Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.
Archive Webcasts
Date | Title | Sponsor | Speaker |
---|---|---|---|
Tuesday, December 20, 2016 at 1:00 PM EST (2016-12-20 18:00 UTC) | 2016 Security Awareness Year in Review - Looking Ahead to 2017 | Lance Spitzner | |
Monday, December 19, 2016 at 3:00 PM EST (2016-12-19 20:00 UTC) | SEC555 - The Industry's First Neutral SIEM Training Course | Justin Henderson | |
Thursday, December 15, 2016 at 12:30 PM EST (2016-12-15 17:30 UTC) | The Data Disconnect: Why All Security Ratings are Not Created Equal | Bitsight | Dave Shackleford, Stephen Boyer |
Wednesday, December 14, 2016 at 3:00 PM EST (2016-12-14 20:00 UTC) | Winning the Culture War: Infusing Security into the Software Development Culture | WhiteHat Security | Setu Kulkarni, Mark Geeslin |
Wednesday, December 14, 2016 at 1:00 PM EST (2016-12-14 18:00 UTC) | Defending Against Fileless Malware | Cybereason | Amit Serper, Matt Bromiley |
Wednesday, December 14, 2016 at 11:00 AM EST (2016-12-14 16:00 UTC) | Cyber Threat Intelligence: Hurricanes and Earthquakes | ThreatQuotient | Jonathan Couch |
Tuesday, December 13, 2016 at 3:00 PM EST (2016-12-13 20:00 UTC) | Secrets to a Successful Phishing Program | Lance Spitzner | |
Tuesday, December 13, 2016 at 1:00 PM EST (2016-12-13 18:00 UTC) | 2016 Cybersecurity Trends Year in Review: Avoiding the Threats and Mistakes of 2016 to Have a More Secure 2017 | Veracode LightCyber | John Pescatore |
Friday, December 09, 2016 at 3:00 PM EST (2016-12-09 20:00 UTC) | A Case Study: Developing an Innovative ICS Security Program and Real-Time OT Monitoring Capability for Oil and Gas Infrastructures | Claroty Inc. | Greg Villano, Matt Morris, Patrick McBride |
Friday, December 09, 2016 at 1:00 PM EST (2016-12-09 18:00 UTC) | Hummingbad: Tools & Techniques To Use When Inspecting Android Applications | Chris Crowley, Cindy Murphy | |
Thursday, December 08, 2016 at 3:00 PM EST (2016-12-08 20:00 UTC) | Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM and Analytics Platform | LogRhythm | Dave Shackleford, Seth Goldhammer |
Thursday, December 08, 2016 at 1:00 PM EST (2016-12-08 18:00 UTC) | Part 2 | SANS Security Analytics Survey Results: What's Working? What's Not? | AlienVault Anomali LogRhythm Lookingglass Cyber Solutions, Inc. Rapid7 Inc. | Dave Shackleford, Kinshuk Pahare, Mike Reagan |
Thursday, December 08, 2016 at 11:00 AM EST (2016-12-08 16:00 UTC) | Let's plan an APT | Javelin Networks | Roi Abutbul |
Wednesday, December 07, 2016 at 3:00 PM EST (2016-12-07 20:00 UTC) | You Can't Stop What You Can’t SOC | Arctic Wolf Networks | John Pescatore, Sridhar Karnam |
Wednesday, December 07, 2016 at 1:00 PM EST (2016-12-07 18:00 UTC) | Security Analytics in Action: SANS Fourth Annual Security Analytics Survey - Part 1 | AlienVault Anomali LogRhythm Lookingglass Cyber Solutions, Inc. Rapid7 Inc. | Travis Farral, Dave Shackleford, Matt Hathaway, Javvad Malik |
Tuesday, December 06, 2016 at 3:00 PM EST (2016-12-06 20:00 UTC) | Throwback: How Social Media has Ushered a Re-emergence of Traditional Espionage Tradecraft (and how defenders can exploit it) | Michael Cloppert | |
Tuesday, December 06, 2016 at 1:00 PM EST (2016-12-06 18:00 UTC) | Fight Advanced Persistent Threats in ICS with Applied Trickery | Bryce Galbraith | |
Monday, December 05, 2016 at 3:00 PM EST (2016-12-05 20:00 UTC) | Opening a can of Active Defense and Cyber Deception to confuse and frustrate attackers | Chris Pizor, Ed Skoudis, John Strand | |
Friday, December 02, 2016 at 1:00 PM EST (2016-12-02 18:00 UTC) | Redefining Endpoint Incident Response with Behavioral Analysis | CounterTack | Michael Angelo Vien, John Pescatore |
Friday, December 02, 2016 at 11:00 AM EST (2016-12-02 16:00 UTC) | Closing the Cyber Skills Gap: The Security Team Force Multiplier | RSA | Deron Grzetich, Louis Yeck, Amy Blackshaw |
Thursday, December 01, 2016 at 11:00 AM EDT (2016-12-01 16:00 UTC) | The Art of Blocking Never-Before-Seen Ransomware | Cybereason | Uri Sternfeld, Jake Williams |
Tuesday, November 29, 2016 at 1:00 PM EST (2016-11-29 18:00 UTC) | Top Methods Pen Testers Use to Socially Engineer Their Way In | Lance Spitzner, Dave Shackleford | |
Monday, November 21, 2016 at 3:00 PM EST (2016-11-21 20:00 UTC) | Infosec Rock Star: Geek Will Only Get You So Far | Ted Demopoulos | |
Monday, November 21, 2016 at 1:00 PM EST (2016-11-21 18:00 UTC) | FOR508 - Advanced Incident Response and Threat Hunting Course Updates: Hunting Guide | Rob Lee | |
Friday, November 18, 2016 at 8:25 AM EST (2016-11-18 13:25 UTC) | SANS Federal Government Cyber Security Briefing: How to Avoid Being the Next Agency to Announce a Major Breach | IBM Cylance | Please Check Back |
Wednesday, November 16, 2016 at 3:00 PM EST (2016-11-16 20:00 UTC) | The Art of Risk Mitigation Through Holistic Security Analytics | Oracle | Russ Lowenthal |
Wednesday, November 16, 2016 at 11:00 AM EST (2016-11-16 16:00 UTC) | Physical Security - Everything That's Wrong With Your Typical Door | Deviant Ollam | |
