SANS Rocky Mountain Fall is Live Online! Join us Nov 2-7 MT for 17 interactive courses + NetWars. Save $300 thru 10/7.

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
Monday, December 18, 2017
at 3:30 PM EST
(2017-12-18 20:30 UTC)
Lessons Learned from the TalkTalk Breach - A Master's Candidate WebcastEd Yuwono
Friday, December 15, 2017
at 3:30 PM EST
(2017-12-15 20:30 UTC)
The Convergence of EPP and EDR: Tomorrow's Solution TodayFireEye
Dan Reis, John Pescatore
Thursday, December 14, 2017
at 1:00 PM EST
(2017-12-14 18:00 UTC)
Who Owns ICS Security? Fusing IT, OT, & IIoT Security in the Corporate SOC. CyberX
Phil Neray, Doug Wylie
Wednesday, December 13, 2017
at 3:30 PM EST
(2017-12-13 20:30 UTC)
2017 Trends and Strategies for Protecting Endpoints in Healthcare Barkly
Justin Armstrong, Jack Danahy, Barbara Filkins
Wednesday, December 13, 2017
at 1:00 PM EST
(2017-12-13 18:00 UTC)
Stop All Imposter Threats Coming Into and Going Out of your OrganizationProofPoint
Ryan Terry, John Pescatore
Wednesday, December 13, 2017
at 10:30 AM EDT
(2017-12-13 15:30 UTC)
Global Response and Industrial Defense (GRID) Certification - What ICS Defenders Need to KnowRobert M. Lee
Monday, December 11, 2017
at 8:18 PM EST
(2017-12-12 01:18 UTC)
Please Check Back
Monday, December 11, 2017
at 1:00 PM EST
(2017-12-11 18:00 UTC)
Tackling DoD Cyber Red Team Deficiencies Through Systems Engineering A Master's Candidate WebcastJohn Schab
Friday, December 08, 2017
at 3:00 PM EST
(2017-12-08 20:00 UTC)
Java on the server? What could possibly go wrong?Adrien de Beaupre, Jason Blanchard
Friday, December 08, 2017
at 1:00 PM EST
(2017-12-08 18:00 UTC)
Driving Better Cybersecurity for Industrial Networks and Critical InfrastructureClaroty Inc.
Dan Desruisseaux, Patrick McBride
Friday, December 08, 2017
at 10:30 AM EST
(2017-12-08 15:30 UTC)
OWASP Top 10 2017: What You Need to KnowVeracode
Dr. Johannes Ullrich, Chris Eng
Thursday, December 07, 2017
at 1:00 PM EST
(2017-12-07 18:00 UTC)
Using Anti-Evasion to Block Stealth Attacks with Minerva LabsMinerva Labs
Lenny Zeltser, Eric Cole, PhD
Thursday, December 07, 2017
at 10:30 AM EST
(2017-12-07 15:30 UTC)
Continuous Security Validation: How effective is your security?Forcepoint LLC
Anil Nandigam
Wednesday, December 06, 2017
at 1:00 PM EST
(2017-12-06 18:00 UTC)
Security and Ops HacksRapid7 Inc.
Sonny Sarai
Wednesday, December 06, 2017
at 10:30 AM EST
(2017-12-06 15:30 UTC)
Business-Driven Network Security Policy ManagementAlgoSec Systems, Ltd.
Edy Almer
Tuesday, December 05, 2017
at 3:30 PM EST
(2017-12-05 20:30 UTC)
Top Network Security Products Revealed in Latest TestsForcepoint LLC
Thomas Skybakmoen
Tuesday, December 05, 2017
at 1:00 PM EST
(2017-12-05 18:00 UTC)
Next-Generation Antivirus (NGAV) Buyer's Guide: Successful Strategies for Choosing and Implementing NGAVCarbon Black
Barbara Filkins, Brian Gladstein
Tuesday, December 05, 2017
at 10:30 AM EST
(2017-12-05 15:30 UTC)
Bring the Fight to Them: Hunting down adversaries using OSQueryErik Van Buggenhout, Stephen Sims
Monday, December 04, 2017
at 1:00 PM EST
(2017-12-04 18:00 UTC)
Secure DevOps Ė Monitoring in the CloudBen Allen
Thursday, November 30, 2017
at 1:00 PM EDT
(2017-11-30 18:00 UTC)
The ROI of AppSec: Getting your Money's Worth from Your AppSec ProgramVeracode
Jim Bird, Maria Loughlin, Ellen Nussbaum
Wednesday, November 29, 2017
at 1:00 PM EST
(2017-11-29 18:00 UTC)
Use Code Reuse to your Advantage: The Forgotten Component of your Incident Response PlanIntezer
Itai Tevet, Jake Williams
Wednesday, November 22, 2017
at 10:00 AM EST
(2017-11-22 15:00 UTC)
GDPR - What to Train Your WorkforceBrian Honan, Lance Spitzner
Tuesday, November 21, 2017
at 1:00 PM EST
(2017-11-21 18:00 UTC)
The Four Types of Threat Detection for ICS SecurityDragos, Inc.
Robert M. Lee
Tuesday, November 21, 2017
at 10:00 AM EDT
(2017-11-21 15:00 UTC)
Memory Forensics: Sodium Pentothal for Your SecurityJake Williams, Alissa Torres
Monday, November 20, 2017
at 1:00 PM EST
(2017-11-20 18:00 UTC)
Prevent-Detect-RESPONSE - How to Win at Security Part 3 - Implementing Proper Incident Response from SEC401Dr. Eric Cole
Friday, November 17, 2017
at 8:00 AM EST
(2017-11-17 13:00 UTC)
SANS Security Operations Center (SOC) BriefingRecordedFuture
DomainTools
Authentic8
Digital Guardian
Please Check Back
Wednesday, November 15, 2017
at 3:30 PM EST
(2017-11-15 20:30 UTC)
Collaborative Development of Att&ck AnalyticsJohn Wunder
Wednesday, November 15, 2017
at 10:30 AM EST
(2017-11-15 15:30 UTC)
Breaking Down the Data: How Secure Are You and Your Supply Chain?Bitsight
Stephen Boyer, Jay Jacobs, G. Mark Hardy
Tuesday, November 14, 2017
at 3:30 PM EST
(2017-11-14 20:30 UTC)
Integrated Security Operations - The Difference between Knowing and GuessingServiceNow
Matthew O'Brien, Piero DePaoli, John Pescatore
Tuesday, November 14, 2017
at 1:00 PM EST
(2017-11-14 18:00 UTC)
A day in the life doing incident response without Bro. And how it could be so much better.Corelight
Vincent Stoffer, Matt Bromiley
Tuesday, November 14, 2017
at 11:00 AM EST
(2017-11-14 16:00 UTC)
Using Malware Analysis to Explore the Potential of Malware VaccinationLenny Zeltser
Monday, November 13, 2017
at 3:30 PM EST
(2017-11-13 20:30 UTC)
Secure DevOps: Three Keys for SuccessFrank Kim
Monday, November 13, 2017
at 1:00 PM EST
(2017-11-13 18:00 UTC)
Making IoT RelevantMagnet Forensics
Jessica Hyde
Friday, November 10, 2017
at 1:00 PM EST
(2017-11-10 18:00 UTC)
Getting Started with the SIFT WorkstationRob Lee
Thursday, November 09, 2017
at 3:00 PM EST
(2017-11-09 20:00 UTC)
Which SANS Pen Test Course Should I Take? November 2017 EditionJason Blanchard, Larry Pesce, Ed Skoudis
Thursday, November 09, 2017
at 1:00 PM EDT
(2017-11-09 18:00 UTC)
Preventing Persistent Attacks With Linux Micro VirtualizationImmutable Systems
Tom Gillis, John Pescatore
Thursday, November 09, 2017
at 10:30 AM EST
(2017-11-09 15:30 UTC)
Creating Understanding from DataJohn Bambenek
Wednesday, November 08, 2017
at 3:00 PM EDT
(2017-11-08 20:00 UTC)
Modern Log Parsing and Enrichment with SIEMJohn Hubbard, Justin Henderson
Wednesday, November 08, 2017
at 10:30 AM EST
(2017-11-08 15:30 UTC)
iOS 11 isn't all fun and games. What we know so far and ways to handle unsupported data setsDomenica Crognale, Heather Mahalik
Tuesday, November 07, 2017
at 3:30 PM EDT
(2017-11-07 20:30 UTC)
Attack and Defend: Linux Privilege Escalation Techniques In DepthMichael C. Long
Tuesday, November 07, 2017
at 10:30 AM EST
(2017-11-07 15:30 UTC)
Scripting Cloud Security CapabilitiesKenneth G. Hartman
Monday, November 06, 2017
at 1:00 PM EST
(2017-11-06 18:00 UTC)
Managed Detection and Response and Business context-- where do they meet, how do they co-exist to help organizations understand true risk?Leidos
Justin Lachesky, Mike Gotham, Anne Saunders, Ken Brown
Friday, November 03, 2017
at 3:30 PM EDT
(2017-11-03 19:30 UTC)
Catch, Investigate, Repeat: Automating Incident Response with Behavior-Based IOCsSECDO
Joseph Pizzo, Jake Williams
Friday, November 03, 2017
at 1:00 PM EDT
(2017-11-03 17:00 UTC)
Updated FOR578 - Training for Security Personnel and Why Intelligence Matters to YouRobert M. Lee
Thursday, November 02, 2017
at 3:30 PM EDT
(2017-11-02 19:30 UTC)
Office 365 Migration Checklist: Considerations for Midsize EnterprisesProofPoint
Jennifer Cheng
Thursday, November 02, 2017
at 1:00 PM EDT
(2017-11-02 17:00 UTC)
Cloud Security: Defense in Detail if Not in Depth. Part 2: Changes Make the Cloud More Secure, but Is InfoSec Changing Even More?BMC Software, Inc.
