Date (in UTC) |
Title |
Sponsor |
Speaker |
Dec 20, 2016 | 2016 Security Awareness Year in Review - Looking Ahead to 2017 | Lance Spitzner |
Dec 19, 2016 | SEC555 - The Industry's First Neutral SIEM Training Course | Justin Henderson |
Dec 15, 2016 | The Data Disconnect: Why All Security Ratings are Not Created Equal | Dave Shackleford, Stephen Boyer |
Dec 14, 2016 | Winning the Culture War: Infusing Security into the Software Development Culture | Setu Kulkarni, Mark Geeslin |
Dec 14, 2016 | Defending Against Fileless Malware | Amit Serper, Matt Bromiley |
Dec 14, 2016 | Cyber Threat Intelligence: Hurricanes and Earthquakes | Jonathan Couch |
Dec 13, 2016 | Secrets to a Successful Phishing Program | Lance Spitzner |
Dec 13, 2016 | 2016 Cybersecurity Trends Year in Review: Avoiding the Threats and Mistakes of 2016 to Have a More Secure 2017 | John Pescatore |
Dec 9, 2016 | A Case Study: Developing an Innovative ICS Security Program and Real-Time OT Monitoring Capability for Oil and Gas Infrastructures | Greg Villano, Matt Morris, Patrick McBride |
Dec 9, 2016 | Hummingbad: Tools & Techniques To Use When Inspecting Android Applications | Chris Crowley, Cindy Murphy |
Dec 8, 2016 | Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM and Analytics Platform | Dave Shackleford, Seth Goldhammer |
Dec 8, 2016 | Part 2 | SANS Security Analytics Survey Results: What's Working? What's Not? | Dave Shackleford, Kinshuk Pahare, Mike Reagan |
Dec 8, 2016 | Let's plan an APT | Roi Abutbul |
Dec 7, 2016 | You Can't Stop What You Cant SOC | John Pescatore, Sridhar Karnam |
Dec 7, 2016 | Security Analytics in Action: SANS Fourth Annual Security Analytics Survey - Part 1 | Travis Farral, Dave Shackleford, Matt Hathaway, Javvad Malik |
Dec 6, 2016 | Throwback: How Social Media has Ushered a Re-emergence of Traditional Espionage Tradecraft (and how defenders can exploit it) | Michael Cloppert |
Dec 6, 2016 | Fight Advanced Persistent Threats in ICS with Applied Trickery | Bryce Galbraith |
Dec 5, 2016 | Opening a can of Active Defense and Cyber Deception to confuse and frustrate attackers | Chris Pizor, Ed Skoudis, John Strand |
Dec 2, 2016 | Redefining Endpoint Incident Response with Behavioral Analysis | Michael Angelo Vien, John Pescatore |
Dec 2, 2016 | Closing the Cyber Skills Gap: The Security Team Force Multiplier | Deron Grzetich, Louis Yeck, Amy Blackshaw |
Dec 1, 2016 | The Art of Blocking Never-Before-Seen Ransomware | Uri Sternfeld, Jake Williams |
Nov 29, 2016 | Top Methods Pen Testers Use to Socially Engineer Their Way In | Lance Spitzner, Dave Shackleford |
Nov 21, 2016 | Infosec Rock Star: Geek Will Only Get You So Far | Ted Demopoulos |
Nov 21, 2016 | FOR508 - Advanced Incident Response and Threat Hunting Course Updates: Hunting Guide | Rob Lee |
Nov 18, 2016 | SANS Federal Government Cyber Security Briefing: How to Avoid Being the Next Agency to Announce a Major Breach | |
Nov 16, 2016 | The Art of Risk Mitigation Through Holistic Security Analytics | Russ Lowenthal |
Nov 16, 2016 | Physical Security - Everything That's Wrong With Your Typical Door | Deviant Ollam |