Tuesday, November 15, 2016 at 3:00 PM EST (2016-11-15 20:00 UTC) | DevSecOps and the Cloud Security Gap | CloudPassage | Sami Laine, Dave Shackleford |
Tuesday, November 15, 2016 at 1:00 PM EST (2016-11-15 18:00 UTC) | Vulnerabilities, Controls and Continuous Monitoring: The SANS 2016 Continuous Monitoring Survey | Forescout Technologies BV IBM Qualys RiskIQ | Barbara Filkins, Scott Gordon, Dan Lamorena, Patrick Vowles, Martin Walker |
Friday, November 11, 2016 at 11:00 AM EST (2016-11-11 16:00 UTC) | Implementing the 5th Critical Security Control: Controlled Use of Administrative Privilege | Paul Ackerman | |
Thursday, November 10, 2016 at 1:00 PM EDT (2016-11-10 18:00 UTC) | Endpoint Detection and Response - The Final Frontier: Why EDR is essential to your security operations | Cybereason | Dan Chapman, Justin Lachesky |
Wednesday, November 09, 2016 at 3:00 PM EST (2016-11-09 20:00 UTC) | Taking Action: Effective Measures of Defense | Forcepoint LLC | Richard Ford, Eric Cole |
Wednesday, November 09, 2016 at 1:00 PM EST (2016-11-09 18:00 UTC) | 8 Ways To Watch The Invisible: Analyzing Encrypted Network Traffic | Johannes Ullrich | |
Wednesday, November 09, 2016 at 11:00 AM EST (2016-11-09 16:00 UTC) | FOR572 Course Update from the Future - Where We’re Going, We Don’t Need Roads | Philip Hagen | |
Monday, November 07, 2016 at 1:00 PM EST (2016-11-07 18:00 UTC) | Seeing Over the Horizon: Predictive and Preventive Security Based on the Kill-Chain Model | DomainTools | Tim Helming, Mike Cloppert |
Thursday, November 03, 2016 at 1:00 PM EDT (2016-11-03 17:00 UTC) | Ready to Replace AV? Criteria to Evaluate NGAV Solutions | Carbon Black | Neil Boland, Greg Notch, Barbara Filkins, J. Michael Butler |
Wednesday, November 02, 2016 at 1:00 PM EDT (2016-11-02 17:00 UTC) | The Fusion of IT and OT Security: What You Need to Know | GE | Rebecca Lawson, Derek Harp, Bengt Gregory-Brown |
Wednesday, November 02, 2016 at 11:00 AM EDT (2016-11-02 15:00 UTC) | Practical ICS Cyber Security for the Process Industry | Jim Gilsinn, James McGlone | |
Thursday, October 27, 2016 at 1:00 PM EDT (2016-10-27 17:00 UTC) | The Human Factor in the Age of Cyber Conflict | Arbor Networks | Sean Brady, Lance Spitzner |
Wednesday, October 26, 2016 at 1:00 PM EDT (2016-10-26 17:00 UTC) | Prioritizing and Planning to Ensure a High-Impact SOC Rollout | Leidos | Brent Hambly, John Pescatore |
Wednesday, October 26, 2016 at 11:00 AM EDT (2016-10-26 15:00 UTC) | The Most Common Human Incidents - A Forensicator's Tale | Lance Spitzner, Matt Bromiley | |
Tuesday, October 25, 2016 at 1:00 PM EDT (2016-10-25 17:00 UTC) | Packet Capture + Flow Analytics = Holistic Network Visibility | Cisco Systems | Brian Ford |
Monday, October 24, 2016 at 1:00 PM EDT (2016-10-24 17:00 UTC) | Prioritizing the CIS Critical Controls for ICS: Learning from recent incidents | Leidos | Walt Sikora, Mike Assante, Tim Conway |
Friday, October 21, 2016 at 3:00 PM EDT (2016-10-21 19:00 UTC) | Intro to SDR Projects: Have Fun Before You Get Serious | Larry Pesce | |
Friday, October 21, 2016 at 1:00 PM EDT (2016-10-21 17:00 UTC) | How Security Analysts Master Incident Response with Behavioral Analytics | Exabeam | Orion Cassetto, Andy Skrei |
Friday, October 21, 2016 at 11:00 AM EDT (2016-10-21 15:00 UTC) | The State of Vulnerability Discovery - How Bug Bounties Are Actually Making a Difference | Bugcrowd | David Baker, Casey Ellis, John Pescatore |
Thursday, October 20, 2016 at 1:00 PM EDT (2016-10-20 17:00 UTC) | From the Trenches, the SANS 2016 Survey on Security and Risk in the Financial Sector: Part 2 Securing Financial Environments | Arbor Networks Forescout Technologies BV Guidance Software NSFOCUS WhiteHat Security | Sandeep Kumar , Anthony Di Bello, G. Mark Hardy, Anil Nandigam |
Wednesday, October 19, 2016 at 1:00 PM EDT (2016-10-19 17:00 UTC) | From the Trenches, the SANS 2016 Survey on Security and Risk in the Financial Sector: Part 1 Incidents, Risks and Preparedness | Arbor Networks Forescout Technologies BV Guidance Software NSFOCUS WhiteHat Security | G. Mark Hardy, Mike Goldgof, Arabella Hallawell |
Tuesday, October 18, 2016 at 1:00 PM EDT (2016-10-18 17:00 UTC) | What's New for Security in Windows Server 2016? | Jason Fossen | |
Tuesday, October 18, 2016 at 11:00 AM EDT (2016-10-18 15:00 UTC) | They Can Run, But They Can't Hide: Real-Time Threat Hunting Using Passive DNS | FarSight Security | Dr. Paul Vixie, Dave Shackleford |
Monday, October 17, 2016 at 1:00 PM EDT (2016-10-17 17:00 UTC) | Designing and Building a SOC: In-house vs. Out-Sourcing | Chris Crowley | |
Friday, October 14, 2016 at 8:30 AM EDT (2016-10-14 12:30 UTC) | SANS Financial Services Security Vendor Briefing | RecordedFuture Mcafee LLC Malwarebytes NSFOCUS DomainTools CYBERBIT Commercial Solutions | Please Check Back |
Thursday, October 13, 2016 at 1:00 PM EST (2016-10-13 17:00 UTC) | The Internet of Evil Things: How to Detect and Secure Your Vulnerable Devices from the Mirai Botnet | Johannes Ullrich | |
