SANS OnDemand: Extended Access, Hands-On Labs, and SME Support

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
December 18, 2017
3:30pm EST
(20:30:00 UTC)
Lessons Learned from the TalkTalk Breach - A Master's Candidate WebcastEd Yuwono
December 15, 2017
3:30pm EST
(20:30:00 UTC)
The Convergence of EPP and EDR: Tomorrow's Solution TodayFireEyeDan Reis, John Pescatore
December 14, 2017
1:00pm EST
(18:00:00 UTC)
Who Owns ICS Security? Fusing IT, OT, & IIoT Security in the Corporate SOC. CyberXPhil Neray, Doug Wylie
December 13, 2017
3:30pm EST
(20:30:00 UTC)
2017 Trends and Strategies for Protecting Endpoints in Healthcare BarklyJustin Armstrong, Jack Danahy, Barbara Filkins
December 13, 2017
1:00pm EST
(18:00:00 UTC)
Stop All Imposter Threats Coming Into and Going Out of your OrganizationProofPointRyan Terry, John Pescatore
December 13, 2017
10:30am EDT
(15:30:00 UTC)
Global Response and Industrial Defense (GRID) Certification - What ICS Defenders Need to KnowRobert M. Lee
December 11, 2017
8:18pm EST
(01:18:00 UTC)
December 11, 2017
1:00pm EST
(18:00:00 UTC)
Tackling DoD Cyber Red Team Deficiencies Through Systems Engineering A Master's Candidate WebcastJohn Schab
December 8, 2017
3:00pm EST
(20:00:00 UTC)
Java on the server? What could possibly go wrong?Adrien de Beaupre, Jason Blanchard
December 8, 2017
1:00pm EST
(18:00:00 UTC)
Driving Better Cybersecurity for Industrial Networks and Critical InfrastructureClaroty Inc. Dan Desruisseaux, Patrick McBride
December 8, 2017
10:30am EST
(15:30:00 UTC)
OWASP Top 10 2017: What You Need to KnowVeracodeDr. Johannes Ullrich, Chris Eng
December 7, 2017
1:00pm EST
(18:00:00 UTC)
Using Anti-Evasion to Block Stealth Attacks with Minerva LabsMinerva LabsLenny Zeltser, Eric Cole, PhD
December 7, 2017
10:30am EST
(15:30:00 UTC)
Continuous Security Validation: How effective is your security?Forcepoint LLCAnil Nandigam
December 6, 2017
1:00pm EST
(18:00:00 UTC)
Security and Ops HacksRapid7 Inc.Sonny Sarai
December 6, 2017
10:30am EST
(15:30:00 UTC)
Business-Driven Network Security Policy ManagementAlgoSec Systems, Ltd.Edy Almer
December 5, 2017
3:30pm EST
(20:30:00 UTC)
Top Network Security Products Revealed in Latest TestsForcepoint LLCThomas Skybakmoen
December 5, 2017
1:00pm EST
(18:00:00 UTC)
Next-Generation Antivirus (NGAV) Buyer's Guide: Successful Strategies for Choosing and Implementing NGAVCarbon BlackBarbara Filkins, Brian Gladstein
December 5, 2017
10:30am EST
(15:30:00 UTC)
Bring the Fight to Them: Hunting down adversaries using OSQueryErik Van Buggenhout, Stephen Sims
December 4, 2017
1:00pm EST
(18:00:00 UTC)
Secure DevOps Monitoring in the CloudBen Allen
November 30, 2017
1:00pm EDT
(18:00:00 UTC)
The ROI of AppSec: Getting your Money's Worth from Your AppSec ProgramVeracodeJim Bird, Maria Loughlin, Ellen Nussbaum
November 29, 2017
1:00pm EST
(18:00:00 UTC)
Use Code Reuse to your Advantage: The Forgotten Component of your Incident Response PlanIntezerItai Tevet, Jake Williams
November 22, 2017
10:00am EST
(15:00:00 UTC)
GDPR - What to Train Your WorkforceBrian Honan, Lance Spitzner
November 21, 2017
1:00pm EST
(18:00:00 UTC)
The Four Types of Threat Detection for ICS SecurityDragos, Inc.Robert M. Lee
November 21, 2017
10:00am EDT
(15:00:00 UTC)
Memory Forensics: Sodium Pentothal for Your SecurityJake Williams, Alissa Torres
November 20, 2017
1:00pm EST
(18:00:00 UTC)
Prevent-Detect-RESPONSE - How to Win at Security Part 3 - Implementing Proper Incident Response from SEC401Dr. Eric Cole
November 17, 2017
8:00am EST
(13:00:00 UTC)
SANS Security Operations Center (SOC) BriefingRecordedFuture

DomainTools

Authentic8

Digital Guardian
November 15, 2017
3:30pm EST
(20:30:00 UTC)
Collaborative Development of Att&ck AnalyticsJohn Wunder
November 15, 2017
10:30am EST
(15:30:00 UTC)
Breaking Down the Data: How Secure Are You and Your Supply Chain?BitsightStephen Boyer, Jay Jacobs, G. Mark Hardy
November 14, 2017
3:30pm EST
(20:30:00 UTC)
Integrated Security Operations - The Difference between Knowing and GuessingServiceNowMatthew O'Brien, Piero DePaoli, John Pescatore
November 14, 2017
1:00pm EST
(18:00:00 UTC)
A day in the life doing incident response without Bro. And how it could be so much better.Corelight Vincent Stoffer, Matt Bromiley
November 14, 2017
11:00am EST
(16:00:00 UTC)
Using Malware Analysis to Explore the Potential of Malware VaccinationLenny Zeltser
November 13, 2017
3:30pm EST
(20:30:00 UTC)
Secure DevOps: Three Keys for SuccessFrank Kim
November 13, 2017
1:00pm EST
(18:00:00 UTC)
Making IoT RelevantMagnet ForensicsJessica Hyde
November 10, 2017
1:00pm EST
(18:00:00 UTC)
Getting Started with the SIFT WorkstationRob Lee
November 9, 2017
3:00pm EST
(20:00:00 UTC)
Which SANS Pen Test Course Should I Take? November 2017 EditionJason Blanchard, Larry Pesce, Ed Skoudis
November 9, 2017
1:00pm EDT
(18:00:00 UTC)
Preventing Persistent Attacks With Linux Micro VirtualizationImmutable SystemsTom Gillis, John Pescatore
November 9, 2017
10:30am EST
(15:30:00 UTC)
Creating Understanding from DataJohn Bambenek
November 8, 2017
3:00pm EDT
(20:00:00 UTC)
Modern Log Parsing and Enrichment with SIEMJohn Hubbard, Justin Henderson
November 8, 2017
10:30am EST
(15:30:00 UTC)
iOS 11 isn't all fun and games. What we know so far and ways to handle unsupported data setsDomenica Crognale, Heather Mahalik
November 7, 2017
3:30pm EDT
(20:30:00 UTC)
Attack and Defend: Linux Privilege Escalation Techniques In DepthMichael C. Long
November 7, 2017
10:30am EST
(15:30:00 UTC)
Scripting Cloud Security CapabilitiesKenneth G. Hartman
November 6, 2017
1:00pm EST
(18:00:00 UTC)
Managed Detection and Response and Business context-- where do they meet, how do they co-exist to help organizations understand true risk?LeidosJustin Lachesky, Mike Gotham, Anne Saunders, Ken Brown
November 3, 2017
3:30pm EDT
(19:30:00 UTC)
Catch, Investigate, Repeat: Automating Incident Response with Behavior-Based IOCsSECDOJoseph Pizzo, Jake Williams
November 3, 2017
1:00pm EDT
(17:00:00 UTC)
Updated FOR578 - Training for Security Personnel and Why Intelligence Matters to YouRobert M. Lee
November 2, 2017
3:30pm EDT
(19:30:00 UTC)
Office 365 Migration Checklist: Considerations for Midsize EnterprisesProofPointJennifer Cheng
November 2, 2017
1:00pm EDT
(17:00:00 UTC)
Cloud Security: Defense in Detail if Not in Depth. Part 2: Changes Make the Cloud More Secure, but Is InfoSec Changing Even More?BMC Software, Inc.

