Get the Skills you need from Home with SANS OnDemand

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
December 20, 2016
1:00pm EST
(18:00:00 UTC)
2016 Security Awareness Year in Review - Looking Ahead to 2017Lance Spitzner
December 19, 2016
3:00pm EST
(20:00:00 UTC)
SEC555 - The Industry's First Neutral SIEM Training CourseJustin Henderson
December 15, 2016
12:30pm EST
(17:30:00 UTC)
The Data Disconnect: Why All Security Ratings are Not Created EqualBitsightDave Shackleford, Stephen Boyer
December 14, 2016
3:00pm EST
(20:00:00 UTC)
Winning the Culture War: Infusing Security into the Software Development CultureWhiteHat SecuritySetu Kulkarni, Mark Geeslin
December 14, 2016
1:00pm EST
(18:00:00 UTC)
Defending Against Fileless MalwareCybereasonAmit Serper, Matt Bromiley
December 14, 2016
11:00am EST
(16:00:00 UTC)
Cyber Threat Intelligence: Hurricanes and EarthquakesThreatQuotientJonathan Couch
December 13, 2016
3:00pm EST
(20:00:00 UTC)
Secrets to a Successful Phishing ProgramLance Spitzner
December 13, 2016
1:00pm EST
(18:00:00 UTC)
2016 Cybersecurity Trends Year in Review: Avoiding the Threats and Mistakes of 2016 to Have a More Secure 2017Veracode

LightCyber
John Pescatore
December 9, 2016
3:00pm EST
(20:00:00 UTC)
A Case Study: Developing an Innovative ICS Security Program and Real-Time OT Monitoring Capability for Oil and Gas InfrastructuresClaroty Inc. Greg Villano, Matt Morris, Patrick McBride
December 9, 2016
1:00pm EST
(18:00:00 UTC)
Hummingbad: Tools & Techniques To Use When Inspecting Android ApplicationsChris Crowley, Cindy Murphy
December 8, 2016
3:00pm EST
(20:00:00 UTC)
Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM and Analytics PlatformLogRhythmDave Shackleford, Seth Goldhammer
December 8, 2016
1:00pm EST
(18:00:00 UTC)
Part 2 | SANS Security Analytics Survey Results: What's Working? What's Not?AlienVault

Anomali

LogRhythm

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.
Dave Shackleford, Kinshuk Pahare, Mike Reagan
December 8, 2016
11:00am EST
(16:00:00 UTC)
Let's plan an APTJavelin NetworksRoi Abutbul
December 7, 2016
3:00pm EST
(20:00:00 UTC)
You Can't Stop What You Cant SOCArctic Wolf NetworksJohn Pescatore, Sridhar Karnam
December 7, 2016
1:00pm EST
(18:00:00 UTC)
Security Analytics in Action: SANS Fourth Annual Security Analytics Survey - Part 1 AlienVault

Anomali

LogRhythm

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.
Travis Farral, Dave Shackleford, Matt Hathaway, Javvad Malik
December 6, 2016
3:00pm EST
(20:00:00 UTC)
Throwback: How Social Media has Ushered a Re-emergence of Traditional Espionage Tradecraft (and how defenders can exploit it)Michael Cloppert
December 6, 2016
1:00pm EST
(18:00:00 UTC)
Fight Advanced Persistent Threats in ICS with Applied TrickeryBryce Galbraith
December 5, 2016
3:00pm EST
(20:00:00 UTC)
Opening a can of Active Defense and Cyber Deception to confuse and frustrate attackersChris Pizor, Ed Skoudis, John Strand
December 2, 2016
1:00pm EST
(18:00:00 UTC)
Redefining Endpoint Incident Response with Behavioral AnalysisCounterTackMichael Angelo Vien, John Pescatore
December 2, 2016
11:00am EST
(16:00:00 UTC)
Closing the Cyber Skills Gap: The Security Team Force MultiplierRSADeron Grzetich, Louis Yeck, Amy Blackshaw
December 1, 2016
11:00am EDT
(16:00:00 UTC)
The Art of Blocking Never-Before-Seen RansomwareCybereasonUri Sternfeld, Jake Williams
November 29, 2016
1:00pm EST
(18:00:00 UTC)
Top Methods Pen Testers Use to Socially Engineer Their Way InLance Spitzner, Dave Shackleford
November 21, 2016
3:00pm EST
(20:00:00 UTC)
Infosec Rock Star: Geek Will Only Get You So FarTed Demopoulos
November 21, 2016
1:00pm EST
(18:00:00 UTC)
FOR508 - Advanced Incident Response and Threat Hunting Course Updates: Hunting GuideRob Lee
November 18, 2016
8:25am EST
(13:25:00 UTC)
SANS Federal Government Cyber Security Briefing: How to Avoid Being the Next Agency to Announce a Major BreachIBM

Cylance
November 16, 2016
3:00pm EST
(20:00:00 UTC)
The Art of Risk Mitigation Through Holistic Security AnalyticsOracleRuss Lowenthal
November 16, 2016
11:00am EST
(16:00:00 UTC)
Physical Security - Everything That's Wrong With Your Typical DoorDeviant Ollam
November 15, 2016
3:00pm EST
(20:00:00 UTC)
DevSecOps and the Cloud Security GapCloudPassageSami Laine, Dave Shackleford
November 15, 2016
1:00pm EST
(18:00:00 UTC)
Vulnerabilities, Controls and Continuous Monitoring: The SANS 2016 Continuous Monitoring SurveyForescout Technologies BV

