Webcasts: Archive

Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.
Archive
Date (in UTC) Title Sponsor Speaker
May 26, 2016 Effective Monitoring and Defense in Financial ServicesPalo Alto Networks David Hoelzer, Lawrence Chin
May 26, 2016What Works in Threat Prevention: Detecting and Stopping Attacks more Accurately and Quickly with ThreatstopThreatSTOPJohn Pescatore, Kenneth Compres
May 25, 2016Why So Many Endpoint Attacks Are Still Going Undetected - And What You Can Do About ItRSAJohn Pescatore, Chris Ahearn, Mark Stacey
May 24, 2016A New Perspective on Patch ManagementFlexera SoftwareJohn Pescatore, Marcelo Pereira
May 24, 2016 iOS Location ForensicsSarah Edwards
May 20, 2016Next Level in Cyber Threat Intelligence Training: New FOR578Robert M. Lee
May 19, 2016How to Negotiate a Cyber Insurance Policy Benjamin Wright, Amy Elizabeth Stewart
May 19, 2016systemd and You!Hal Pomeranz
May 18, 2016Scapy and Snort, Packet Peanut Butter and JellyMike Poor, Judy Novak
May 18, 2016Are you serious? Now I have to worry about BYoD and IoT threats?Pwnie ExpressJohn Pescatore, Paul Paget, Yolonda Smith
May 17, 20162016 Security Awareness Report (Special APAC Edition)Lance Spitzner
May 17, 2016Practical and Open Source Threat IntelligenceJames Tarala
May 17, 2016Windows Exploratory Surgery with Process HackerJason Fossen
May 16, 2016Shell items, More than Meets the EyeDavid Cowen
May 13, 2016Know Normal, Find Evil: Windows 10 Memory Forensics OverviewAlissa Torres
May 12, 2016How Aruba leveraged bug bounty hunters to battle test their networking solutionsBugcrowdJohn Pescatore, Jon Green, Leif Dreizler
May 12, 2016Why Train and Who to Train for Education and GovernmentLance Spitzner, Randy Marchany
May 11, 2016Using the Critical Security Controls to Prevent Ransomware in HealthcarePalo Alto NetworksJames Tarala, Matthew Mellen
May 11, 2016This phish goes to 11, w/ Guest: SNOW [DEF CON 22 Social Engineering CtF - Black Badge Winner]Stephanie Carruthers
May 10, 2016Connecting the Dots Between Your Threat Intelligence Tradecraft and Business OperationsSurfWatch LabsJohn Pescatore, Adam Meyer
May 3, 2016Learn to Trust Your Insecure ICS NetworksLisa Lorenzin, David Mattes
Apr 28, 2016 Cracking the Code on SaaS Security & ComplianceSkyHigh NetworksBrandon Cook
Apr 28, 2016Analyzing Analytics: Turning Big Data into Security IntelligenceCisco SystemsTim (TK) Keanani
Apr 27, 2016How to Produce a World-Class Threat Intelligence Capability From ScratchRecordedFutureJohn Pescatore, Levi Gundert
Apr 27, 2016Managing Applications Securely: A SANS SurveyCheckmarx Inc.

Veracode

WhiteHat Security
Johannes Ullrich, Tim Jarrett, Amit Ashbel, Ryan O'Leary
Apr 27, 2016Stopping CEO FraudLance Spitzner, FBI, Special Agent Cyber Crimes Division
Apr 26, 20162016 Security Awareness Report Findings - How STH is Helping YouLance Spitzner, Dan deBeaubien, Lisa Murray-Johnson, Danielle Ventre-Olson
Apr 26, 2016Overcome Privilege Management Obstacles with CSC v. 6AppsenseJohn Pescatore, Jon Wallace
Apr 25, 2016Are network-centric practices undermining your SOC?Brandie Anderson
Apr 22, 2016DNS Evidence: You Dont Know What Youre MissingPhilip Hagen
Apr 20, 2016Securing the Internet of Old Things (IoOT)MalwarebytesG.W. Ray Davidson, PhD, Dana Torgersen, Jean-Philippe Taggart
Apr 20, 2016SANS Asia-Pacific Webcast Series- Basic Mobile Application Reverse Engineering and a Free Trip to VegasTim Medin
Apr 19, 2016Security Leadership: How to Increase the Success of Your ProjectsJeff Frisk
Apr 15, 2016Open Season on Cyberthreats: Part 2- Threat Hunting Methodologies and ToolsCarbon Black