Forcepoint LLC

Mcafee LLC

Qualys
Nicolas Fischbach, Eric Boerger, Dave Shackleford
November 2, 2017
10:30am EST
(14:30:00 UTC)
Spamhaus DNS Firewall ( DNS RPZ ) - DNS as a 'Critical Choke Point' to Block Resolution of Known Malicious SitesSecurityZONESMatt Stith
November 1, 2017
1:00pm EST
(17:00:00 UTC)
Cloud Security: Defense in Detail if Not in Depth. Part 1: Using Cloud Services to Address the Cloud Threat Environment BMC Software, Inc.

Forcepoint LLC

Mcafee LLC

Qualys
Mark Butler, Allison Cramer, Dave Shackleford
November 1, 2017
10:30am EDT
(14:30:00 UTC)
The Role of AI in Cybersecurity and AuditingMuzamil Riffat
October 31, 2017
10:30am EDT
(14:30:00 UTC)
Closing the Skills Gap with Analytics and Machine Learning RSAPeter M. Tran, Ahmed Tantawy
October 30, 2017
1:00pm EDT
(17:00:00 UTC)
Beyond layered securityPalo Alto NetworksNavneet Singh, John Pescatore
October 27, 2017
1:00pm EDT
(17:00:00 UTC)
Windows Credentials: Attacks, Mitigations & DefenseChad Tilbury
October 26, 2017
3:30pm EDT
(19:30:00 UTC)
Prevent-DETECT-Response - How to Win at Security Part 2 - Timely Detection Tips and Tricks from SEC401Eric Cole
October 26, 2017
1:00pm EDT
(17:00:00 UTC)
Enhance Your Investigations with Network DataCisco SystemsBrian Ford, Matt Bromiley
October 26, 2017
10:30am EST
(14:30:00 UTC)
The Science Behind the Hype: Machine Learning in Endpoint SecurityBarklyDavid Hoelzer, Jack Danahy
October 25, 2017
3:30pm EDT
(19:30:00 UTC)
7-Step Process to Secure AWS and Custom ApplicationsSkyHigh NetworksJohn Pescatore, Brandon Cook, Niraj Patel, Anant Mahajan
October 25, 2017
1:00pm EST
(17:00:00 UTC)
Application Breaches and Lifecycle Security: SANS 2017 Application Security Survey, Part 2Rapid7 Inc.

Synopsys

Tenable

Veracode

WhiteHat Security
Frank Kim, Anthony Bettini, Ryan O'Leary
October 25, 2017
10:30am EDT
(14:30:00 UTC)
Forensic Timeline Analysis Using WiresharkDavid Fletcher
October 24, 2017
3:30pm EDT
(19:30:00 UTC)
Closing the Skills Gap Chasm with Automation and Actionable AnalyticsExabeamOrion Cassetto, Dave Shackleford
October 24, 2017
1:00pm EST
(17:00:00 UTC)
Application Security on the Go! SANS Survey Results, Part 1Rapid7 Inc.