Forcepoint LLC
Mcafee LLC
Qualys
Nicolas Fischbach, Eric Boerger, Dave Shackleford
Thursday, November 02, 2017
at 10:30 AM EST
(2017-11-02 14:30 UTC)
Spamhaus DNS Firewall ( DNS RPZ ) - DNS as a 'Critical Choke Point' to Block Resolution of Known Malicious SitesSecurityZONES
Matt Stith
Wednesday, November 01, 2017
at 1:00 PM EST
(2017-11-01 17:00 UTC)
Cloud Security: Defense in Detail if Not in Depth. Part 1: Using Cloud Services to Address the Cloud Threat Environment BMC Software, Inc.
Forcepoint LLC
Mcafee LLC
Qualys
Mark Butler, Allison Cramer, Dave Shackleford
Wednesday, November 01, 2017
at 10:30 AM EDT
(2017-11-01 14:30 UTC)
The Role of AI in Cybersecurity and AuditingMuzamil Riffat
Tuesday, October 31, 2017
at 10:30 AM EDT
(2017-10-31 14:30 UTC)
Closing the Skills Gap with Analytics and Machine Learning RSA
Peter M. Tran, Ahmed Tantawy
Monday, October 30, 2017
at 1:00 PM EDT
(2017-10-30 17:00 UTC)
Beyond layered securityPalo Alto Networks
Navneet Singh, John Pescatore
Friday, October 27, 2017
at 1:00 PM EDT
(2017-10-27 17:00 UTC)
Windows Credentials: Attacks, Mitigations & DefenseChad Tilbury
Thursday, October 26, 2017
at 3:30 PM EDT
(2017-10-26 19:30 UTC)
Prevent-DETECT-Response - How to Win at Security Part 2 - Timely Detection Tips and Tricks from SEC401Eric Cole
Thursday, October 26, 2017
at 1:00 PM EDT
(2017-10-26 17:00 UTC)
Enhance Your Investigations with Network DataCisco Systems
Brian Ford, Matt Bromiley
Thursday, October 26, 2017
at 10:30 AM EST
(2017-10-26 14:30 UTC)
The Science Behind the Hype: Machine Learning in Endpoint SecurityBarkly
David Hoelzer, Jack Danahy
Wednesday, October 25, 2017
at 3:30 PM EDT
(2017-10-25 19:30 UTC)
7-Step Process to Secure AWS and Custom ApplicationsSkyHigh Networks
John Pescatore, Brandon Cook, Niraj Patel, Anant Mahajan
Wednesday, October 25, 2017
at 1:00 PM EST
(2017-10-25 17:00 UTC)
Application Breaches and Lifecycle Security: SANS 2017 Application Security Survey, Part 2Rapid7 Inc.
Synopsys
Tenable
Veracode
WhiteHat Security
Frank Kim, Anthony Bettini, Ryan O'Leary
Wednesday, October 25, 2017
at 10:30 AM EDT
(2017-10-25 14:30 UTC)
Forensic Timeline Analysis Using WiresharkDavid Fletcher
Tuesday, October 24, 2017
at 3:30 PM EDT
(2017-10-24 19:30 UTC)
Closing the Skills Gap Chasm with Automation and Actionable AnalyticsExabeam
Orion Cassetto, Dave Shackleford
Tuesday, October 24, 2017
at 1:00 PM EST
(2017-10-24 17:00 UTC)
Application Security on the Go! SANS Survey Results, Part 1Rapid7 Inc.
Synopsys
Tenable
Veracode
WhiteHat Security
Eric Johnson, Alfred Chung, Colin Domoney, Apoorva Phadke
Tuesday, October 24, 2017
at 10:30 AM EDT
(2017-10-24 14:30 UTC)
The Maturing of Endpoint Detection and Response (EDR): Choose the Right SolutionCrowdStrike, Inc.
