Take $400 Off Any SANS OnDemand or vLive Course Through Feb. 17

Webcasts: Archive

Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.
Date Title Sponsor Speaker
Feb 12, 2016Implementing a Successful Continuous Monitoring program with Open Source / Free ToolsIsmael Valenzuela
Feb 12, 2016What Works in Threat Prevention: Detecting and Stopping Attacks more accurately and Quickly with ThreatSTOPThreatSTOPJohn Pescatore
Feb 11, 2016Getting Started with Web Application Security VeracodeGregory Leonard, Joseph Feiman
Feb 10, 2016Predicting Future Attacks and Breaches: Analytics in ActionSAS INSTITUTE INCDave Shackleford, Christopher Smith
Feb 9, 2016CISO Hot Topic: Communicating to and Influencing CEOs and Boards of Directors: What Works and What to AvoidPalo Alto NetworksAlan Paller, John Pescatore
Feb 9, 2016Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and DevicesSkycureLee Neely, Mic McCully
Feb 8, 2016Risky Business: Evaluating the True Risk to your Security ProgramWhiteHat SecurityJohannes Ullrich, PhD, Demetrios Lazarikos (Laz) , Mike Goldgof, Jenna McAuley
Feb 5, 2016Scaling Big Data Analytics: SANS Review of LogRhythm 7 Analytics and Intelligence UpgradesLogRhythmErick Ingleby, Dave Shackleford
Feb 4, 2016Security Leadership: Strategies for SuccessFrank Kim
Feb 3, 2016SANS 2016 IT Security Spending Strategies SurveyArbor Networks

Gary Sockrider, Barb Filkins, G. Mark Hardy, Simon Gibson
Feb 2, 2016Threat HuntingSqrrl Data, Inc.Rob Lee, Robert M. Lee, Luis Maldonado
Jan 28, 2016Why You Need Application SecurityVeracodeJohannes Ullrich, Joseph Feiman
Jan 27, 2016The Frankenstein Framework - Assembling the Pieces to Enhance ICS Security Without Creating a MonsterJustin Opatny
Jan 21, 2016An Analysis of the Sandworm Team in UkraineRobert M. Lee
Jan 20, 2016Security Program Development, Maturity Models and Security Dashboards that help you manage riskDean Sapp
Jan 19, 2016Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingAlex Pinto
Jan 19, 2016How to Leverage The Critical Controls in 2016Randy Marchany
Jan 18, 2016Threat Intelligence AwakensRick Holland
Jan 14, 2016WhatWorks in AppSec: ASP.NET Web API Security
Jan 13, 2016From the Front Lines: Practical Application of DNS Threat Intel Data DomainToolsRobert M. Lee, Tim Helming
Jan 12, 2016 Intelligent Intelligence: Secrets to Threat Intel SuccessDavid Bianco
Jan 12, 2016Know Before You Go: Key AWS Security ConsiderationsPalo Alto NetworksDave Shackleford, Matt Keil
Jan 12, 2016Smartphone Forensics Moves Fast. Stay Current or You May Miss Relevant Evidence!Heather Mahalik
Jan 11, 2016What's New for Security in Windows 10 and Server 2016?Jason Fossen
Jan 6, 2016Are You Ready for Threat Intelligence? Behind the Scenes with FOR578Robert M. Lee, Mike Cloppert
Jan 5, 2016Deconstructing the Reports of Iranian Activity Against the Power Grid and New York DamRobert M. Lee, Mike Assante

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, email sales@sans.org for more information.