Synopsys

Tenable

Veracode

WhiteHat Security
Eric Johnson, Alfred Chung, Colin Domoney, Apoorva Phadke
October 24, 2017
10:30am EDT
(14:30:00 UTC)
The Maturing of Endpoint Detection and Response (EDR): Choose the Right SolutionCrowdStrike, Inc.Con Mallon, John Pescatore
October 20, 2017
3:00pm EST
(19:00:00 UTC)
EDR vs SIEM - Place your bet! The fight is onJustin Henderson
October 19, 2017
3:00pm EDT
(19:00:00 UTC)
The facts about KRACK and your WPA enabled WiFi networkLarry Pesce
October 19, 2017
1:00pm EDT
(17:00:00 UTC)
Threat Intelligence for Every Security FunctionRecordedFutureDave Shackleford, Chris Pace
October 18, 2017
1:00pm EST
(17:00:00 UTC)
Security Awareness for Board of DirectorsLance Spitzner, John Pescatore
October 18, 2017
10:30am EST
(14:30:00 UTC)
New Threats Posed by Misuse of Legitimate Websites, End-to-End Encryption Technologies and Countermeasures, A SANS Technology Institute Masters Candidate PresentationPaul Tang
October 17, 2017
1:00pm EDT
(17:00:00 UTC)
Targeted Attack Protection: SANS Review of Endgame's endpoint security platformEndgameMike Nichols, Dave Shackleford
October 17, 2017
11:00am EDT
(15:00:00 UTC)
There's A Secure App for That: How to Mitigate Attacks Targeting Automotive Mobile Application's CommunicationsColin DeWinter, Ben Gardiner
October 13, 2017
3:30pm EDT
(19:30:00 UTC)
Strut(s) your stuff.Moses Hernandez
October 12, 2017
1:00pm EDT
(17:00:00 UTC)
NotPetya, Dragonfly 2.0 & CrashOverride: Is Now the Time for Active Cyber Defense in ICS/SCADA Networks?CyberXPhil Neray, Mike Assante
October 11, 2017
1:00pm EDT
(17:00:00 UTC)
Isolate the Critical: How to Deploy Microsegmentation for Operational ResiliencyUnisysChip Yeager, Erin Kelly
October 11, 2017
10:30am EDT
(14:30:00 UTC)
Turning Threat Data into Threat Intel Using Automated AnalysisVMRay Carsten Willems, Dave Shackleford
October 10, 2017
1:00pm EDT
(17:00:00 UTC)
DevSecOps - Building Continuous Security Into IT & App InfrastructuresQualysChris Carlson, John Pescatore
October 6, 2017
3:00pm EST
(19:00:00 UTC)
Guide to Selecting and Sourcing a Managed Security Services ProviderCory Mazzola, Chris Crowley
October 5, 2017
3:30pm EDT
(19:30:00 UTC)
Simplified Segmentation for a Stronger Threat DefenseCisco SystemsKeti Kilcrease
October 5, 2017
1:00pm EST
(17:00:00 UTC)
I'm in the cloud now so... I'm secure right?NetwrixJeff Melnick, John Pescatore
October 4, 2017
3:00pm EDT
(19:00:00 UTC)
Detecting Modern PowerShell Attacks with SIEMTim Garcia, Justin Henderson
October 4, 2017
10:30am EDT
(14:30:00 UTC)
Beyond Scanning: Delivering Impact Driven Vulnerability AssessmentsMatthew Toussain
October 3, 2017
9:00pm EDT
(01:00:00 UTC)
SANS Asia-Pacific Webcast Series- Standard Logs Made into Actionable DetectsTim Garcia, Justin Henderson
October 3, 2017
3:30pm EDT
(19:30:00 UTC)
New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
October 3, 2017
1:00pm EDT
(17:00:00 UTC)
Shrinking Attack Dwell Times - A Phishing Case Study DemoSyncurityJohn Jolly, John Pescatore
October 3, 2017
9:00am EST
(13:00:00 UTC)
New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
October 2, 2017
1:00pm EST
(17:00:00 UTC)
Accurate behavior analysis enables detection and of malicious insiders, outsiders and IoT deviceE8 SecurityMatt Rodgers, John Pescatore
September 29, 2017
1:00pm EDT
(17:00:00 UTC)
Understanding Fileless Attacks and How to Stop ThemCrowdStrike, Inc.Jackie Castelli, John Pescatore
September 28, 2017
3:30pm EDT
(19:30:00 UTC)
Clustering, Sourcing, and Correlating All Things IndicatorsDomainToolsKyle Wilhoit, Rebekah Brown
September 28, 2017
1:00pm EDT
(17:00:00 UTC)
SANS CyberTalent VetSuccessBrian D. Ray, Sonny Sandelius
September 28, 2017
7:00am EDT
(11:00:00 UTC)
SANS Asia-Pacific Webcast Series- 2017 SANS SOC Survey DiscussionChristopher Crowley
September 27, 2017
3:30pm EDT
(19:30:00 UTC)
PREVENT-Detect-Response - How to Win at Security Part 1 - The Secret to Prevention from SEC401Eric Cole
September 27, 2017
1:00pm EDT
(17:00:00 UTC)
Your Security Sandbox Won't Catch It All - The Phishing ProblemProofPointMark Guntrip, Robert M. Lee
September 26, 2017
3:30pm EDT
(19:30:00 UTC)
The True Cost of Ransomware: 5 Companies, 5 Attacks, and the Reality of RecoveryBarklyJohn Pescatore, Ryan Berg
September 20, 2017
10:30am EDT
(14:30:00 UTC)
Outsmart Hackers by Coordinating Your DefensesSophos Inc.Seth Geftic, John Pescatore
September 19, 2017
1:00pm EDT
(17:00:00 UTC)
The Top 20 ICS Cyber Attacks And how to use them to improve IIoT and cloud security designsWaterfall SecurityAndrew Ginter, Tim Conway
September 18, 2017
1:00pm EDT
(17:00:00 UTC)
Breaking Red - Designing IOCs Using Red Team ToolsJoe Vest
September 15, 2017
1:00pm EDT
(17:00:00 UTC)
EDR + NGAV Working Together: SANS Review of Carbon Black Cb DefenseCarbon BlackJerry Shenk, Brian Gladstein
September 13, 2017
3:30pm EDT
(19:30:00 UTC)
What To Do About the Equifax HackLance Spitzner
September 13, 2017
1:00pm EDT
(17:00:00 UTC)
Harness the Hacker With Breach and Attack SimulationSafebreachItzik Kotler, John Pescatore
September 12, 2017
1:00pm EDT
(17:00:00 UTC)
Asking the Right Questions about Dynamic Scanning to Secure Web Applications: A Buyer's Guide to App Sec Scanning ToolsVeracodeJoe Pelletier, Barbara Filkins
September 12, 2017
11:00am EDT
(15:00:00 UTC)
Hitting the Security Sweet Spot with Honeypots in ICS NetworksBrent Huston
September 6, 2017
10:00pm EDT
(02:00:00 UTC)
Windows PowerShell for AuditorsClay Risenhoover
September 6, 2017
3:00pm EDT
(19:00:00 UTC)
SIEM Design & ArchitectureJohn Hubbard, Justin Henderson
September 6, 2017
1:00pm EST
(17:00:00 UTC)
Sensitive Data Everywhere: Results of SANS 2017 Data Protection SurveyInfoBlox

Mcafee LLC
Barbara Filkins, Benjamin Wright, Cindy Chen, Sam Kumarsamy
September 6, 2017
10:30am EDT
(14:30:00 UTC)
The latest 2017 NSS Labs NGFW test results reveals many NGFWs may be vulnerable to evasions. Does your current firewall or IPS protect against AETs?Forcepoint LLCJim Fulton
September 5, 2017
1:00pm EDT
(17:00:00 UTC)
The Efficiency of Context: Review of WireX Network Forensics PlatformWireX SystemsPhilip Campeau, Jerry Shenk
August 31, 2017
1:00pm EDT
(17:00:00 UTC)
Threat Hunting with Endpoints: A Methodology for Effective Detection and Agile ResponseRSAJack "Wes" Riley, John Pescatore
August 24, 2017
3:30pm EST
(19:30:00 UTC)
Building Your Own Super-Duper Home LabJeff McJunkin, Jason Blanchard
August 23, 2017
3:30pm EDT
(19:30:00 UTC)
Which SANS Pen Test Course Should I Take?Ed Skoudis, Mark Baggett, Jason Blanchard
August 23, 2017
10:30am EDT
(14:30:00 UTC)
Protect and Prevent: 3 strategies for blocking fileless attacks and exploitsBarklyPhilip Maio, John Pescatore, Jack Danahy
August 22, 2017
3:30pm EST
(19:30:00 UTC)
Using COIN doctrine to improve Cyber DefenseSebastien Godin
August 17, 2017
1:00pm EDT
(17:00:00 UTC)
Detect & Prevent Data Exfiltration: A Unique Approach with InfobloxInfoBloxSam Kumarsamy, Andrew Hay
August 17, 2017
10:30am EDT
(14:30:00 UTC)
Put Some Power in Your Network Security: Detect, Hunt & Prevent ThreatsBricataDruce MacFarlane, John Pescatore
August 16, 2017
3:30pm EDT
(19:30:00 UTC)
Continuous Security: Implementing the Critical Controls in a DevOps Environment, A SANS Technology Institute Masters Degree PresentationAlyssa Robinson
August 15, 2017
3:30pm EDT
(19:30:00 UTC)
Making Sense of the Critical Security Controls in the CloudEric Johnson
August 15, 2017
1:00pm EDT
(17:00:00 UTC)
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyCylance

FireEye

Mcafee LLC

Qualys
Chad Skipper, Sean Murphy, Robert Leong, Mark Butler, Lee Neely
August 15, 2017
10:30am EDT
(14:30:00 UTC)
Know Thy Network - Cisco Firepower and CIS Critical Security Controls 1 & 2Ryan Firth
August 14, 2017
1:00pm EDT
(17:00:00 UTC)
5.3 Billion Reasons to Keep Up-to-date with BECProofPointRyan Terry, Johannes Ullrich
August 10, 2017
1:00pm EDT
(17:00:00 UTC)
Roadmap to a Secure Smart InfrastructureRapid7 Inc.Tod Beardsley, Barbara Filkins
August 9, 2017
10:30am EDT
(14:30:00 UTC)
Dissecting various real-world DGA variantsCybereasonSean Ennis, John Pescatore
August 8, 2017
1:00pm EDT
(17:00:00 UTC)
Protecting the Critical: An innovative approach to defending your Industrial Control SystemsUnisysStuart Phillips, Christopher Blask, Mike Assante
August 3, 2017
1:00pm EDT
(17:00:00 UTC)
Machine Learning: Practical Applications for Cyber SecurityRecordedFutureChris Pace, Ismael Valenzuela
August 3, 2017
10:30am EDT
(14:30:00 UTC)
Using Docker to Create Multi-Container Research EnvironmentsShaun McCullough
August 1, 2017
3:30pm EDT
(19:30:00 UTC)
Risk-based privilege managementChristoph Eckstein
August 1, 2017
1:00pm EDT
(17:00:00 UTC)
The SANS 2017 Insider Threat Survey: Mounting an Effective Defense Against Insider ThreatDtex Systems

Haystax Technology

Rapid7 Inc.
Eric Cole, PhD, Bryan Ware, Matt Hathaway, Pramod Cherukumilli
July 27, 2017
10:30am EDT
(14:30:00 UTC)
Win The Cyberwar With Zero TrustPalo Alto NetworksJohn Kindervag
July 21, 2017
1:00pm EDT
(17:00:00 UTC)
A glimpse into NEW FOR500: Windows Forensics Course: Windows 10 and beyond - what is your digital forensics investigation missing?Rob Lee
July 20, 2017
10:00pm EDT
(02:00:00 UTC)
SANS Asia-Pacific Webcast Series- Elevating Your Analysis Tactics: The New Forensics PosterPhilip Hagen
July 20, 2017
1:00pm EDT
(17:00:00 UTC)
Cloud Security MonitoringBalaji Balakrishnan
July 19, 2017
1:00pm EDT
(17:00:00 UTC)
Bridging the O365 Security Gap with CASBSkyHigh NetworksAndreas Zengel, Brandon Cook, John Pescatore
July 18, 2017
3:30pm EDT
(19:30:00 UTC)
PowerShell ProxyKenton Groombridge
July 18, 2017
10:30am EDT
(14:30:00 UTC)
NSS Labs NGFW Test: Is your firewall a top performer?Forcepoint LLCThomas Skybakmoen, Jim Fulton
July 14, 2017
10:00am EDT
(14:00:00 UTC)
Automating Cloud Security to Mitigate RiskSkybox Security, Inc.David Boardman, Dave Shackleford
July 13, 2017
4:15pm CST
(21:15:00 UTC)
SANS ICS Briefing: Defending Energy SystemsWaterfall Security

PAS

Cylance

Arbor Networks

Tripwire, Inc.

Claroty Inc.
Jason Farmer, Nick Cappi, Stuart Bailey, Robert M. Lee
July 12, 2017
1:00pm EDT
(17:00:00 UTC)
The 2017 State of Industrial Control System SecurityPart 2: Protection, Prevention and ConvergenceGreat Bay Software

Nozomi Networks

PAS

Tempered

Tripwire, Inc.
David Zahn, Erik Giesa, Katherine Brocklehurst, Doug Wylie, Bengt Gregory-Brown
July 12, 2017
10:30am EDT
(14:30:00 UTC)
ICS Cyber Security in The Real-World: Demonstrating Threat Detection and Mitigation In Industrial Networks IndegyDana Tamir, Chris Grove
July 11, 2017
1:00pm EDT
(17:00:00 UTC)
The 2017 State of Industrial Control System Security-Part 1: Personnel, Threats and ToolsGreat Bay Software

Nozomi Networks

PAS

Tempered

Tripwire, Inc.
Ty Powers, Edgard Capdevielle, Doug Wylie, Bengt Gregory-Brown
July 11, 2017
10:30am EST
(14:30:00 UTC)
Five Lessons Learned from Petya and WannaCryVeracodeJake Williams, Chris Wysopal
July 7, 2017
1:00pm EDT
(17:00:00 UTC)
CRASHOVERIDE - Detecting and Mitigating the Electric Grid Targeted MalwareDan Gunter, Robert M. Lee, Mike Assante
July 6, 2017
3:00pm EDT
(19:00:00 UTC)
IPv6 and Open Source IDS, A SANS Technology Institute Masters Degree PresentationJon Mark Allen
July 6, 2017
11:00am EDT
(15:00:00 UTC)
A glimpse of the NEW FOR585 Advanced Smartphone CourseHeather Mahalik
June 29, 2017
3:30pm EDT
(19:30:00 UTC)
Putting Digital Threat Investigation and Response into HyperdriveRiskIQBeckie Neumann, Dave Shackleford
June 29, 2017
1:00pm EDT
(17:00:00 UTC)
Using Endpoint Security Innovation and Next-Gen Capabilities to Counter Endpoint Threats At-ScaleCounterTackRaj Dodhiawala, John Pescatore
June 29, 2017
10:00am EDT
(14:00:00 UTC)
Complying with Data Protection Law in a Changing WorldForcepoint LLCNeil Thacker, Benjamin Wright
June 28, 2017
1:00pm EDT
(17:00:00 UTC)
Effortless Detection and Investigation of Cloud Breaches: A Review of Lacework's Zero Touch Cloud Workload Security PlatformLaceworkSanjay Kalra, Matt Bromiley
June 28, 2017
10:30am EDT
(14:30:00 UTC)
Securing Critical Infrastructure Organizations against the Next Cyber Breach: Best Practices for organizations leveraging Managed ServicesLeidos