Con Mallon, John Pescatore
Friday, October 20, 2017
at 3:00 PM EST
(2017-10-20 19:00 UTC)
EDR vs SIEM - Place your bet! The fight is onJustin Henderson
Thursday, October 19, 2017
at 3:00 PM EDT
(2017-10-19 19:00 UTC)
The facts about KRACK and your WPA enabled WiFi networkLarry Pesce
Thursday, October 19, 2017
at 1:00 PM EDT
(2017-10-19 17:00 UTC)
Threat Intelligence for Every Security FunctionRecordedFuture
Dave Shackleford, Chris Pace
Wednesday, October 18, 2017
at 1:00 PM EST
(2017-10-18 17:00 UTC)
Security Awareness for Board of DirectorsLance Spitzner, John Pescatore
Wednesday, October 18, 2017
at 10:30 AM EST
(2017-10-18 14:30 UTC)
New Threats Posed by Misuse of Legitimate Websites, End-to-End Encryption Technologies and Countermeasures, A SANS Technology Institute Masterís Candidate PresentationPaul Tang
Tuesday, October 17, 2017
at 1:00 PM EDT
(2017-10-17 17:00 UTC)
Targeted Attack Protection: SANS Review of Endgame's endpoint security platformEndgame
Mike Nichols, Dave Shackleford
Tuesday, October 17, 2017
at 11:00 AM EDT
(2017-10-17 15:00 UTC)
There's A Secure App for That: How to Mitigate Attacks Targeting Automotive Mobile Application's CommunicationsColin DeWinter, Ben Gardiner
Friday, October 13, 2017
at 3:30 PM EDT
(2017-10-13 19:30 UTC)
Strut(s) your stuff.Moses Hernandez
Thursday, October 12, 2017
at 1:00 PM EDT
(2017-10-12 17:00 UTC)
NotPetya, Dragonfly 2.0 & CrashOverride: Is Now the Time for Active Cyber Defense in ICS/SCADA Networks?CyberX
Phil Neray, Mike Assante
Wednesday, October 11, 2017
at 1:00 PM EDT
(2017-10-11 17:00 UTC)
Isolate the Critical: How to Deploy Microsegmentation for Operational ResiliencyUnisys
Chip Yeager, Erin Kelly
Wednesday, October 11, 2017
at 10:30 AM EDT
(2017-10-11 14:30 UTC)
Turning Threat Data into Threat Intel Using Automated AnalysisVMRay
Carsten Willems, Dave Shackleford
Tuesday, October 10, 2017
at 1:00 PM EDT
(2017-10-10 17:00 UTC)
DevSecOps - Building Continuous Security Into IT & App InfrastructuresQualys
Chris Carlson, John Pescatore
Friday, October 06, 2017
at 3:00 PM EST
(2017-10-06 19:00 UTC)
Guide to Selecting and Sourcing a Managed Security Services ProviderCory Mazzola, Chris Crowley
Thursday, October 05, 2017
at 3:30 PM EDT
(2017-10-05 19:30 UTC)
Simplified Segmentation for a Stronger Threat DefenseCisco Systems
Keti Kilcrease
Thursday, October 05, 2017
at 1:00 PM EST
(2017-10-05 17:00 UTC)
I'm in the cloud now so... I'm secure right?Netwrix
Jeff Melnick, John Pescatore
Wednesday, October 04, 2017
at 3:00 PM EDT
(2017-10-04 19:00 UTC)
Detecting Modern PowerShell Attacks with SIEMTim Garcia, Justin Henderson
Wednesday, October 04, 2017
at 10:30 AM EDT
(2017-10-04 14:30 UTC)
Beyond Scanning: Delivering Impact Driven Vulnerability AssessmentsMatthew Toussain
Tuesday, October 03, 2017
at 9:00 PM EDT
(2017-10-04 01:00 UTC)
SANS Asia-Pacific Webcast Series- Standard Logs Made into Actionable DetectsTim Garcia, Justin Henderson
Tuesday, October 03, 2017
at 3:30 PM EDT
(2017-10-03 19:30 UTC)
New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
Tuesday, October 03, 2017
at 1:00 PM EDT
(2017-10-03 17:00 UTC)
Shrinking Attack Dwell Times - A Phishing Case Study DemoSyncurity
John Jolly, John Pescatore
Tuesday, October 03, 2017
at 9:00 AM EST
(2017-10-03 13:00 UTC)
New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
Monday, October 02, 2017
at 1:00 PM EST
(2017-10-02 17:00 UTC)
Accurate behavior analysis enables detection and of malicious insiders, outsiders and IoT deviceE8 Security
Matt Rodgers, John Pescatore
Friday, September 29, 2017
at 1:00 PM EDT
(2017-09-29 17:00 UTC)
Understanding Fileless Attacks and How to Stop ThemCrowdStrike, Inc.
Jackie Castelli, John Pescatore
Thursday, September 28, 2017
at 3:30 PM EDT
(2017-09-28 19:30 UTC)
Clustering, Sourcing, and Correlating All Things IndicatorsDomainTools
Kyle Wilhoit, Rebekah Brown
Thursday, September 28, 2017
at 1:00 PM EDT
(2017-09-28 17:00 UTC)
SANS CyberTalent VetSuccessBrian D. Ray, Sonny Sandelius
Thursday, September 28, 2017
at 7:00 AM EDT
(2017-09-28 11:00 UTC)
SANS Asia-Pacific Webcast Series- 2017 SANS SOC Survey DiscussionChristopher Crowley
Wednesday, September 27, 2017
at 3:30 PM EDT
(2017-09-27 19:30 UTC)
PREVENT-Detect-Response - How to Win at Security Part 1 - The Secret to Prevention from SEC401Eric Cole
Wednesday, September 27, 2017
at 1:00 PM EDT
(2017-09-27 17:00 UTC)
Your Security Sandbox Won't Catch It All - The Phishing ProblemProofPoint
Mark Guntrip, Robert M. Lee
Tuesday, September 26, 2017
at 3:30 PM EDT
(2017-09-26 19:30 UTC)
The True Cost of Ransomware: 5 Companies, 5 Attacks, and the Reality of RecoveryBarkly
John Pescatore, Ryan Berg
Wednesday, September 20, 2017
at 10:30 AM EDT
(2017-09-20 14:30 UTC)
Outsmart Hackers by Coordinating Your DefensesSophos Inc.
Seth Geftic, John Pescatore
Tuesday, September 19, 2017
at 1:00 PM EDT
(2017-09-19 17:00 UTC)
The Top 20 ICS Cyber Attacks And how to use them to improve IIoT and cloud security designsWaterfall Security
Andrew Ginter, Tim Conway
Monday, September 18, 2017
at 1:00 PM EDT
(2017-09-18 17:00 UTC)
Breaking Red - Designing IOCs Using Red Team ToolsJoe Vest
Friday, September 15, 2017
at 1:00 PM EDT
(2017-09-15 17:00 UTC)
EDR + NGAV Working Together: SANS Review of Carbon Black Cb DefenseCarbon Black
Jerry Shenk, Brian Gladstein
Wednesday, September 13, 2017
at 3:30 PM EDT
(2017-09-13 19:30 UTC)
What To Do About the Equifax HackLance Spitzner
Wednesday, September 13, 2017
at 1:00 PM EDT
(2017-09-13 17:00 UTC)
Harness the Hacker With Breach and Attack SimulationSafebreach
Itzik Kotler, John Pescatore
Tuesday, September 12, 2017
at 1:00 PM EDT
(2017-09-12 17:00 UTC)
Asking the Right Questions about Dynamic Scanning to Secure Web Applications: A Buyer's Guide to App Sec Scanning ToolsVeracode
Joe Pelletier, Barbara Filkins
Tuesday, September 12, 2017
at 11:00 AM EDT
(2017-09-12 15:00 UTC)
Hitting the Security Sweet Spot with Honeypots in ICS NetworksBrent Huston
Wednesday, September 06, 2017
at 10:00 PM EDT
(2017-09-07 02:00 UTC)
Windows PowerShell for AuditorsClay Risenhoover
Wednesday, September 06, 2017
at 3:00 PM EDT
(2017-09-06 19:00 UTC)
SIEM Design & ArchitectureJohn Hubbard, Justin Henderson
Wednesday, September 06, 2017
at 1:00 PM EST
(2017-09-06 17:00 UTC)
Sensitive Data Everywhere: Results of SANS 2017 Data Protection SurveyInfoBlox
Mcafee LLC
Barbara Filkins, Benjamin Wright, Cindy Chen, Sam Kumarsamy
Wednesday, September 06, 2017
at 10:30 AM EDT
(2017-09-06 14:30 UTC)
The latest 2017 NSS Labs NGFW test results reveals many NGFWs may be vulnerable to evasions. Does your current firewall or IPS protect against AETs?Forcepoint LLC
Jim Fulton
Tuesday, September 05, 2017
at 1:00 PM EDT
(2017-09-05 17:00 UTC)
The Efficiency of Context: Review of WireX Network Forensics PlatformWireX Systems
Philip Campeau, Jerry Shenk
Thursday, August 31, 2017
at 1:00 PM EDT
(2017-08-31 17:00 UTC)
Threat Hunting with Endpoints: A Methodology for Effective Detection and Agile ResponseRSA
Jack "Wes" Riley, John Pescatore
Thursday, August 24, 2017
at 3:30 PM EST
(2017-08-24 19:30 UTC)
Building Your Own Super-Duper Home LabJeff McJunkin, Jason Blanchard
Wednesday, August 23, 2017
at 3:30 PM EDT
(2017-08-23 19:30 UTC)
Which SANS Pen Test Course Should I Take?Ed Skoudis, Mark Baggett, Jason Blanchard
Wednesday, August 23, 2017
at 10:30 AM EDT
(2017-08-23 14:30 UTC)
Protect and Prevent: 3 strategies for blocking fileless attacks and exploitsBarkly
Philip Maio, John Pescatore, Jack Danahy
Tuesday, August 22, 2017
at 3:30 PM EST
(2017-08-22 19:30 UTC)
Using COIN doctrine to improve Cyber DefenseSebastien Godin
Thursday, August 17, 2017
at 1:00 PM EDT
(2017-08-17 17:00 UTC)
Detect & Prevent Data Exfiltration: A Unique Approach with InfobloxInfoBlox
Sam Kumarsamy, Andrew Hay
Thursday, August 17, 2017
at 10:30 AM EDT
(2017-08-17 14:30 UTC)
Put Some Power in Your Network Security: Detect, Hunt & Prevent ThreatsBricata
Druce MacFarlane, John Pescatore
Wednesday, August 16, 2017
at 3:30 PM EDT
(2017-08-16 19:30 UTC)
Continuous Security: Implementing the Critical Controls in a DevOps Environment, A SANS Technology Institute Masterís Degree PresentationAlyssa Robinson
Tuesday, August 15, 2017
at 3:30 PM EDT
(2017-08-15 19:30 UTC)
Making Sense of the Critical Security Controls in the CloudEric Johnson
Tuesday, August 15, 2017
at 1:00 PM EDT
(2017-08-15 17:00 UTC)
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyCylance
FireEye
Mcafee LLC
Qualys
Chad Skipper, Sean Murphy, Robert Leong, Mark Butler, Lee Neely
Tuesday, August 15, 2017
at 10:30 AM EDT
(2017-08-15 14:30 UTC)
Know Thy Network - Cisco Firepower and CIS Critical Security Controls 1 & 2Ryan Firth
Monday, August 14, 2017
at 1:00 PM EDT
(2017-08-14 17:00 UTC)
5.3 Billion Reasons to Keep Up-to-date with BECProofPoint
Ryan Terry, Johannes Ullrich
Thursday, August 10, 2017
at 1:00 PM EDT
(2017-08-10 17:00 UTC)
Roadmap to a Secure Smart InfrastructureRapid7 Inc.