Wednesday, October 12, 2016 at 1:00 PM EDT (2016-10-12 17:00 UTC) | Security and Accountability in the Cloud, the SANS 2016 Cloud Security Survey: Part 2 - Changes in Cloud Security | Bitglass CloudPassage IBM Rapid7 Inc. Mcafee LLC | Steve Grossenbacher, Dave Shackleford, Salim Hafid, Matt Hathaway |
Wednesday, October 12, 2016 at 11:00 AM EDT (2016-10-12 15:00 UTC) | Continuous Opportunity: DevOps & Security | Ben Allen | |
Tuesday, October 11, 2016 at 1:00 PM EDT (2016-10-11 17:00 UTC) | Security and Accountability in the Cloud, the SANS 2016 Cloud Security Survey: Part 1 - Breach Landscape and the Top Threats and Challenges | Bitglass CloudPassage IBM Rapid7 Inc. Mcafee LLC | Mark Campbell, Dave Shackleford, Sami Laine |
Tuesday, October 11, 2016 at 11:00 AM EDT (2016-10-11 15:00 UTC) | EHR Vulnerability Reporting – A Cause for Concern? | Greg Porter | |
Monday, October 10, 2016 at 9:00 PM EDT (2016-10-11 01:00 UTC) | Let’s Talk Cyber Security | My-Ngoc Nguyen, Dr. Eric Cole | |
Thursday, October 06, 2016 at 1:00 PM EDT (2016-10-06 17:00 UTC) | Taking Action Against Insider Threats | Dtex Systems | Josh Ablett, Eric Cole |
Wednesday, October 05, 2016 at 1:00 PM EDT (2016-10-05 17:00 UTC) | 2016 Office 365 Security & Risk Benchmarks Report | SkyHigh Networks | Brandon Cook, John Pescatore |
Tuesday, October 04, 2016 at 1:00 PM EDT (2016-10-04 17:00 UTC) | Bring 5 of the top CIS Critical Security Controls to Life! | Tanium | Ken Robinson, Jennifer Ellard |
Wednesday, September 28, 2016 at 1:00 PM EDT (2016-09-28 17:00 UTC) | MobileIron Security Labs: Combatting Rising Mobile Threats | MobileIron | James Plouffe |
Tuesday, September 27, 2016 at 10:00 AM EDT (2016-09-27 14:00 UTC) | Sneak Peek for the European Security Awareness Summit | Chris Boyd, Masha Sedova, Lance Spitzner | |
Monday, September 26, 2016 at 3:00 PM EDT (2016-09-26 19:00 UTC) | Going Mobile: Are Your Apps Putting You at Risk? | Eric Johnson | |
Thursday, September 22, 2016 at 3:00 PM EST (2016-09-22 19:00 UTC) | Compliance Automation with OpenSCAP | Red Hat Intel | Robin Price II |
Thursday, September 22, 2016 at 11:00 AM EDT (2016-09-22 15:00 UTC) | Monitoring the Most Interesting Network in the World: Insights from the Black Hat NOC | RSA | Scott Carter, Neil R. Wyler |
Wednesday, September 21, 2016 at 1:00 PM EDT (2016-09-21 17:00 UTC) | Hardening Microservices Security: Building a Layered Defense Strategy | CloudFlare | Matthew Silverlock, David Hoelzer |
Wednesday, September 21, 2016 at 11:00 AM EDT (2016-09-21 15:00 UTC) | Process Hunting with Microsoft AppLocker: Application Whitelisting is the Killer App | James Tarala | |
Tuesday, September 20, 2016 at 10:00 PM EDT (2016-09-21 02:00 UTC) | Welcome Threat Hunters, Phishermen, and Other Liars | Rob Lee | |
Tuesday, September 20, 2016 at 3:00 PM EDT (2016-09-20 19:00 UTC) | SOC Fundamentals for Your Threat Intelligence Program | RecordedFuture | Glenn Wong, Chris Crowley |
Tuesday, September 20, 2016 at 1:00 PM EDT (2016-09-20 17:00 UTC) | Threat Intelligence: What It Is, and How to Use It Effectively | NSFOCUS | Stephen Gates, Matt Bromiley |
Monday, September 19, 2016 at 11:00 AM EDT (2016-09-19 15:00 UTC) | Evasive malware is everywhere: Learn how it works and how to prevent it. | Minerva Labs | Omri Moyal, John Pescatore |
Thursday, September 15, 2016 at 9:00 PM EST (2016-09-16 01:00 UTC) | How to Target Critical Infrastructure: The Adversary Return on Investment from an Industrial Control System | Matthew Hosburgh | |
Thursday, September 15, 2016 at 1:00 PM EDT (2016-09-15 17:00 UTC) | Injecting a node.js app using NoSQL and Query Selector Injection | Aaron Cure | |
Tuesday, September 13, 2016 at 1:00 PM EDT (2016-09-13 17:00 UTC) | Breach Detected! Could It Have Been Prevented? | Palo Alto Networks | Barbara Filkins, Scott Simkin |
Thursday, September 08, 2016 at 8:00 PM EST (2016-09-09 00:00 UTC) | Real World Phishing & Exploitation | Phillip Bosco | |
Thursday, September 08, 2016 at 1:00 PM EDT (2016-09-08 17:00 UTC) | Hunting 101 - Back to Basics: Implementing a Proactive Cyber Hunting Approach | Cybereason | Brad Mecha, Dave Shackleford |
Thursday, September 08, 2016 at 11:00 AM EDT (2016-09-08 15:00 UTC) | Navigating SANS Pen Test Cheat Sheets for Fun and Profit | Ed Skoudis | |
Wednesday, September 07, 2016 at 12:00 PM EDT (2016-09-07 16:00 UTC) | CISO Hot Topic Lunch Session: Communicating Cybersecurity Effectively to CEOs and Boards of Directors | Endgame | John Pescatore, Alan Paller |
Wednesday, September 07, 2016 at 9:00 AM EDT (2016-09-07 13:00 UTC) | 2016 Threat Landscape Survey Report: Europe Edition | Check Point Software Technologies, Inc. | Polomi Batra, Lee Neely |
Tuesday, September 06, 2016 at 1:00 PM EDT (2016-09-06 17:00 UTC) | Incorporating ICS Cybersecurity Into Water Utility Master Planning | Jason Dely | |
Wednesday, August 31, 2016 at 1:00 PM EDT (2016-08-31 17:00 UTC) | Top Office 365 Mail Vulnerabilities: Attacks on your Users Right Now | Avanan | Kip James, Michael Landewe |
Tuesday, August 30, 2016 at 1:00 PM EDT (2016-08-30 17:00 UTC) | National Cyber Security Awareness Month Toolkit | Cathy Click, Lance Spitzner | |
