Lee
Thursday, January 28, 2016
at 1:00 PM EST
(2016-01-28 18:00 UTC)
Why You Need Application SecurityVeracode
Joseph Feiman, Johannes Ullrich
Wednesday, January 27, 2016
at 1:00 PM EST
(2016-01-27 18:00 UTC)
The Frankenstein Framework - Assembling the Pieces to Enhance ICS Security Without Creating a MonsterJustin Opatny
Thursday, January 21, 2016
at 11:00 AM EST
(2016-01-21 16:00 UTC)
An Analysis of the Sandworm Team in UkraineRobert M. Lee
Wednesday, January 20, 2016
at 8:00 PM EST
(2016-01-21 01:00 UTC)
Security Program Development, Maturity Models and Security Dashboards that help you manage riskDean Sapp
Tuesday, January 19, 2016
at 3:00 PM EST
(2016-01-19 20:00 UTC)
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingAlex Pinto
Tuesday, January 19, 2016
at 1:00 PM EST
(2016-01-19 18:00 UTC)
How to Leverage The Critical Controls in 2016Randy Marchany
Monday, January 18, 2016
at 1:00 PM EST
(2016-01-18 18:00 UTC)
Threat Intelligence AwakensRick Holland
Thursday, January 14, 2016
at 3:00 PM EST
(2016-01-14 20:00 UTC)
WhatWorks in AppSec: ASP.NET Web API SecurityPlease Check Back
Wednesday, January 13, 2016
at 1:00 PM EST
(2016-01-13 18:00 UTC)
From the Front Lines: Practical Application of DNS Threat Intel Data DomainTools
Tim Helming, Robert M. Lee
Tuesday, January 12, 2016
at 3:00 PM EST
(2016-01-12 20:00 UTC)
Intelligent Intelligence: Secrets to Threat Intel SuccessDavid Bianco
Tuesday, January 12, 2016
at 1:00 PM EST
(2016-01-12 18:00 UTC)
Know Before You Go: Key AWS Security ConsiderationsPalo Alto Networks
Matt Keil, Dave Shackleford
Tuesday, January 12, 2016
at 9:00 AM EST
(2016-01-12 14:00 UTC)
Smartphone Forensics Moves Fast. Stay Current or You May Miss Relevant Evidence!Heather Mahalik
Monday, January 11, 2016
at 10:00 AM EST
(2016-01-11 15:00 UTC)
What's New for Security in Windows 10 and Server 2016?Jason Fossen
Wednesday, January 06, 2016
at 12:00 PM EST
(2016-01-06 17:00 UTC)
Are You Ready for Threat Intelligence? Behind the Scenes with FOR578Mike Cloppert, Robert M. Lee
Tuesday, January 05, 2016
at 12:00 PM EST
(2016-01-05 17:00 UTC)
Deconstructing the Reports of Iranian Activity Against the Power Grid and New York DamMike Assante, Robert M. Lee

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.