Tod Beardsley, Barbara Filkins
Wednesday, August 09, 2017
at 10:30 AM EDT
(2017-08-09 14:30 UTC)
Dissecting various real-world DGA variantsCybereason
Sean Ennis, John Pescatore
Tuesday, August 08, 2017
at 1:00 PM EDT
(2017-08-08 17:00 UTC)
Protecting the Critical: An innovative approach to defending your Industrial Control SystemsUnisys
Stuart Phillips, Christopher Blask, Mike Assante
Thursday, August 03, 2017
at 1:00 PM EDT
(2017-08-03 17:00 UTC)
Machine Learning: Practical Applications for Cyber SecurityRecordedFuture
Chris Pace, Ismael Valenzuela
Thursday, August 03, 2017
at 10:30 AM EDT
(2017-08-03 14:30 UTC)
Using Docker to Create Multi-Container Research EnvironmentsShaun McCullough
Tuesday, August 01, 2017
at 3:30 PM EDT
(2017-08-01 19:30 UTC)
Risk-based privilege managementChristoph Eckstein
Tuesday, August 01, 2017
at 1:00 PM EDT
(2017-08-01 17:00 UTC)
The SANS 2017 Insider Threat Survey: Mounting an Effective Defense Against Insider ThreatDtex Systems
Haystax Technology
Rapid7 Inc.
Eric Cole, PhD, Bryan Ware, Matt Hathaway, Pramod Cherukumilli
Thursday, July 27, 2017
at 10:30 AM EDT
(2017-07-27 14:30 UTC)
Win The Cyberwar With Zero TrustPalo Alto Networks
John Kindervag
Friday, July 21, 2017
at 1:00 PM EDT
(2017-07-21 17:00 UTC)
A glimpse into NEW FOR500: Windows Forensics Course: Windows 10 and beyond - what is your digital forensics investigation missing?Rob Lee
Thursday, July 20, 2017
at 10:00 PM EDT
(2017-07-21 02:00 UTC)
SANS Asia-Pacific Webcast Series- Elevating Your Analysis Tactics: The New Forensics PosterPhilip Hagen
Thursday, July 20, 2017
at 1:00 PM EDT
(2017-07-20 17:00 UTC)
Cloud Security MonitoringBalaji Balakrishnan
Wednesday, July 19, 2017
at 1:00 PM EDT
(2017-07-19 17:00 UTC)
Bridging the O365 Security Gap with CASBSkyHigh Networks
Andreas Zengel, Brandon Cook, John Pescatore
Tuesday, July 18, 2017
at 3:30 PM EDT
(2017-07-18 19:30 UTC)
PowerShell ProxyKenton Groombridge
Tuesday, July 18, 2017
at 10:30 AM EDT
(2017-07-18 14:30 UTC)
NSS Labs NGFW Test: Is your firewall a top performer?Forcepoint LLC
Thomas Skybakmoen, Jim Fulton
Friday, July 14, 2017
at 10:00 AM EDT
(2017-07-14 14:00 UTC)
Automating Cloud Security to Mitigate RiskSkybox Security, Inc.
David Boardman, Dave Shackleford
Thursday, July 13, 2017
at 4:15 PM CST
(2017-07-13 21:15 UTC)
SANS ICS Briefing: Defending Energy SystemsWaterfall Security
PAS
Cylance
Arbor Networks
Tripwire, Inc.
Claroty Inc.
Jason Farmer, Nick Cappi, Stuart Bailey, Robert M. Lee
Wednesday, July 12, 2017
at 1:00 PM EDT
(2017-07-12 17:00 UTC)
The 2017 State of Industrial Control System SecurityóPart 2: Protection, Prevention and ConvergenceGreat Bay Software
Nozomi Networks
PAS
Tempered
Tripwire, Inc.
David Zahn, Erik Giesa, Katherine Brocklehurst, Doug Wylie, Bengt Gregory-Brown
Wednesday, July 12, 2017
at 10:30 AM EDT
(2017-07-12 14:30 UTC)
ICS Cyber Security in The Real-World: Demonstrating Threat Detection and Mitigation In Industrial Networks Indegy
Dana Tamir, Chris Grove
Tuesday, July 11, 2017
at 1:00 PM EDT
(2017-07-11 17:00 UTC)
The 2017 State of Industrial Control System Security-Part 1: Personnel, Threats and ToolsGreat Bay Software
Nozomi Networks
PAS
Tempered
Tripwire, Inc.