Monday, August 29, 2016 at 1:00 PM EDT (2016-08-29 17:00 UTC) | CISO Success Strategies | Frank Kim | |
Thursday, August 25, 2016 at 8:00 PM EDT (2016-08-26 00:00 UTC) | Prioritizing Cybersecurity with the Critical Security Controls | Wes Whitteker | |
Thursday, August 25, 2016 at 1:00 PM EDT (2016-08-25 17:00 UTC) | Intelligent Network Security | ThreatSTOP | Tom Byrnes, Jake Williams |
Wednesday, August 24, 2016 at 1:00 PM EDT (2016-08-24 17:00 UTC) | Using an Attacker Technique-Based Approach for Prevention | Endgame | Mike Nichols, Dave Shackleford |
Tuesday, August 23, 2016 at 1:00 PM EDT (2016-08-23 17:00 UTC) | Cyber-Hygiene and Standards of Care: Practical Defenses for Healthcare | James Tarala | |
Tuesday, August 23, 2016 at 11:00 AM EDT (2016-08-23 15:00 UTC) | A Credit Union Detected LAN Turtle Attacks in Seconds with Network Access Control from Great Bay Software Beacon | Great Bay Software | Jeremy Taylor, John Pescatore |
Thursday, August 18, 2016 at 3:00 PM EDT (2016-08-18 19:00 UTC) | Practical Open Source Intelligence: Six Tips for Starting an Effective Investigation | Micah Hoffman | |
Thursday, August 18, 2016 at 1:00 PM EDT (2016-08-18 17:00 UTC) | In Detection, the Only Thing That Matters Is Results | LightCyber | Kasey Cross, David Thompson, Dave Shackleford |
Wednesday, August 17, 2016 at 1:00 PM EDT (2016-08-17 17:00 UTC) | The State of Cyber Threat Intelligence: Part 2: The Value of CTI | AlienVault Anomali Arbor Networks HP Enterprise Security NETSCOUT Systems, Inc. Rapid7 Inc. | Rebekah Brown, Dave Shackleford, Mark Doering, Aaron Shelmire |
Tuesday, August 16, 2016 at 10:00 PM EDT (2016-08-17 02:00 UTC) | Designing and Building a SOC: Management Fundamentals | Christopher Crowley | |
Tuesday, August 16, 2016 at 1:00 PM EDT (2016-08-16 17:00 UTC) | The State of Cyber Threat Intelligence: Part 1: How Cyber Threat Intelligence Is Consumed and Processed | AlienVault Anomali Arbor Networks HP Enterprise Security NETSCOUT Systems, Inc. Rapid7 Inc. | Dave Shackleford, Arabella Hallawell, Javvad Malik, Chip Witt |
Monday, August 15, 2016 at 11:00 AM EDT (2016-08-15 15:00 UTC) | Establishing Street Cred: Fundamental Security Concepts (Hint: It’s Not About Technology) | Ted Demopoulos | |
Friday, August 12, 2016 at 9:30 AM EDT (2016-08-12 13:30 UTC) | SANS Threat Intelligence Vendor Briefing | RecordedFuture NSFOCUS ThreatQuotient DomainTools | Robert M. Lee |
Thursday, August 11, 2016 at 1:00 PM EDT (2016-08-11 17:00 UTC) | 2016 Threat Landscape Survey Report | Check Point Software Technologies, Inc. | Polomi Batra, Lee Neely |
Wednesday, August 10, 2016 at 3:00 PM EDT (2016-08-10 19:00 UTC) | Running a Better Red Team Through Understanding ICS/SCADA Adversary Tactics | Robert M. Lee | |
Wednesday, August 10, 2016 at 1:00 PM EDT (2016-08-10 17:00 UTC) | Time is on your side: username harvesting via timing attacks | Eric Conrad | |
Tuesday, August 09, 2016 at 1:00 PM EDT (2016-08-09 17:00 UTC) | A Sneak Peek at Pokémon Go Forensic Artifacts | Cindy Murphy | |
Friday, August 05, 2016 at 1:00 PM EDT (2016-08-05 17:00 UTC) | Designing and Building a SOC: Management Fundamentals | Christopher Crowley | |
Tuesday, August 02, 2016 at 11:00 AM EDT (2016-08-02 15:00 UTC) | Demystifying Cyber Attacks on ICS: How They Work and How to Use Engineered and Cyber Layer of Protections | Bryan L. Singer, CISSP, CAP | |
Friday, July 29, 2016 at 1:00 PM EDT (2016-07-29 17:00 UTC) | Pokémon Go - What To Tell Employees | Jacob Wilson, Thomas McHahon, Jennifer Miller, Lance Spitzner | |
Thursday, July 28, 2016 at 1:00 PM EDT (2016-07-28 17:00 UTC) | Get Ready for NCSAM 2016 | Michael Kaiser, Lance Spitzner | |
Thursday, July 28, 2016 at 11:00 AM EDT (2016-07-28 15:00 UTC) | Illuminate Your Network with Security Analytics | Cisco Systems | Andrew Wild |
Tuesday, July 26, 2016 at 5:20 PM EDT (2016-07-26 21:20 UTC) | ICS-Houston Security Briefing | Palo Alto Networks Waterfall Security Ultra Electronics, 3eTI | Please Check Back |
Thursday, July 21, 2016 at 1:00 PM EDT (2016-07-21 17:00 UTC) | Health Care Provider Breaches and Risk Management Roadmaps: Part 2 - Health Care Security from the Top Down | Anomali Carbon Black Forescout Technologies BV Great Bay Software Trend Micro Inc. WhiteHat Security | Sandeep Kumar , Ed Cabrera, Barbara Filkins, Christopher Strand |
Wednesday, July 20, 2016 at 1:00 PM EDT (2016-07-20 17:00 UTC) | Health Care Provider Breaches and Risk Management Roadmaps: Part 1 - Health Care Security from the Bottom Up | Anomali Carbon Black Forescout Technologies BV Great Bay Software Trend Micro Inc. WhiteHat Security | Mike Goldgof, Barbara Filkins, Hugh Njemanze, Ty Powers |
Tuesday, July 19, 2016 at 3:00 PM EDT (2016-07-19 19:00 UTC) | Incident or Breach? | Hal Pomeranz, Benjamin Wright | |
Tuesday, July 19, 2016 at 11:00 AM EDT (2016-07-19 15:00 UTC) | Why Layered Security Strategies Do Not Work and What You Can Do About It | Palo Alto Networks | Navneet Singh |