Nov 15, 2016 | DevSecOps and the Cloud Security Gap | Sami Laine, Dave Shackleford |
Nov 15, 2016 | Vulnerabilities, Controls and Continuous Monitoring: The SANS 2016 Continuous Monitoring Survey | Barbara Filkins, Scott Gordon, Dan Lamorena, Patrick Vowles, Martin Walker |
Nov 11, 2016 | Implementing the 5th Critical Security Control: Controlled Use of Administrative Privilege | Paul Ackerman |
Nov 10, 2016 | Endpoint Detection and Response - The Final Frontier: Why EDR is essential to your security operations | Dan Chapman, Justin Lachesky |
Nov 9, 2016 | Taking Action: Effective Measures of Defense | Richard Ford, Eric Cole |
Nov 9, 2016 | 8 Ways To Watch The Invisible: Analyzing Encrypted Network Traffic | Johannes Ullrich |
Nov 9, 2016 | FOR572 Course Update from the Future - Where Were Going, We Dont Need Roads | Philip Hagen |
Nov 7, 2016 | Seeing Over the Horizon: Predictive and Preventive Security Based on the Kill-Chain Model | Tim Helming, Mike Cloppert |
Nov 3, 2016 | Ready to Replace AV? Criteria to Evaluate NGAV Solutions | Neil Boland, Greg Notch, Barbara Filkins, J. Michael Butler |
Nov 2, 2016 | The Fusion of IT and OT Security: What You Need to Know | Rebecca Lawson, Derek Harp, Bengt Gregory-Brown |
Nov 2, 2016 | Practical ICS Cyber Security for the Process Industry | Jim Gilsinn, James McGlone |
Oct 27, 2016 | The Human Factor in the Age of Cyber Conflict | Sean Brady, Lance Spitzner |
Oct 26, 2016 | Prioritizing and Planning to Ensure a High-Impact SOC Rollout | Brent Hambly, John Pescatore |
Oct 26, 2016 | The Most Common Human Incidents - A Forensicator's Tale | Lance Spitzner, Matt Bromiley |
Oct 25, 2016 | Packet Capture + Flow Analytics = Holistic Network Visibility | Brian Ford |
Oct 24, 2016 | Prioritizing the CIS Critical Controls for ICS: Learning from recent incidents | Walt Sikora, Mike Assante, Tim Conway |
Oct 21, 2016 | Intro to SDR Projects: Have Fun Before You Get Serious | Larry Pesce |
Oct 21, 2016 | How Security Analysts Master Incident Response with Behavioral Analytics | Orion Cassetto, Andy Skrei |
Oct 21, 2016 | The State of Vulnerability Discovery - How Bug Bounties Are Actually Making a Difference | David Baker, Casey Ellis, John Pescatore |
Oct 20, 2016 | From the Trenches, the SANS 2016 Survey on Security and Risk in the Financial Sector: Part 2 Securing Financial Environments | Sandeep Kumar , Anthony Di Bello, G. Mark Hardy, Anil Nandigam |
Oct 19, 2016 | From the Trenches, the SANS 2016 Survey on Security and Risk in the Financial Sector: Part 1 Incidents, Risks and Preparedness | G. Mark Hardy, Mike Goldgof, Arabella Hallawell |
Oct 18, 2016 | What's New for Security in Windows Server 2016? | Jason Fossen |
Oct 18, 2016 | They Can Run, But They Can't Hide: Real-Time Threat Hunting Using Passive DNS | Dr. Paul Vixie, Dave Shackleford |
Oct 17, 2016 | Designing and Building a SOC: In-house vs. Out-Sourcing | Chris Crowley |
Oct 14, 2016 | SANS Financial Services Security Vendor Briefing | |
Oct 13, 2016 | The Internet of Evil Things: How to Detect and Secure Your Vulnerable Devices from the Mirai Botnet | Johannes Ullrich |
