Register Today! Online Training Special: Get an iPad Pro w/ Smart Keyboard, HP ProBook, or $350 Off with Online Training!

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Dec 18, 2017Lessons Learned from the TalkTalk Breach - A Master's Candidate WebcastEd Yuwono
Dec 15, 2017The Convergence of EPP and EDR: Tomorrow's Solution TodayFireEyeDan Reis, John Pescatore
Dec 14, 2017Who Owns ICS Security? Fusing IT, OT, & IIoT Security in the Corporate SOC. CyberXPhil Neray, Doug Wylie
Dec 13, 20172017 Trends and Strategies for Protecting Endpoints in Healthcare BarklyJustin Armstrong, Jack Danahy, Barbara Filkins
Dec 13, 2017Stop All Imposter Threats Coming Into and Going Out of your OrganizationProofPointRyan Terry, John Pescatore
Dec 13, 2017Global Response and Industrial Defense (GRID) Certification - What ICS Defenders Need to KnowRobert M. Lee
Dec 12, 2017
Dec 11, 2017Tackling DoD Cyber Red Team Deficiencies Through Systems Engineering A Master's Candidate WebcastJohn Schab
Dec 8, 2017Java on the server? What could possibly go wrong?Adrien de Beaupre, Jason Blanchard
Dec 8, 2017Driving Better Cybersecurity for Industrial Networks and Critical InfrastructureClaroty Inc. Dan Desruisseaux, Patrick McBride
Dec 8, 2017OWASP Top 10 2017: What You Need to KnowVeracodeDr. Johannes Ullrich, Chris Eng
Dec 7, 2017Using Anti-Evasion to Block Stealth Attacks with Minerva LabsMinerva LabsLenny Zeltser, Eric Cole, PhD
Dec 7, 2017Continuous Security Validation: How effective is your security?Forcepoint LLCAnil Nandigam
Dec 6, 2017Security and Ops HacksRapid7 Inc.Sonny Sarai
Dec 6, 2017Business-Driven Network Security Policy ManagementAlgoSecEdy Almer
Dec 5, 2017Top Network Security Products Revealed in Latest TestsForcepoint LLCThomas Skybakmoen
Dec 5, 2017Next-Generation Antivirus (NGAV) Buyer's Guide: Successful Strategies for Choosing and Implementing NGAVCarbon BlackBarbara Filkins, Brian Gladstein
Dec 5, 2017Bring the Fight to Them: Hunting down adversaries using OSQueryErik Van Buggenhout, Stephen Sims
Dec 4, 2017Secure DevOps Monitoring in the CloudBen Allen
Nov 30, 2017The ROI of AppSec: Getting your Money's Worth from Your AppSec ProgramVeracodeJim Bird, Maria Loughlin, Ellen Nussbaum
Nov 29, 2017Use Code Reuse to your Advantage: The Forgotten Component of your Incident Response PlanIntezerItai Tevet, Jake Williams
Nov 22, 2017GDPR - What to Train Your WorkforceBrian Honan, Lance Spitzner
Nov 21, 2017The Four Types of Threat Detection for ICS SecurityDragos, Inc.Robert M. Lee
Nov 21, 2017Memory Forensics: Sodium Pentothal for Your SecurityJake Williams, Alissa Torres
Nov 20, 2017Prevent-Detect-RESPONSE - How to Win at Security Part 3 - Implementing Proper Incident Response from SEC401Dr. Eric Cole
Nov 17, 2017SANS Security Operations Center (SOC) BriefingRecordedFuture

