Last Day to Save $400 on SANS Baltimore Spring 2017

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Mar 1, 2017Next-Gen Endpoints Risks and Protections: A SANS Survey Part 2: Next-Gen Protection and ResponseCarbon Black

Great Bay Software

Guidance Software

IBM

Malwarebytes

Sophos Inc.
Matt Cooke, G.W. Ray Davidson, PhD, Mark Hafner, Stacia Tympanick
Feb 28, 2017Next-Gen Endpoints Risks and Protections: A SANS Survey Part 1: New Devices and RisksCarbon Black

Great Bay Software

Guidance Software

IBM

Malwarebytes

Sophos Inc.
G.W. Ray Davidson, PhD, Nick Charpentier, Anthony Di Bello, Dana Torgersen
Feb 28, 2017Reimagine Your Identity StrategyRSAChris Wraight, Jim Ducharme
Feb 27, 2017Malware Wants your Memory: Here's Why and How to Protect itAlissa Torres, Lance Spitzner
Feb 24, 2017Continuous Integration: Static Analysis with Visual Studio & RoslynEric Johnson
Feb 23, 2017The Problems with the Dark Web: From Crime to Complicated CrawlingTerbium LabsAlex Viana, Emily Wilson
Feb 22, 2017Application White-listing through Bit9 aka Parity aka Carbon Black Protect - A Masters Candidate WebcastMichael Weeks
Feb 21, 2017So What's It Mean To Hack a CarMatthew Carpenter
Feb 17, 2017Analyzing the Enhanced Analysis of GRIZZLY STEPPE ReportRobert M. Lee
Feb 10, 2017Operation Escalation: How Attackers Use Adware to Sell Corporate AssetsCybereasonIsrael Barak, G. Mark Hardy
Feb 9, 2017The Cost and Consequences of Security Complexity: New Ponemon Institute Research Identifies 8 Best PracticesMobileIronOjas Rege, Dr. Larry Ponemon
Feb 9, 2017Tools and Techniques for Assessing Android MalwareChristopher Crowley
Feb 8, 2017Go Beyond Incident Response: The Benefits of a Complete Incident Management PlatformD3 Security

Chertoff Group
Fraser Retallack, Bob Day, Jim Pflaging, Chris Crowley
Feb 8, 2017Beyond Feeds: A Deep Dive Into Threat Intelligence SourcesRecordedFutureChris Pace, Dave Shackleford
Feb 7, 2017Elevators as Security Risks... What Goes Up May Let You DownDeviant Ollam
Feb 3, 2017Cross Origin Resource Sharing: Using CORS to secure AJAXClay Risenhoover
Feb 1, 2017Digital Ghost: Turning the Tables on Cyber Attacks in Industrial SystemsGERobert Garry, Michael Assante
Jan 31, 20173 Cs of Security Awareness Lance Spitzner
Jan 31, 2017Automating Information SecurityMark Baggett
Jan 26, 2017Mimecast Targeted Threat ProtectionMimecastMatthew Gardiner, Jerry Shenk
Jan 26, 2017Dont get marooned on Analytic IslandsBAE Systems Applied IntelligenceMark Watkinson
Jan 25, 2017Stop Threats in their Tracks- An Introduction to Advanced Malware ProtectionCisco SystemsBrian McMahon, Tom Stitt
Jan 25, 2017Implementing and Maintaining a DevSecOps Approach in the Cloud - Tips, tricks, operational and security best practices Sumo LogicMark Bloom, George Gerchow
Jan 25, 2017Introducing the NEW SANS Pen Test Poster - White Board of Awesome Command Line Kung-FuEd Skoudis
Jan 24, 20172017 Cloud Security and Risk BenchmarksSkyHigh NetworksBrandon Cook, John Pescatore
Jan 24, 2017Next generation analysts for next generation threats - lessons from deploying best practices to hundreds of SOC teams!SiemplifyMeny Har, John Pescatore
Jan 23, 2017 Practical Application of Threat Intel for Network DefendersDomainToolsDave Shackleford, Tim Helming
Jan 20, 2017Attacks on Databases: When NoSQL became NoDatabaseMatt Bromiley
Jan 19, 2017Packets Dont Lie: Whats Really Happening on Your Network?LogRhythmRob McCovern, Dave Shackleford
Jan 18, 2017Hunting with Cyber Deception and Incident Response AutomationCymmetria Gadi Evron
Jan 17, 2017Enhanced Application Security for the Financial IndustrySynopsysMike Ware, Steve Kosten
Jan 13, 2017Using Cisco Stealthwatch to Increase Security By Enhancing Critical Security Control PerformanceCisco SystemsJamison Budacki, John Pescatore
Jan 12, 2017How To Use Your Network To Fend Off The Latest Cyber ThreatsNETSCOUT Systems, Inc.Arabella Hallawell, Paul Bowen, John Pescatore, Ann Sun
Jan 12, 2017Packet Capture + Flow Analytics = Holistic Network VisibilityCisco SystemsBrian Ford
Jan 10, 2017Taking Control of Your Application SecurityLance Spitzner, Eric Johnson
Jan 10, 2017 Hello Friend: Creating a Threat Intelligence CapabilityScott Roberts, Rebekah Brown
Jan 6, 2017Analyzing the DHS/FBI's GRIZZLY STEPPE ReportRobert M. Lee

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.