IBM

Qualys

RiskIQ
Barbara Filkins, Scott Gordon, Dan Lamorena, Patrick Vowles, Martin Walker
November 11, 2016
11:00am EST
(16:00:00 UTC)
Implementing the 5th Critical Security Control: Controlled Use of Administrative PrivilegePaul Ackerman
November 10, 2016
1:00pm EDT
(18:00:00 UTC)
Endpoint Detection and Response - The Final Frontier: Why EDR is essential to your security operationsCybereasonDan Chapman, Justin Lachesky
November 9, 2016
3:00pm EST
(20:00:00 UTC)
Taking Action: Effective Measures of DefenseForcepoint LLCRichard Ford, Eric Cole
November 9, 2016
1:00pm EST
(18:00:00 UTC)
8 Ways To Watch The Invisible: Analyzing Encrypted Network TrafficJohannes Ullrich
November 9, 2016
11:00am EST
(16:00:00 UTC)
FOR572 Course Update from the Future - Where Were Going, We Dont Need RoadsPhilip Hagen
November 7, 2016
1:00pm EST
(18:00:00 UTC)
Seeing Over the Horizon: Predictive and Preventive Security Based on the Kill-Chain ModelDomainToolsTim Helming, Mike Cloppert
November 3, 2016
1:00pm EDT
(17:00:00 UTC)
Ready to Replace AV? Criteria to Evaluate NGAV SolutionsCarbon BlackNeil Boland, Greg Notch, Barbara Filkins, J. Michael Butler
November 2, 2016
1:00pm EDT
(17:00:00 UTC)
The Fusion of IT and OT Security: What You Need to KnowGERebecca Lawson, Derek Harp, Bengt Gregory-Brown
November 2, 2016
11:00am EDT
(15:00:00 UTC)
Practical ICS Cyber Security for the Process IndustryJim Gilsinn, James McGlone
October 27, 2016
1:00pm EDT
(17:00:00 UTC)
The Human Factor in the Age of Cyber ConflictArbor NetworksSean Brady, Lance Spitzner
October 26, 2016
1:00pm EDT
(17:00:00 UTC)
Prioritizing and Planning to Ensure a High-Impact SOC RolloutLeidosBrent Hambly, John Pescatore
October 26, 2016
11:00am EDT
(15:00:00 UTC)
The Most Common Human Incidents - A Forensicator's TaleLance Spitzner, Matt Bromiley
October 25, 2016
1:00pm EDT
(17:00:00 UTC)
Packet Capture + Flow Analytics = Holistic Network VisibilityCisco SystemsBrian Ford
October 24, 2016
1:00pm EDT
(17:00:00 UTC)
Prioritizing the CIS Critical Controls for ICS: Learning from recent incidentsLeidosWalt Sikora, Mike Assante, Tim Conway
October 21, 2016
3:00pm EDT
(19:00:00 UTC)
Intro to SDR Projects: Have Fun Before You Get SeriousLarry Pesce
October 21, 2016
1:00pm EDT
(17:00:00 UTC)
How Security Analysts Master Incident Response with Behavioral AnalyticsExabeamOrion Cassetto, Andy Skrei
October 21, 2016
11:00am EDT
(15:00:00 UTC)
The State of Vulnerability Discovery - How Bug Bounties Are Actually Making a DifferenceBugcrowdDavid Baker, Casey Ellis, John Pescatore
October 20, 2016
1:00pm EDT
(17:00:00 UTC)
From the Trenches, the SANS 2016 Survey on Security and Risk in the Financial Sector: Part 2 Securing Financial EnvironmentsArbor Networks

Forescout Technologies BV

Guidance Software

NSFOCUS

WhiteHat Security
Sandeep Kumar , Anthony Di Bello, G. Mark Hardy, Anil Nandigam
October 19, 2016
1:00pm EDT
(17:00:00 UTC)
From the Trenches, the SANS 2016 Survey on Security and Risk in the Financial Sector: Part 1 Incidents, Risks and PreparednessArbor Networks

Forescout Technologies BV

Guidance Software

NSFOCUS

WhiteHat Security
G. Mark Hardy, Mike Goldgof, Arabella Hallawell
October 18, 2016
1:00pm EDT
(17:00:00 UTC)
What's New for Security in Windows Server 2016?Jason Fossen
October 18, 2016
11:00am EDT
(15:00:00 UTC)
They Can Run, But They Can't Hide: Real-Time Threat Hunting Using Passive DNSFarSight SecurityDr. Paul Vixie, Dave Shackleford
October 17, 2016
1:00pm EDT
(17:00:00 UTC)
Designing and Building a SOC: In-house vs. Out-SourcingChris Crowley
October 14, 2016
8:30am EDT
(12:30:00 UTC)
SANS Financial Services Security Vendor BriefingRecordedFuture

Mcafee LLC

Malwarebytes

NSFOCUS

DomainTools

CYBERBIT Commercial Solutions
October 13, 2016
1:00pm EST
(17:00:00 UTC)
The Internet of Evil Things: How to Detect and Secure Your Vulnerable Devices from the Mirai BotnetJohannes Ullrich
October 12, 2016
1:00pm EDT
(17:00:00 UTC)
Security and Accountability in the Cloud, the SANS 2016 Cloud Security Survey: Part 2 - Changes in Cloud SecurityBitglass

CloudPassage

IBM

Rapid7 Inc.