Thursday, July 14, 2016 at 3:00 PM EDT (2016-07-14 19:00 UTC) | Ransomware & Malvertising: Dominating the Threat Landscape | Malwarebytes | Adam Kujawa, Dana Torgersen, John Pescatore |
Thursday, July 14, 2016 at 11:00 AM EDT (2016-07-14 15:00 UTC) | Case Study: See How Aruba Networks Uses Bug Bounties to Discover Vulnerabilities, Faster | Bugcrowd | Leif Dreizler, John Pescatore, Jon Green |
Wednesday, July 13, 2016 at 12:00 PM EDT (2016-07-13 16:00 UTC) | Decision Criteria and Analysis for Hardware-Based Encryption | THALES e-Security | Eric Cole, John Grimm |
Tuesday, July 12, 2016 at 1:00 PM EDT (2016-07-12 17:00 UTC) | Beyond Infiltration: Conquering all Stages of the Attack Lifecycle | Cybereason | Lotem Guy , John Pescatore |
Tuesday, July 05, 2016 at 1:00 PM EDT (2016-07-05 17:00 UTC) | Internet of Things (IoT) and Embedded Device Security Research - A Primer | Billy Rios | |
Thursday, June 30, 2016 at 3:00 PM EST (2016-06-30 19:00 UTC) | What You Need to Know: iOS 10 Security | Joshua Wright | |
Thursday, June 30, 2016 at 1:00 PM EST (2016-06-30 17:00 UTC) | Going Mobile: Are your apps putting you at risk? | Gregory Leonard | |
Wednesday, June 29, 2016 at 1:00 PM EDT (2016-06-29 17:00 UTC) | Where Are We Now?: The SANS 2016 ICS Survey | Anomali Arbor Networks Belden Carbon Black | Derek Harp, Bengt Gregory-Brown, Arabella Hallawell, David Meltzer, Christopher Strand, Jason Trost |
Wednesday, June 29, 2016 at 11:00 AM EST (2016-06-29 15:00 UTC) | Continuous Opportunity: DevOps & Security | Ben Allen | |
Wednesday, June 22, 2016 at 1:00 PM EDT (2016-06-22 17:00 UTC) | The End of IOCs: A Case Study on Resolving Persistent Attacks Using Tactics, Techniques, and Procedures (TTPs) | Cybereason | Israel Barak, Dave Shackleford |
Tuesday, June 21, 2016 at 1:00 PM EDT (2016-06-21 17:00 UTC) | Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey | PivotPoint Risk Analytics | Barbara Filkins, Benjamin Wright, Dave Bradford, Julian Waits |
Monday, June 20, 2016 at 11:00 AM EST (2016-06-20 15:00 UTC) | What we all need to learn from recent ICS incidents | Mike Assante, Tim Conway | |
Wednesday, June 15, 2016 at 3:00 PM EDT (2016-06-15 19:00 UTC) | Warning: Email may be Hazardous to your business | BAE Systems Applied Intelligence | John Devenyns |
Wednesday, June 15, 2016 at 1:00 PM EDT (2016-06-15 17:00 UTC) | MobileIron Mobile Security and Risk Review Research Results | MobileIron | David Schwartzberg |
Tuesday, June 14, 2016 at 1:00 PM EDT (2016-06-14 17:00 UTC) | The Case for PIM/PAM in Today's Infosec | CA, Inc. | Ken Ammon, Barbara Filkins |
Friday, June 10, 2016 at 11:00 AM EDT (2016-06-10 15:00 UTC) | How is User Risk Mitigation achieved? Achieving user risk mitigation-stopping the insider threat | Forcepoint LLC | Daniel Velez, Dr. Eric Cole |
Thursday, June 09, 2016 at 8:00 PM EDT (2016-06-10 00:00 UTC) | No Python Allowed: learning a whole new language to sell the Critical Security Controls | Paul Hershberger | |
Thursday, June 09, 2016 at 1:00 PM EDT (2016-06-09 17:00 UTC) | Incident Response Capabilities in 2016 - Part 2: Emerging Trends in Incident Response and Survey Results | AlienVault Arbor Networks HP Enterprise Security IBM Mcafee LLC LogRhythm NETSCOUT Systems, Inc. Veriato | Matt Bromiley, Jack Doyle, Rob Lee, Mark Painter, Arabella Hallawell, Ryan Sommers |
Wednesday, June 08, 2016 at 1:00 PM EDT (2016-06-08 17:00 UTC) | Incident Response Capabilities in 2016 - Part 1: The Current Threat Landscape and Survey Results | AlienVault Arbor Networks HP Enterprise Security IBM Mcafee LLC LogRhythm NETSCOUT Systems, Inc. Veriato | Matt Bromiley, Rob Lee, Don Shin, Tamar Shafler, Ismael Valenzuela, Ann Sun |
Tuesday, June 07, 2016 at 1:00 PM EDT (2016-06-07 17:00 UTC) | ICS Network Segmentation | Dan Morrow, Brett Young | |
Friday, June 03, 2016 at 1:00 PM EST (2016-06-03 17:00 UTC) | (Am)Cache rules everything around me | Eric Zimmerman | |
Thursday, June 02, 2016 at 1:00 PM EDT (2016-06-02 17:00 UTC) | A Blueprint to Secure SAP Applications Using CIS Controls As a Guide | Onapsis | Barbara Filkins, Alex Horan |
Tuesday, May 31, 2016 at 1:00 PM EDT (2016-05-31 17:00 UTC) | Sneak Peek for the 2016 Security Awareness Summit | Lance Spitzner | |
Thursday, May 26, 2016 at 3:00 PM EDT (2016-05-26 19:00 UTC) | Effective Monitoring and Defense in Financial Services | Palo Alto Networks | Lawrence Chin, David Hoelzer |
Thursday, May 26, 2016 at 1:00 PM EDT (2016-05-26 17:00 UTC) | What Works in Threat Prevention: Detecting and Stopping Attacks more Accurately and Quickly with Threatstop | ThreatSTOP | Kenneth Compres, John Pescatore |
Wednesday, May 25, 2016 at 1:00 PM EDT (2016-05-25 17:00 UTC) | Why So Many Endpoint Attacks Are Still Going Undetected - And What You Can Do About It | RSA | Mark Stacey, Chris Ahearn, John Pescatore |
Tuesday, May 24, 2016 at 1:00 PM EDT (2016-05-24 17:00 UTC) | A New Perspective on Patch Management | Flexera Software | Marcelo Pereira, John Pescatore |
Tuesday, May 24, 2016 at 11:00 AM EDT (2016-05-24 15:00 UTC) | iOS Location Forensics | Sarah Edwards | |