Oct 12, 2016 | Security and Accountability in the Cloud, the SANS 2016 Cloud Security Survey: Part 2 - Changes in Cloud Security | Steve Grossenbacher, Dave Shackleford, Salim Hafid, Matt Hathaway |
Oct 12, 2016 | Continuous Opportunity: DevOps & Security | Ben Allen |
Oct 11, 2016 | Security and Accountability in the Cloud, the SANS 2016 Cloud Security Survey: Part 1 - Breach Landscape and the Top Threats and Challenges | Mark Campbell, Dave Shackleford, Sami Laine |
Oct 11, 2016 | EHR Vulnerability Reporting A Cause for Concern? | Greg Porter |
Oct 11, 2016 | Lets Talk Cyber Security | My-Ngoc Nguyen, Dr. Eric Cole |
Oct 6, 2016 | Taking Action Against Insider Threats | Josh Ablett, Eric Cole |
Oct 5, 2016 | 2016 Office 365 Security & Risk Benchmarks Report | Brandon Cook, John Pescatore |
Oct 4, 2016 | Bring 5 of the top CIS Critical Security Controls to Life! | Ken Robinson, Jennifer Ellard |
Sep 28, 2016 | MobileIron Security Labs: Combatting Rising Mobile Threats | James Plouffe |
Sep 27, 2016 | Sneak Peek for the European Security Awareness Summit | Chris Boyd, Masha Sedova, Lance Spitzner |
Sep 26, 2016 | Going Mobile: Are Your Apps Putting You at Risk? | Eric Johnson |
Sep 22, 2016 | Compliance Automation with OpenSCAP | Robin Price II |
Sep 22, 2016 | Monitoring the Most Interesting Network in the World: Insights from the Black Hat NOC | Scott Carter, Neil R. Wyler |
Sep 21, 2016 | Hardening Microservices Security: Building a Layered Defense Strategy | Matthew Silverlock, David Hoelzer |
Sep 21, 2016 | Process Hunting with Microsoft AppLocker: Application Whitelisting is the Killer App | James Tarala |
Sep 21, 2016 | Welcome Threat Hunters, Phishermen, and Other Liars | Rob Lee |
Sep 20, 2016 | SOC Fundamentals for Your Threat Intelligence Program | Glenn Wong, Chris Crowley |
Sep 20, 2016 | Threat Intelligence: What It Is, and How to Use It Effectively | Stephen Gates, Matt Bromiley |
Sep 19, 2016 | Evasive malware is everywhere: Learn how it works and how to prevent it. | Omri Moyal, John Pescatore |
Sep 16, 2016 | How to Target Critical Infrastructure: The Adversary Return on Investment from an Industrial Control System | Matthew Hosburgh |
Sep 15, 2016 | Injecting a node.js app using NoSQL and Query Selector Injection | Aaron Cure |
Sep 13, 2016 | Breach Detected! Could It Have Been Prevented? | Barbara Filkins, Scott Simkin |
Sep 9, 2016 | Real World Phishing & Exploitation | Phillip Bosco |
Sep 8, 2016 | Hunting 101 - Back to Basics: Implementing a Proactive Cyber Hunting Approach | Brad Mecha, Dave Shackleford |
Sep 8, 2016 | Navigating SANS Pen Test Cheat Sheets for Fun and Profit | Ed Skoudis |
Sep 7, 2016 | CISO Hot Topic Lunch Session: Communicating Cybersecurity Effectively to CEOs and Boards of Directors | John Pescatore, Alan Paller |
Sep 7, 2016 | 2016 Threat Landscape Survey Report: Europe Edition | Polomi Batra, Lee Neely |
Sep 6, 2016 | Incorporating ICS Cybersecurity Into Water Utility Master Planning | Jason Dely |
Aug 31, 2016 | Top Office 365 Mail Vulnerabilities: Attacks on your Users Right Now | Kip James, Michael Landewe |
Aug 30, 2016 | National Cyber Security Awareness Month Toolkit | Cathy Click, Lance Spitzner |
