Cyber Skills Training at SANS Rocky Mountain Fall 2017. Save $400 thru Aug. 2.

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Dec 20, 20162016 Security Awareness Year in Review - Looking Ahead to 2017Lance Spitzner
Dec 19, 2016SEC555 - The Industry's First Neutral SIEM Training CourseJustin Henderson
Dec 15, 2016The Data Disconnect: Why All Security Ratings are Not Created EqualBitsightDave Shackleford, Stephen Boyer
Dec 14, 2016Winning the Culture War: Infusing Security into the Software Development CultureWhiteHat SecuritySetu Kulkarni, Mark Geeslin
Dec 14, 2016Defending Against Fileless MalwareCybereasonAmit Serper, Matt Bromiley
Dec 14, 2016Cyber Threat Intelligence: Hurricanes and EarthquakesThreatQuotientJonathan Couch
Dec 13, 2016Secrets to a Successful Phishing ProgramLance Spitzner
Dec 13, 20162016 Cybersecurity Trends Year in Review: Avoiding the Threats and Mistakes of 2016 to Have a More Secure 2017Veracode

LightCyber
John Pescatore
Dec 9, 2016A Case Study: Developing an Innovative ICS Security Program and Real-Time OT Monitoring Capability for Oil and Gas InfrastructuresClarotyGreg Villano, Matt Morris, Patrick McBride
Dec 9, 2016Hummingbad: Tools & Techniques To Use When Inspecting Android ApplicationsChris Crowley, Cindy Murphy
Dec 8, 2016Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM and Analytics PlatformLogRhythmDave Shackleford, Seth Goldhammer
Dec 8, 2016Part 2 | SANS Security Analytics Survey Results: What's Working? What's Not?AlienVault

Anomali

LogRhythm

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.
Dave Shackleford, Kinshuk Pahare, Mike Reagan
Dec 8, 2016Let's plan an APTJavelin NetworksRoi Abutbul
Dec 7, 2016You Can't Stop What You Cant SOCArctic Wolf NetworksJohn Pescatore, Sridhar Karnam
Dec 7, 2016Security Analytics in Action: SANS Fourth Annual Security Analytics Survey - Part 1 AlienVault

Anomali

LogRhythm

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.
Travis Farral, Dave Shackleford, Matt Hathaway, Javvad Malik
Dec 6, 2016Throwback: How Social Media has Ushered a Re-emergence of Traditional Espionage Tradecraft (and how defenders can exploit it)Michael Cloppert
Dec 6, 2016Fight Advanced Persistent Threats in ICS with Applied TrickeryBryce Galbraith
Dec 5, 2016Opening a can of Active Defense and Cyber Deception to confuse and frustrate attackersChris Pizor, Ed Skoudis, John Strand
Dec 2, 2016Redefining Endpoint Incident Response with Behavioral AnalysisCounterTackMichael Angelo Vien, John Pescatore
Dec 2, 2016Closing the Cyber Skills Gap: The Security Team Force MultiplierRSADeron Grzetich, Louis Yeck, Amy Blackshaw
Dec 1, 2016The Art of Blocking Never-Before-Seen RansomwareCybereasonUri Sternfeld, Jake Williams
Nov 29, 2016Top Methods Pen Testers Use to Socially Engineer Their Way InLance Spitzner, Dave Shackleford
Nov 21, 2016Infosec Rock Star: Geek Will Only Get You So FarTed Demopoulos
Nov 21, 2016FOR508 - Advanced Incident Response and Threat Hunting Course Updates: Hunting GuideRob Lee
Nov 21, 2016A Peek Inside IoT Malware and HackingJames Lyne
Nov 18, 2016SANS Federal Government Cyber Security Briefing: How to Avoid Being the Next Agency to Announce a Major BreachIBM

Cylance
Nov 16, 2016The Art of Risk Mitigation Through Holistic Security AnalyticsOracleRuss Lowenthal
Nov 16, 2016Physical Security - Everything That's Wrong With Your Typical DoorDeviant Ollam
Nov 15, 2016DevSecOps and the Cloud Security GapCloudPassageSami Laine, Dave Shackleford
Nov 15, 2016Vulnerabilities, Controls and Continuous Monitoring: The SANS 2016 Continuous Monitoring SurveyForeScout Technologies