Ty Powers, Edgard Capdevielle, Doug Wylie, Bengt Gregory-Brown
Tuesday, July 11, 2017
at 10:30 AM EST
(2017-07-11 14:30 UTC)
Five Lessons Learned from Petya and WannaCryVeracode
Jake Williams, Chris Wysopal
Friday, July 07, 2017
at 1:00 PM EDT
(2017-07-07 17:00 UTC)
CRASHOVERIDE - Detecting and Mitigating the Electric Grid Targeted MalwareDan Gunter, Robert M. Lee, Mike Assante
Thursday, July 06, 2017
at 3:00 PM EDT
(2017-07-06 19:00 UTC)
IPv6 and Open Source IDS, A SANS Technology Institute Masterís Degree PresentationJon Mark Allen
Thursday, July 06, 2017
at 11:00 AM EDT
(2017-07-06 15:00 UTC)
A glimpse of the NEW FOR585 Advanced Smartphone CourseHeather Mahalik
Thursday, June 29, 2017
at 3:30 PM EDT
(2017-06-29 19:30 UTC)
Putting Digital Threat Investigation and Response into HyperdriveRiskIQ
Beckie Neumann, Dave Shackleford
Thursday, June 29, 2017
at 1:00 PM EDT
(2017-06-29 17:00 UTC)
Using Endpoint Security Innovation and Next-Gen Capabilities to Counter Endpoint Threats At-ScaleCounterTack
Raj Dodhiawala, John Pescatore
Thursday, June 29, 2017
at 10:00 AM EDT
(2017-06-29 14:00 UTC)
Complying with Data Protection Law in a Changing WorldForcepoint LLC
Neil Thacker, Benjamin Wright
Wednesday, June 28, 2017
at 1:00 PM EDT
(2017-06-28 17:00 UTC)
Effortless Detection and Investigation of Cloud Breaches: A Review of Lacework's Zero Touch Cloud Workload Security PlatformLacework
Sanjay Kalra, Matt Bromiley
Wednesday, June 28, 2017
at 10:30 AM EDT
(2017-06-28 14:30 UTC)
Securing Critical Infrastructure Organizations against the Next Cyber Breach: Best Practices for organizations leveraging Managed ServicesLeidos
RSA
Jim Hollar, Gib Sorebo
Tuesday, June 27, 2017
at 1:00 PM EDT
(2017-06-27 17:00 UTC)
New Threat Vectors for ICS/SCADA Networks -- and How to Prepare for ThemCyberX
Phil Neray, Mike Assante
Tuesday, June 27, 2017
at 10:30 AM EDT
(2017-06-27 14:30 UTC)
Managing Your Top 5 Human RisksLance Spitzner
Thursday, June 22, 2017
at 1:00 PM EDT
(2017-06-22 17:00 UTC)
Efficiently Contain Threats and Ease Operations with Security OrchestrationInfoBlox
Srikrupa Srivatsan, Andrew Hay
Tuesday, June 20, 2017
at 1:00 PM EDT
(2017-06-20 17:00 UTC)
Live Demonstration: Automating Enterprise Security ResponseServiceNow
Alex Cox, Piero DePaoli, John Strand
Friday, June 16, 2017
at 8:00 AM EDT
(2017-06-16 12:00 UTC)
SANS Finance Briefing: Practical Threat Modeling for Financial OrganizationsForcepoint LLC
RecordedFuture
Please Check Back
Thursday, June 15, 2017
at 11:00 AM EDT
(2017-06-15 15:00 UTC)
Catch Me if You can - Pentesting vs APTCybereason
Mor Levi
Wednesday, June 14, 2017
at 3:30 PM EDT
(2017-06-14 19:30 UTC)
Intrusion Detection Through Relationship Analysis, A SANS Technology Institute Masterís Degree PresentationPatrick Neise
Wednesday, June 14, 2017
at 12:00 PM EDT
(2017-06-14 16:00 UTC)
SANS 2017 Incident Response Survey ResultsóPart 2: Threat Intelligence and Improving Incident Response CapabilitiesAlienVault
Anomali
Guidance Software
IBM
LogRhythm
Mcafee LLC
Matt Bromiley, Anthony Di Bello, George Mina, Travis Farral
Tuesday, June 13, 2017
at 3:00 PM EDT
(2017-06-13 19:00 UTC)
PKI Cartels: The Value of Trust, A SANS Technology Institute Masterís Degree PresentationSandy Dunn
Tuesday, June 13, 2017
at 12:00 PM EDT
(2017-06-13 16:00 UTC)
SANS 2017 Incident Response Survey Results - Part 1: Attack, Response and MaturityAlienVault
Anomali
Guidance Software
IBM
LogRhythm
Mcafee LLC
Danielle Russell, Matt Bromiley, Riana Smalberger, James Carder
Monday, June 12, 2017
at 10:30 AM EDT
(2017-06-12 14:30 UTC)
You Have 24 Hours to Comply: Lessons Learned from Implementing a Behavioral Ransomware Detection FrameworkMark Mager
Friday, June 09, 2017
at 3:30 PM EDT
(2017-06-09 19:30 UTC)
What's New in the FOR610: Reverse-Engineering Malware Analysis Course in 2017?Lenny Zeltser
Friday, June 09, 2017
at 1:00 PM EDT
(2017-06-09 17:00 UTC)
SecOps principles to close gaps in Vulnerability ManagementFlexera Software
Ken Hilker, John Pescatore
Friday, June 09, 2017
at 10:30 AM EDT
(2017-06-09 14:30 UTC)
A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint ProtectionCrowdStrike, Inc.
Peter Ingebrigtsen, Dave Shackleford
Thursday, June 08, 2017
at 11:00 AM EDT
(2017-06-08 15:00 UTC)
What Works in Situational Awareness and Visibility: Reducing Time to Detect and Enhancing Business Outcomes with SplunkSplunk
Ryan Niemes, John Pescatore
Wednesday, June 07, 2017
at 3:00 PM EDT
(2017-06-07 19:00 UTC)
Evaluation Criteria for ICS Cyber Security Monitoring with Rockwell Automation and ClarotyClaroty Inc.
Rockwell Automation
Umair Masud, Patrick McBride
Wednesday, June 07, 2017
at 10:30 AM EST
(2017-06-07 14:30 UTC)
Tackling Mobile Security with CiscoCisco Systems
Beth Barach
Tuesday, June 06, 2017
at 8:00 PM EDT
(2017-06-07 00:00 UTC)
Critical Security Controls for Home Networks, A SANS Technology Institute Masters Degree PresentationGlen Roberts
Tuesday, June 06, 2017
at 3:00 PM EDT
(2017-06-06 19:00 UTC)
Pin the Key on the App... and Other Transport Security FunMark Geeslin
Tuesday, June 06, 2017
at 1:00 PM EDT
(2017-06-06 17:00 UTC)
Elevating Your Analysis Tactics: The New Forensics Poster Philip Hagen
Friday, June 02, 2017
at 1:00 PM EDT
(2017-06-02 17:00 UTC)
FROM DETECTION TO RESPONSE, SOC 2.0 - 2017 State of Security Operations and What's Being Done!Siemplify
Miguel Carrero, Meny Har
Wednesday, May 31, 2017
at 1:00 PM EDT
(2017-05-31 17:00 UTC)
Using Dynamic Scanning to Secure Web Apps in Development and After DeploymentVeracode
Chris Kirsch, Barbara Filkins
Wednesday, May 31, 2017
at 11:00 AM EDT
(2017-05-31 15:00 UTC)
Vulnerability Management LifecycleDavid R. Miller
Tuesday, May 30, 2017
at 10:00 PM EDT
(2017-05-31 02:00 UTC)
SANS Asia-Pacific Webcast Series- Powercat has Power: A PowerShell Implementation of NetcatMick Douglas
Tuesday, May 30, 2017
at 11:00 AM EDT
(2017-05-30 15:00 UTC)
2017 SANS Security Awareness ReportThe Kogod Cybersecurity Governance Center (KCGC), Lance Spitzner
Friday, May 26, 2017
at 1:00 PM EDT
(2017-05-26 17:00 UTC)
Building Effective CTI Sharing for Network DefenseScott J. Roberts
Friday, May 26, 2017
at 10:30 AM EDT
(2017-05-26 14:30 UTC)
Defending the ICS Ahead of the Patch: WannaCry Lessons Learned Joe Slowik, Mike Assante, Ben Miller
Thursday, May 25, 2017
at 1:00 PM EDT
(2017-05-25 17:00 UTC)
The Role of Vulnerability Scanning in Web App SecurityNetsparker
Ferruh Mavituna, Barbara Filkins
Thursday, May 25, 2017
at 11:00 AM EDT
(2017-05-25 15:00 UTC)
The New Reality: Centralizing Security when Your Network is DecentralizingForcepoint LLC
Dave Shackleford, Michael Knapp
Wednesday, May 24, 2017
at 3:00 PM EDT
(2017-05-24 19:00 UTC)
The Road to Increased Asset Visibility: Building an Effective ICS Security StrategyLeidos
Aruna Sreeram, Eric Cornelius
Wednesday, May 24, 2017
at 1:00 PM EDT
(2017-05-24 17:00 UTC)
Choosing the Right Path to Application SecurityVeracode
Adam Shostack, Chris Wysopal
Wednesday, May 24, 2017
at 11:00 AM EDT
(2017-05-24 15:00 UTC)
Fighting Fileless MalwareCybereason
Sanat Chugh
Tuesday, May 23, 2017
at 1:00 PM EDT
(2017-05-23 17:00 UTC)
Network Security Infrastructure and Best Practices: A SANS SurveyNETSCOUT Systems, Inc.
