Become more effective at your job with hands-on cyber security training in Austin. Save $350 thru 9/25.

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Dec 18, 2017Lessons Learned from the TalkTalk Breach - A Master's Candidate WebcastEd Yuwono
Dec 15, 2017The Convergence of EPP and EDR: Tomorrow's Solution TodayFireEyeDan Reis, John Pescatore
Dec 14, 2017Who Owns ICS Security? Fusing IT, OT, & IIoT Security in the Corporate SOC. CyberXPhil Neray, Doug Wylie
Dec 13, 20172017 Trends and Strategies for Protecting Endpoints in Healthcare BarklyJustin Armstrong, Jack Danahy, Barbara Filkins
Dec 13, 2017Stop All Imposter Threats Coming Into and Going Out of your OrganizationProofPointRyan Terry, John Pescatore
Dec 13, 2017Global Response and Industrial Defense (GRID) Certification - What ICS Defenders Need to KnowRobert M. Lee
Dec 12, 2017
Dec 11, 2017Tackling DoD Cyber Red Team Deficiencies Through Systems Engineering A Master's Candidate WebcastJohn Schab
Dec 8, 2017Java on the server? What could possibly go wrong?Adrien de Beaupre, Jason Blanchard
Dec 8, 2017Driving Better Cybersecurity for Industrial Networks and Critical InfrastructureClaroty Inc. Dan Desruisseaux, Patrick McBride
Dec 8, 2017OWASP Top 10 2017: What You Need to KnowVeracodeDr. Johannes Ullrich, Chris Eng
Dec 7, 2017Using Anti-Evasion to Block Stealth Attacks with Minerva LabsMinerva LabsLenny Zeltser, Eric Cole, PhD
Dec 7, 2017Continuous Security Validation: How effective is your security?Forcepoint LLCAnil Nandigam
Dec 6, 2017Security and Ops HacksRapid7 Inc.Sonny Sarai
Dec 6, 2017Business-Driven Network Security Policy ManagementAlgoSecEdy Almer
Dec 5, 2017Top Network Security Products Revealed in Latest TestsForcepoint LLCThomas Skybakmoen
Dec 5, 2017Next-Generation Antivirus (NGAV) Buyer's Guide: Successful Strategies for Choosing and Implementing NGAVCarbon BlackBarbara Filkins, Brian Gladstein
Dec 5, 2017Bring the Fight to Them: Hunting down adversaries using OSQueryErik Van Buggenhout, Stephen Sims
Dec 4, 2017Secure DevOps Monitoring in the CloudBen Allen
Nov 30, 2017The ROI of AppSec: Getting your Money's Worth from Your AppSec ProgramVeracodeJim Bird, Maria Loughlin, Ellen Nussbaum
Nov 29, 2017Use Code Reuse to your Advantage: The Forgotten Component of your Incident Response PlanIntezerItai Tevet, Jake Williams
Nov 22, 2017GDPR - What to Train Your WorkforceBrian Honan, Lance Spitzner
Nov 21, 2017The Four Types of Threat Detection for ICS SecurityDragos, Inc.Robert M. Lee
Nov 21, 2017Memory Forensics: Sodium Pentothal for Your SecurityJake Williams, Alissa Torres
Nov 20, 2017Prevent-Detect-RESPONSE - How to Win at Security Part 3 - Implementing Proper Incident Response from SEC401Dr. Eric Cole
Nov 17, 2017SANS Security Operations Center (SOC) BriefingRecordedFuture