IBM

Qualys

RiskIQ
Barbara Filkins, Scott Gordon, Dan Lamorena, Patrick Vowles, Martin Walker
Nov 11, 2016Implementing the 5th Critical Security Control: Controlled Use of Administrative PrivilegePaul Ackerman
Nov 10, 2016Endpoint Detection and Response - The Final Frontier: Why EDR is essential to your security operationsCybereasonDan Chapman, Justin Lachesky
Nov 9, 2016Taking Action: Effective Measures of DefenseForcepoint LLCRichard Ford, Eric Cole
Nov 9, 20168 Ways To Watch The Invisible: Analyzing Encrypted Network TrafficJohannes Ullrich
Nov 9, 2016FOR572 Course Update from the Future - Where Were Going, We Dont Need RoadsPhilip Hagen
Nov 7, 2016Seeing Over the Horizon: Predictive and Preventive Security Based on the Kill-Chain ModelDomainToolsTim Helming, Mike Cloppert
Nov 3, 2016Ready to Replace AV? Criteria to Evaluate NGAV SolutionsCarbon BlackNeil Boland, Greg Notch, Barbara Filkins, J. Michael Butler
Nov 2, 2016The Fusion of IT and OT Security: What You Need to KnowGERebecca Lawson, Derek Harp, Bengt Gregory-Brown
Nov 2, 2016Practical ICS Cyber Security for the Process IndustryJim Gilsinn, James McGlone
Oct 27, 2016The Human Factor in the Age of Cyber ConflictArbor NetworksSean Brady, Lance Spitzner
Oct 26, 2016Prioritizing and Planning to Ensure a High-Impact SOC RolloutLeidosBrent Hambly, John Pescatore
Oct 26, 2016The Most Common Human Incidents - A Forensicator's TaleLance Spitzner, Matt Bromiley
Oct 25, 2016Packet Capture + Flow Analytics = Holistic Network VisibilityCisco SystemsBrian Ford
Oct 24, 2016Prioritizing the CIS Critical Controls for ICS: Learning from recent incidentsLeidosWalt Sikora, Mike Assante, Tim Conway
Oct 21, 2016Intro to SDR Projects: Have Fun Before You Get SeriousLarry Pesce
Oct 21, 2016How Security Analysts Master Incident Response with Behavioral AnalyticsExabeamOrion Cassetto, Andy Skrei
Oct 21, 2016The State of Vulnerability Discovery - How Bug Bounties Are Actually Making a DifferenceBugcrowdDavid Baker, Casey Ellis, John Pescatore
Oct 20, 2016From the Trenches, the SANS 2016 Survey on Security and Risk in the Financial Sector: Part 2 Securing Financial EnvironmentsArbor Networks

ForeScout Technologies

Guidance Software

NSFOCUS

WhiteHat Security
Sandeep Kumar , Anthony Di Bello, G. Mark Hardy, Anil Nandigam
Oct 19, 2016From the Trenches, the SANS 2016 Survey on Security and Risk in the Financial Sector: Part 1 Incidents, Risks and PreparednessArbor Networks

ForeScout Technologies

Guidance Software

NSFOCUS

WhiteHat Security
G. Mark Hardy, Mike Goldgof, Arabella Hallawell
Oct 18, 2016What's New for Security in Windows Server 2016?Jason Fossen
Oct 18, 2016They Can Run, But They Can't Hide: Real-Time Threat Hunting Using Passive DNSFarSight SecurityDr. Paul Vixie, Dave Shackleford
Oct 17, 2016Designing and Building a SOC: In-house vs. Out-SourcingChris Crowley
Oct 14, 2016SANS Financial Services Security Vendor BriefingRecordedFuture

McAfee

Malwarebytes

NSFOCUS

DomainTools

CYBERBIT Commercial Solutions
Oct 13, 2016The Internet of Evil Things: How to Detect and Secure Your Vulnerable Devices from the Mirai BotnetJohannes Ullrich
Oct 12, 2016Security and Accountability in the Cloud, the SANS 2016 Cloud Security Survey: Part 2 - Changes in Cloud SecurityBitglass

CloudPassage

IBM

Rapid7 Inc.