Aug 29, 2016 | CISO Success Strategies | Frank Kim |
Aug 26, 2016 | Prioritizing Cybersecurity with the Critical Security Controls | Wes Whitteker |
Aug 25, 2016 | Intelligent Network Security | Tom Byrnes, Jake Williams |
Aug 24, 2016 | Using an Attacker Technique-Based Approach for Prevention | Mike Nichols, Dave Shackleford |
Aug 23, 2016 | Cyber-Hygiene and Standards of Care: Practical Defenses for Healthcare | James Tarala |
Aug 23, 2016 | A Credit Union Detected LAN Turtle Attacks in Seconds with Network Access Control from Great Bay Software Beacon | Jeremy Taylor, John Pescatore |
Aug 18, 2016 | Practical Open Source Intelligence: Six Tips for Starting an Effective Investigation | Micah Hoffman |
Aug 18, 2016 | In Detection, the Only Thing That Matters Is Results | Kasey Cross, David Thompson, Dave Shackleford |
Aug 17, 2016 | The State of Cyber Threat Intelligence: Part 2: The Value of CTI | Rebekah Brown, Dave Shackleford, Mark Doering, Aaron Shelmire |
Aug 17, 2016 | Designing and Building a SOC: Management Fundamentals | Christopher Crowley |
Aug 16, 2016 | The State of Cyber Threat Intelligence: Part 1: How Cyber Threat Intelligence Is Consumed and Processed | Dave Shackleford, Arabella Hallawell, Javvad Malik, Chip Witt |
Aug 15, 2016 | Establishing Street Cred: Fundamental Security Concepts (Hint: Its Not About Technology) | Ted Demopoulos |
Aug 12, 2016 | SANS Threat Intelligence Vendor Briefing | Robert M. Lee |
Aug 11, 2016 | 2016 Threat Landscape Survey Report | Polomi Batra, Lee Neely |
Aug 10, 2016 | Running a Better Red Team Through Understanding ICS/SCADA Adversary Tactics | Robert M. Lee |
Aug 10, 2016 | Time is on your side: username harvesting via timing attacks | Eric Conrad |
Aug 9, 2016 | A Sneak Peek at Pokémon Go Forensic Artifacts | Cindy Murphy |
Aug 5, 2016 | Designing and Building a SOC: Management Fundamentals | Christopher Crowley |
Aug 2, 2016 | Demystifying Cyber Attacks on ICS: How They Work and How to Use Engineered and Cyber Layer of Protections | Bryan L. Singer, CISSP, CAP |
Jul 29, 2016 | Pokémon Go - What To Tell Employees | Jacob Wilson, Thomas McHahon, Jennifer Miller, Lance Spitzner |
Jul 28, 2016 | Get Ready for NCSAM 2016 | Michael Kaiser, Lance Spitzner |
Jul 28, 2016 | Illuminate Your Network with Security Analytics | Andrew Wild |
Jul 26, 2016 | ICS-Houston Security Briefing | |
Jul 21, 2016 | Health Care Provider Breaches and Risk Management Roadmaps: Part 2 - Health Care Security from the Top Down | Sandeep Kumar , Ed Cabrera, Barbara Filkins, Christopher Strand |
Jul 20, 2016 | Health Care Provider Breaches and Risk Management Roadmaps: Part 1 - Health Care Security from the Bottom Up | Mike Goldgof, Barbara Filkins, Hugh Njemanze, Ty Powers |
Jul 19, 2016 | Incident or Breach? | Hal Pomeranz, Benjamin Wright |
Jul 19, 2016 | Why Layered Security Strategies Do Not Work and What You Can Do About It | Navneet Singh |
Jul 14, 2016 | Ransomware & Malvertising: Dominating the Threat Landscape | Adam Kujawa, Dana Torgersen, John Pescatore |
Jul 14, 2016 | Case Study: See How Aruba Networks Uses Bug Bounties to Discover Vulnerabilities, Faster | Leif Dreizler, John Pescatore, Jon Green |