DomainTools

Authentic8

Digital Guardian
Nov 15, 2017Collaborative Development of Att&ck AnalyticsJohn Wunder
Nov 15, 2017Breaking Down the Data: How Secure Are You and Your Supply Chain?BitsightStephen Boyer, Jay Jacobs, G. Mark Hardy
Nov 14, 2017Integrated Security Operations - The Difference between Knowing and GuessingServiceNowMatthew O'Brien, Piero DePaoli, John Pescatore
Nov 14, 2017A day in the life doing incident response without Bro. And how it could be so much better.Corelight Vincent Stoffer, Matt Bromiley
Nov 14, 2017Using Malware Analysis to Explore the Potential of Malware VaccinationLenny Zeltser
Nov 13, 2017Secure DevOps: Three Keys for SuccessFrank Kim
Nov 13, 2017Making IoT RelevantMagnet ForensicsJessica Hyde
Nov 10, 2017Getting Started with the SIFT WorkstationRob Lee
Nov 9, 2017Which SANS Pen Test Course Should I Take? November 2017 EditionJason Blanchard, Larry Pesce, Ed Skoudis
Nov 9, 2017Preventing Persistent Attacks With Linux Micro VirtualizationImmutable SystemsTom Gillis, John Pescatore
Nov 9, 2017Creating Understanding from DataJohn Bambenek
Nov 8, 2017Modern Log Parsing and Enrichment with SIEMJohn Hubbard, Justin Henderson
Nov 8, 2017iOS 11 isn't all fun and games. What we know so far and ways to handle unsupported data setsDomenica Crognale, Heather Mahalik
Nov 7, 2017Attack and Defend: Linux Privilege Escalation Techniques In DepthMichael C. Long
Nov 7, 2017Scripting Cloud Security CapabilitiesKenneth Hartman
Nov 6, 2017Managed Detection and Response and Business context-- where do they meet, how do they co-exist to help organizations understand true risk?LeidosJustin Lachesky, Mike Gotham, Anne Saunders, Ken Brown
Nov 3, 2017Catch, Investigate, Repeat: Automating Incident Response with Behavior-Based IOCsSECDOJoseph Pizzo, Jake Williams
Nov 3, 2017Updated FOR578 - Training for Security Personnel and Why Intelligence Matters to YouRobert M. Lee
Nov 2, 2017Office 365 Migration Checklist: Considerations for Midsize EnterprisesProofPointJennifer Cheng
Nov 2, 2017Cloud Security: Defense in Detail if Not in Depth. Part 2: Changes Make the Cloud More Secure, but Is InfoSec Changing Even More?BMC Software, Inc.

Forcepoint LLC

Mcafee LLC

Qualys
Nicolas Fischbach, Eric Boerger, Dave Shackleford
Nov 2, 2017Spamhaus DNS Firewall ( DNS RPZ ) - DNS as a 'Critical Choke Point' to Block Resolution of Known Malicious SitesSecurityZONESMatt Stith
Nov 1, 2017Cloud Security: Defense in Detail if Not in Depth. Part 1: Using Cloud Services to Address the Cloud Threat Environment BMC Software, Inc.

Forcepoint LLC

Mcafee LLC

Qualys
Mark Butler, Allison Cramer, Dave Shackleford
Nov 1, 2017The Role of AI in Cybersecurity and AuditingMuzamil Riffat
Oct 31, 2017Closing the Skills Gap with Analytics and Machine Learning RSAPeter M. Tran, Ahmed Tantawy
Oct 30, 2017Beyond layered securityPalo Alto NetworksNavneet Singh, John Pescatore
Oct 27, 2017Windows Credentials: Attacks, Mitigations & DefenseChad Tilbury
Oct 26, 2017Prevent-DETECT-Response - How to Win at Security Part 2 - Timely Detection Tips and Tricks from SEC401Eric Cole
Oct 26, 2017Enhance Your Investigations with Network DataCisco SystemsBrian Ford, Matt Bromiley
Oct 26, 2017The Science Behind the Hype: Machine Learning in Endpoint SecurityBarklyDavid Hoelzer, Jack Danahy
Oct 25, 20177-Step Process to Secure AWS and Custom ApplicationsSkyHigh NetworksJohn Pescatore, Brandon Cook, Niraj Patel, Anant Mahajan
Oct 25, 2017Application Breaches and Lifecycle Security: SANS 2017 Application Security Survey, Part 2Rapid7 Inc.

Synopsys

Tenable

Veracode

WhiteHat Security
Frank Kim, Anthony Bettini, Ryan O'Leary
Oct 25, 2017Forensic Timeline Analysis Using WiresharkDavid Fletcher
Oct 24, 2017Closing the Skills Gap Chasm with Automation and Actionable AnalyticsExabeamOrion Cassetto, Dave Shackleford
Oct 24, 2017Application Security on the Go! SANS Survey Results, Part 1Rapid7 Inc.