McAfee
Steve Grossenbacher, Dave Shackleford, Salim Hafid, Matt Hathaway
Oct 12, 2016Continuous Opportunity: DevOps & SecurityBen Allen
Oct 11, 2016Security and Accountability in the Cloud, the SANS 2016 Cloud Security Survey: Part 1 - Breach Landscape and the Top Threats and ChallengesBitglass

CloudPassage

IBM

Rapid7 Inc.

McAfee
Mark Campbell, Dave Shackleford, Sami Laine
Oct 11, 2016EHR Vulnerability Reporting A Cause for Concern?Greg Porter
Oct 11, 2016Lets Talk Cyber SecurityMy-Ngoc Nguyen, Dr. Eric Cole
Oct 6, 2016Taking Action Against Insider ThreatsDtex SystemsJosh Ablett, Eric Cole
Oct 5, 20162016 Office 365 Security & Risk Benchmarks ReportSkyHigh NetworksBrandon Cook, John Pescatore
Oct 4, 2016Bring 5 of the top CIS Critical Security Controls to Life!TaniumKen Robinson, Jennifer Ellard
Sep 28, 2016MobileIron Security Labs: Combatting Rising Mobile ThreatsMobileIronJames Plouffe
Sep 27, 2016Sneak Peek for the European Security Awareness SummitChris Boyd, Masha Sedova, Lance Spitzner
Sep 26, 2016Going Mobile: Are Your Apps Putting You at Risk?Eric Johnson
Sep 22, 2016Compliance Automation with OpenSCAPRed Hat

Intel
Robin Price II
Sep 22, 2016Monitoring the Most Interesting Network in the World: Insights from the Black Hat NOCRSAScott Carter, Neil R. Wyler
Sep 21, 2016Hardening Microservices Security: Building a Layered Defense StrategyCloudFlareMatthew Silverlock, David Hoelzer
Sep 21, 2016Process Hunting with Microsoft AppLocker: Application Whitelisting is the Killer AppJames Tarala
Sep 21, 2016Welcome Threat Hunters, Phishermen, and Other LiarsRob Lee
Sep 20, 2016SOC Fundamentals for Your Threat Intelligence ProgramRecordedFutureGlenn Wong, Chris Crowley
Sep 20, 2016Threat Intelligence: What It Is, and How to Use It EffectivelyNSFOCUSStephen Gates, Matt Bromiley
Sep 19, 2016Evasive malware is everywhere: Learn how it works and how to prevent it.Minerva LabsOmri Moyal, John Pescatore
Sep 16, 2016How to Target Critical Infrastructure: The Adversary Return on Investment from an Industrial Control SystemMatthew Hosburgh
Sep 15, 2016Injecting a node.js app using NoSQL and Query Selector InjectionAaron Cure
Sep 13, 2016Breach Detected! Could It Have Been Prevented?Palo Alto NetworksBarbara Filkins, Scott Simkin
Sep 9, 2016Real World Phishing & ExploitationPhillip Bosco
Sep 8, 2016Hunting 101 - Back to Basics: Implementing a Proactive Cyber Hunting Approach CybereasonBrad Mecha, Dave Shackleford
Sep 8, 2016Navigating SANS Pen Test Cheat Sheets for Fun and ProfitEd Skoudis
Sep 7, 2016CISO Hot Topic Lunch Session: Communicating Cybersecurity Effectively to CEOs and Boards of DirectorsEndgameJohn Pescatore, Alan Paller
Sep 7, 20162016 Threat Landscape Survey Report: Europe EditionCheck Point Software Technologies, Inc.Polomi Batra, Lee Neely
Sep 6, 2016Incorporating ICS Cybersecurity Into Water Utility Master PlanningJason Dely
Aug 31, 2016Top Office 365 Mail Vulnerabilities: Attacks on your Users Right NowAvananKip James, Michael Landewe
Aug 30, 2016National Cyber Security Awareness Month ToolkitCathy Click, Lance Spitzner
Aug 29, 2016CISO Success StrategiesFrank Kim
Aug 26, 2016Prioritizing Cybersecurity with the Critical Security ControlsWes Whitteker
Aug 25, 2016Intelligent Network SecurityThreatSTOPTom Byrnes, Jake Williams
Aug 24, 2016Using an Attacker Technique-Based Approach for PreventionEndgameMike Nichols, Dave Shackleford
Aug 23, 2016Cyber-Hygiene and Standards of Care: Practical Defenses for HealthcareJames Tarala
Aug 23, 2016A Credit Union Detected LAN Turtle Attacks in Seconds with Network Access Control from Great Bay Software BeaconGreat Bay SoftwareJeremy Taylor, John Pescatore
Aug 18, 2016Practical Open Source Intelligence: Six Tips for Starting an Effective InvestigationMicah Hoffman
Aug 18, 2016In Detection, the Only Thing That Matters Is ResultsLightCyberKasey Cross, David Thompson, Dave Shackleford
Aug 17, 2016The State of Cyber Threat Intelligence: Part 2: The Value of CTIAlienVault