Matt Bromiley, John Pescatore, Barbara Filkins, Ann Sun
Friday, May 19, 2017
at 3:00 PM EDT
(2017-05-19 19:00 UTC)
Prelude to Beats & Bytes: Striking the Right Chord in Digital ForensicsRyan Pittman, Matt Linton, Cindy Murphy
Thursday, May 18, 2017
at 3:00 PM EST
(2017-05-18 19:00 UTC)
Lingering Exploits Related to WannaCry Ransomware?Jake Williams, Gil Barak, Benjamin Wright
Thursday, May 18, 2017
at 1:00 PM EDT
(2017-05-18 17:00 UTC)
Future SOCs: Results of the 2017 SANS Survey on Security Operations Centers, Part 2 Carbon Black
Endgame
LogRhythm
NETSCOUT Systems, Inc.
ThreatConnect
Tripwire, Inc.
Christopher Crowley, Braden Preston, Jim Wachhaus , Ksenia Coffman
Thursday, May 18, 2017
at 11:00 AM EDT
(2017-05-18 15:00 UTC)
Threat Hunting for the MassesFrank McClain
Wednesday, May 17, 2017
at 1:00 PM EDT
(2017-05-17 17:00 UTC)
SOCs Grow Up to Protect, Defend, Respond: Results of the 2017 SANS Survey on Security Operations Centers, Part 1Carbon Black
Endgame
LogRhythm
NETSCOUT Systems, Inc.
ThreatConnect
Tripwire, Inc.
Alex Valdivia, Christopher Crowley, John Markott, James Carder
Tuesday, May 16, 2017
at 12:00 PM EDT
(2017-05-16 16:00 UTC)
Latest on WannaCry RansomwareRenato Marinho, Jake Williams, Benjamin Wright
Monday, May 15, 2017
at 1:00 PM EDT
(2017-05-15 17:00 UTC)
Elevating the Fraud in Point of Sale (PoS) to Another LevelThiago Bordini
Friday, May 12, 2017
at 7:45 PM PST
(2017-05-13 02:45 UTC)
Special Webcast: WannaCry Ransomeware Threat - What we know so farJake Williams
Thursday, May 11, 2017
at 1:00 PM EDT
(2017-05-11 17:00 UTC)
Prevent DNS Based Data Exfiltration and Disrupt Cyber Kill ChainInfoBlox
Srikrupa Srivatsan, Andrew Hay
Thursday, May 11, 2017
at 11:00 AM EDT
(2017-05-11 15:00 UTC)
www.google.com/search?q=what+does+this+all+mean?Phill Moore
Wednesday, May 10, 2017
at 1:00 PM EDT
(2017-05-10 17:00 UTC)
How to Conquer Targeted Email Threats: SANS Review of Agari Advanced Threat ProtectionAGARI
Vidur Apparao, Dave Shackleford
Wednesday, May 10, 2017
at 11:00 AM EDT
(2017-05-10 15:00 UTC)
IIOT and Megacities 2025Andy Bochman, Mike Assante
Tuesday, May 09, 2017
at 3:00 PM EDT
(2017-05-09 19:00 UTC)
The Promise and Pitfalls of Security Testing TodayWhiteHat Security
Setu Kulkarni, Mark Geeslin
Tuesday, May 09, 2017
at 1:00 PM EDT
(2017-05-09 17:00 UTC)
SANS Best of Awards Drilldown: Endpoint Detection and ResponseCarbon Black
John Pescatore, Justin Falck
Friday, May 05, 2017
at 11:00 AM EDT
(2017-05-05 15:00 UTC)
Obfuscated No More: Practical Steps for Defeating Android ObfuscationJoshua Wright
Thursday, May 04, 2017
at 3:00 PM EDT
(2017-05-04 19:00 UTC)
Deploying DNSSEC at ScaleCloudFlare
Dani Grant, Matt Bromiley
Tuesday, May 02, 2017
at 8:00 PM EDT
(2017-05-03 00:00 UTC)
Improvements to Critical Control 12Steve Jaworski
Tuesday, May 02, 2017
at 3:00 PM EDT
(2017-05-02 19:00 UTC)
Taming and Securing the Internet of Things Infestation in Your EnterpriseGreat Bay Software
Ty Powers, John Pescatore
Tuesday, May 02, 2017
at 1:00 PM EDT
(2017-05-02 17:00 UTC)
Deception Matters: Slowing the Adversary with illusive networksIllusive Networks
Chad Gasaway, Eric Cole
Monday, May 01, 2017
at 1:00 PM EDT
(2017-05-01 17:00 UTC)
Speeding Up Triage and Incident Response By Speaking to MalwareTodd O'Boyle
Friday, April 28, 2017
at 11:00 AM EDT
(2017-04-28 15:00 UTC)
Establishing a Security Ambassador ProgramJohn Haren, Cassie Clark, Lance Spitzner
Thursday, April 27, 2017
at 1:00 PM EDT
(2017-04-27 17:00 UTC)
Reducing Attacks and Improving Resiliency: The SANS 2017 Threat Hunting Survey Results | Part 2Anomali
DomainTools
Malwarebytes
Rapid7 Inc.
Sqrrl Data, Inc.
ThreatConnect
Robert M. Lee, Toni Gidwani, Mike Scutt, Dana Torgersen
Thursday, April 27, 2017
at 11:00 AM EDT
(2017-04-27 15:00 UTC)
Attack Attribution: Itís ComplicatedCybereason
Ross Rustici, Jake Williams
Wednesday, April 26, 2017
at 3:00 PM EDT
(2017-04-26 19:00 UTC)
WikiLeaks' Release of CIA Hacking Tools: What Security Professionals Need to KnowCarbon Black
Rick McElroy, Jake Williams
Wednesday, April 26, 2017
at 1:00 PM EDT
(2017-04-26 17:00 UTC)
Threat Hunting-Modernizing Detection Operations: The SANS 2017 Threat Hunting Survey Results | Part 1Anomali
DomainTools
Malwarebytes
Rapid7 Inc.
Sqrrl Data, Inc.
ThreatConnect
Zach Hill, Travis Farral, Rob Lee, Ely Kahn
Wednesday, April 26, 2017
at 10:00 AM EDT
(2017-04-26 14:00 UTC)
Phoning it in: Heather talks about smartphone forensicsHeather Mahalik
Friday, April 21, 2017
at 1:00 PM EDT
(2017-04-21 17:00 UTC)
NoSQL Doesnít Make you NoVulnerableJohannes Ullrich
Friday, April 21, 2017
at 11:00 AM EDT
(2017-04-21 15:00 UTC)
Hiding in Plain Sight: When Malware Abuses Legitimate Services for CommunicationsCisco Systems
Josh Reynolds
Thursday, April 20, 2017
at 1:00 PM EDT
(2017-04-20 17:00 UTC)
Impact of Isolated Cyber Security Functions: A SANS SurveyThreatConnect
Wade Baker, G.W. Ray Davidson, PhD
Thursday, April 20, 2017
at 11:00 AM EDT
(2017-04-20 15:00 UTC)
Using the Power of Artificial Intelligence to Minimize Your Cybersecurity Attack SurfaceSparkCognition Inc.
Bryan Lares, John Pescatore
Wednesday, April 19, 2017
at 1:00 PM EDT
(2017-04-19 17:00 UTC)
Real Steps to Build a Threat Intelligence FrameworkRecordedFuture
Chris Pace, Dave Shackleford
Tuesday, April 18, 2017
at 3:00 PM EDT
(2017-04-18 19:00 UTC)
Ready, Aim, Protect With Total Endpoint ProtectionSentinelOne
Eran Ashkenazi, G.W. Ray Davidson, PhD
Tuesday, April 18, 2017
at 1:00 PM EDT
(2017-04-18 17:00 UTC)
Influencing and Effectively Communicating to CEOs and Boards of DirectorsAGARI
John Pescatore, Alan Paller
Tuesday, April 18, 2017
at 11:00 AM EDT
(2017-04-18 15:00 UTC)
Exploring the Unknown ICS Threat LandscapeDragos, Inc.