DomainTools

Authentic8

Digital Guardian
Nov 15, 2017Collaborative Development of Att&ck AnalyticsJohn Wunder
Nov 15, 2017Breaking Down the Data: How Secure Are You and Your Supply Chain?BitsightStephen Boyer, Jay Jacobs, G. Mark Hardy
Nov 14, 2017Integrated Security Operations - The Difference between Knowing and GuessingServiceNowMatthew O'Brien, Piero DePaoli, John Pescatore
Nov 14, 2017A day in the life doing incident response without Bro. And how it could be so much better.Corelight Vincent Stoffer, Matt Bromiley
Nov 14, 2017Using Malware Analysis to Explore the Potential of Malware VaccinationLenny Zeltser
Nov 13, 2017Secure DevOps: Three Keys for SuccessFrank Kim
Nov 13, 2017Making IoT RelevantMagnet ForensicsJessica Hyde
Nov 10, 2017Getting Started with the SIFT WorkstationRob Lee
Nov 9, 2017Which SANS Pen Test Course Should I Take? November 2017 EditionJason Blanchard, Larry Pesce, Ed Skoudis
Nov 9, 2017Preventing Persistent Attacks With Linux Micro VirtualizationImmutable SystemsTom Gillis, John Pescatore
Nov 9, 2017Creating Understanding from DataJohn Bambenek
Nov 8, 2017Modern Log Parsing and Enrichment with SIEMJohn Hubbard, Justin Henderson
Nov 8, 2017iOS 11 isn't all fun and games. What we know so far and ways to handle unsupported data setsDomenica Crognale, Heather Mahalik
Nov 7, 2017Attack and Defend: Linux Privilege Escalation Techniques In DepthMichael C. Long
Nov 7, 2017Scripting Cloud Security CapabilitiesKenneth Hartman
Nov 6, 2017Managed Detection and Response and Business context-- where do they meet, how do they co-exist to help organizations understand true risk?LeidosJustin Lachesky, Mike Gotham, Anne Saunders, Ken Brown
Nov 3, 2017Catch, Investigate, Repeat: Automating Incident Response with Behavior-Based IOCsSECDOJoseph Pizzo, Jake Williams
Nov 3, 2017Updated FOR578 - Training for Security Personnel and Why Intelligence Matters to YouRobert M. Lee
Nov 2, 2017Office 365 Migration Checklist: Considerations for Midsize EnterprisesProofPointJennifer Cheng
Nov 2, 2017Cloud Security: Defense in Detail if Not in Depth. Part 2: Changes Make the Cloud More Secure, but Is InfoSec Changing Even More?BMC Software, Inc.

Forcepoint LLC

Mcafee LLC

Qualys
Nicolas Fischbach, Eric Boerger, Dave Shackleford
Nov 2, 2017Spamhaus DNS Firewall ( DNS RPZ ) - DNS as a 'Critical Choke Point' to Block Resolution of Known Malicious SitesSecurityZONESMatt Stith
Nov 1, 2017Cloud Security: Defense in Detail if Not in Depth. Part 1: Using Cloud Services to Address the Cloud Threat Environment BMC Software, Inc.

Forcepoint LLC

Mcafee LLC

Qualys
Mark Butler, Allison Cramer, Dave Shackleford
Nov 1, 2017The Role of AI in Cybersecurity and AuditingMuzamil Riffat
Oct 31, 2017Closing the Skills Gap with Analytics and Machine Learning RSAPeter M. Tran, Ahmed Tantawy
Oct 30, 2017Beyond layered securityPalo Alto NetworksNavneet Singh, John Pescatore
Oct 27, 2017Windows Credentials: Attacks, Mitigations & DefenseChad Tilbury
Oct 26, 2017Prevent-DETECT-Response - How to Win at Security Part 2 - Timely Detection Tips and Tricks from SEC401Eric Cole
Oct 26, 2017Enhance Your Investigations with Network DataCisco SystemsBrian Ford, Matt Bromiley
Oct 26, 2017The Science Behind the Hype: Machine Learning in Endpoint SecurityBarklyDavid Hoelzer, Jack Danahy
Oct 25, 20177-Step Process to Secure AWS and Custom ApplicationsSkyHigh NetworksJohn Pescatore, Brandon Cook, Niraj Patel, Anant Mahajan
Oct 25, 2017Application Breaches and Lifecycle Security: SANS 2017 Application Security Survey, Part 2Rapid7 Inc.

Synopsys

Tenable

Veracode

WhiteHat Security
Frank Kim, Anthony Bettini, Ryan O'Leary
Oct 25, 2017Forensic Timeline Analysis Using WiresharkDavid Fletcher
Oct 24, 2017Closing the Skills Gap Chasm with Automation and Actionable AnalyticsExabeamOrion Cassetto, Dave Shackleford
Oct 24, 2017Application Security on the Go! SANS Survey Results, Part 1Rapid7 Inc.