DomainTools

Endgame

Hewlett Packard Enterprise

Malwarebytes

Sqrrl Data, Inc.
Eric Cole, Tim Helming, Mike Nichols, Ely Kahn
Apr 14, 20162016 Awareness Report - Lessons Learned for Education and State / Local GovernmentLance Spitzner, Mark Evans, Ashley Sudderth
Apr 14, 2016Open Season on Cyberthreats: Part I- Threat Hunting 101Carbon Black

DomainTools

Endgame

Hewlett Packard Enterprise

Malwarebytes

Sqrrl Data, Inc.
Eric Cole, Mark Painter, Ryan Cason, Dana Torgersen
Apr 13, 2016BadLock: What you need to knowVeracodeJohannes Ullrich, PhD, Chris Wysopal
Apr 13, 2016HTTP/2 & Websockets Are Gonna Change the Pen Test World. Are You Ready?Justin Searle, Adrien de Beaupre
Apr 12, 2016LIVE from THIR Summit in New Orleans: The Most Dangerous Game; Evolving Threat Hunting to Keep Up with Skilled AdversariesCarbon Black
Apr 8, 2016To trust or not to trust: The relationship between you & your mobile forensics toolHeather Mahalik
Apr 7, 2016Gamification of a Fortune 20 SOCHewlett Packard Enterprise Marcel Hoffmann, Josh Stevens
Mar 31, 2016Mapping Attack Infrastructure: Leave Your Foe With Nowhere to HideRiskIQJohn Pescatore, Stephen Ginty
Mar 29, 2016Evolving from cyber Gatherers to cyber Hunters - Darwin was wrong about APTsArbor NetworksJohn Pescatore, Darren Anstee
Mar 29, 20162016 Security Awareness Report Key FindingsLance Spitzner, Bob Rudis, Lance Hayden
Mar 24, 2016Expect the Unexpected, Preparing for the Inevitable Cyber BreachLancopeJoseph Muniz
Mar 24, 2016Mobile Data Loss - Threats & Countermeasures MobileIronMichael T. Raggo
Mar 24, 2016Facilitating Fluffy Forensics 2.0Andrew Hay
Mar 23, 2016 What Works: Inspecting Encrypted Traffic with the Blue Coat SSL Visibility ApplianceBlue Coat Systems, Inc.John Pescatore, Michael Weinstein
Mar 22, 2016Ensuring Compliance and Detecting Suspicious Activity with Promisec Endpoint ManagerPromisecDave Shackleford, Noel Slane
Mar 18, 2016SANS 2016 Endpoint Security Survey Part 2: Can We Say Next-Gen Yet? Guidance Software

Great Bay Software

IBM

Malwarebytes

Sophos Inc.
G.W. Ray Davidson, PhD, Anthony Di Bello, Marty Ward
Mar 17, 2016SANS 2016 Endpoint Security Survey Part 1: The Evolving Definition of EndpointsGuidance Software