Robert M. Lee, Ben Miller, Michael Assante
Monday, April 17, 2017
at 3:00 PM EDT
(2017-04-17 19:00 UTC)
AFF4: The New Standard in Forensic Image Format, and Why You Should CareDr. Bradley Schatz
Thursday, April 13, 2017
at 11:00 AM EDT
(2017-04-13 15:00 UTC)
Preventing an IT Security Epidemic - Cybersecurity for Connected HealthcarePwnie Express
Aaron Turner, Tony Sager
Wednesday, April 12, 2017
at 10:00 PM EDT
(2017-04-13 02:00 UTC)
SANS Asia-Pacific Webcast Series- How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...Bryce Galbraith
Tuesday, April 11, 2017
at 1:00 PM EDT
(2017-04-11 17:00 UTC)
Learn how to protect your infrastructure against the widest range of DNS attacksInfoBlox
Cricket Liu, John Pescatore, Sam Kumarsamy
Friday, April 07, 2017
at 3:00 PM EDT
(2017-04-07 19:00 UTC)
Mobile App Security Trends and TechniquesGregory Leonard
Friday, April 07, 2017
at 1:00 PM EDT
(2017-04-07 17:00 UTC)
NEW SANS DFIR Cheat Sheet: A Guide to Eric Zimmerman's command line toolsEric Zimmerman
Thursday, April 06, 2017
at 1:00 PM EDT
(2017-04-06 17:00 UTC)
How to Achieve Visibility, Security and Integrity for Forward Looking ResilienceUpGuard Inc
Andy Steigleder
Thursday, April 06, 2017
at 11:00 AM EST
(2017-04-06 15:00 UTC)
Struts-Shock: Current Attacks against Struts2 and How to Defend Against ThemVeracode
Jonathan Mandell, Johannes Ullrich
Wednesday, April 05, 2017
at 1:00 PM EDT
(2017-04-05 17:00 UTC)
Six stages of an attack: The Art of DetectionCybereason
Richard Harlan, Matt Bromiley
Tuesday, April 04, 2017
at 1:00 PM EDT
(2017-04-04 17:00 UTC)
Increasing Software Security Up and Down the Supply ChainVeracode
John Pescatore, Steve Lipner, John Martin, Chris Wysopal
Wednesday, March 29, 2017
at 3:00 PM EDT
(2017-03-29 19:00 UTC)
Forensic State Analysis: A New Approach to Threat HuntingInfocyte
Chris Gerritz, Alissa Torres
Wednesday, March 29, 2017
at 1:00 PM EDT
(2017-03-29 17:00 UTC)
SOC in the Cloud: A review of Arctic Wolf SOC ServicesArctic Wolf Networks
Sridhar Karnam, Sonny Sarai
Tuesday, March 28, 2017
at 1:00 PM EDT
(2017-03-28 17:00 UTC)
Best practices for securing, analyzing, and mitigating threats to your AWS applicationsGigamon
RSA
Sesh Sayani, Mike Janik, Scott Ward
Tuesday, March 28, 2017
at 11:00 AM EDT
(2017-03-28 15:00 UTC)
ICS Hacking ExposedCyberX
Phil Neray, Clint Bodungen
Friday, March 24, 2017
at 3:00 PM EDT
(2017-03-24 19:00 UTC)
A Case Study: Exploring Potential Attack Methods and Sophisticated Security Defenses for the World's Power PlantsClaroty Inc.
Patrick McBride
Friday, March 24, 2017
at 1:00 PM EDT
(2017-03-24 17:00 UTC)
FISMA Compliance for Containerized AppsRed Hat
Jason Callaway
Thursday, March 23, 2017
at 3:00 PM EDT
(2017-03-23 19:00 UTC)
Threat Hunting 102: Beyond the Basics, Maturing Your Threat Hunting ProgramCybereason
Brad Mecha, Dave Shackleford
Thursday, March 23, 2017
at 1:00 PM EDT
(2017-03-23 17:00 UTC)
MobileIron Security Labs: Combatting the Current State of Mobile Enterprise SecurityMobileIron
James Plouffe
Thursday, March 23, 2017
at 11:00 AM EDT
(2017-03-23 15:00 UTC)
Profiling Online Personas: Are We Sharing Too Much?Lance Spitzner, Micah Hoffman
Wednesday, March 22, 2017
at 1:00 PM EST
(2017-03-22 17:00 UTC)
Changing the Game in Public Cloud SecurityPalo Alto Networks
Erik Yunghans, Scott Simkin, Dave Shackleford
Tuesday, March 21, 2017
at 3:00 PM EST
(2017-03-21 19:00 UTC)
Threat Hunting with Indicators: Not for Prevention AnymorePhilip Hagen
Tuesday, March 21, 2017
at 1:00 PM EST
(2017-03-21 17:00 UTC)
2017 Cybersecurity Trends: Aiming Ahead of the Target to Increase SecurityQualys
Chris Carlson, John Pescatore
Friday, March 17, 2017
at 3:00 PM EST
(2017-03-17 19:00 UTC)
Breaking Red - Understanding Threats through Red TeamingJames Tubberville, Joe Vest
Friday, March 17, 2017
at 1:00 PM EST
(2017-03-17 17:00 UTC)
Protecting Business Mobility Against Emerging ThreatsInfoBlox
Prakash Nagpal, John Pescatore
Thursday, March 16, 2017
at 3:00 PM EST
(2017-03-16 19:00 UTC)
I Don't Give One IoTA: Introducing the Internet of Things Attack MethodologyLarry Pesce
Thursday, March 16, 2017
at 1:00 PM EST
(2017-03-16 17:00 UTC)
Cyber Threat Intelligence in Action-Effectiveness of CTI Programs and Wish Lists for the Future: Results of the 2017 Cyber Threat Intelligence Survey Part 2Anomali
Arbor Networks
DomainTools
Lookingglass Cyber Solutions, Inc.
Rapid7 Inc.
ThreatConnect
Travis Farral, Rebekah Brown, Dave Shackleford, Allan Thomson
Wednesday, March 15, 2017
at 1:00 PM EST
(2017-03-15 17:00 UTC)
Cyber Threat Intelligence in Action-Skills and Implementations: Results of the 2017 Cyber Threat Intelligence Survey Part 1Anomali
Arbor Networks
DomainTools
Lookingglass Cyber Solutions, Inc.
Rapid7 Inc.
ThreatConnect
Zach Hill, Robert Simmons, Paul Bowen, Dave Shackleford
Wednesday, March 15, 2017
at 11:00 AM EST
(2017-03-15 15:00 UTC)
Going Past the Wire: Leveraging Social Engineering in Physical Security AssessmentsStephanie Carruthers
Tuesday, March 14, 2017
at 3:00 PM EST
(2017-03-14 19:00 UTC)
How the new Preemptive Incident Response methodology can slash end-to-end IR time for SOC teams to minutes and solve alert fatigueSECDO
Gil Barak, John Pescatore
Tuesday, March 14, 2017
at 1:00 PM EST
(2017-03-14 17:00 UTC)
Ransomware Remedies: Decoding and Dealing with Ransomware's Problematic BehaviorsCybereason
Cortez Lake, Jessica Stanford, Alissa Torres
Tuesday, March 14, 2017
at 11:00 AM EST
(2017-03-14 15:00 UTC)
Cybersecuring DoD ICS SystemsMichael Chipley
Monday, March 13, 2017
at 1:00 PM EST
(2017-03-13 17:00 UTC)
The Impacts of JSON on Reversing Your FirmwareBen Gardiner
Friday, March 10, 2017
at 11:00 AM EST
(2017-03-10 16:00 UTC)
The life and death of SHA-1Jake Williams
Wednesday, March 08, 2017
at 1:00 PM EST
(2017-03-08 18:00 UTC)
Complying with the General Data Protection Regulation: A Guide for Security PractitionersSkybox Security, Inc.
Kevin Flynn, Benjamin Wright
Tuesday, March 07, 2017
at 11:00 AM EST
(2017-03-07 16:00 UTC)
What's new on the FOR572 Horizon Ė Stockholm and BeyondPhilip Hagen
Wednesday, March 01, 2017
at 3:00 PM EST
(2017-03-01 20:00 UTC)
Real DevSecOps for the Security PractitionerCloudPassage
Jenks Gibbons
Wednesday, March 01, 2017
at 1:00 PM EST
(2017-03-01 18:00 UTC)
Next-Gen Endpoints Risks and Protections: A SANS Survey Part 2: Next-Gen Protection and ResponseCarbon Black
Great Bay Software
Guidance Software
IBM
Malwarebytes
Sophos Inc.