RSA
Jim Hollar, Gib Sorebo
June 27, 2017
1:00pm EDT
(17:00:00 UTC)
New Threat Vectors for ICS/SCADA Networks -- and How to Prepare for ThemCyberXPhil Neray, Mike Assante
June 27, 2017
10:30am EDT
(14:30:00 UTC)
Managing Your Top 5 Human RisksLance Spitzner
June 22, 2017
1:00pm EDT
(17:00:00 UTC)
Efficiently Contain Threats and Ease Operations with Security OrchestrationInfoBloxSrikrupa Srivatsan, Andrew Hay
June 20, 2017
1:00pm EDT
(17:00:00 UTC)
Live Demonstration: Automating Enterprise Security ResponseServiceNowAlex Cox, Piero DePaoli, John Strand
June 16, 2017
8:00am EDT
(12:00:00 UTC)
SANS Finance Briefing: Practical Threat Modeling for Financial OrganizationsForcepoint LLC

RecordedFuture
June 15, 2017
11:00am EDT
(15:00:00 UTC)
Catch Me if You can - Pentesting vs APTCybereasonMor Levi
June 14, 2017
3:30pm EDT
(19:30:00 UTC)
Intrusion Detection Through Relationship Analysis, A SANS Technology Institute Masters Degree PresentationPatrick Neise
June 14, 2017
12:00pm EDT
(16:00:00 UTC)
SANS 2017 Incident Response Survey ResultsPart 2: Threat Intelligence and Improving Incident Response CapabilitiesAlienVault

Anomali

Guidance Software

IBM

LogRhythm

Mcafee LLC
Matt Bromiley, Anthony Di Bello, George Mina, Travis Farral
June 13, 2017
3:00pm EDT
(19:00:00 UTC)
PKI Cartels: The Value of Trust, A SANS Technology Institute Masters Degree PresentationSandy Dunn
June 13, 2017
12:00pm EDT
(16:00:00 UTC)
SANS 2017 Incident Response Survey Results - Part 1: Attack, Response and MaturityAlienVault

Anomali

Guidance Software

IBM

LogRhythm

Mcafee LLC
Danielle Russell, Matt Bromiley, Riana Smalberger, James Carder
June 12, 2017
10:30am EDT
(14:30:00 UTC)
You Have 24 Hours to Comply: Lessons Learned from Implementing a Behavioral Ransomware Detection FrameworkMark Mager
June 9, 2017
3:30pm EDT
(19:30:00 UTC)
What's New in the FOR610: Reverse-Engineering Malware Analysis Course in 2017?Lenny Zeltser
June 9, 2017
1:00pm EDT
(17:00:00 UTC)
SecOps principles to close gaps in Vulnerability ManagementFlexera SoftwareKen Hilker, John Pescatore
June 9, 2017
10:30am EDT
(14:30:00 UTC)
A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint ProtectionCrowdStrike, Inc.Peter Ingebrigtsen, Dave Shackleford
June 8, 2017
11:00am EDT
(15:00:00 UTC)
What Works in Situational Awareness and Visibility: Reducing Time to Detect and Enhancing Business Outcomes with SplunkSplunkRyan Niemes, John Pescatore
June 7, 2017
3:00pm EDT
(19:00:00 UTC)
Evaluation Criteria for ICS Cyber Security Monitoring with Rockwell Automation and ClarotyClaroty Inc.

Rockwell Automation
Umair Masud, Patrick McBride
June 7, 2017
10:30am EST
(14:30:00 UTC)
Tackling Mobile Security with CiscoCisco SystemsBeth Barach
June 6, 2017
8:00pm EDT
(00:00:00 UTC)
Critical Security Controls for Home Networks, A SANS Technology Institute Masters Degree PresentationGlen Roberts
June 6, 2017
3:00pm EDT
(19:00:00 UTC)
Pin the Key on the App... and Other Transport Security FunMark Geeslin
June 6, 2017
1:00pm EDT
(17:00:00 UTC)
Elevating Your Analysis Tactics: The New Forensics Poster Philip Hagen
June 2, 2017
1:00pm EDT
(17:00:00 UTC)
FROM DETECTION TO RESPONSE, SOC 2.0 - 2017 State of Security Operations and What's Being Done!SiemplifyMiguel Carrero, Meny Har
May 31, 2017
1:00pm EDT
(17:00:00 UTC)
Using Dynamic Scanning to Secure Web Apps in Development and After DeploymentVeracodeChris Kirsch, Barbara Filkins
May 31, 2017
11:00am EDT
(15:00:00 UTC)
Vulnerability Management LifecycleDavid R. Miller
May 30, 2017
10:00pm EDT
(02:00:00 UTC)
SANS Asia-Pacific Webcast Series- Powercat has Power: A PowerShell Implementation of NetcatMick Douglas
May 30, 2017
11:00am EDT
(15:00:00 UTC)
2017 SANS Security Awareness ReportThe Kogod Cybersecurity Governance Center (KCGC), Lance Spitzner
May 26, 2017
1:00pm EDT
(17:00:00 UTC)
Building Effective CTI Sharing for Network DefenseScott J. Roberts
May 26, 2017
10:30am EDT
(14:30:00 UTC)
Defending the ICS Ahead of the Patch: WannaCry Lessons Learned Joe Slowik, Mike Assante, Ben Miller
May 25, 2017
1:00pm EDT
(17:00:00 UTC)
The Role of Vulnerability Scanning in Web App SecurityNetsparkerFerruh Mavituna, Barbara Filkins
May 25, 2017
11:00am EDT
(15:00:00 UTC)
The New Reality: Centralizing Security when Your Network is DecentralizingForcepoint LLCDave Shackleford, Michael Knapp
May 24, 2017
3:00pm EDT
(19:00:00 UTC)
The Road to Increased Asset Visibility: Building an Effective ICS Security StrategyLeidosAruna Sreeram, Eric Cornelius
May 24, 2017
1:00pm EDT
(17:00:00 UTC)
Choosing the Right Path to Application SecurityVeracodeAdam Shostack, Chris Wysopal
May 24, 2017
11:00am EDT
(15:00:00 UTC)
Fighting Fileless MalwareCybereasonSanat Chugh
May 23, 2017
1:00pm EDT
(17:00:00 UTC)
Network Security Infrastructure and Best Practices: A SANS SurveyNETSCOUT Systems, Inc.Matt Bromiley, John Pescatore, Barbara Filkins, Ann Sun
May 19, 2017
3:00pm EDT
(19:00:00 UTC)
Prelude to Beats & Bytes: Striking the Right Chord in Digital ForensicsRyan Pittman, Matt Linton, Cindy Murphy
May 18, 2017
3:00pm EST
(19:00:00 UTC)
Lingering Exploits Related to WannaCry Ransomware?Jake Williams, Gil Barak, Benjamin Wright
May 18, 2017
1:00pm EDT
(17:00:00 UTC)
Future SOCs: Results of the 2017 SANS Survey on Security Operations Centers, Part 2 Carbon Black

Endgame

LogRhythm

NETSCOUT Systems, Inc.