Synopsys

Tenable

Veracode

WhiteHat Security
Eric Johnson, Alfred Chung, Colin Domoney, Apoorva Phadke
Oct 24, 2017The Maturing of Endpoint Detection and Response (EDR): Choose the Right SolutionCrowdStrikeCon Mallon, John Pescatore
Oct 20, 2017EDR vs SIEM - Place your bet! The fight is onJustin Henderson
Oct 19, 2017The facts about KRACK and your WPA enabled WiFi networkLarry Pesce
Oct 19, 2017Threat Intelligence for Every Security FunctionRecordedFutureDave Shackleford, Chris Pace
Oct 18, 2017Security Awareness for Board of DirectorsLance Spitzner, John Pescatore
Oct 18, 2017New Threats Posed by Misuse of Legitimate Websites, End-to-End Encryption Technologies and Countermeasures, A SANS Technology Institute Masters Candidate PresentationPaul Tang
Oct 17, 2017Targeted Attack Protection: SANS Review of Endgame's endpoint security platformEndgameMike Nichols, Dave Shackleford
Oct 17, 2017There's A Secure App for That: How to Mitigate Attacks Targeting Automotive Mobile Application's CommunicationsColin DeWinter, Ben Gardiner
Oct 13, 2017Strut(s) your stuff.Moses Hernandez
Oct 12, 2017NotPetya, Dragonfly 2.0 & CrashOverride: Is Now the Time for Active Cyber Defense in ICS/SCADA Networks?CyberXPhil Neray, Mike Assante
Oct 11, 2017Isolate the Critical: How to Deploy Microsegmentation for Operational ResiliencyUnisysChip Yeager, Erin Kelly
Oct 11, 2017Turning Threat Data into Threat Intel Using Automated AnalysisVMRay Carsten Willems, Dave Shackleford
Oct 10, 2017DevSecOps - Building Continuous Security Into IT & App InfrastructuresQualysChris Carlson, John Pescatore
Oct 6, 2017Guide to Selecting and Sourcing a Managed Security Services ProviderCory Mazzola, Chris Crowley
Oct 5, 2017Simplified Segmentation for a Stronger Threat DefenseCisco SystemsKeti Kilcrease
Oct 5, 2017I'm in the cloud now so... I'm secure right?NetwrixJeff Melnick, John Pescatore
Oct 4, 2017Detecting Modern PowerShell Attacks with SIEMTim Garcia, Justin Henderson
Oct 4, 2017Beyond Scanning: Delivering Impact Driven Vulnerability AssessmentsMatthew Toussain
Oct 4, 2017SANS Asia-Pacific Webcast Series- Standard Logs Made into Actionable DetectsTim Garcia, Justin Henderson
Oct 3, 2017New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
Oct 3, 2017Shrinking Attack Dwell Times - A Phishing Case Study DemoSyncurityJohn Jolly, John Pescatore
Oct 3, 2017New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
Oct 2, 2017Accurate behavior analysis enables detection and of malicious insiders, outsiders and IoT deviceE8 SecurityMatt Rodgers, John Pescatore
Sep 29, 2017Understanding Fileless Attacks and How to Stop ThemCrowdStrikeJackie Castelli, John Pescatore
Sep 28, 2017Clustering, Sourcing, and Correlating All Things IndicatorsDomainToolsKyle Wilhoit, Rebekah Brown
Sep 28, 2017SANS CyberTalent VetSuccessBrian D. Ray, Sonny Sandelius
Sep 28, 2017SANS Asia-Pacific Webcast Series- 2017 SANS SOC Survey DiscussionChristopher Crowley
Sep 27, 2017PREVENT-Detect-Response - How to Win at Security Part 1 - The Secret to Prevention from SEC401Eric Cole
Sep 27, 2017Your Security Sandbox Won't Catch It All - The Phishing ProblemProofPointMark Guntrip, Robert M. Lee
Sep 26, 2017The True Cost of Ransomware: 5 Companies, 5 Attacks, and the Reality of RecoveryBarklyJohn Pescatore, Ryan Berg
Sep 20, 2017Outsmart Hackers by Coordinating Your DefensesSophos Inc.Seth Geftic, John Pescatore
Sep 19, 2017The Top 20 ICS Cyber Attacks And how to use them to improve IIoT and cloud security designsWaterfall SecurityAndrew Ginter, Tim Conway
Sep 18, 2017Breaking Red - Designing IOCs Using Red Team ToolsJoe Vest
Sep 15, 2017EDR + NGAV Working Together: SANS Review of Carbon Black Cb DefenseCarbon BlackJerry Shenk, Brian Gladstein
Sep 13, 2017What To Do About the Equifax HackLance Spitzner
Sep 13, 2017Harness the Hacker With Breach and Attack SimulationSafebreachItzik Kotler, John Pescatore
Sep 12, 2017Asking the Right Questions about Dynamic Scanning to Secure Web Applications: A Buyer's Guide to App Sec Scanning ToolsVeracodeJoe Pelletier, Barbara Filkins
Sep 12, 2017Hitting the Security Sweet Spot with Honeypots in ICS NetworksBrent Huston
Sep 7, 2017Windows PowerShell for AuditorsClay Risenhoover
Sep 6, 2017SIEM Design & ArchitectureJohn Hubbard, Justin Henderson
Sep 6, 2017Sensitive Data Everywhere: Results of SANS 2017 Data Protection SurveyInfoBlox