Matt Cooke, G.W. Ray Davidson, PhD, Mark Hafner, Stacia Tympanick
Tuesday, February 28, 2017
at 1:00 PM EST
(2017-02-28 18:00 UTC)
Next-Gen Endpoints Risks and Protections: A SANS Survey Part 1: New Devices and RisksCarbon Black
Great Bay Software
Guidance Software
IBM
Malwarebytes
Sophos Inc.
G.W. Ray Davidson, PhD, Nick Charpentier, Anthony Di Bello, Dana Torgersen
Tuesday, February 28, 2017
at 11:00 AM EST
(2017-02-28 16:00 UTC)
Reimagine Your Identity StrategyRSA
Chris Wraight, Jim Ducharme
Monday, February 27, 2017
at 11:00 AM EST
(2017-02-27 16:00 UTC)
Malware Wants your Memory: Here's Why and How to Protect itAlissa Torres, Lance Spitzner
Friday, February 24, 2017
at 3:00 PM EST
(2017-02-24 20:00 UTC)
Continuous Integration: Static Analysis with Visual Studio & RoslynEric Johnson
Thursday, February 23, 2017
at 3:00 PM EST
(2017-02-23 20:00 UTC)
The Problems with the Dark Web: From Crime to Complicated CrawlingTerbium Labs
Alex Viana, Emily Wilson
Tuesday, February 21, 2017
at 8:00 PM EST
(2017-02-22 01:00 UTC)
Application White-listing through Bit9 aka Parity aka Carbon Black Protect - A Masters Candidate WebcastMichael Weeks
Tuesday, February 21, 2017
at 1:00 PM EST
(2017-02-21 18:00 UTC)
So What's It Mean To Hack a CarMatthew Carpenter
Friday, February 17, 2017
at 1:00 PM EST
(2017-02-17 18:00 UTC)
Analyzing the Enhanced Analysis of GRIZZLY STEPPE ReportRobert M. Lee
Friday, February 10, 2017
at 1:00 PM EST
(2017-02-10 18:00 UTC)
Operation Escalation: How Attackers Use Adware to Sell Corporate AssetsCybereason
Israel Barak, G. Mark Hardy
Thursday, February 09, 2017
at 1:00 PM EST
(2017-02-09 18:00 UTC)
The Cost and Consequences of Security Complexity: New Ponemon Institute Research Identifies 8 Best PracticesMobileIron
Ojas Rege, Dr. Larry Ponemon
Wednesday, February 08, 2017
at 8:00 PM EST
(2017-02-09 01:00 UTC)
Tools and Techniques for Assessing Android MalwareChristopher Crowley
Wednesday, February 08, 2017
at 3:00 PM EST
(2017-02-08 20:00 UTC)
Go Beyond Incident Response: The Benefits of a Complete Incident Management PlatformD3 Security
Chertoff Group
Fraser Retallack, Bob Day, Jim Pflaging, Chris Crowley
Wednesday, February 08, 2017
at 1:00 PM EST
(2017-02-08 18:00 UTC)
Beyond Feeds: A Deep Dive Into Threat Intelligence SourcesRecordedFuture
Chris Pace, Dave Shackleford
Tuesday, February 07, 2017
at 3:00 PM EST
(2017-02-07 20:00 UTC)
Elevators as Security Risks... What Goes Up May Let You DownDeviant Ollam
Friday, February 03, 2017
at 11:00 AM EST
(2017-02-03 16:00 UTC)
Cross Origin Resource Sharing: Using CORS to secure AJAXClay Risenhoover
Wednesday, February 01, 2017
at 1:00 PM EST
(2017-02-01 18:00 UTC)
Digital Ghost: Turning the Tables on Cyber Attacks in Industrial SystemsGE
Robert Garry, Michael Assante
Tuesday, January 31, 2017
at 1:00 PM EST
(2017-01-31 18:00 UTC)
3 Cs of Security Awareness Lance Spitzner
Tuesday, January 31, 2017
at 11:00 AM EST
(2017-01-31 16:00 UTC)
Automating Information SecurityMark Baggett
Thursday, January 26, 2017
at 2:00 PM EST
(2017-01-26 19:00 UTC)
Mimecast Targeted Threat ProtectionMimecast Services Limited
Matthew Gardiner, Jerry Shenk
Thursday, January 26, 2017
at 12:00 PM EST
(2017-01-26 17:00 UTC)
Donít get marooned on Analytic IslandsBAE Systems Applied Intelligence
Mark Watkinson
Wednesday, January 25, 2017
at 3:00 PM EST
(2017-01-25 20:00 UTC)
Stop Threats in their Tracks- An Introduction to Advanced Malware ProtectionCisco Systems
Brian McMahon, Tom Stitt
Wednesday, January 25, 2017
at 1:00 PM EST
(2017-01-25 18:00 UTC)
Implementing and Maintaining a DevSecOps Approach in the Cloud - Tips, tricks, operational and security best practices Sumo Logic
Mark Bloom, George Gerchow
Wednesday, January 25, 2017
at 11:00 AM EST
(2017-01-25 16:00 UTC)
Introducing the NEW SANS Pen Test Poster - White Board of Awesome Command Line Kung-FuEd Skoudis
Tuesday, January 24, 2017
at 1:00 PM EST
(2017-01-24 18:00 UTC)
2017 Cloud Security and Risk BenchmarksSkyHigh Networks
Brandon Cook, John Pescatore
Tuesday, January 24, 2017
at 11:00 AM EST
(2017-01-24 16:00 UTC)
Next generation analysts for next generation threats - lessons from deploying best practices to hundreds of SOC teams!Siemplify
Meny Har, John Pescatore
Monday, January 23, 2017
at 1:00 PM EST
(2017-01-23 18:00 UTC)
Practical Application of Threat Intel for Network DefendersDomainTools
Dave Shackleford, Tim Helming
Friday, January 20, 2017
at 1:00 PM EST
(2017-01-20 18:00 UTC)
Attacks on Databases: When NoSQL became NoDatabaseMatt Bromiley
Thursday, January 19, 2017
at 1:00 PM EST
(2017-01-19 18:00 UTC)
Packets Donít Lie: Whatís Really Happening on Your Network?LogRhythm
Rob McCovern, Dave Shackleford
Wednesday, January 18, 2017
at 1:00 PM EST
(2017-01-18 18:00 UTC)
Hunting with Cyber Deception and Incident Response AutomationCymmetria
Gadi Evron
Tuesday, January 17, 2017
at 1:00 PM EST
(2017-01-17 18:00 UTC)
Enhanced Application Security for the Financial IndustrySynopsys
Mike Ware, Steve Kosten
Friday, January 13, 2017
at 1:00 PM EST
(2017-01-13 18:00 UTC)
Using Cisco Stealthwatch to Increase Security By Enhancing Critical Security Control PerformanceCisco Systems
Jamison Budacki, John Pescatore
Thursday, January 12, 2017
at 11:00 AM EST
(2017-01-12 16:00 UTC)
How To Use Your Network To Fend Off The Latest Cyber ThreatsNETSCOUT Systems, Inc.
Arabella Hallawell, Paul Bowen, John Pescatore, Ann Sun
Wednesday, January 11, 2017
at 9:00 PM EST
(2017-01-12 02:00 UTC)
Packet Capture + Flow Analytics = Holistic Network VisibilityCisco Systems
Brian Ford
Tuesday, January 10, 2017
at 12:00 PM EST
(2017-01-10 17:00 UTC)
Hello Friend: Creating a Threat Intelligence CapabilityScott Roberts, Rebekah Brown
Friday, January 06, 2017
at 1:00 PM EST
(2017-01-06 18:00 UTC)
Analyzing the DHS/FBI's GRIZZLY STEPPE ReportRobert M. Lee

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.