Anomali

Arbor Networks

HP Enterprise Security

NETSCOUT Systems, Inc.

Rapid7 Inc.
Rebekah Brown, Dave Shackleford, Mark Doering, Aaron Shelmire
Aug 17, 2016Designing and Building a SOC: Management FundamentalsChristopher Crowley
Aug 16, 2016The State of Cyber Threat Intelligence: Part 1: How Cyber Threat Intelligence Is Consumed and ProcessedAlienVault

Anomali

Arbor Networks

HP Enterprise Security

NETSCOUT Systems, Inc.

Rapid7 Inc.
Dave Shackleford, Arabella Hallawell, Javvad Malik, Chip Witt
Aug 15, 2016Establishing Street Cred: Fundamental Security Concepts (Hint: Its Not About Technology)Ted Demopoulos
Aug 12, 2016SANS Threat Intelligence Vendor BriefingRecordedFuture

NSFOCUS

ThreatQuotient

DomainTools
Robert M. Lee
Aug 11, 20162016 Threat Landscape Survey ReportCheck Point Software Technologies, Inc.Polomi Batra, Lee Neely
Aug 10, 2016Running a Better Red Team Through Understanding ICS/SCADA Adversary TacticsRobert M. Lee
Aug 10, 2016Time is on your side: username harvesting via timing attacksEric Conrad
Aug 9, 2016 A Sneak Peek at Pokémon Go Forensic ArtifactsCindy Murphy
Aug 5, 2016Designing and Building a SOC: Management FundamentalsChristopher Crowley
Aug 2, 2016Demystifying Cyber Attacks on ICS: How They Work and How to Use Engineered and Cyber Layer of ProtectionsBryan L. Singer, CISSP, CAP
Jul 29, 2016Pokémon Go - What To Tell EmployeesJacob Wilson, Thomas McHahon, Jennifer Miller, Lance Spitzner
Jul 28, 2016Get Ready for NCSAM 2016Michael Kaiser, Lance Spitzner
Jul 28, 2016Illuminate Your Network with Security AnalyticsCisco SystemsAndrew Wild
Jul 26, 2016ICS-Houston Security BriefingPalo Alto Networks

Waterfall Security

Ultra Electronics, 3eTI
Jul 21, 2016Health Care Provider Breaches and Risk Management Roadmaps: Part 2 - Health Care Security from the Top DownAnomali

Carbon Black

ForeScout Technologies

Great Bay Software

Trend Micro Inc.

WhiteHat Security
Sandeep Kumar , Ed Cabrera, Barbara Filkins, Christopher Strand
Jul 20, 2016Health Care Provider Breaches and Risk Management Roadmaps: Part 1 - Health Care Security from the Bottom UpAnomali

Carbon Black

ForeScout Technologies

Great Bay Software

Trend Micro Inc.

