Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Aug 17, 2017Detect & Prevent Data Exfiltration: A Unique Approach with InfobloxInfoBloxSam Kumarsamy, Andrew Hay
Aug 17, 2017Put Some Power in Your Network Security: Detect, Hunt & Prevent ThreatsBricataDruce MacFarlane, John Pescatore
Aug 16, 2017Continuous Security: Implementing the Critical Controls in a DevOps Environment, A SANS Technology Institute Masters Degree PresentationAlyssa Robinson
Aug 15, 2017Making Sense of the Critical Security Controls in the CloudEric Johnson
Aug 15, 2017Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyCylance

FireEye

McAfee

Qualys
Chad Skipper, Sean Murphy, Robert Leong, Mark Butler, Lee Neely
Aug 15, 2017Know Thy Network - Cisco Firepower and CIS Critical Security Controls 1 & 2Ryan Firth
Aug 14, 20175.3 Billion Reasons to Keep Up-to-date with BECProofPointRyan Terry, Johannes Ullrich
Aug 10, 2017Roadmap to a Secure Smart InfrastructureRapid7 Inc.Tod Beardsley, Barbara Filkins
Aug 9, 2017Dissecting various real-world DGA variantsCybereasonSean Ennis, John Pescatore
Aug 8, 2017Protecting the Critical: An innovative approach to defending your Industrial Control SystemsUnisysStuart Phillips, Christopher Blask, Mike Assante
Aug 3, 2017Machine Learning: Practical Applications for Cyber SecurityRecordedFutureChris Pace, Ismael Valenzuela
Aug 3, 2017Using Docker to Create Multi-Container Research EnvironmentsShaun McCullough
Aug 1, 2017Risk-based privilege managementChristoph Eckstein
Aug 1, 2017 The SANS 2017 Insider Threat Survey: Mounting an Effective Defense Against Insider ThreatDtex Systems

Haystax Technology

Rapid7 Inc.
Eric Cole, PhD, Bryan Ware, Matt Hathaway, Pramod Cherukumilli
Jul 27, 2017Win The Cyberwar With Zero TrustPalo Alto NetworksJohn Kindervag
Jul 21, 2017A glimpse into NEW FOR500: Windows Forensics Course: Windows 10 and beyond - what is your digital forensics investigation missing?Rob Lee
Jul 21, 2017SANS Asia-Pacific Webcast Series- Elevating Your Analysis Tactics: The New Forensics PosterPhilip Hagen
Jul 20, 2017Cloud Security MonitoringBalaji Balakrishnan
Jul 19, 2017Bridging the O365 Security Gap with CASBSkyHigh NetworksAndreas Zengel, Brandon Cook, John Pescatore
Jul 18, 2017PowerShell ProxyKenton Groombridge
Jul 18, 2017NSS Labs NGFW Test: Is your firewall a top performer?Forcepoint LLCThomas Skybakmoen, Jim Fulton
Jul 14, 2017Automating Cloud Security to Mitigate RiskSkybox Security, Inc.David Boardman, Dave Shackleford
Jul 13, 2017SANS ICS Briefing: Defending Energy SystemsWaterfall Security

PAS

Cylance

Arbor Networks

Tripwire, Inc.

Claroty
Jason Farmer, Nick Cappi, Stuart Bailey, Robert M. Lee
Jul 12, 2017The 2017 State of Industrial Control System SecurityPart 2: Protection, Prevention and ConvergenceGreat Bay Software

Nozomi Networks

PAS

Tempered Networks

Tripwire, Inc.
David Zahn, Erik Giesa, Katherine Brocklehurst, Doug Wylie, Bengt Gregory-Brown
Jul 12, 2017ICS Cyber Security in The Real-World: Demonstrating Threat Detection and Mitigation In Industrial Networks IndegyDana Tamir, Chris Grove
Jul 11, 2017The 2017 State of Industrial Control System Security-Part 1: Personnel, Threats and ToolsGreat Bay Software

