4 Days Left to Save $200 on Automotive Cybersecurity Summit 2017

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Mar 24, 2017A Case Study: Exploring Potential Attack Methods and Sophisticated Security Defenses for the World's Power PlantsClarotyPatrick McBride
Mar 24, 2017FISMA Compliance for Containerized AppsRed HatJason Callaway
Mar 24, 2017The Efficiency of Context: Review of WireX Network Forensics PlatformWireX Systems
Mar 24, 2017The Efficiency of Context: Review of WireX Network Forensics PlatformWireX Systems
Mar 23, 2017Threat Hunting 102: Beyond the Basics, Maturing Your Threat Hunting ProgramCybereasonBrad Mecha, Dave Shackleford
Mar 23, 2017MobileIron Security Labs: Combatting the Current State of Mobile Enterprise SecurityMobileIronJames Plouffe
Mar 23, 2017Profiling Online Personas: Are We Sharing Too Much?Lance Spitzner, Micah Hoffman
Mar 22, 2017Changing the Game in Public Cloud SecurityPalo Alto NetworksErik Yunghans, Scott Simkin, Dave Shackleford
Mar 21, 2017Threat Hunting with Indicators: Not for Prevention AnymorePhilip Hagen
Mar 21, 20172017 Cybersecurity Trends: Aiming Ahead of the Target to Increase SecurityQualysChris Carlson, John Pescatore
Mar 17, 2017Breaking Red - Understanding Threats through Red TeamingJames Tubberville, Joe Vest
Mar 17, 2017Protecting Business Mobility Against Emerging ThreatsInfoBloxPrakash Nagpal, John Pescatore
Mar 16, 2017I Don't Give One IoTA: Introducing the Internet of Things Attack MethodologyLarry Pesce
Mar 16, 2017Cyber Threat Intelligence in Action-Effectiveness of CTI Programs and Wish Lists for the Future: Results of the 2017 Cyber Threat Intelligence Survey Part 2Anomali

Arbor Networks

DomainTools

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.

ThreatConnect
Travis Farral, Rebekah Brown, Dave Shackleford, Allan Thomson
Mar 15, 2017Cyber Threat Intelligence in Action-Skills and Implementations: Results of the 2017 Cyber Threat Intelligence Survey Part 1Anomali

Arbor Networks

DomainTools

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.

ThreatConnect
Zach Hill, Robert Simmons, Paul Bowen, Dave Shackleford
Mar 15, 2017Going Past the Wire: Leveraging Social Engineering in Physical Security AssessmentsStephanie Carruthers
Mar 14, 2017How the new Preemptive Incident Response methodology can slash end-to-end IR time for SOC teams to minutes and solve alert fatigueSECDOGil Barak, John Pescatore
Mar 14, 2017Ransomware Remedies: Decoding and Dealing with Ransomware's Problematic BehaviorsCybereasonCortez Lake, Jessica Stanford, Alissa Torres
Mar 14, 2017Cybersecuring DoD ICS SystemsMichael Chipley
Mar 13, 2017The Impacts of JSON on Reversing Your FirmwareBen Gardiner
Mar 10, 2017The life and death of SHA-1Jake Williams
Mar 8, 2017Complying with the General Data Protection Regulation: A Guide for Security PractitionersSkybox Security, Inc.Kevin Flynn, Benjamin Wright
Mar 7, 2017What's new on the FOR572 Horizon Stockholm and BeyondPhilip Hagen
Mar 1, 2017Real DevSecOps for the Security PractitionerCloudPassageJenks Gibbons
Mar 1, 2017Next-Gen Endpoints Risks and Protections: A SANS Survey Part 2: Next-Gen Protection and ResponseCarbon Black

Great Bay Software

Guidance Software

IBM

Malwarebytes

Sophos Inc.
Matt Cooke, G.W. Ray Davidson, PhD, Mark Hafner, Stacia Tympanick
Feb 28, 2017Next-Gen Endpoints Risks and Protections: A SANS Survey Part 1: New Devices and RisksCarbon Black