Mcafee LLC
Steve Grossenbacher, Dave Shackleford, Salim Hafid, Matt Hathaway
October 12, 2016
11:00am EDT
(15:00:00 UTC)
Continuous Opportunity: DevOps & SecurityBen Allen
October 11, 2016
1:00pm EDT
(17:00:00 UTC)
Security and Accountability in the Cloud, the SANS 2016 Cloud Security Survey: Part 1 - Breach Landscape and the Top Threats and ChallengesBitglass

CloudPassage

IBM

Rapid7 Inc.

Mcafee LLC
Mark Campbell, Dave Shackleford, Sami Laine
October 11, 2016
11:00am EDT
(15:00:00 UTC)
EHR Vulnerability Reporting A Cause for Concern?Greg Porter
October 10, 2016
9:00pm EDT
(01:00:00 UTC)
Lets Talk Cyber SecurityMy-Ngoc Nguyen, Dr. Eric Cole
October 6, 2016
1:00pm EDT
(17:00:00 UTC)
Taking Action Against Insider ThreatsDtex SystemsJosh Ablett, Eric Cole
October 5, 2016
1:00pm EDT
(17:00:00 UTC)
2016 Office 365 Security & Risk Benchmarks ReportSkyHigh NetworksBrandon Cook, John Pescatore
October 4, 2016
1:00pm EDT
(17:00:00 UTC)
Bring 5 of the top CIS Critical Security Controls to Life!TaniumKen Robinson, Jennifer Ellard
September 28, 2016
1:00pm EDT
(17:00:00 UTC)
MobileIron Security Labs: Combatting Rising Mobile ThreatsMobileIronJames Plouffe
September 27, 2016
10:00am EDT
(14:00:00 UTC)
Sneak Peek for the European Security Awareness SummitChris Boyd, Masha Sedova, Lance Spitzner
September 26, 2016
3:00pm EDT
(19:00:00 UTC)
Going Mobile: Are Your Apps Putting You at Risk?Eric Johnson
September 22, 2016
3:00pm EST
(19:00:00 UTC)
Compliance Automation with OpenSCAPRed Hat

Intel
Robin Price II
September 22, 2016
11:00am EDT
(15:00:00 UTC)
Monitoring the Most Interesting Network in the World: Insights from the Black Hat NOCRSAScott Carter, Neil R. Wyler
September 21, 2016
1:00pm EDT
(17:00:00 UTC)
Hardening Microservices Security: Building a Layered Defense StrategyCloudFlareMatthew Silverlock, David Hoelzer
September 21, 2016
11:00am EDT
(15:00:00 UTC)
Process Hunting with Microsoft AppLocker: Application Whitelisting is the Killer AppJames Tarala
September 20, 2016
10:00pm EDT
(02:00:00 UTC)
Welcome Threat Hunters, Phishermen, and Other LiarsRob Lee
September 20, 2016
3:00pm EDT
(19:00:00 UTC)
SOC Fundamentals for Your Threat Intelligence ProgramRecordedFutureGlenn Wong, Chris Crowley
September 20, 2016
1:00pm EDT
(17:00:00 UTC)
Threat Intelligence: What It Is, and How to Use It EffectivelyNSFOCUSStephen Gates, Matt Bromiley
September 19, 2016
11:00am EDT
(15:00:00 UTC)
Evasive malware is everywhere: Learn how it works and how to prevent it.Minerva LabsOmri Moyal, John Pescatore
September 15, 2016
9:00pm EST
(01:00:00 UTC)
How to Target Critical Infrastructure: The Adversary Return on Investment from an Industrial Control SystemMatthew Hosburgh
September 15, 2016
1:00pm EDT
(17:00:00 UTC)
Injecting a node.js app using NoSQL and Query Selector InjectionAaron Cure
September 13, 2016
1:00pm EDT
(17:00:00 UTC)
Breach Detected! Could It Have Been Prevented?Palo Alto NetworksBarbara Filkins, Scott Simkin
September 8, 2016
8:00pm EST
(00:00:00 UTC)
Real World Phishing & ExploitationPhillip Bosco
September 8, 2016
1:00pm EDT
(17:00:00 UTC)
Hunting 101 - Back to Basics: Implementing a Proactive Cyber Hunting Approach CybereasonBrad Mecha, Dave Shackleford
September 8, 2016
11:00am EDT
(15:00:00 UTC)
Navigating SANS Pen Test Cheat Sheets for Fun and ProfitEd Skoudis
September 7, 2016
12:00pm EDT
(16:00:00 UTC)
CISO Hot Topic Lunch Session: Communicating Cybersecurity Effectively to CEOs and Boards of DirectorsEndgameJohn Pescatore, Alan Paller
September 7, 2016
9:00am EDT
(13:00:00 UTC)
2016 Threat Landscape Survey Report: Europe EditionCheck Point Software Technologies, Inc.Polomi Batra, Lee Neely
September 6, 2016
1:00pm EDT
(17:00:00 UTC)
Incorporating ICS Cybersecurity Into Water Utility Master PlanningJason Dely
August 31, 2016
1:00pm EDT
(17:00:00 UTC)
Top Office 365 Mail Vulnerabilities: Attacks on your Users Right NowAvananKip James, Michael Landewe
August 30, 2016
1:00pm EDT
(17:00:00 UTC)
National Cyber Security Awareness Month ToolkitCathy Click, Lance Spitzner
August 29, 2016
1:00pm EDT
(17:00:00 UTC)
CISO Success StrategiesFrank Kim
August 25, 2016
8:00pm EDT
(00:00:00 UTC)
Prioritizing Cybersecurity with the Critical Security ControlsWes Whitteker
August 25, 2016
1:00pm EDT
(17:00:00 UTC)
Intelligent Network SecurityThreatSTOPTom Byrnes, Jake Williams
August 24, 2016
1:00pm EDT
(17:00:00 UTC)
Using an Attacker Technique-Based Approach for PreventionEndgameMike Nichols, Dave Shackleford
August 23, 2016
1:00pm EDT
(17:00:00 UTC)
Cyber-Hygiene and Standards of Care: Practical Defenses for HealthcareJames Tarala
August 23, 2016
11:00am EDT
(15:00:00 UTC)
A Credit Union Detected LAN Turtle Attacks in Seconds with Network Access Control from Great Bay Software BeaconGreat Bay SoftwareJeremy Taylor, John Pescatore
August 18, 2016
3:00pm EDT
(19:00:00 UTC)
Practical Open Source Intelligence: Six Tips for Starting an Effective InvestigationMicah Hoffman
August 18, 2016
1:00pm EDT
(17:00:00 UTC)
In Detection, the Only Thing That Matters Is ResultsLightCyberKasey Cross, David Thompson, Dave Shackleford
August 17, 2016
1:00pm EDT
(17:00:00 UTC)
The State of Cyber Threat Intelligence: Part 2: The Value of CTIAlienVault