Mcafee LLC
Barbara Filkins, Benjamin Wright, Cindy Chen, Sam Kumarsamy
Sep 6, 2017The latest 2017 NSS Labs NGFW test results reveals many NGFWs may be vulnerable to evasions. Does your current firewall or IPS protect against AETs?Forcepoint LLCJim Fulton
Sep 5, 2017The Efficiency of Context: Review of WireX Network Forensics PlatformWireX SystemsPhilip Campeau, Jerry Shenk
Aug 31, 2017Threat Hunting with Endpoints: A Methodology for Effective Detection and Agile ResponseRSAJack "Wes" Riley, John Pescatore
Aug 24, 2017Building Your Own Super-Duper Home LabJeff McJunkin, Jason Blanchard
Aug 23, 2017Which SANS Pen Test Course Should I Take?Ed Skoudis, Mark Baggett, Jason Blanchard
Aug 23, 2017Protect and Prevent: 3 strategies for blocking fileless attacks and exploitsBarklyPhilip Maio, John Pescatore, Jack Danahy
Aug 22, 2017Using COIN doctrine to improve Cyber DefenseSebastien Godin
Aug 17, 2017Detect & Prevent Data Exfiltration: A Unique Approach with InfobloxInfoBloxSam Kumarsamy, Andrew Hay
Aug 17, 2017Put Some Power in Your Network Security: Detect, Hunt & Prevent ThreatsBricataDruce MacFarlane, John Pescatore
Aug 16, 2017Continuous Security: Implementing the Critical Controls in a DevOps Environment, A SANS Technology Institute Masters Degree PresentationAlyssa Robinson
Aug 15, 2017Making Sense of the Critical Security Controls in the CloudEric Johnson
Aug 15, 2017Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyCylance

FireEye

Mcafee LLC

Qualys
Chad Skipper, Sean Murphy, Robert Leong, Mark Butler, Lee Neely
Aug 15, 2017Know Thy Network - Cisco Firepower and CIS Critical Security Controls 1 & 2Ryan Firth
Aug 14, 20175.3 Billion Reasons to Keep Up-to-date with BECProofPointRyan Terry, Johannes Ullrich
Aug 10, 2017Roadmap to a Secure Smart InfrastructureRapid7 Inc.Tod Beardsley, Barbara Filkins
Aug 9, 2017Dissecting various real-world DGA variantsCybereasonSean Ennis, John Pescatore
Aug 8, 2017Protecting the Critical: An innovative approach to defending your Industrial Control SystemsUnisysStuart Phillips, Christopher Blask, Mike Assante
Aug 3, 2017Machine Learning: Practical Applications for Cyber SecurityRecordedFutureChris Pace, Ismael Valenzuela
Aug 3, 2017Using Docker to Create Multi-Container Research EnvironmentsShaun McCullough
Aug 1, 2017Risk-based privilege managementChristoph Eckstein
Aug 1, 2017 The SANS 2017 Insider Threat Survey: Mounting an Effective Defense Against Insider ThreatDtex Systems

Haystax Technology

Rapid7 Inc.
Eric Cole, PhD, Bryan Ware, Matt Hathaway, Pramod Cherukumilli
Jul 27, 2017Win The Cyberwar With Zero TrustPalo Alto NetworksJohn Kindervag
Jul 21, 2017A glimpse into NEW FOR500: Windows Forensics Course: Windows 10 and beyond - what is your digital forensics investigation missing?Rob Lee
Jul 21, 2017SANS Asia-Pacific Webcast Series- Elevating Your Analysis Tactics: The New Forensics PosterPhilip Hagen
Jul 20, 2017Cloud Security MonitoringBalaji Balakrishnan
Jul 19, 2017Bridging the O365 Security Gap with CASBSkyHigh NetworksAndreas Zengel, Brandon Cook, John Pescatore

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.