ThreatConnect

Tripwire, Inc.
Christopher Crowley, Braden Preston, Jim Wachhaus , Ksenia Coffman
May 18, 2017
11:00am EDT
(15:00:00 UTC)
Threat Hunting for the MassesFrank McClain
May 17, 2017
1:00pm EDT
(17:00:00 UTC)
SOCs Grow Up to Protect, Defend, Respond: Results of the 2017 SANS Survey on Security Operations Centers, Part 1Carbon Black

Endgame

LogRhythm

NETSCOUT Systems, Inc.

ThreatConnect

Tripwire, Inc.
Alex Valdivia, Christopher Crowley, John Markott, James Carder
May 16, 2017
12:00pm EDT
(16:00:00 UTC)
Latest on WannaCry RansomwareRenato Marinho, Jake Williams, Benjamin Wright
May 15, 2017
1:00pm EDT
(17:00:00 UTC)
Elevating the Fraud in Point of Sale (PoS) to Another LevelThiago Bordini
May 12, 2017
7:45pm PST
(02:45:00 UTC)
Special Webcast: WannaCry Ransomeware Threat - What we know so farJake Williams
May 11, 2017
1:00pm EDT
(17:00:00 UTC)
Prevent DNS Based Data Exfiltration and Disrupt Cyber Kill ChainInfoBloxSrikrupa Srivatsan, Andrew Hay
May 11, 2017
11:00am EDT
(15:00:00 UTC)
www.google.com/search?q=what+does+this+all+mean?Phill Moore
May 10, 2017
1:00pm EDT
(17:00:00 UTC)
How to Conquer Targeted Email Threats: SANS Review of Agari Advanced Threat ProtectionAGARIVidur Apparao, Dave Shackleford
May 10, 2017
11:00am EDT
(15:00:00 UTC)
IIOT and Megacities 2025Andy Bochman, Mike Assante
May 9, 2017
3:00pm EDT
(19:00:00 UTC)
The Promise and Pitfalls of Security Testing TodayWhiteHat SecuritySetu Kulkarni, Mark Geeslin
May 9, 2017
1:00pm EDT
(17:00:00 UTC)
SANS Best of Awards Drilldown: Endpoint Detection and ResponseCarbon BlackJohn Pescatore, Justin Falck
May 5, 2017
11:00am EDT
(15:00:00 UTC)
Obfuscated No More: Practical Steps for Defeating Android ObfuscationJoshua Wright
May 4, 2017
3:00pm EDT
(19:00:00 UTC)
Deploying DNSSEC at ScaleCloudFlareDani Grant, Matt Bromiley
May 2, 2017
8:00pm EDT
(00:00:00 UTC)
Improvements to Critical Control 12Steve Jaworski
May 2, 2017
3:00pm EDT
(19:00:00 UTC)
Taming and Securing the Internet of Things Infestation in Your EnterpriseGreat Bay SoftwareTy Powers, John Pescatore
May 2, 2017
1:00pm EDT
(17:00:00 UTC)
Deception Matters: Slowing the Adversary with illusive networksIllusive NetworksChad Gasaway, Eric Cole
May 1, 2017
1:00pm EDT
(17:00:00 UTC)
Speeding Up Triage and Incident Response By Speaking to MalwareTodd O'Boyle
April 28, 2017
11:00am EDT
(15:00:00 UTC)
Establishing a Security Ambassador ProgramJohn Haren, Cassie Clark, Lance Spitzner
April 27, 2017
1:00pm EDT
(17:00:00 UTC)
Reducing Attacks and Improving Resiliency: The SANS 2017 Threat Hunting Survey Results | Part 2Anomali

DomainTools

Malwarebytes

Rapid7 Inc.

Sqrrl Data, Inc.

ThreatConnect
Robert M. Lee, Toni Gidwani, Mike Scutt, Dana Torgersen
April 27, 2017
11:00am EDT
(15:00:00 UTC)
Attack Attribution: Its ComplicatedCybereasonRoss Rustici, Jake Williams
April 26, 2017
3:00pm EDT
(19:00:00 UTC)
WikiLeaks' Release of CIA Hacking Tools: What Security Professionals Need to KnowCarbon BlackRick McElroy, Jake Williams
April 26, 2017
1:00pm EDT
(17:00:00 UTC)
Threat Hunting-Modernizing Detection Operations: The SANS 2017 Threat Hunting Survey Results | Part 1Anomali

DomainTools

Malwarebytes

Rapid7 Inc.

Sqrrl Data, Inc.