Anomali

Arbor Networks

HP Enterprise Security

NETSCOUT Systems, Inc.

Rapid7 Inc.
Rebekah Brown, Dave Shackleford, Mark Doering, Aaron Shelmire
August 16, 2016
10:00pm EDT
(02:00:00 UTC)
Designing and Building a SOC: Management FundamentalsChristopher Crowley
August 16, 2016
1:00pm EDT
(17:00:00 UTC)
The State of Cyber Threat Intelligence: Part 1: How Cyber Threat Intelligence Is Consumed and ProcessedAlienVault

Anomali

Arbor Networks

HP Enterprise Security

NETSCOUT Systems, Inc.

Rapid7 Inc.
Dave Shackleford, Arabella Hallawell, Javvad Malik, Chip Witt
August 15, 2016
11:00am EDT
(15:00:00 UTC)
Establishing Street Cred: Fundamental Security Concepts (Hint: Its Not About Technology)Ted Demopoulos
August 12, 2016
9:30am EDT
(13:30:00 UTC)
SANS Threat Intelligence Vendor BriefingRecordedFuture

NSFOCUS

ThreatQuotient

DomainTools
Robert M. Lee
August 11, 2016
1:00pm EDT
(17:00:00 UTC)
2016 Threat Landscape Survey ReportCheck Point Software Technologies, Inc.Polomi Batra, Lee Neely
August 10, 2016
3:00pm EDT
(19:00:00 UTC)
Running a Better Red Team Through Understanding ICS/SCADA Adversary TacticsRobert M. Lee
August 10, 2016
1:00pm EDT
(17:00:00 UTC)
Time is on your side: username harvesting via timing attacksEric Conrad
August 9, 2016
1:00pm EDT
(17:00:00 UTC)
A Sneak Peek at Pokémon Go Forensic ArtifactsCindy Murphy
August 5, 2016
1:00pm EDT
(17:00:00 UTC)
Designing and Building a SOC: Management FundamentalsChristopher Crowley
August 2, 2016
11:00am EDT
(15:00:00 UTC)
Demystifying Cyber Attacks on ICS: How They Work and How to Use Engineered and Cyber Layer of ProtectionsBryan L. Singer, CISSP, CAP
July 29, 2016
1:00pm EDT
(17:00:00 UTC)
Pokémon Go - What To Tell EmployeesJacob Wilson, Thomas McHahon, Jennifer Miller, Lance Spitzner
July 28, 2016
1:00pm EDT
(17:00:00 UTC)
Get Ready for NCSAM 2016Michael Kaiser, Lance Spitzner
July 28, 2016
11:00am EDT
(15:00:00 UTC)
Illuminate Your Network with Security AnalyticsCisco SystemsAndrew Wild
July 26, 2016
5:20pm EDT
(21:20:00 UTC)
ICS-Houston Security BriefingPalo Alto Networks

Waterfall Security

Ultra Electronics, 3eTI
July 21, 2016
1:00pm EDT
(17:00:00 UTC)
Health Care Provider Breaches and Risk Management Roadmaps: Part 2 - Health Care Security from the Top DownAnomali

Carbon Black

Forescout Technologies BV

Great Bay Software

Trend Micro Inc.

WhiteHat Security
Sandeep Kumar , Ed Cabrera, Barbara Filkins, Christopher Strand
July 20, 2016
1:00pm EDT
(17:00:00 UTC)
Health Care Provider Breaches and Risk Management Roadmaps: Part 1 - Health Care Security from the Bottom UpAnomali

Carbon Black

Forescout Technologies BV

Great Bay Software

Trend Micro Inc.