Synopsys

Tenable

Veracode

WhiteHat Security
Eric Johnson, Alfred Chung, Colin Domoney, Apoorva Phadke
Oct 24, 2017The Maturing of Endpoint Detection and Response (EDR): Choose the Right SolutionCrowdStrikeCon Mallon, John Pescatore
Oct 20, 2017EDR vs SIEM - Place your bet! The fight is onJustin Henderson
Oct 19, 2017The facts about KRACK and your WPA enabled WiFi networkLarry Pesce
Oct 19, 2017Threat Intelligence for Every Security FunctionRecordedFutureDave Shackleford, Chris Pace
Oct 18, 2017Security Awareness for Board of DirectorsLance Spitzner, John Pescatore
Oct 18, 2017New Threats Posed by Misuse of Legitimate Websites, End-to-End Encryption Technologies and Countermeasures, A SANS Technology Institute Masters Candidate PresentationPaul Tang
Oct 17, 2017Targeted Attack Protection: SANS Review of Endgame's endpoint security platformEndgameMike Nichols, Dave Shackleford
Oct 17, 2017There's A Secure App for That: How to Mitigate Attacks Targeting Automotive Mobile Application's CommunicationsColin DeWinter, Ben Gardiner
Oct 13, 2017Strut(s) your stuff.Moses Hernandez
Oct 12, 2017NotPetya, Dragonfly 2.0 & CrashOverride: Is Now the Time for Active Cyber Defense in ICS/SCADA Networks?CyberXPhil Neray, Mike Assante
Oct 11, 2017Isolate the Critical: How to Deploy Microsegmentation for Operational ResiliencyUnisysChip Yeager, Erin Kelly
Oct 11, 2017Turning Threat Data into Threat Intel Using Automated AnalysisVMRay Carsten Willems, Dave Shackleford
Oct 10, 2017DevSecOps - Building Continuous Security Into IT & App InfrastructuresQualysChris Carlson, John Pescatore
Oct 6, 2017Guide to Selecting and Sourcing a Managed Security Services ProviderCory Mazzola, Chris Crowley
Oct 5, 2017Simplified Segmentation for a Stronger Threat DefenseCisco SystemsKeti Kilcrease
Oct 5, 2017I'm in the cloud now so... I'm secure right?NetwrixJeff Melnick, John Pescatore
Oct 4, 2017Detecting Modern PowerShell Attacks with SIEMTim Garcia, Justin Henderson
Oct 4, 2017Beyond Scanning: Delivering Impact Driven Vulnerability AssessmentsMatthew Toussain
Oct 4, 2017SANS Asia-Pacific Webcast Series- Standard Logs Made into Actionable DetectsTim Garcia, Justin Henderson
Oct 3, 2017New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
Oct 3, 2017Shrinking Attack Dwell Times - A Phishing Case Study DemoSyncurityJohn Jolly, John Pescatore
Oct 3, 2017New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
Oct 2, 2017Accurate behavior analysis enables detection and of malicious insiders, outsiders and IoT deviceE8 SecurityMatt Rodgers, John Pescatore
Sep 29, 2017Understanding Fileless Attacks and How to Stop ThemCrowdStrikeJackie Castelli, John Pescatore
Sep 28, 2017Clustering, Sourcing, and Correlating All Things IndicatorsDomainToolsKyle Wilhoit, Rebekah Brown
Sep 28, 2017SANS CyberTalent VetSuccessBrian D. Ray, Sonny Sandelius
Sep 28, 2017SANS Asia-Pacific Webcast Series- 2017 SANS SOC Survey DiscussionChristopher Crowley
Sep 27, 2017PREVENT-Detect-Response - How to Win at Security Part 1 - The Secret to Prevention from SEC401Eric Cole
Sep 27, 2017Your Security Sandbox Won't Catch It All - The Phishing ProblemProofPointMark Guntrip, Robert M. Lee
Sep 26, 2017The True Cost of Ransomware: 5 Companies, 5 Attacks, and the Reality of RecoveryBarklyJohn Pescatore, Ryan Berg

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.