ThreatConnect
Zach Hill, Travis Farral, Rob Lee, Ely Kahn
April 26, 2017
10:00am EDT
(14:00:00 UTC)
Phoning it in: Heather talks about smartphone forensicsHeather Mahalik
April 21, 2017
1:00pm EDT
(17:00:00 UTC)
NoSQL Doesnt Make you NoVulnerableJohannes Ullrich
April 21, 2017
11:00am EDT
(15:00:00 UTC)
Hiding in Plain Sight: When Malware Abuses Legitimate Services for CommunicationsCisco SystemsJosh Reynolds
April 20, 2017
1:00pm EDT
(17:00:00 UTC)
Impact of Isolated Cyber Security Functions: A SANS SurveyThreatConnectWade Baker, G.W. Ray Davidson, PhD
April 20, 2017
11:00am EDT
(15:00:00 UTC)
Using the Power of Artificial Intelligence to Minimize Your Cybersecurity Attack SurfaceSparkCognition Inc.Bryan Lares, John Pescatore
April 19, 2017
1:00pm EDT
(17:00:00 UTC)
Real Steps to Build a Threat Intelligence FrameworkRecordedFutureChris Pace, Dave Shackleford
April 18, 2017
3:00pm EDT
(19:00:00 UTC)
Ready, Aim, Protect With Total Endpoint ProtectionSentinelOneEran Ashkenazi, G.W. Ray Davidson, PhD
April 18, 2017
1:00pm EDT
(17:00:00 UTC)
Influencing and Effectively Communicating to CEOs and Boards of DirectorsAGARIJohn Pescatore, Alan Paller
April 18, 2017
11:00am EDT
(15:00:00 UTC)
Exploring the Unknown ICS Threat LandscapeDragos, Inc.Robert M. Lee, Ben Miller, Michael Assante
April 17, 2017
3:00pm EDT
(19:00:00 UTC)
AFF4: The New Standard in Forensic Image Format, and Why You Should CareDr. Bradley Schatz
April 13, 2017
11:00am EDT
(15:00:00 UTC)
Preventing an IT Security Epidemic - Cybersecurity for Connected HealthcarePwnie ExpressAaron Turner, Tony Sager
April 12, 2017
10:00pm EDT
(02:00:00 UTC)
SANS Asia-Pacific Webcast Series- How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...Bryce Galbraith
April 11, 2017
1:00pm EDT
(17:00:00 UTC)
Learn how to protect your infrastructure against the widest range of DNS attacksInfoBloxCricket Liu, John Pescatore, Sam Kumarsamy
April 7, 2017
3:00pm EDT
(19:00:00 UTC)
Mobile App Security Trends and TechniquesGregory Leonard
April 7, 2017
1:00pm EDT
(17:00:00 UTC)
NEW SANS DFIR Cheat Sheet: A Guide to Eric Zimmerman's command line toolsEric Zimmerman
April 6, 2017
1:00pm EDT
(17:00:00 UTC)
How to Achieve Visibility, Security and Integrity for Forward Looking ResilienceUpGuard IncAndy Steigleder
April 6, 2017
11:00am EST
(15:00:00 UTC)
Struts-Shock: Current Attacks against Struts2 and How to Defend Against ThemVeracodeJonathan Mandell, Johannes Ullrich
April 5, 2017
1:00pm EDT
(17:00:00 UTC)
Six stages of an attack: The Art of DetectionCybereasonRichard Harlan, Matt Bromiley
April 4, 2017
1:00pm EDT
(17:00:00 UTC)
Increasing Software Security Up and Down the Supply ChainVeracodeJohn Pescatore, Steve Lipner, John Martin, Chris Wysopal
March 29, 2017
3:00pm EDT
(19:00:00 UTC)
Forensic State Analysis: A New Approach to Threat HuntingInfocyteChris Gerritz, Alissa Torres
March 29, 2017
1:00pm EDT
(17:00:00 UTC)
SOC in the Cloud: A review of Arctic Wolf SOC ServicesArctic Wolf NetworksSridhar Karnam, Sonny Sarai
March 28, 2017
1:00pm EDT
(17:00:00 UTC)
Best practices for securing, analyzing, and mitigating threats to your AWS applicationsGigamon

RSA
Sesh Sayani, Mike Janik, Scott Ward
March 28, 2017
11:00am EDT
(15:00:00 UTC)
ICS Hacking ExposedCyberXPhil Neray, Clint Bodungen
March 24, 2017
3:00pm EDT
(19:00:00 UTC)
A Case Study: Exploring Potential Attack Methods and Sophisticated Security Defenses for the World's Power PlantsClaroty Inc. Patrick McBride
March 24, 2017
1:00pm EDT
(17:00:00 UTC)
FISMA Compliance for Containerized AppsRed HatJason Callaway
March 23, 2017
3:00pm EDT
(19:00:00 UTC)
Threat Hunting 102: Beyond the Basics, Maturing Your Threat Hunting ProgramCybereasonBrad Mecha, Dave Shackleford
March 23, 2017
1:00pm EDT
(17:00:00 UTC)
MobileIron Security Labs: Combatting the Current State of Mobile Enterprise SecurityMobileIronJames Plouffe
March 23, 2017
11:00am EDT
(15:00:00 UTC)
Profiling Online Personas: Are We Sharing Too Much?Lance Spitzner, Micah Hoffman
March 22, 2017
1:00pm EST
(17:00:00 UTC)
Changing the Game in Public Cloud SecurityPalo Alto NetworksErik Yunghans, Scott Simkin, Dave Shackleford
March 21, 2017
3:00pm EST
(19:00:00 UTC)
Threat Hunting with Indicators: Not for Prevention AnymorePhilip Hagen
March 21, 2017
1:00pm EST
(17:00:00 UTC)
2017 Cybersecurity Trends: Aiming Ahead of the Target to Increase SecurityQualysChris Carlson, John Pescatore
March 17, 2017
3:00pm EST
(19:00:00 UTC)
Breaking Red - Understanding Threats through Red TeamingJames Tubberville, Joe Vest
March 17, 2017
1:00pm EST
(17:00:00 UTC)
Protecting Business Mobility Against Emerging ThreatsInfoBloxPrakash Nagpal, John Pescatore
March 16, 2017
3:00pm EST
(19:00:00 UTC)
I Don't Give One IoTA: Introducing the Internet of Things Attack MethodologyLarry Pesce
March 16, 2017
1:00pm EST
(17:00:00 UTC)
Cyber Threat Intelligence in Action-Effectiveness of CTI Programs and Wish Lists for the Future: Results of the 2017 Cyber Threat Intelligence Survey Part 2Anomali

Arbor Networks

DomainTools

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.

ThreatConnect
Travis Farral, Rebekah Brown, Dave Shackleford, Allan Thomson
March 15, 2017
1:00pm EST
(17:00:00 UTC)
Cyber Threat Intelligence in Action-Skills and Implementations: Results of the 2017 Cyber Threat Intelligence Survey Part 1Anomali

Arbor Networks

DomainTools

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.

ThreatConnect
Zach Hill, Robert Simmons, Paul Bowen, Dave Shackleford
March 15, 2017
11:00am EST
(15:00:00 UTC)
Going Past the Wire: Leveraging Social Engineering in Physical Security AssessmentsStephanie Carruthers
March 14, 2017
3:00pm EST
(19:00:00 UTC)
How the new Preemptive Incident Response methodology can slash end-to-end IR time for SOC teams to minutes and solve alert fatigueSECDOGil Barak, John Pescatore
March 14, 2017
1:00pm EST
(17:00:00 UTC)
Ransomware Remedies: Decoding and Dealing with Ransomware's Problematic BehaviorsCybereasonCortez Lake, Jessica Stanford, Alissa Torres
March 14, 2017
11:00am EST
(15:00:00 UTC)
Cybersecuring DoD ICS SystemsMichael Chipley
March 13, 2017
1:00pm EST
(17:00:00 UTC)
The Impacts of JSON on Reversing Your FirmwareBen Gardiner
March 10, 2017
11:00am EST
(16:00:00 UTC)
The life and death of SHA-1Jake Williams
March 8, 2017
1:00pm EST
(18:00:00 UTC)
Complying with the General Data Protection Regulation: A Guide for Security PractitionersSkybox Security, Inc.Kevin Flynn, Benjamin Wright
March 7, 2017
11:00am EST
(16:00:00 UTC)
What's new on the FOR572 Horizon Stockholm and BeyondPhilip Hagen
March 1, 2017
3:00pm EST
(20:00:00 UTC)
Real DevSecOps for the Security PractitionerCloudPassageJenks Gibbons
March 1, 2017
1:00pm EST
(18:00:00 UTC)
Next-Gen Endpoints Risks and Protections: A SANS Survey Part 2: Next-Gen Protection and ResponseCarbon Black