WhiteHat Security
Mike Goldgof, Barbara Filkins, Hugh Njemanze, Ty Powers
July 19, 2016
3:00pm EDT
(19:00:00 UTC)
Incident or Breach?Hal Pomeranz, Benjamin Wright
July 19, 2016
11:00am EDT
(15:00:00 UTC)
Why Layered Security Strategies Do Not Work and What You Can Do About ItPalo Alto NetworksNavneet Singh
July 14, 2016
3:00pm EDT
(19:00:00 UTC)
Ransomware & Malvertising: Dominating the Threat LandscapeMalwarebytesAdam Kujawa, Dana Torgersen, John Pescatore
July 14, 2016
11:00am EDT
(15:00:00 UTC)
Case Study: See How Aruba Networks Uses Bug Bounties to Discover Vulnerabilities, FasterBugcrowdLeif Dreizler, John Pescatore, Jon Green
July 13, 2016
12:00pm EDT
(16:00:00 UTC)
Decision Criteria and Analysis for Hardware-Based EncryptionTHALES e-SecurityEric Cole, John Grimm
July 12, 2016
1:00pm EDT
(17:00:00 UTC)
Beyond Infiltration: Conquering all Stages of the Attack LifecycleCybereasonLotem Guy , John Pescatore
July 5, 2016
1:00pm EDT
(17:00:00 UTC)
Internet of Things (IoT) and Embedded Device Security Research - A PrimerBilly Rios
June 30, 2016
3:00pm EST
(19:00:00 UTC)
What You Need to Know: iOS 10 SecurityJoshua Wright
June 30, 2016
1:00pm EST
(17:00:00 UTC)
Going Mobile: Are your apps putting you at risk?Gregory Leonard
June 29, 2016
1:00pm EDT
(17:00:00 UTC)
Where Are We Now?: The SANS 2016 ICS SurveyAnomali

Arbor Networks

Belden

Carbon Black
Derek Harp, Bengt Gregory-Brown, Arabella Hallawell, David Meltzer, Christopher Strand, Jason Trost
June 29, 2016
11:00am EST
(15:00:00 UTC)
Continuous Opportunity: DevOps & SecurityBen Allen
June 22, 2016
1:00pm EDT
(17:00:00 UTC)
The End of IOCs: A Case Study on Resolving Persistent Attacks Using Tactics, Techniques, and Procedures (TTPs)CybereasonIsrael Barak, Dave Shackleford
June 21, 2016
1:00pm EDT
(17:00:00 UTC)
Bridging the Insurance/InfoSec Gap: The SANS 2016 Cyber Insurance SurveyPivotPoint Risk AnalyticsBarbara Filkins, Benjamin Wright, Dave Bradford, Julian Waits
June 20, 2016
1:00pm EDT
(17:00:00 UTC)
Malware Analysis and Adversary Infrastructure Mapping: A One-Two PunchDomainToolsTim Helming, Alissa Torres
June 20, 2016
11:00am EST
(15:00:00 UTC)
What we all need to learn from recent ICS incidentsMike Assante, Tim Conway
June 15, 2016
3:00pm EDT
(19:00:00 UTC)
Warning: Email may be Hazardous to your businessBAE Systems Applied IntelligenceJohn Devenyns
June 15, 2016
1:00pm EDT
(17:00:00 UTC)
MobileIron Mobile Security and Risk Review Research ResultsMobileIronDavid Schwartzberg
June 14, 2016
1:00pm EDT
(17:00:00 UTC)
The Case for PIM/PAM in Today's InfosecCA, Inc.Ken Ammon, Barbara Filkins
June 10, 2016
11:00am EDT
(15:00:00 UTC)
How is User Risk Mitigation achieved? Achieving user risk mitigation-stopping the insider threatForcepoint LLCDaniel Velez, Dr. Eric Cole
June 9, 2016
8:00pm EDT
(00:00:00 UTC)
No Python Allowed: learning a whole new language to sell the Critical Security ControlsPaul Hershberger
June 9, 2016
1:00pm EDT
(17:00:00 UTC)
Incident Response Capabilities in 2016 - Part 2: Emerging Trends in Incident Response and Survey ResultsAlienVault

Arbor Networks

HP Enterprise Security

IBM

Mcafee LLC

LogRhythm

NETSCOUT Systems, Inc.

Veriato
Matt Bromiley, Jack Doyle, Rob Lee, Mark Painter, Arabella Hallawell, Ryan Sommers
June 8, 2016
1:00pm EDT
(17:00:00 UTC)
Incident Response Capabilities in 2016 - Part 1: The Current Threat Landscape and Survey ResultsAlienVault

Arbor Networks

HP Enterprise Security

IBM

Mcafee LLC

LogRhythm

NETSCOUT Systems, Inc.