Nozomi Networks

PAS

Tempered Networks

Tripwire, Inc.
Ty Powers, Edgard Capdevielle, Doug Wylie, Bengt Gregory-Brown
Jul 11, 2017Five Lessons Learned from Petya and WannaCryVeracodeJake Williams, Chris Wysopal
Jul 7, 2017CRASHOVERIDE - Detecting and Mitigating the Electric Grid Targeted MalwareDan Gunter, Robert M. Lee, Mike Assante
Jul 6, 2017IPv6 and Open Source IDS, A SANS Technology Institute Masters Degree PresentationJon Mark Allen
Jul 6, 2017 A glimpse of the NEW FOR585 Advanced Smartphone CourseHeather Mahalik
Jun 29, 2017Putting Digital Threat Investigation and Response into HyperdriveRiskIQBeckie Neumann, Dave Shackleford
Jun 29, 2017Using Endpoint Security Innovation and Next-Gen Capabilities to Counter Endpoint Threats At-ScaleCounterTackRaj Dodhiawala, John Pescatore
Jun 29, 2017Complying with Data Protection Law in a Changing WorldForcepoint LLCNeil Thacker, Benjamin Wright
Jun 28, 2017Effortless Detection and Investigation of Cloud Breaches: A Review of Lacework's Zero Touch Cloud Workload Security PlatformLaceworkSanjay Kalra, Matt Bromiley
Jun 28, 2017Securing Critical Infrastructure Organizations against the Next Cyber Breach: Best Practices for organizations leveraging Managed ServicesLeidos

RSA
Jim Hollar, Gib Sorebo
Jun 27, 2017New Threat Vectors for ICS/SCADA Networks -- and How to Prepare for ThemCyberXPhil Neray, Mike Assante
Jun 27, 2017Managing Your Top 5 Human RisksLance Spitzner
Jun 22, 2017Efficiently Contain Threats and Ease Operations with Security OrchestrationInfoBloxSrikrupa Srivatsan, Andrew Hay
Jun 20, 2017Live Demonstration: Automating Enterprise Security ResponseServiceNowAlex Cox, Piero DePaoli, John Strand
Jun 16, 2017SANS Finance Briefing: Practical Threat Modeling for Financial OrganizationsForcepoint LLC

RecordedFuture
Jun 15, 2017Catch Me if You can - Pentesting vs APTCybereasonMor Levi
Jun 14, 2017Intrusion Detection Through Relationship Analysis, A SANS Technology Institute Masters Degree PresentationPatrick Neise
Jun 14, 2017SANS 2017 Incident Response Survey ResultsPart 2: Threat Intelligence and Improving Incident Response CapabilitiesAlienVault

Anomali

Guidance Software

IBM

LogRhythm

McAfee
Matt Bromiley, Anthony Di Bello, George Mina, Travis Farral
Jun 13, 2017PKI Cartels: The Value of Trust, A SANS Technology Institute Masters Degree PresentationSandy Dunn
Jun 13, 2017SANS 2017 Incident Response Survey ResultsPart 1: Attack, Response and MaturityAlienVault

Anomali

Guidance Software

IBM

LogRhythm

McAfee
Danielle Russell, Matt Bromiley, Riana Smalberger, James Carder
Jun 12, 2017You Have 24 Hours to Comply: Lessons Learned from Implementing a Behavioral Ransomware Detection FrameworkMark Mager
Jun 9, 2017What's New in the FOR610: Reverse-Engineering Malware Analysis Course in 2017?Lenny Zeltser
Jun 9, 2017SecOps principles to close gaps in Vulnerability ManagementFlexera SoftwareKen Hilker, John Pescatore
Jun 9, 2017A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint ProtectionCrowdStrikePeter Ingebrigtsen, Dave Shackleford
Jun 8, 2017What Works in Situational Awareness and Visibility: Reducing Time to Detect and Enhancing Business Outcomes with SplunkSplunkRyan Niemes, John Pescatore
Jun 7, 2017Evaluation Criteria for ICS Cyber Security Monitoring with Rockwell Automation and ClarotyClaroty