Jul 13, 2016 | Decision Criteria and Analysis for Hardware-Based Encryption | Eric Cole, John Grimm |
Jul 12, 2016 | Beyond Infiltration: Conquering all Stages of the Attack Lifecycle | Lotem Guy , John Pescatore |
Jul 5, 2016 | Internet of Things (IoT) and Embedded Device Security Research - A Primer | Billy Rios |
Jun 30, 2016 | What You Need to Know: iOS 10 Security | Joshua Wright |
Jun 30, 2016 | Going Mobile: Are your apps putting you at risk? | Gregory Leonard |
Jun 29, 2016 | Where Are We Now?: The SANS 2016 ICS Survey | Derek Harp, Bengt Gregory-Brown, Arabella Hallawell, David Meltzer, Christopher Strand, Jason Trost |
Jun 29, 2016 | Continuous Opportunity: DevOps & Security | Ben Allen |
Jun 22, 2016 | The End of IOCs: A Case Study on Resolving Persistent Attacks Using Tactics, Techniques, and Procedures (TTPs) | Israel Barak, Dave Shackleford |
Jun 21, 2016 | Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance Survey | Barbara Filkins, Benjamin Wright, Dave Bradford, Julian Waits |
Jun 20, 2016 | Malware Analysis and Adversary Infrastructure Mapping: A One-Two Punch | Tim Helming, Alissa Torres |
Jun 20, 2016 | What we all need to learn from recent ICS incidents | Mike Assante, Tim Conway |
Jun 15, 2016 | Warning: Email may be Hazardous to your business | John Devenyns |
Jun 15, 2016 | MobileIron Mobile Security and Risk Review Research Results | David Schwartzberg |
Jun 14, 2016 | The Case for PIM/PAM in Today's Infosec | Ken Ammon, Barbara Filkins |
Jun 10, 2016 | How is User Risk Mitigation achieved? Achieving user risk mitigation-stopping the insider threat | Daniel Velez, Dr. Eric Cole |
Jun 10, 2016 | No Python Allowed: learning a whole new language to sell the Critical Security Controls | Paul Hershberger |
Jun 9, 2016 | Incident Response Capabilities in 2016 - Part 2: Emerging Trends in Incident Response and Survey Results | Matt Bromiley, Jack Doyle, Rob Lee, Mark Painter, Arabella Hallawell, Ryan Sommers |
Jun 8, 2016 | Incident Response Capabilities in 2016 - Part 1: The Current Threat Landscape and Survey Results | Matt Bromiley, Rob Lee, Don Shin, Tamar Shafler, Ismael Valenzuela, Ann Sun |
Jun 7, 2016 | ICS Network Segmentation | Dan Morrow, Brett Young |
Jun 3, 2016 | (Am)Cache rules everything around me | Eric Zimmerman |
Jun 2, 2016 | A Blueprint to Secure SAP Applications Using CIS Controls As a Guide | Barbara Filkins, Alex Horan |
May 31, 2016 | Sneak Peek for the 2016 Security Awareness Summit | Lance Spitzner |
May 26, 2016 | Effective Monitoring and Defense in Financial Services | Lawrence Chin, David Hoelzer |
May 26, 2016 | What Works in Threat Prevention: Detecting and Stopping Attacks more Accurately and Quickly with Threatstop | Kenneth Compres, John Pescatore |
May 25, 2016 | Why So Many Endpoint Attacks Are Still Going Undetected - And What You Can Do About It | Mark Stacey, Chris Ahearn, John Pescatore |
May 24, 2016 | A New Perspective on Patch Management | Marcelo Pereira, John Pescatore |
May 24, 2016 | iOS Location Forensics | Sarah Edwards |
May 20, 2016 | Next Level in Cyber Threat Intelligence Training: New FOR578 | Robert M. Lee |