Veriato
Matt Bromiley, Rob Lee, Don Shin, Tamar Shafler, Ismael Valenzuela, Ann Sun
June 7, 2016
1:00pm EDT
(17:00:00 UTC)
ICS Network SegmentationDan Morrow, Brett Young
June 3, 2016
1:00pm EST
(17:00:00 UTC)
(Am)Cache rules everything around meEric Zimmerman
June 2, 2016
1:00pm EDT
(17:00:00 UTC)
A Blueprint to Secure SAP Applications Using CIS Controls As a GuideOnapsisBarbara Filkins, Alex Horan
May 31, 2016
1:00pm EDT
(17:00:00 UTC)
Sneak Peek for the 2016 Security Awareness SummitLance Spitzner
May 26, 2016
3:00pm EDT
(19:00:00 UTC)
Effective Monitoring and Defense in Financial ServicesPalo Alto NetworksLawrence Chin, David Hoelzer
May 26, 2016
1:00pm EDT
(17:00:00 UTC)
What Works in Threat Prevention: Detecting and Stopping Attacks more Accurately and Quickly with ThreatstopThreatSTOPKenneth Compres, John Pescatore
May 25, 2016
1:00pm EDT
(17:00:00 UTC)
Why So Many Endpoint Attacks Are Still Going Undetected - And What You Can Do About ItRSAMark Stacey, Chris Ahearn, John Pescatore
May 24, 2016
1:00pm EDT
(17:00:00 UTC)
A New Perspective on Patch ManagementFlexera SoftwareMarcelo Pereira, John Pescatore
May 24, 2016
11:00am EDT
(15:00:00 UTC)
iOS Location ForensicsSarah Edwards
May 20, 2016
1:00pm EDT
(17:00:00 UTC)
Next Level in Cyber Threat Intelligence Training: New FOR578Robert M. Lee
May 19, 2016
1:00pm EDT
(17:00:00 UTC)
How to Negotiate a Cyber Insurance Policy Amy Elizabeth Stewart, Benjamin Wright
May 19, 2016
11:00am EDT
(15:00:00 UTC)
systemd and You!Hal Pomeranz
May 18, 2016
1:00pm EDT
(17:00:00 UTC)
Scapy and Snort, Packet Peanut Butter and JellyJudy Novak, Mike Poor
May 18, 2016
11:00am EDT
(15:00:00 UTC)
Are you serious? Now I have to worry about BYoD and IoT threats?Pwnie ExpressYolonda Smith, Paul Paget, John Pescatore
May 17, 2016
7:00pm EDT
(23:00:00 UTC)
2016 Security Awareness Report (Special APAC Edition)Lance Spitzner
May 17, 2016
3:00pm EDT
(19:00:00 UTC)
Practical and Open Source Threat IntelligenceJames Tarala
May 17, 2016
12:00pm EDT
(16:00:00 UTC)
Windows Exploratory Surgery with Process HackerJason Fossen
May 16, 2016
1:00pm EDT
(17:00:00 UTC)
Shell items, More than Meets the EyeDavid Cowen
May 13, 2016
1:00pm EDT
(17:00:00 UTC)
Know Normal, Find Evil: Windows 10 Memory Forensics OverviewAlissa Torres
May 12, 2016
1:00pm EDT
(17:00:00 UTC)
Why Train and Who to Train for Education and GovernmentRandy Marchany, Lance Spitzner
May 11, 2016
1:00pm EDT
(17:00:00 UTC)
Using the Critical Security Controls to Prevent Ransomware in HealthcarePalo Alto NetworksMatthew Mellen, James Tarala
May 11, 2016
11:00am EDT
(15:00:00 UTC)
This phish goes to 11, w/ Guest: SNOW [DEF CON 22 Social Engineering CtF - Black Badge Winner]Stephanie Carruthers
May 10, 2016
1:00pm EDT
(17:00:00 UTC)
Connecting the Dots Between Your Threat Intelligence Tradecraft and Business OperationsSurfWatch LabsAdam Meyer, John Pescatore
May 3, 2016
1:00pm EDT
(17:00:00 UTC)
Learn to Trust Your Insecure ICS NetworksDavid Mattes, Lisa Lorenzin
April 28, 2016
1:00pm EDT
(17:00:00 UTC)
Cracking the Code on SaaS Security & ComplianceSkyHigh NetworksBrandon Cook
April 28, 2016
11:00am EDT
(15:00:00 UTC)
Analyzing Analytics: Turning Big Data into Security IntelligenceCisco SystemsTim (TK) Keanani
April 27, 2016
3:00pm EDT
(19:00:00 UTC)
How to Produce a World-Class Threat Intelligence Capability From ScratchRecordedFutureLevi Gundert, John Pescatore
April 27, 2016
1:00pm EDT
(17:00:00 UTC)
Managing Applications Securely: A SANS SurveyCheckmarx Inc.

Veracode

WhiteHat Security
Johannes Ullrich, Amit Ashbel, Tim Jarrett, Ryan O'Leary
April 27, 2016
10:00am EDT
(14:00:00 UTC)
Stopping CEO FraudFBI, Special Agent Cyber Crimes Division, Lance Spitzner
April 26, 2016
1:00pm EDT
(17:00:00 UTC)
2016 Security Awareness Report Findings - How STH is Helping YouDan deBeaubien, Danielle Ventre-Olson, Lisa Murray-Johnson, Lance Spitzner
April 26, 2016
11:00am EDT
(15:00:00 UTC)
Overcome Privilege Management Obstacles with CSC v. 6AppsenseJon Wallace, John Pescatore
April 25, 2016
3:00pm EDT
(19:00:00 UTC)
Are network-centric practices undermining your SOC?Brandie Anderson
April 22, 2016
1:00pm EDT
(17:00:00 UTC)
DNS Evidence: You Dont Know What Youre MissingPhilip Hagen
April 20, 2016
2:00pm EDT
(18:00:00 UTC)
Securing the Internet of Old Things (IoOT)MalwarebytesJean-Philippe Taggart, Dana Torgersen, G.W. Ray Davidson, PhD
April 19, 2016
11:00pm EDT
(03:00:00 UTC)
SANS Asia-Pacific Webcast Series- Basic Mobile Application Reverse Engineering and a Free Trip to VegasTim Medin
April 19, 2016
3:00pm EDT
(19:00:00 UTC)
Security Leadership: How to Increase the Success of Your ProjectsJeff Frisk
April 15, 2016
1:00pm EDT
(17:00:00 UTC)
Open Season on Cyberthreats: Part 2- Threat Hunting Methodologies and ToolsCarbon Black

DomainTools

Endgame

HPE

Malwarebytes

Sqrrl Data, Inc.
Ely Kahn, Eric Cole, Tim Helming, Mike Nichols
April 14, 2016
3:00pm EDT
(19:00:00 UTC)
2016 Awareness Report - Lessons Learned for Education and State / Local GovernmentAshley Sudderth, Mark Evans, Lance Spitzner
April 14, 2016
1:00pm EDT
(17:00:00 UTC)
Open Season on Cyberthreats: Part I- Threat Hunting 101Carbon Black