Great Bay Software

IBM

Malwarebytes

Sophos Inc.
G.W. Ray Davidson, PhD, Dana Torgersen, Lee Wei, Sara Lofgren
Mar 16, 2016 Bring Your Own Collaboration Technical Control TradeoffsFinal CodeScott Gordon, Dave Shackleford
Mar 15, 2016Benchmarking AppSec: A Metrics PyramidVeracodeJim Bird, Tim Jarrett
Mar 14, 2016Analyzing the Ukrainian Power Grid Cyber-AttacksWaterfall SecurityJake Williams
Mar 10, 201610 Quick Win, Industry Agnostic SIEM DashboardsCraig Bowser
Mar 10, 2016Is Active Breach Detection the Next-Generation Security Technology?EastWind NetworksDave Shackleford, Paul Kraus
Mar 9, 2016Security Awareness: Understanding and Managing Your Top Seven Human RisksLance Spitzner
Mar 8, 2016A DevSecOps PlaybookCloudPassageDave Shackleford, Amrit Williams
Mar 8, 2016Passive DNS Logs: The Pulse of the NetworkPhilip Hagen
Mar 2, 2016How To Become A SANS InstructorEric Conrad
Feb 26, 2016SIFT and REMnux: Wonder Twin Powers Activate!Rob Lee, Lenny Zeltser
Feb 26, 2016Predicting Future Attacks and Breaches: Analytics in ActionSAS INSTITUTE INCDave Shackleford, Christopher Smith
Feb 26, 2016Security Leadership For Everyone: Personal Authority and BeyondTed Demopoulos
Feb 25, 2016SANS VetSuccess Academy sponsored by Solutionary - open now!Solutionary, Inc.Arlin Halstead, Maxwell Shuftan
Feb 24, 2016Hunting and Farming : Concepts and Strategies to Improve Your Cyber DefensesCarbon BlackBen Johnson
Feb 24, 2016Making Risk Assessment UsefulDavid Hoelzer
Feb 23, 2016The Effectiveness of Microsoft's EMETStephen Sims
Feb 23, 2016iPhone Forensics - Separating the Facts from Fiction. A Technical Autopsy of the Apple/FBI DebateHeather Mahalik, Sarah Edwards, Cindy Murphy
Feb 19, 2016GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerabilityVeracodeChris Eng, Johannes Ullrich, PhD
Feb 19, 2016GHOST 2.0: What do you need to know about the glibc getaddrinfo vulnerabilityVeracodeChris Eng, Johannes Ullrich, PhD
Feb 18, 2016Dizzy New World of Cyber Investigations: Law, Ethics and EvidenceBenjamin Wright
Feb 18, 2016How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...Bryce Galbraith
Feb 17, 2016Case Study: How the City of Lewiston Improved Threat Detection with AlienVault USMAlienVaultDave Shackleford
Feb 12, 2016Implementing a Successful Continuous Monitoring program with Open Source / Free ToolsIsmael Valenzuela
Feb 11, 2016Getting Started with Web Application Security VeracodeGregory Leonard, Joseph Feiman
Feb 9, 2016CISO Hot Topic: Communicating to and Influencing CEOs and Boards of Directors: What Works and What to AvoidPalo Alto NetworksAlan Paller, John Pescatore
Feb 9, 2016Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and DevicesSkycureLee Neely, Mic McCully
Feb 8, 2016Risky Business: Evaluating the True Risk to your Security ProgramWhiteHat SecurityJohannes Ullrich, PhD, Demetrios Lazarikos (Laz) , Mike Goldgof, Jenna McAuley
Feb 5, 2016Scaling Big Data Analytics: SANS Review of LogRhythm 7 Analytics and Intelligence UpgradesLogRhythmErick Ingleby, Dave Shackleford
Feb 4, 2016Security Leadership: Strategies for SuccessFrank Kim
Feb 3, 2016SANS 2016 IT Security Spending Strategies SurveyArbor Networks

Gigamon
Gary Sockrider, Barb Filkins, G. Mark Hardy, Simon Gibson
Feb 2, 2016Threat HuntingSqrrl Data, Inc.Rob Lee, Robert M. Lee, Luis Maldonado
Jan 28, 2016Why You Need Application SecurityVeracodeJohannes Ullrich, Joseph Feiman
Jan 27, 2016The Frankenstein Framework - Assembling the Pieces to Enhance ICS Security Without Creating a MonsterJustin Opatny
Jan 21, 2016An Analysis of the Sandworm Team in UkraineRobert M. Lee
Jan 21, 2016Security Program Development, Maturity Models and Security Dashboards that help you manage riskDean Sapp
Jan 19, 2016Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and SharingAlex Pinto
Jan 19, 2016How to Leverage The Critical Controls in 2016Randy Marchany
Jan 18, 2016Threat Intelligence AwakensRick Holland
Jan 14, 2016WhatWorks in AppSec: ASP.NET Web API Security
Jan 13, 2016From the Front Lines: Practical Application of DNS Threat Intel Data DomainToolsRobert M. Lee, Tim Helming
Jan 12, 2016 Intelligent Intelligence: Secrets to Threat Intel SuccessDavid Bianco
Jan 12, 2016Know Before You Go: Key AWS Security ConsiderationsPalo Alto NetworksDave Shackleford, Matt Keil
Jan 12, 2016Smartphone Forensics Moves Fast. Stay Current or You May Miss Relevant Evidence!Heather Mahalik
Jan 11, 2016What's New for Security in Windows 10 and Server 2016?Jason Fossen
Jan 6, 2016Are You Ready for Threat Intelligence? Behind the Scenes with FOR578Robert M. Lee, Mike Cloppert
Jan 5, 2016Deconstructing the Reports of Iranian Activity Against the Power Grid and New York DamRobert M. Lee, Mike Assante

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, email sales@sans.org for more information.