May 19, 2016 | How to Negotiate a Cyber Insurance Policy | Amy Elizabeth Stewart, Benjamin Wright |
May 19, 2016 | systemd and You! | Hal Pomeranz |
May 18, 2016 | Scapy and Snort, Packet Peanut Butter and Jelly | Judy Novak, Mike Poor |
May 18, 2016 | Are you serious? Now I have to worry about BYoD and IoT threats? | Yolonda Smith, Paul Paget, John Pescatore |
May 17, 2016 | 2016 Security Awareness Report (Special APAC Edition) | Lance Spitzner |
May 17, 2016 | Practical and Open Source Threat Intelligence | James Tarala |
May 17, 2016 | Windows Exploratory Surgery with Process Hacker | Jason Fossen |
May 16, 2016 | Shell items, More than Meets the Eye | David Cowen |
May 13, 2016 | Know Normal, Find Evil: Windows 10 Memory Forensics Overview | Alissa Torres |
May 12, 2016 | Why Train and Who to Train for Education and Government | Randy Marchany, Lance Spitzner |
May 11, 2016 | Using the Critical Security Controls to Prevent Ransomware in Healthcare | Matthew Mellen, James Tarala |
May 11, 2016 | This phish goes to 11, w/ Guest: SNOW [DEF CON 22 Social Engineering CtF - Black Badge Winner] | Stephanie Carruthers |
May 10, 2016 | Connecting the Dots Between Your Threat Intelligence Tradecraft and Business Operations | Adam Meyer, John Pescatore |
May 3, 2016 | Learn to Trust Your Insecure ICS Networks | David Mattes, Lisa Lorenzin |
Apr 28, 2016 | Cracking the Code on SaaS Security & Compliance | Brandon Cook |
Apr 28, 2016 | Analyzing Analytics: Turning Big Data into Security Intelligence | Tim (TK) Keanani |
Apr 27, 2016 | How to Produce a World-Class Threat Intelligence Capability From Scratch | Levi Gundert, John Pescatore |
Apr 27, 2016 | Managing Applications Securely: A SANS Survey | Johannes Ullrich, Amit Ashbel, Tim Jarrett, Ryan O'Leary |
Apr 27, 2016 | Stopping CEO Fraud | FBI, Special Agent Cyber Crimes Division, Lance Spitzner |
Apr 26, 2016 | 2016 Security Awareness Report Findings - How STH is Helping You | Dan deBeaubien, Danielle Ventre-Olson, Lisa Murray-Johnson, Lance Spitzner |
Apr 26, 2016 | Overcome Privilege Management Obstacles with CSC v. 6 | Jon Wallace, John Pescatore |
Apr 25, 2016 | Are network-centric practices undermining your SOC? | Brandie Anderson |
Apr 22, 2016 | DNS Evidence: You Dont Know What Youre Missing | Philip Hagen |
Apr 20, 2016 | Securing the Internet of Old Things (IoOT) | Jean-Philippe Taggart, Dana Torgersen, G.W. Ray Davidson, PhD |
Apr 20, 2016 | SANS Asia-Pacific Webcast Series- Basic Mobile Application Reverse Engineering and a Free Trip to Vegas | Tim Medin |
Apr 19, 2016 | Security Leadership: How to Increase the Success of Your Projects | Jeff Frisk |
Apr 15, 2016 | Open Season on Cyberthreats: Part 2- Threat Hunting Methodologies and Tools | Ely Kahn, Eric Cole, Tim Helming, Mike Nichols |
Apr 14, 2016 | 2016 Awareness Report - Lessons Learned for Education and State / Local Government | Ashley Sudderth, Mark Evans, Lance Spitzner |
Apr 14, 2016 | Open Season on Cyberthreats: Part I- Threat Hunting 101 | Ryan Cason, Eric Cole, Mark Painter, Dana Torgersen |
Apr 13, 2016 | BadLock: What you need to know | Chris Wysopal, Johannes Ullrich, PhD |