WhiteHat Security
Mike Goldgof, Barbara Filkins, Hugh Njemanze, Ty Powers
Jul 19, 2016Incident or Breach?Hal Pomeranz, Benjamin Wright
Jul 19, 2016Why Layered Security Strategies Do Not Work and What You Can Do About ItPalo Alto NetworksNavneet Singh
Jul 14, 2016Ransomware & Malvertising: Dominating the Threat LandscapeMalwarebytesAdam Kujawa, Dana Torgersen, John Pescatore
Jul 14, 2016Case Study: See How Aruba Networks Uses Bug Bounties to Discover Vulnerabilities, FasterBugcrowdLeif Dreizler, John Pescatore, Jon Green
Jul 13, 2016Decision Criteria and Analysis for Hardware-Based EncryptionTHALES e-SecurityEric Cole, John Grimm
Jul 12, 2016Beyond Infiltration: Conquering all Stages of the Attack LifecycleCybereasonLotem Guy , John Pescatore
Jul 7, 2016Taking Control of Your Application SecurityEric Johnson
Jul 5, 2016 Internet of Things (IoT) and Embedded Device Security Research - A PrimerBilly Rios
Jun 30, 2016What You Need to Know: iOS 10 SecurityJoshua Wright
Jun 30, 2016Going Mobile: Are your apps putting you at risk?Gregory Leonard
Jun 29, 2016Where Are We Now?: The SANS 2016 ICS SurveyAnomali

Arbor Networks

Belden

Carbon Black
Derek Harp, Bengt Gregory-Brown, Arabella Hallawell, David Meltzer, Christopher Strand, Jason Trost
Jun 29, 2016Continuous Opportunity: DevOps & SecurityBen Allen
Jun 22, 2016The End of IOCs: A Case Study on Resolving Persistent Attacks Using Tactics, Techniques, and Procedures (TTPs)CybereasonIsrael Barak, Dave Shackleford
Jun 21, 2016Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance SurveyPivotPoint Risk AnalyticsBarbara Filkins, Benjamin Wright, Dave Bradford, Julian Waits
Jun 20, 2016 Malware Analysis and Adversary Infrastructure Mapping: A One-Two PunchDomainToolsTim Helming, Alissa Torres
Jun 20, 2016What we all need to learn from recent ICS incidentsMike Assante, Tim Conway
Jun 15, 2016Warning: Email may be Hazardous to your businessBAE Systems Applied IntelligenceJohn Devenyns
Jun 15, 2016MobileIron Mobile Security and Risk Review Research ResultsMobileIronDavid Schwartzberg
Jun 14, 2016The Case for PIM/PAM in Today's InfosecCA, Inc.Ken Ammon, Barbara Filkins
Jun 10, 2016How is User Risk Mitigation achieved? Achieving user risk mitigation-stopping the insider threatForcepoint LLCDaniel Velez, Dr. Eric Cole
Jun 10, 2016No Python Allowed: learning a whole new language to sell the Critical Security ControlsPaul Hershberger
Jun 9, 2016 Incident Response Capabilities in 2016 - Part 2: Emerging Trends in Incident Response and Survey ResultsAlienVault

Arbor Networks

HP Enterprise Security

IBM

McAfee

LogRhythm

NETSCOUT Systems, Inc.

Veriato
Matt Bromiley, Jack Doyle, Rob Lee, Mark Painter, Arabella Hallawell, Ryan Sommers
Jun 8, 2016Incident Response Capabilities in 2016 - Part 1: The Current Threat Landscape and Survey ResultsAlienVault

Arbor Networks

HP Enterprise Security

IBM

McAfee

LogRhythm

NETSCOUT Systems, Inc.