DomainTools

Endgame

HPE

Malwarebytes

Sqrrl Data, Inc.
Ryan Cason, Eric Cole, Mark Painter, Dana Torgersen
April 13, 2016
1:00pm EDT
(17:00:00 UTC)
BadLock: What you need to knowVeracodeChris Wysopal, Johannes Ullrich, PhD
April 13, 2016
11:00am EDT
(15:00:00 UTC)
HTTP/2 & Websockets Are Gonna Change the Pen Test World. Are You Ready?Adrien de Beaupre, Justin Searle
April 12, 2016
1:15pm EDT
(17:15:00 UTC)
LIVE from THIR Summit in New Orleans: The Most Dangerous Game; Evolving Threat Hunting to Keep Up with Skilled AdversariesCarbon Black
April 8, 2016
1:00pm EDT
(17:00:00 UTC)
To trust or not to trust: The relationship between you & your mobile forensics toolHeather Mahalik
April 7, 2016
1:00pm EDT
(17:00:00 UTC)
Gamification of a Fortune 20 SOCHPEJosh Stevens, Marcel Hoffmann
March 31, 2016
1:00pm EDT
(17:00:00 UTC)
Mapping Attack Infrastructure: Leave Your Foe With Nowhere to HideRiskIQStephen Ginty, John Pescatore
March 29, 2016
1:00pm EDT
(17:00:00 UTC)
Evolving from cyber Gatherers to cyber Hunters - Darwin was wrong about APTsArbor NetworksDarren Anstee, John Pescatore
March 29, 2016
11:00am EDT
(15:00:00 UTC)
2016 Security Awareness Report Key FindingsLance Hayden, Bob Rudis, Lance Spitzner
March 24, 2016
3:00pm EDT
(19:00:00 UTC)
Expect the Unexpected, Preparing for the Inevitable Cyber BreachLancopeJoseph Muniz
March 24, 2016
1:00pm EDT
(17:00:00 UTC)
Mobile Data Loss - Threats & Countermeasures MobileIronMichael T. Raggo
March 24, 2016
11:00am EDT
(15:00:00 UTC)
Facilitating Fluffy Forensics 2.0Andrew Hay
March 23, 2016
1:00pm EDT
(17:00:00 UTC)
What Works: Inspecting Encrypted Traffic with the Blue Coat SSL Visibility ApplianceBlue Coat Systems, Inc.Michael Weinstein, John Pescatore
March 22, 2016
1:00pm EDT
(17:00:00 UTC)
Ensuring Compliance and Detecting Suspicious Activity with Promisec Endpoint ManagerPromisecNoel Slane, Dave Shackleford
March 18, 2016
1:00pm EDT
(17:00:00 UTC)
SANS 2016 Endpoint Security Survey Part 2: Can We Say Next-Gen Yet? Guidance Software

Great Bay Software

IBM

Malwarebytes

Sophos Inc.
Marty Ward, Anthony Di Bello, G.W. Ray Davidson, PhD
March 17, 2016
1:00pm EDT
(17:00:00 UTC)
SANS 2016 Endpoint Security Survey Part 1: The Evolving Definition of EndpointsGuidance Software