Apr 13, 2016 | HTTP/2 & Websockets Are Gonna Change the Pen Test World. Are You Ready? | Adrien de Beaupre, Justin Searle |
Apr 12, 2016 | LIVE from THIR Summit in New Orleans: The Most Dangerous Game; Evolving Threat Hunting to Keep Up with Skilled Adversaries | |
Apr 8, 2016 | To trust or not to trust: The relationship between you & your mobile forensics tool | Heather Mahalik |
Apr 7, 2016 | Gamification of a Fortune 20 SOC | Josh Stevens, Marcel Hoffmann |
Mar 31, 2016 | Mapping Attack Infrastructure: Leave Your Foe With Nowhere to Hide | Stephen Ginty, John Pescatore |
Mar 29, 2016 | Evolving from cyber Gatherers to cyber Hunters - Darwin was wrong about APTs | Darren Anstee, John Pescatore |
Mar 29, 2016 | 2016 Security Awareness Report Key Findings | Lance Hayden, Bob Rudis, Lance Spitzner |
Mar 24, 2016 | Expect the Unexpected, Preparing for the Inevitable Cyber Breach | Joseph Muniz |
Mar 24, 2016 | Mobile Data Loss - Threats & Countermeasures | Michael T. Raggo |
Mar 24, 2016 | Facilitating Fluffy Forensics 2.0 | Andrew Hay |
Mar 23, 2016 | What Works: Inspecting Encrypted Traffic with the Blue Coat SSL Visibility Appliance | Michael Weinstein, John Pescatore |
Mar 22, 2016 | Ensuring Compliance and Detecting Suspicious Activity with Promisec Endpoint Manager | Noel Slane, Dave Shackleford |
Mar 18, 2016 | SANS 2016 Endpoint Security Survey Part 2: Can We Say Next-Gen Yet? | Marty Ward, Anthony Di Bello, G.W. Ray Davidson, PhD |
Mar 17, 2016 | SANS 2016 Endpoint Security Survey Part 1: The Evolving Definition of Endpoints | G.W. Ray Davidson, PhD, Sara Lofgren, Dana Torgersen, Lee Wei |
Mar 16, 2016 | Bring Your Own Collaboration Technical Control Tradeoffs | Dave Shackleford, Scott Gordon |
Mar 15, 2016 | Benchmarking AppSec: A Metrics Pyramid | Tim Jarrett, Jim Bird |
Mar 14, 2016 | Analyzing the Ukrainian Power Grid Cyber-Attacks | Jake Williams |
Mar 10, 2016 | 10 Quick Win, Industry Agnostic SIEM Dashboards | Craig Bowser |
Mar 10, 2016 | Is Active Breach Detection the Next-Generation Security Technology? | Paul Kraus, Dave Shackleford |
Mar 9, 2016 | Security Awareness: Understanding and Managing Your Top Seven Human Risks | Lance Spitzner |
Mar 8, 2016 | A DevSecOps Playbook | Amrit Williams, Dave Shackleford |
Mar 8, 2016 | Passive DNS Logs: The Pulse of the Network | Philip Hagen |
Mar 2, 2016 | How To Become A SANS Instructor | Eric Conrad |
Feb 26, 2016 | SIFT and REMnux: Wonder Twin Powers Activate! | Lenny Zeltser, Rob Lee |
Feb 26, 2016 | Predicting Future Attacks and Breaches: Analytics in Action | Christopher Smith, Dave Shackleford |
Feb 26, 2016 | Security Leadership For Everyone: Personal Authority and Beyond | Ted Demopoulos |
Feb 25, 2016 | SANS VetSuccess Academy sponsored by Solutionary - open now! | Maxwell Shuftan, Arlin Halstead |
Feb 24, 2016 | Hunting and Farming : Concepts and Strategies to Improve Your Cyber Defenses | Ben Johnson |
Feb 24, 2016 | Making Risk Assessment Useful | David Hoelzer |
Feb 23, 2016 | The Effectiveness of Microsoft's EMET | Stephen Sims |