Veriato
Matt Bromiley, Rob Lee, Don Shin, Tamar Shafler, Ismael Valenzuela, Ann Sun
Jun 7, 2016ICS Network SegmentationDan Morrow, Brett Young
Jun 3, 2016(Am)Cache rules everything around meEric Zimmerman
Jun 2, 2016The Remediation Ballet: Performing the Delicate Dance of CleanupMatt Linton
Jun 2, 2016A Blueprint to Secure SAP Applications Using CIS Controls As a GuideOnapsisBarbara Filkins, Alex Horan
May 31, 2016Sneak Peek for the 2016 Security Awareness SummitLance Spitzner
May 26, 2016 Effective Monitoring and Defense in Financial ServicesPalo Alto NetworksLawrence Chin, David Hoelzer
May 26, 2016What Works in Threat Prevention: Detecting and Stopping Attacks more Accurately and Quickly with ThreatstopThreatSTOPKenneth Compres, John Pescatore
May 25, 2016Why So Many Endpoint Attacks Are Still Going Undetected - And What You Can Do About ItRSAMark Stacey, Chris Ahearn, John Pescatore
May 24, 2016A New Perspective on Patch ManagementFlexera SoftwareMarcelo Pereira, John Pescatore
May 24, 2016 iOS Location ForensicsSarah Edwards
May 20, 2016Next Level in Cyber Threat Intelligence Training: New FOR578Robert M. Lee
May 19, 2016How to Negotiate a Cyber Insurance Policy Amy Elizabeth Stewart, Benjamin Wright
May 19, 2016systemd and You!Hal Pomeranz
May 18, 2016Scapy and Snort, Packet Peanut Butter and JellyJudy Novak, Mike Poor
May 18, 2016Are you serious? Now I have to worry about BYoD and IoT threats?Pwnie ExpressYolonda Smith, Paul Paget, John Pescatore
May 17, 20162016 Security Awareness Report (Special APAC Edition)Lance Spitzner
May 17, 2016Practical and Open Source Threat IntelligenceJames Tarala
May 17, 2016Windows Exploratory Surgery with Process HackerJason Fossen
May 16, 2016Shell items, More than Meets the EyeDavid Cowen
May 13, 2016Know Normal, Find Evil: Windows 10 Memory Forensics OverviewAlissa Torres
May 12, 2016Why Train and Who to Train for Education and GovernmentRandy Marchany, Lance Spitzner
May 11, 2016Using the Critical Security Controls to Prevent Ransomware in HealthcarePalo Alto NetworksMatthew Mellen, James Tarala
May 11, 2016This phish goes to 11, w/ Guest: SNOW [DEF CON 22 Social Engineering CtF - Black Badge Winner]Stephanie Carruthers
May 10, 2016Connecting the Dots Between Your Threat Intelligence Tradecraft and Business OperationsSurfWatch LabsAdam Meyer, John Pescatore
May 3, 2016Learn to Trust Your Insecure ICS NetworksDavid Mattes, Lisa Lorenzin
Apr 28, 2016 Cracking the Code on SaaS Security & ComplianceSkyHigh NetworksBrandon Cook
Apr 28, 2016Analyzing Analytics: Turning Big Data into Security IntelligenceCisco SystemsTim (TK) Keanani
Apr 27, 2016How to Produce a World-Class Threat Intelligence Capability From ScratchRecordedFutureLevi Gundert, John Pescatore
Apr 27, 2016Managing Applications Securely: A SANS SurveyCheckmarx Inc.

Veracode

WhiteHat Security
Johannes Ullrich, Amit Ashbel, Tim Jarrett, Ryan O'Leary
Apr 27, 2016Stopping CEO FraudFBI, Special Agent Cyber Crimes Division, Lance Spitzner
Apr 26, 20162016 Security Awareness Report Findings - How STH is Helping YouDan deBeaubien, Danielle Ventre-Olson, Lisa Murray-Johnson, Lance Spitzner
Apr 26, 2016Overcome Privilege Management Obstacles with CSC v. 6AppsenseJon Wallace, John Pescatore
Apr 25, 2016Are network-centric practices undermining your SOC?Brandie Anderson
Apr 22, 2016DNS Evidence: You Dont Know What Youre MissingPhilip Hagen
Apr 20, 2016Securing the Internet of Old Things (IoOT)MalwarebytesJean-Philippe Taggart, Dana Torgersen, G.W. Ray Davidson, PhD
Apr 20, 2016SANS Asia-Pacific Webcast Series- Basic Mobile Application Reverse Engineering and a Free Trip to VegasTim Medin
Apr 19, 2016Security Leadership: How to Increase the Success of Your ProjectsJeff Frisk
Apr 15, 2016Open Season on Cyberthreats: Part 2- Threat Hunting Methodologies and ToolsCarbon Black

DomainTools

Endgame

HPE

Malwarebytes

Sqrrl Data, Inc.
Ely Kahn, Eric Cole, Tim Helming, Mike Nichols
Apr 14, 20162016 Awareness Report - Lessons Learned for Education and State / Local GovernmentAshley Sudderth, Mark Evans, Lance Spitzner
Apr 14, 2016Open Season on Cyberthreats: Part I- Threat Hunting 101Carbon Black