Friday, May 20, 2016 at 1:00 PM EDT (2016-05-20 17:00 UTC) | Next Level in Cyber Threat Intelligence Training: New FOR578 | Robert M. Lee | |
Thursday, May 19, 2016 at 1:00 PM EDT (2016-05-19 17:00 UTC) | How to Negotiate a Cyber Insurance Policy | Amy Elizabeth Stewart, Benjamin Wright | |
Thursday, May 19, 2016 at 11:00 AM EDT (2016-05-19 15:00 UTC) | systemd and You! | Hal Pomeranz | |
Wednesday, May 18, 2016 at 1:00 PM EDT (2016-05-18 17:00 UTC) | Scapy and Snort, Packet Peanut Butter and Jelly | Judy Novak, Mike Poor | |
Wednesday, May 18, 2016 at 11:00 AM EDT (2016-05-18 15:00 UTC) | Are you serious? Now I have to worry about BYoD and IoT threats? | Pwnie Express | Yolonda Smith, Paul Paget, John Pescatore |
Tuesday, May 17, 2016 at 7:00 PM EDT (2016-05-17 23:00 UTC) | 2016 Security Awareness Report (Special APAC Edition) | Lance Spitzner | |
Tuesday, May 17, 2016 at 3:00 PM EDT (2016-05-17 19:00 UTC) | Practical and Open Source Threat Intelligence | James Tarala | |
Tuesday, May 17, 2016 at 12:00 PM EDT (2016-05-17 16:00 UTC) | Windows Exploratory Surgery with Process Hacker | Jason Fossen | |
Monday, May 16, 2016 at 1:00 PM EDT (2016-05-16 17:00 UTC) | Shell items, More than Meets the Eye | David Cowen | |
Thursday, May 12, 2016 at 1:00 PM EDT (2016-05-12 17:00 UTC) | Why Train and Who to Train for Education and Government | Randy Marchany, Lance Spitzner | |
Wednesday, May 11, 2016 at 1:00 PM EDT (2016-05-11 17:00 UTC) | Using the Critical Security Controls to Prevent Ransomware in Healthcare | Palo Alto Networks | Matthew Mellen, James Tarala |
Wednesday, May 11, 2016 at 11:00 AM EDT (2016-05-11 15:00 UTC) | This phish goes to 11, w/ Guest: “SNOW” [DEF CON 22 Social Engineering CtF - Black Badge Winner] | Stephanie Carruthers | |
Tuesday, May 10, 2016 at 1:00 PM EDT (2016-05-10 17:00 UTC) | Connecting the Dots Between Your Threat Intelligence Tradecraft and Business Operations | SurfWatch Labs | Adam Meyer, John Pescatore |
Tuesday, May 03, 2016 at 1:00 PM EDT (2016-05-03 17:00 UTC) | Learn to Trust Your Insecure ICS Networks | David Mattes, Lisa Lorenzin | |
Thursday, April 28, 2016 at 1:00 PM EDT (2016-04-28 17:00 UTC) | Cracking the Code on SaaS Security & Compliance | SkyHigh Networks | Brandon Cook |
Thursday, April 28, 2016 at 11:00 AM EDT (2016-04-28 15:00 UTC) | Analyzing Analytics: Turning Big Data into Security Intelligence | Cisco Systems | Tim (TK) Keanani |
Wednesday, April 27, 2016 at 3:00 PM EDT (2016-04-27 19:00 UTC) | How to Produce a World-Class Threat Intelligence Capability From Scratch | RecordedFuture | Levi Gundert, John Pescatore |
Wednesday, April 27, 2016 at 1:00 PM EDT (2016-04-27 17:00 UTC) | Managing Applications Securely: A SANS Survey | Checkmarx Ltd. Veracode WhiteHat Security | Johannes Ullrich, Amit Ashbel, Tim Jarrett, Ryan O'Leary |
Wednesday, April 27, 2016 at 10:00 AM EDT (2016-04-27 14:00 UTC) | Stopping CEO Fraud | FBI, Special Agent Cyber Crimes Division, Lance Spitzner | |
Tuesday, April 26, 2016 at 1:00 PM EDT (2016-04-26 17:00 UTC) | 2016 Security Awareness Report Findings - How STH is Helping You | Dan deBeaubien, Danielle Ventre-Olson, Lisa Murray-Johnson, Lance Spitzner | |
Tuesday, April 26, 2016 at 11:00 AM EDT (2016-04-26 15:00 UTC) | Overcome Privilege Management Obstacles with CSC v. 6 | Appsense | Jon Wallace, John Pescatore |
Monday, April 25, 2016 at 3:00 PM EDT (2016-04-25 19:00 UTC) | Are network-centric practices undermining your SOC? | Brandie Anderson | |
Friday, April 22, 2016 at 1:00 PM EDT (2016-04-22 17:00 UTC) | DNS Evidence: You Don’t Know What You’re Missing | Philip Hagen | |
Wednesday, April 20, 2016 at 2:00 PM EDT (2016-04-20 18:00 UTC) | Securing the Internet of Old Things (IoOT) | Malwarebytes | Jean-Philippe Taggart, Dana Torgersen, G.W. Ray Davidson, PhD |
Tuesday, April 19, 2016 at 11:00 PM EDT (2016-04-20 03:00 UTC) | SANS Asia-Pacific Webcast Series- Basic Mobile Application Reverse Engineering and a Free Trip to Vegas | Tim Medin | |
Tuesday, April 19, 2016 at 3:00 PM EDT (2016-04-19 19:00 UTC) | Security Leadership: How to Increase the Success of Your Projects | Jeff Frisk | |
Friday, April 15, 2016 at 1:00 PM EDT (2016-04-15 17:00 UTC) | Open Season on Cyberthreats: Part 2- Threat Hunting Methodologies and Tools | Carbon Black DomainTools Endgame HPE Malwarebytes Sqrrl Data, Inc. | Ely Kahn, Eric Cole, Tim Helming, Mike Nichols |
Thursday, April 14, 2016 at 3:00 PM EDT (2016-04-14 19:00 UTC) | 2016 Awareness Report - Lessons Learned for Education and State / Local Government | Ashley Sudderth, Mark Evans, Lance Spitzner | |
Thursday, April 14, 2016 at 1:00 PM EDT (2016-04-14 17:00 UTC) | Open Season on Cyberthreats: Part I- Threat Hunting 101 | Carbon Black DomainTools Endgame HPE Malwarebytes Sqrrl Data, Inc. | Ryan Cason, Eric Cole, Mark Painter, Dana Torgersen |
Wednesday, April 13, 2016 at 1:00 PM EDT (2016-04-13 17:00 UTC) | BadLock: What you need to know | Veracode | Chris Wysopal, Johannes Ullrich, PhD |
Wednesday, April 13, 2016 at 11:00 AM EDT (2016-04-13 15:00 UTC) | HTTP/2 & Websockets Are Gonna Change the Pen Test World. Are You Ready? | Adrien de Beaupre, Justin Searle | |