Great Bay Software

Guidance Software

IBM

Malwarebytes

Sophos Inc.
G.W. Ray Davidson, PhD, Nick Charpentier, Anthony Di Bello, Dana Torgersen
Feb 28, 2017Reimagine Your Identity StrategyRSAChris Wraight, Jim Ducharme
Feb 27, 2017Malware Wants your Memory: Here's Why and How to Protect itAlissa Torres, Lance Spitzner
Feb 24, 2017Continuous Integration: Static Analysis with Visual Studio & RoslynEric Johnson
Feb 23, 2017The Problems with the Dark Web: From Crime to Complicated CrawlingTerbium LabsAlex Viana, Emily Wilson
Feb 22, 2017Application White-listing through Bit9 aka Parity aka Carbon Black Protect - A Masters Candidate WebcastMichael Weeks
Feb 21, 2017So What's It Mean To Hack a CarMatthew Carpenter
Feb 17, 2017Analyzing the Enhanced Analysis of GRIZZLY STEPPE ReportRobert M. Lee
Feb 10, 2017Operation Escalation: How Attackers Use Adware to Sell Corporate AssetsCybereasonIsrael Barak, G. Mark Hardy
Feb 9, 2017The Cost and Consequences of Security Complexity: New Ponemon Institute Research Identifies 8 Best PracticesMobileIronOjas Rege, Dr. Larry Ponemon
Feb 9, 2017Tools and Techniques for Assessing Android MalwareChristopher Crowley
Feb 8, 2017Go Beyond Incident Response: The Benefits of a Complete Incident Management PlatformD3 Security

Chertoff Group
Fraser Retallack, Bob Day, Jim Pflaging, Chris Crowley
Feb 8, 2017Beyond Feeds: A Deep Dive Into Threat Intelligence SourcesRecordedFutureChris Pace, Dave Shackleford
Feb 7, 2017Elevators as Security Risks... What Goes Up May Let You DownDeviant Ollam
Feb 3, 2017Cross Origin Resource Sharing: Using CORS to secure AJAXClay Risenhoover
Feb 1, 2017Digital Ghost: Turning the Tables on Cyber Attacks in Industrial SystemsGERobert Garry, Michael Assante
Jan 31, 20173 Cs of Security Awareness Lance Spitzner
Jan 31, 2017Automating Information SecurityMark Baggett
Jan 26, 2017Mimecast Targeted Threat ProtectionMimecastMatthew Gardiner, Jerry Shenk
Jan 26, 2017Dont get marooned on Analytic IslandsBAE Systems Applied IntelligenceMark Watkinson
Jan 25, 2017Stop Threats in their Tracks- An Introduction to Advanced Malware ProtectionCisco SystemsBrian McMahon, Tom Stitt
Jan 25, 2017Implementing and Maintaining a DevSecOps Approach in the Cloud - Tips, tricks, operational and security best practices Sumo LogicMark Bloom, George Gerchow
Jan 25, 2017Introducing the NEW SANS Pen Test Poster - White Board of Awesome Command Line Kung-FuEd Skoudis
Jan 24, 20172017 Cloud Security and Risk BenchmarksSkyHigh NetworksBrandon Cook, John Pescatore
Jan 24, 2017Next generation analysts for next generation threats - lessons from deploying best practices to hundreds of SOC teams!SiemplifyMeny Har, John Pescatore
Jan 23, 2017 Practical Application of Threat Intel for Network DefendersDomainToolsDave Shackleford, Tim Helming
Jan 20, 2017Attacks on Databases: When NoSQL became NoDatabaseMatt Bromiley
Jan 19, 2017Packets Dont Lie: Whats Really Happening on Your Network?LogRhythmRob McCovern, Dave Shackleford
Jan 18, 2017Hunting with Cyber Deception and Incident Response AutomationCymmetria Gadi Evron
Jan 17, 2017Enhanced Application Security for the Financial IndustrySynopsysMike Ware, Steve Kosten
Jan 13, 2017Using Cisco Stealthwatch to Increase Security By Enhancing Critical Security Control PerformanceCisco SystemsJamison Budacki, John Pescatore
Jan 12, 2017How To Use Your Network To Fend Off The Latest Cyber ThreatsNETSCOUT Systems, Inc.Arabella Hallawell, Paul Bowen, John Pescatore, Ann Sun
Jan 12, 2017Packet Capture + Flow Analytics = Holistic Network VisibilityCisco SystemsBrian Ford
Jan 10, 2017Taking Control of Your Application SecurityLance Spitzner, Eric Johnson
Jan 10, 2017 Hello Friend: Creating a Threat Intelligence CapabilityScott Roberts, Rebekah Brown
Jan 6, 2017Analyzing the DHS/FBI's GRIZZLY STEPPE ReportRobert M. Lee

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.