DomainTools

Endgame

HPE

Malwarebytes

Sqrrl Data, Inc.
Ryan Cason, Eric Cole, Mark Painter, Dana Torgersen
Apr 13, 2016BadLock: What you need to knowVeracodeChris Wysopal, Johannes Ullrich, PhD
Apr 13, 2016HTTP/2 & Websockets Are Gonna Change the Pen Test World. Are You Ready?Adrien de Beaupre, Justin Searle
Apr 12, 2016LIVE from THIR Summit in New Orleans: The Most Dangerous Game; Evolving Threat Hunting to Keep Up with Skilled AdversariesCarbon Black
Apr 8, 2016To trust or not to trust: The relationship between you & your mobile forensics toolHeather Mahalik
Apr 7, 2016Gamification of a Fortune 20 SOCHPEJosh Stevens, Marcel Hoffmann
Mar 31, 2016Mapping Attack Infrastructure: Leave Your Foe With Nowhere to HideRiskIQStephen Ginty, John Pescatore
Mar 29, 2016Evolving from cyber Gatherers to cyber Hunters - Darwin was wrong about APTsArbor NetworksDarren Anstee, John Pescatore
Mar 29, 20162016 Security Awareness Report Key FindingsLance Hayden, Bob Rudis, Lance Spitzner
Mar 24, 2016Expect the Unexpected, Preparing for the Inevitable Cyber BreachLancopeJoseph Muniz
Mar 24, 2016Mobile Data Loss - Threats & Countermeasures MobileIronMichael T. Raggo
Mar 24, 2016Facilitating Fluffy Forensics 2.0Andrew Hay
Mar 23, 2016 What Works: Inspecting Encrypted Traffic with the Blue Coat SSL Visibility ApplianceBlue Coat Systems, Inc.Michael Weinstein, John Pescatore
Mar 22, 2016Ensuring Compliance and Detecting Suspicious Activity with Promisec Endpoint ManagerPromisecNoel Slane, Dave Shackleford
Mar 18, 2016SANS 2016 Endpoint Security Survey Part 2: Can We Say Next-Gen Yet? Guidance Software

Great Bay Software

IBM

Malwarebytes

Sophos Inc.
Marty Ward, Anthony Di Bello, G.W. Ray Davidson, PhD
Mar 17, 2016SANS 2016 Endpoint Security Survey Part 1: The Evolving Definition of EndpointsGuidance Software