Tuesday, April 12, 2016 at 1:15 PM EDT (2016-04-12 17:15 UTC) | LIVE from THIR Summit in New Orleans: The Most Dangerous Game; Evolving Threat Hunting to Keep Up with Skilled Adversaries | Carbon Black | Please Check Back |
Friday, April 08, 2016 at 1:00 PM EDT (2016-04-08 17:00 UTC) | To trust or not to trust: The relationship between you & your mobile forensics tool | Heather Mahalik | |
Thursday, April 07, 2016 at 1:00 PM EDT (2016-04-07 17:00 UTC) | Gamification of a Fortune 20 SOC | HPE | Josh Stevens, Marcel Hoffmann |
Thursday, March 31, 2016 at 1:00 PM EDT (2016-03-31 17:00 UTC) | Mapping Attack Infrastructure: Leave Your Foe With Nowhere to Hide | RiskIQ | Stephen Ginty, John Pescatore |
Tuesday, March 29, 2016 at 1:00 PM EDT (2016-03-29 17:00 UTC) | Evolving from cyber Gatherers to cyber Hunters - Darwin was wrong about APTs | Arbor Networks | Darren Anstee, John Pescatore |
Tuesday, March 29, 2016 at 11:00 AM EDT (2016-03-29 15:00 UTC) | 2016 Security Awareness Report Key Findings | Lance Hayden, Bob Rudis, Lance Spitzner | |
Thursday, March 24, 2016 at 3:00 PM EDT (2016-03-24 19:00 UTC) | Expect the Unexpected, Preparing for the Inevitable Cyber Breach | Lancope | Joseph Muniz |
Thursday, March 24, 2016 at 1:00 PM EDT (2016-03-24 17:00 UTC) | Mobile Data Loss - Threats & Countermeasures | MobileIron | Michael T. Raggo |
Thursday, March 24, 2016 at 11:00 AM EDT (2016-03-24 15:00 UTC) | Facilitating Fluffy Forensics 2.0 | Andrew Hay | |
Wednesday, March 23, 2016 at 1:00 PM EDT (2016-03-23 17:00 UTC) | What Works: Inspecting Encrypted Traffic with the Blue Coat SSL Visibility Appliance | Blue Coat Systems, Inc. | Michael Weinstein, John Pescatore |
Tuesday, March 22, 2016 at 1:00 PM EDT (2016-03-22 17:00 UTC) | Ensuring Compliance and Detecting Suspicious Activity with Promisec Endpoint Manager | Promisec | Noel Slane, Dave Shackleford |
Friday, March 18, 2016 at 1:00 PM EDT (2016-03-18 17:00 UTC) | SANS 2016 Endpoint Security Survey Part 2: Can We Say Next-Gen Yet? | Guidance Software Great Bay Software IBM Malwarebytes Sophos Inc. | Marty Ward, Anthony Di Bello, G.W. Ray Davidson, PhD |
Thursday, March 17, 2016 at 1:00 PM EDT (2016-03-17 17:00 UTC) | SANS 2016 Endpoint Security Survey Part 1: The Evolving Definition of Endpoints | Guidance Software Great Bay Software IBM Malwarebytes Sophos Inc. | G.W. Ray Davidson, PhD, Sara Lofgren, Dana Torgersen, Lee Wei |
Wednesday, March 16, 2016 at 1:00 PM EDT (2016-03-16 17:00 UTC) | Bring Your Own Collaboration – Technical Control Tradeoffs | Final Code | Dave Shackleford, Scott Gordon |
Tuesday, March 15, 2016 at 1:00 PM EDT (2016-03-15 17:00 UTC) | Benchmarking AppSec: A Metrics Pyramid | Veracode | Tim Jarrett, Jim Bird |
Monday, March 14, 2016 at 7:15 PM EDT (2016-03-14 23:15 UTC) | Analyzing the Ukrainian Power Grid Cyber-Attacks | Waterfall Security | Jake Williams |
Thursday, March 10, 2016 at 3:00 PM EST (2016-03-10 20:00 UTC) | 10 Quick Win, Industry Agnostic SIEM Dashboards | Craig Bowser | |
Thursday, March 10, 2016 at 1:00 PM EST (2016-03-10 18:00 UTC) | Is Active Breach Detection the Next-Generation Security Technology? | EastWind Networks | Paul Kraus, Dave Shackleford |
Wednesday, March 09, 2016 at 2:00 PM EST (2016-03-09 19:00 UTC) | Security Awareness: Understanding and Managing Your Top Seven Human Risks | Lance Spitzner | |
Tuesday, March 08, 2016 at 1:00 PM EST (2016-03-08 18:00 UTC) | A DevSecOps Playbook | CloudPassage | Amrit Williams, Dave Shackleford |
Monday, March 07, 2016 at 9:00 PM EST (2016-03-08 02:00 UTC) | Passive DNS Logs: The Pulse of the Network | Philip Hagen | |
Wednesday, March 02, 2016 at 1:00 PM EST (2016-03-02 18:00 UTC) | How To Become A SANS Instructor | Eric Conrad | |
Friday, February 26, 2016 at 1:00 PM EST (2016-02-26 18:00 UTC) | SIFT and REMnux: Wonder Twin Powers Activate! | Lenny Zeltser, Rob Lee | |
Friday, February 26, 2016 at 11:00 AM EST (2016-02-26 16:00 UTC) | Predicting Future Attacks and Breaches: Analytics in Action | SAS INSTITUTE INC | Christopher Smith, Dave Shackleford |
Thursday, February 25, 2016 at 9:00 PM EST (2016-02-26 02:00 UTC) | Security Leadership For Everyone: Personal Authority and Beyond | Ted Demopoulos | |
Thursday, February 25, 2016 at 3:00 PM EST (2016-02-25 20:00 UTC) | SANS VetSuccess Academy sponsored by Solutionary - open now! | Solutionary, Inc. | Maxwell Shuftan, Arlin Halstead |
Wednesday, February 24, 2016 at 1:00 PM EST (2016-02-24 18:00 UTC) | Hunting and Farming : Concepts and Strategies to Improve Your Cyber Defenses | Carbon Black | Ben Johnson |
Wednesday, February 24, 2016 at 6:00 AM EST (2016-02-24 11:00 UTC) | Making Risk Assessment Useful | David Hoelzer | |
Tuesday, February 23, 2016 at 1:00 PM EST (2016-02-23 18:00 UTC) | The Effectiveness of Microsoft's EMET | Stephen Sims | |
Tuesday, February 23, 2016 at 11:00 AM EDT (2016-02-23 16:00 UTC) | iPhone Forensics - Separating the Facts from Fiction. A Technical Autopsy of the Apple/FBI Debate | Cindy Murphy, Sarah Edwards, Heather Mahalik | |