Great Bay Software

Guidance Software

IBM

Malwarebytes

Sophos Inc.
Matt Cooke, G.W. Ray Davidson, PhD, Mark Hafner, Stacia Tympanick
February 28, 2017
1:00pm EST
(18:00:00 UTC)
Next-Gen Endpoints Risks and Protections: A SANS Survey Part 1: New Devices and RisksCarbon Black

Great Bay Software

Guidance Software

IBM

Malwarebytes

Sophos Inc.
G.W. Ray Davidson, PhD, Nick Charpentier, Anthony Di Bello, Dana Torgersen
February 28, 2017
11:00am EST
(16:00:00 UTC)
Reimagine Your Identity StrategyRSAChris Wraight, Jim Ducharme
February 27, 2017
11:00am EST
(16:00:00 UTC)
Malware Wants your Memory: Here's Why and How to Protect itAlissa Torres, Lance Spitzner
February 24, 2017
3:00pm EST
(20:00:00 UTC)
Continuous Integration: Static Analysis with Visual Studio & RoslynEric Johnson
February 23, 2017
3:00pm EST
(20:00:00 UTC)
The Problems with the Dark Web: From Crime to Complicated CrawlingTerbium LabsAlex Viana, Emily Wilson
February 21, 2017
8:00pm EST
(01:00:00 UTC)
Application White-listing through Bit9 aka Parity aka Carbon Black Protect - A Masters Candidate WebcastMichael Weeks
February 21, 2017
1:00pm EST
(18:00:00 UTC)
So What's It Mean To Hack a CarMatthew Carpenter
February 17, 2017
1:00pm EST
(18:00:00 UTC)
Analyzing the Enhanced Analysis of GRIZZLY STEPPE ReportRobert M. Lee
February 10, 2017
1:00pm EST
(18:00:00 UTC)
Operation Escalation: How Attackers Use Adware to Sell Corporate AssetsCybereasonIsrael Barak, G. Mark Hardy
February 9, 2017
1:00pm EST
(18:00:00 UTC)
The Cost and Consequences of Security Complexity: New Ponemon Institute Research Identifies 8 Best PracticesMobileIronOjas Rege, Dr. Larry Ponemon
February 8, 2017
8:00pm EST
(01:00:00 UTC)
Tools and Techniques for Assessing Android MalwareChristopher Crowley
February 8, 2017
3:00pm EST
(20:00:00 UTC)
Go Beyond Incident Response: The Benefits of a Complete Incident Management PlatformD3 Security

Chertoff Group
Fraser Retallack, Bob Day, Jim Pflaging, Chris Crowley
February 8, 2017
1:00pm EST
(18:00:00 UTC)
Beyond Feeds: A Deep Dive Into Threat Intelligence SourcesRecordedFutureChris Pace, Dave Shackleford
February 7, 2017
3:00pm EST
(20:00:00 UTC)
Elevators as Security Risks... What Goes Up May Let You DownDeviant Ollam
February 3, 2017
11:00am EST
(16:00:00 UTC)
Cross Origin Resource Sharing: Using CORS to secure AJAXClay Risenhoover
February 1, 2017
1:00pm EST
(18:00:00 UTC)
Digital Ghost: Turning the Tables on Cyber Attacks in Industrial SystemsGERobert Garry, Michael Assante
January 31, 2017
1:00pm EST
(18:00:00 UTC)
3 Cs of Security Awareness Lance Spitzner
January 31, 2017
11:00am EST
(16:00:00 UTC)
Automating Information SecurityMark Baggett
January 26, 2017
2:00pm EST
(19:00:00 UTC)
Mimecast Targeted Threat ProtectionMimecast Services LimitedMatthew Gardiner, Jerry Shenk
January 26, 2017
12:00pm EST
(17:00:00 UTC)
Dont get marooned on Analytic IslandsBAE Systems Applied IntelligenceMark Watkinson
January 25, 2017
3:00pm EST
(20:00:00 UTC)
Stop Threats in their Tracks- An Introduction to Advanced Malware ProtectionCisco SystemsBrian McMahon, Tom Stitt
January 25, 2017
1:00pm EST
(18:00:00 UTC)
Implementing and Maintaining a DevSecOps Approach in the Cloud - Tips, tricks, operational and security best practices Sumo LogicMark Bloom, George Gerchow
January 25, 2017
11:00am EST
(16:00:00 UTC)
Introducing the NEW SANS Pen Test Poster - White Board of Awesome Command Line Kung-FuEd Skoudis
January 24, 2017
1:00pm EST
(18:00:00 UTC)
2017 Cloud Security and Risk BenchmarksSkyHigh NetworksBrandon Cook, John Pescatore
January 24, 2017
11:00am EST
(16:00:00 UTC)
Next generation analysts for next generation threats - lessons from deploying best practices to hundreds of SOC teams!SiemplifyMeny Har, John Pescatore
January 23, 2017
1:00pm EST
(18:00:00 UTC)
Practical Application of Threat Intel for Network DefendersDomainToolsDave Shackleford, Tim Helming
January 20, 2017
1:00pm EST
(18:00:00 UTC)
Attacks on Databases: When NoSQL became NoDatabaseMatt Bromiley
January 19, 2017
1:00pm EST
(18:00:00 UTC)
Packets Dont Lie: Whats Really Happening on Your Network?LogRhythmRob McCovern, Dave Shackleford
January 18, 2017
1:00pm EST
(18:00:00 UTC)
Hunting with Cyber Deception and Incident Response AutomationCymmetria Gadi Evron
January 17, 2017
1:00pm EST
(18:00:00 UTC)
Enhanced Application Security for the Financial IndustrySynopsysMike Ware, Steve Kosten
January 13, 2017
1:00pm EST
(18:00:00 UTC)
Using Cisco Stealthwatch to Increase Security By Enhancing Critical Security Control PerformanceCisco SystemsJamison Budacki, John Pescatore
January 12, 2017
11:00am EST
(16:00:00 UTC)
How To Use Your Network To Fend Off The Latest Cyber ThreatsNETSCOUT Systems, Inc.Arabella Hallawell, Paul Bowen, John Pescatore, Ann Sun
January 11, 2017
9:00pm EST
(02:00:00 UTC)
Packet Capture + Flow Analytics = Holistic Network VisibilityCisco SystemsBrian Ford
January 10, 2017
12:00pm EST
(17:00:00 UTC)
Hello Friend: Creating a Threat Intelligence CapabilityScott Roberts, Rebekah Brown
January 6, 2017
1:00pm EST
(18:00:00 UTC)
Analyzing the DHS/FBI's GRIZZLY STEPPE ReportRobert M. Lee

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.