Great Bay Software

IBM

Malwarebytes

Sophos Inc.
G.W. Ray Davidson, PhD, Sara Lofgren, Dana Torgersen, Lee Wei
Mar 16, 2016 Bring Your Own Collaboration Technical Control TradeoffsFinal CodeDave Shackleford, Scott Gordon
Mar 15, 2016Benchmarking AppSec: A Metrics PyramidVeracodeTim Jarrett, Jim Bird
Mar 14, 2016Analyzing the Ukrainian Power Grid Cyber-AttacksWaterfall SecurityJake Williams
Mar 10, 201610 Quick Win, Industry Agnostic SIEM DashboardsCraig Bowser
Mar 10, 2016Is Active Breach Detection the Next-Generation Security Technology?EastWind NetworksPaul Kraus, Dave Shackleford
Mar 9, 2016Security Awareness: Understanding and Managing Your Top Seven Human RisksLance Spitzner
Mar 8, 2016A DevSecOps PlaybookCloudPassageAmrit Williams, Dave Shackleford
Mar 8, 2016Passive DNS Logs: The Pulse of the NetworkPhilip Hagen
Mar 2, 2016How To Become A SANS InstructorEric Conrad
Feb 26, 2016SIFT and REMnux: Wonder Twin Powers Activate!Lenny Zeltser, Rob Lee
Feb 26, 2016Predicting Future Attacks and Breaches: Analytics in ActionSAS INSTITUTE INCChristopher Smith, Dave Shackleford
Feb 26, 2016Security Leadership For Everyone: Personal Authority and BeyondTed Demopoulos
Feb 25, 2016SANS VetSuccess Academy sponsored by Solutionary - open now!Solutionary, Inc.Maxwell Shuftan, Arlin Halstead
Feb 24, 2016Hunting and Farming : Concepts and Strategies to Improve Your Cyber DefensesCarbon BlackBen Johnson
Feb 24, 2016Making Risk Assessment UsefulDavid Hoelzer
Feb 23, 2016The Effectiveness of Microsoft's EMETStephen Sims
Feb 23, 2016iPhone Forensics - Separating the Facts from Fiction. A Technical Autopsy of the Apple/FBI DebateCindy Murphy, Sarah Edwards, Heather Mahalik
Feb 19, 2016GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerabilityVeracodeJohannes Ullrich, PhD, Chris Eng
Feb 19, 2016GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerabilityVeracodeJohannes Ullrich, PhD, Chris Eng
Feb 18, 2016Dizzy New World of Cyber Investigations: Law, Ethics and EvidenceBenjamin Wright
Feb 18, 2016How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...Bryce Galbraith
Feb 17, 2016Case Study: How the City of Lewiston Improved Threat Detection with AlienVault USMAlienVaultDave Shackleford
Feb 12, 2016Implementing a Successful Continuous Monitoring program with Open Source / Free ToolsIsmael Valenzuela
Feb 11, 2016Getting Started with Web Application Security VeracodeJoseph Feiman, Gregory Leonard
Feb 9, 2016CISO Hot Topic: Communicating to and Influencing CEOs and Boards of Directors: What Works and What to AvoidPalo Alto NetworksJohn Pescatore, Alan Paller
Feb 9, 2016Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and DevicesSkycureMic McCully, Lee Neely
Feb 8, 2016Risky Business: Evaluating the True Risk to your Security ProgramWhiteHat SecurityJenna McAuley, Mike Goldgof, Demetrios Lazarikos (Laz) , Johannes Ullrich, PhD
Feb 5, 2016Scaling Big Data Analytics: SANS Review of LogRhythm 7 Analytics and Intelligence UpgradesLogRhythmDave Shackleford, Erick Ingleby
Feb 4, 2016Security Leadership: Strategies for SuccessFrank Kim
Feb 3, 2016SANS 2016 IT Security Spending Strategies SurveyArbor Networks

Gigamon
Simon Gibson, G. Mark Hardy, Barbara Filkins, Gary Sockrider
Feb 2, 2016Threat HuntingSqrrl Data, Inc.Luis Maldonado, Robert M. Lee, Rob Lee
Jan 28, 2016Why You Need Application SecurityVeracodeJoseph Feiman, Johannes Ullrich
Jan 27, 2016The Frankenstein Framework - Assembling the Pieces to Enhance ICS Security Without Creating a MonsterJustin Opatny
Jan 21, 2016An Analysis of the Sandworm Team in UkraineRobert M. Lee
Jan 21, 2016Security Program Development, Maturity Models and Security Dashboards that help you manage riskDean Sapp
Jan 19, 2016Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingAlex Pinto
Jan 19, 2016How to Leverage The Critical Controls in 2016Randy Marchany
Jan 18, 2016Threat Intelligence AwakensRick Holland
Jan 14, 2016WhatWorks in AppSec: ASP.NET Web API Security
Jan 13, 2016From the Front Lines: Practical Application of DNS Threat Intel Data DomainToolsTim Helming, Robert M. Lee
Jan 12, 2016 Intelligent Intelligence: Secrets to Threat Intel SuccessDavid Bianco
Jan 12, 2016Know Before You Go: Key AWS Security ConsiderationsPalo Alto NetworksMatt Keil, Dave Shackleford
Jan 12, 2016Smartphone Forensics Moves Fast. Stay Current or You May Miss Relevant Evidence!Heather Mahalik
Jan 11, 2016What's New for Security in Windows 10 and Server 2016?Jason Fossen
Jan 6, 2016Are You Ready for Threat Intelligence? Behind the Scenes with FOR578Mike Cloppert, Robert M. Lee
Jan 5, 2016Deconstructing the Reports of Iranian Activity Against the Power Grid and New York DamMike Assante, Robert M. Lee

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.