Friday, February 19, 2016 at 3:00 PM EDT (2016-02-19 20:00 UTC) | GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerability | Veracode | Johannes Ullrich, PhD, Chris Eng |
Friday, February 19, 2016 at 10:00 AM EDT (2016-02-19 15:00 UTC) | GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerability | Veracode | Johannes Ullrich, PhD, Chris Eng |
Thursday, February 18, 2016 at 1:00 PM EST (2016-02-18 18:00 UTC) | Dizzy New World of Cyber Investigations: Law, Ethics and Evidence | Benjamin Wright | |
Thursday, February 18, 2016 at 12:00 AM EST (2016-02-18 05:00 UTC) | How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats... | Bryce Galbraith | |
Wednesday, February 17, 2016 at 11:00 AM EDT (2016-02-17 16:00 UTC) | Case Study: How the City of Lewiston Improved Threat Detection with AlienVault USM | AlienVault | Dave Shackleford |
Friday, February 12, 2016 at 3:00 PM EST (2016-02-12 20:00 UTC) | Implementing a Successful Continuous Monitoring program with Open Source / Free Tools | Ismael Valenzuela | |
Thursday, February 11, 2016 at 1:00 PM EST (2016-02-11 18:00 UTC) | Getting Started with Web Application Security | Veracode | Joseph Feiman, Gregory Leonard |
Tuesday, February 09, 2016 at 6:00 PM EST (2016-02-09 23:00 UTC) | CISO Hot Topic: Communicating to and Influencing CEOs and Boards of Directors: What Works and What to Avoid | Palo Alto Networks | John Pescatore, Alan Paller |
Tuesday, February 09, 2016 at 1:00 PM EST (2016-02-09 18:00 UTC) | Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Devices | Skycure | Mic McCully, Lee Neely |
Monday, February 08, 2016 at 1:00 PM EST (2016-02-08 18:00 UTC) | Risky Business: Evaluating the True Risk to your Security Program | WhiteHat Security | Jenna McAuley, Mike Goldgof, Demetrios Lazarikos (Laz) , Johannes Ullrich, PhD |
Friday, February 05, 2016 at 3:00 PM EST (2016-02-05 20:00 UTC) | Scaling Big Data Analytics: SANS Review of LogRhythm 7 Analytics and Intelligence Upgrades | LogRhythm | Dave Shackleford, Erick Ingleby |
Thursday, February 04, 2016 at 1:00 PM EST (2016-02-04 18:00 UTC) | Security Leadership: Strategies for Success | Frank Kim | |
Wednesday, February 03, 2016 at 1:00 PM EST (2016-02-03 18:00 UTC) | SANS 2016 IT Security Spending Strategies Survey | Arbor Networks Gigamon | Simon Gibson, G. Mark Hardy, Barbara Filkins, Gary Sockrider |
Tuesday, February 02, 2016 at 1:00 PM EST (2016-02-02 18:00 UTC) | Threat Hunting | Sqrrl Data, Inc. | Luis Maldonado, Robert M. Lee, Rob Lee |
Thursday, January 28, 2016 at 1:00 PM EST (2016-01-28 18:00 UTC) | Why You Need Application Security | Veracode | Joseph Feiman, Johannes Ullrich |
Wednesday, January 27, 2016 at 1:00 PM EST (2016-01-27 18:00 UTC) | The Frankenstein Framework - Assembling the Pieces to Enhance ICS Security Without Creating a Monster | Justin Opatny | |
Monday, January 25, 2016 at 7:59 PM EST (2016-01-26 00:59 UTC) | Stop Threats in their Tracks- An Introduction to Advanced Malware Protection | Please Check Back | |
Thursday, January 21, 2016 at 11:00 AM EST (2016-01-21 16:00 UTC) | An Analysis of the Sandworm Team in Ukraine | Robert M. Lee | |
Wednesday, January 20, 2016 at 8:00 PM EST (2016-01-21 01:00 UTC) | Security Program Development, Maturity Models and Security Dashboards that help you manage risk | Dean Sapp | |
Tuesday, January 19, 2016 at 3:00 PM EST (2016-01-19 20:00 UTC) | Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing | Alex Pinto | |
Tuesday, January 19, 2016 at 1:00 PM EST (2016-01-19 18:00 UTC) | How to Leverage The Critical Controls in 2016 | Randy Marchany | |
Monday, January 18, 2016 at 1:00 PM EST (2016-01-18 18:00 UTC) | Threat Intelligence Awakens | Rick Holland | |
Thursday, January 14, 2016 at 3:00 PM EST (2016-01-14 20:00 UTC) | WhatWorks in AppSec: ASP.NET Web API Security | Please Check Back | |
Wednesday, January 13, 2016 at 1:00 PM EST (2016-01-13 18:00 UTC) | From the Front Lines: Practical Application of DNS Threat Intel Data | DomainTools | Tim Helming, Robert M. Lee |
Tuesday, January 12, 2016 at 3:00 PM EST (2016-01-12 20:00 UTC) | Intelligent Intelligence: Secrets to Threat Intel Success | David Bianco | |
Tuesday, January 12, 2016 at 1:00 PM EST (2016-01-12 18:00 UTC) | Know Before You Go: Key AWS Security Considerations | Palo Alto Networks | Matt Keil, Dave Shackleford |
Tuesday, January 12, 2016 at 9:00 AM EST (2016-01-12 14:00 UTC) | Smartphone Forensics Moves Fast. Stay Current or You May Miss Relevant Evidence! | Heather Mahalik | |
Monday, January 11, 2016 at 10:00 AM EST (2016-01-11 15:00 UTC) | What's New for Security in Windows 10 and Server 2016? | Jason Fossen | |
Wednesday, January 06, 2016 at 12:00 PM EST (2016-01-06 17:00 UTC) | Are You Ready for Threat Intelligence? Behind the Scenes with FOR578 | Mike Cloppert, Robert M. Lee | |
Tuesday, January 05, 2016 at 12:00 PM EST (2016-01-05 17:00 UTC) | Deconstructing the Reports of Iranian Activity Against the Power Grid and New York Dam | Mike Assante, Robert M. Lee |
Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.