Feb 23, 2016 | iPhone Forensics - Separating the Facts from Fiction. A Technical Autopsy of the Apple/FBI Debate | Cindy Murphy, Sarah Edwards, Heather Mahalik |
Feb 19, 2016 | GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerability | Johannes Ullrich, PhD, Chris Eng |
Feb 19, 2016 | GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerability | Johannes Ullrich, PhD, Chris Eng |
Feb 18, 2016 | Dizzy New World of Cyber Investigations: Law, Ethics and Evidence | Benjamin Wright |
Feb 18, 2016 | How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats... | Bryce Galbraith |
Feb 17, 2016 | Case Study: How the City of Lewiston Improved Threat Detection with AlienVault USM | Dave Shackleford |
Feb 12, 2016 | Implementing a Successful Continuous Monitoring program with Open Source / Free Tools | Ismael Valenzuela |
Feb 11, 2016 | Getting Started with Web Application Security | Joseph Feiman, Gregory Leonard |
Feb 9, 2016 | CISO Hot Topic: Communicating to and Influencing CEOs and Boards of Directors: What Works and What to Avoid | John Pescatore, Alan Paller |
Feb 9, 2016 | Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Devices | Mic McCully, Lee Neely |
Feb 8, 2016 | Risky Business: Evaluating the True Risk to your Security Program | Jenna McAuley, Mike Goldgof, Demetrios Lazarikos (Laz) , Johannes Ullrich, PhD |
Feb 5, 2016 | Scaling Big Data Analytics: SANS Review of LogRhythm 7 Analytics and Intelligence Upgrades | Dave Shackleford, Erick Ingleby |
Feb 4, 2016 | Security Leadership: Strategies for Success | Frank Kim |
Feb 3, 2016 | SANS 2016 IT Security Spending Strategies Survey | Simon Gibson, G. Mark Hardy, Barbara Filkins, Gary Sockrider |
Feb 2, 2016 | Threat Hunting | Luis Maldonado, Robert M. Lee, Rob Lee |
Jan 28, 2016 | Why You Need Application Security | Joseph Feiman, Johannes Ullrich |
Jan 27, 2016 | The Frankenstein Framework - Assembling the Pieces to Enhance ICS Security Without Creating a Monster | Justin Opatny |
Jan 21, 2016 | An Analysis of the Sandworm Team in Ukraine | Robert M. Lee |
Jan 21, 2016 | Security Program Development, Maturity Models and Security Dashboards that help you manage risk | Dean Sapp |
Jan 19, 2016 | Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing | Alex Pinto |
Jan 19, 2016 | How to Leverage The Critical Controls in 2016 | Randy Marchany |
Jan 18, 2016 | Threat Intelligence Awakens | Rick Holland |
Jan 14, 2016 | WhatWorks in AppSec: ASP.NET Web API Security | |
Jan 13, 2016 | From the Front Lines: Practical Application of DNS Threat Intel Data | Tim Helming, Robert M. Lee |
Jan 12, 2016 | Intelligent Intelligence: Secrets to Threat Intel Success | David Bianco |
Jan 12, 2016 | Know Before You Go: Key AWS Security Considerations | Matt Keil, Dave Shackleford |
Jan 12, 2016 | Smartphone Forensics Moves Fast. Stay Current or You May Miss Relevant Evidence! | Heather Mahalik |
Jan 11, 2016 | What's New for Security in Windows 10 and Server 2016? | Jason Fossen |
Jan 6, 2016 | Are You Ready for Threat Intelligence? Behind the Scenes with FOR578 | Mike Cloppert, Robert M. Lee |
Jan 5, 2016 | Deconstructing the Reports of Iranian Activity Against the Power Grid and New York Dam | Mike Assante, Robert M. Lee |