Great Bay Software

IBM

Malwarebytes

Sophos Inc.
G.W. Ray Davidson, PhD, Sara Lofgren, Dana Torgersen, Lee Wei
March 16, 2016
1:00pm EDT
(17:00:00 UTC)
Bring Your Own Collaboration Technical Control TradeoffsFinal CodeDave Shackleford, Scott Gordon
March 15, 2016
1:00pm EDT
(17:00:00 UTC)
Benchmarking AppSec: A Metrics PyramidVeracodeTim Jarrett, Jim Bird
March 14, 2016
7:15pm EDT
(23:15:00 UTC)
Analyzing the Ukrainian Power Grid Cyber-AttacksWaterfall SecurityJake Williams
March 10, 2016
3:00pm EST
(20:00:00 UTC)
10 Quick Win, Industry Agnostic SIEM DashboardsCraig Bowser
March 10, 2016
1:00pm EST
(18:00:00 UTC)
Is Active Breach Detection the Next-Generation Security Technology?EastWind NetworksPaul Kraus, Dave Shackleford
March 9, 2016
2:00pm EST
(19:00:00 UTC)
Security Awareness: Understanding and Managing Your Top Seven Human RisksLance Spitzner
March 8, 2016
1:00pm EST
(18:00:00 UTC)
A DevSecOps PlaybookCloudPassageAmrit Williams, Dave Shackleford
March 7, 2016
9:00pm EST
(02:00:00 UTC)
Passive DNS Logs: The Pulse of the NetworkPhilip Hagen
March 2, 2016
1:00pm EST
(18:00:00 UTC)
How To Become A SANS InstructorEric Conrad
February 26, 2016
1:00pm EST
(18:00:00 UTC)
SIFT and REMnux: Wonder Twin Powers Activate!Lenny Zeltser, Rob Lee
February 26, 2016
11:00am EST
(16:00:00 UTC)
Predicting Future Attacks and Breaches: Analytics in ActionSAS INSTITUTE INCChristopher Smith, Dave Shackleford
February 25, 2016
9:00pm EST
(02:00:00 UTC)
Security Leadership For Everyone: Personal Authority and BeyondTed Demopoulos
February 25, 2016
3:00pm EST
(20:00:00 UTC)
SANS VetSuccess Academy sponsored by Solutionary - open now!Solutionary, Inc.Maxwell Shuftan, Arlin Halstead
February 24, 2016
1:00pm EST
(18:00:00 UTC)
Hunting and Farming : Concepts and Strategies to Improve Your Cyber DefensesCarbon BlackBen Johnson
February 24, 2016
6:00am EST
(11:00:00 UTC)
Making Risk Assessment UsefulDavid Hoelzer
February 23, 2016
1:00pm EST
(18:00:00 UTC)
The Effectiveness of Microsoft's EMETStephen Sims
February 23, 2016
11:00am EDT
(16:00:00 UTC)
iPhone Forensics - Separating the Facts from Fiction. A Technical Autopsy of the Apple/FBI DebateCindy Murphy, Sarah Edwards, Heather Mahalik
February 19, 2016
3:00pm EDT
(20:00:00 UTC)
GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerabilityVeracodeJohannes Ullrich, PhD, Chris Eng
February 19, 2016
10:00am EDT
(15:00:00 UTC)
GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerabilityVeracodeJohannes Ullrich, PhD, Chris Eng
February 18, 2016
1:00pm EST
(18:00:00 UTC)
Dizzy New World of Cyber Investigations: Law, Ethics and EvidenceBenjamin Wright
February 18, 2016
12:00am EST
(05:00:00 UTC)
How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...Bryce Galbraith
February 17, 2016
11:00am EDT
(16:00:00 UTC)
Case Study: How the City of Lewiston Improved Threat Detection with AlienVault USMAlienVaultDave Shackleford
February 12, 2016
3:00pm EST
(20:00:00 UTC)
Implementing a Successful Continuous Monitoring program with Open Source / Free ToolsIsmael Valenzuela
February 11, 2016
1:00pm EST
(18:00:00 UTC)
Getting Started with Web Application Security VeracodeJoseph Feiman, Gregory Leonard
February 9, 2016
6:00pm EST
(23:00:00 UTC)
CISO Hot Topic: Communicating to and Influencing CEOs and Boards of Directors: What Works and What to AvoidPalo Alto NetworksJohn Pescatore, Alan Paller
February 9, 2016
1:00pm EST
(18:00:00 UTC)
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and DevicesSkycureMic McCully, Lee Neely
February 8, 2016
1:00pm EST
(18:00:00 UTC)
Risky Business: Evaluating the True Risk to your Security ProgramWhiteHat SecurityJenna McAuley, Mike Goldgof, Demetrios Lazarikos (Laz) , Johannes Ullrich, PhD
February 5, 2016
3:00pm EST
(20:00:00 UTC)
Scaling Big Data Analytics: SANS Review of LogRhythm 7 Analytics and Intelligence UpgradesLogRhythmDave Shackleford, Erick Ingleby
February 4, 2016
1:00pm EST
(18:00:00 UTC)
Security Leadership: Strategies for SuccessFrank Kim
February 3, 2016
1:00pm EST
(18:00:00 UTC)
SANS 2016 IT Security Spending Strategies SurveyArbor Networks

Gigamon
Simon Gibson, G. Mark Hardy, Barbara Filkins, Gary Sockrider
February 2, 2016
1:00pm EST
(18:00:00 UTC)
Threat HuntingSqrrl Data, Inc.Luis Maldonado, Robert M. Lee, Rob Lee
January 28, 2016
1:00pm EST
(18:00:00 UTC)
Why You Need Application SecurityVeracodeJoseph Feiman, Johannes Ullrich
January 27, 2016
1:00pm EST
(18:00:00 UTC)
The Frankenstein Framework - Assembling the Pieces to Enhance ICS Security Without Creating a MonsterJustin Opatny
January 21, 2016
11:00am EST
(16:00:00 UTC)
An Analysis of the Sandworm Team in UkraineRobert M. Lee
January 20, 2016
8:00pm EST
(01:00:00 UTC)
Security Program Development, Maturity Models and Security Dashboards that help you manage riskDean Sapp
January 19, 2016
3:00pm EST
(20:00:00 UTC)
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingAlex Pinto
January 19, 2016
1:00pm EST
(18:00:00 UTC)
How to Leverage The Critical Controls in 2016Randy Marchany
January 18, 2016
1:00pm EST
(18:00:00 UTC)
Threat Intelligence AwakensRick Holland
January 14, 2016
3:00pm EST
(20:00:00 UTC)
WhatWorks in AppSec: ASP.NET Web API Security
January 13, 2016
1:00pm EST
(18:00:00 UTC)
From the Front Lines: Practical Application of DNS Threat Intel Data DomainToolsTim Helming, Robert M. Lee
January 12, 2016
3:00pm EST
(20:00:00 UTC)
Intelligent Intelligence: Secrets to Threat Intel SuccessDavid Bianco
January 12, 2016
1:00pm EST
(18:00:00 UTC)
Know Before You Go: Key AWS Security ConsiderationsPalo Alto NetworksMatt Keil, Dave Shackleford
January 12, 2016
9:00am EST
(14:00:00 UTC)
Smartphone Forensics Moves Fast. Stay Current or You May Miss Relevant Evidence!Heather Mahalik
January 11, 2016
10:00am EST
(15:00:00 UTC)
What's New for Security in Windows 10 and Server 2016?Jason Fossen
January 6, 2016
12:00pm EST
(17:00:00 UTC)
Are You Ready for Threat Intelligence? Behind the Scenes with FOR578Mike Cloppert, Robert M. Lee
January 5, 2016
12:00pm EST
(17:00:00 UTC)
Deconstructing the Reports of Iranian Activity Against the Power Grid and New York DamMike Assante, Robert M. Lee

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.