Rockwell Automation
Umair Masud, Patrick McBride
Jun 7, 2017 Fighting Account Takeover - Change The Battle and WinPerimeterXIdo Safruti
Jun 7, 2017Tackling Mobile Security with CiscoCisco SystemsBeth Barach
Jun 7, 2017Critical Security Controls for Home Networks, A SANS Technology Institute Masters Degree PresentationGlen Roberts
Jun 6, 2017Pin the Key on the App... and Other Transport Security FunMark Geeslin
Jun 6, 2017Elevating Your Analysis Tactics: The New Forensics Poster Philip Hagen
Jun 2, 2017FROM DETECTION TO RESPONSE, SOC 2.0 - 2017 State of Security Operations and What's Being Done!SiemplifyMiguel Carrero, Meny Har
May 31, 2017Using Dynamic Scanning to Secure Web Apps in Development and After DeploymentVeracodeChris Kirsch, Barbara Filkins
May 31, 2017Vulnerability Management LifecycleDavid R. Miller
May 31, 2017SANS Asia-Pacific Webcast Series- Powercat has Power: A PowerShell Implementation of NetcatMick Douglas
May 30, 20172017 SANS Security Awareness ReportThe Kogod Cybersecurity Governance Center (KCGC), Lance Spitzner
May 26, 2017Building Effective CTI Sharing for Network DefenseScott J. Roberts
May 26, 2017Defending the ICS Ahead of the Patch: WannaCry Lessons Learned Joe Slowik, Mike Assante, Ben Miller
May 25, 2017The Role of Vulnerability Scanning in Web App SecurityNetsparkerFerruh Mavituna, Barbara Filkins
May 25, 2017The New Reality: Centralizing Security when Your Network is DecentralizingForcepoint LLCDave Shackleford, Michael Knapp
May 24, 2017The Road to Increased Asset Visibility: Building an Effective ICS Security StrategyLeidosAruna Sreeram, Eric Cornelius
May 24, 2017Choosing the Right Path to Application SecurityVeracodeAdam Shostack, Chris Wysopal
May 24, 2017Fighting Fileless MalwareCybereasonSanat Chugh
May 23, 2017Network Security Infrastructure and Best Practices: A SANS SurveyNETSCOUT Systems, Inc.Matt Bromiley, John Pescatore, Barbara Filkins, Ann Sun
May 23, 2017The Power of Bro - and why you should include it in your security infrastructureCorelight Seth Hall, Matt Bromiley
May 19, 2017Prelude to Beats & Bytes: Striking the Right Chord in Digital ForensicsRyan Pittman, Matt Linton, Cindy Murphy
May 18, 2017Lingering Exploits Related to WannaCry Ransomware?Jake Williams, Gil Barak, Benjamin Wright
May 18, 2017Future SOCs: Results of the 2017 SANS Survey on Security Operations Centers, Part 2 Carbon Black

Endgame

LogRhythm

NETSCOUT Systems, Inc.

ThreatConnect

Tripwire, Inc.
Christopher Crowley, Braden Preston, Jim Wachhaus , Ksenia Coffman
May 18, 2017Threat Hunting for the MassesFrank McClain
May 17, 2017SOCs Grow Up to Protect, Defend, Respond: Results of the 2017 SANS Survey on Security Operations Centers, Part 1Carbon Black

Endgame

LogRhythm

NETSCOUT Systems, Inc.

ThreatConnect

Tripwire, Inc.
Alex Valdivia, Christopher Crowley, John Markott, James Carder
May 16, 2017Latest on WannaCry RansomwareRenato Marinho, Jake Williams, Benjamin Wright
May 15, 2017Elevating the Fraud in Point of Sale (PoS) to Another LevelThiago Bordini
May 13, 2017Special Webcast: WannaCry Ransomeware Threat - What we know so farJake Williams
May 11, 2017Prevent DNS Based Data Exfiltration and Disrupt Cyber Kill ChainInfoBloxSrikrupa Srivatsan, Andrew Hay
May 11, 2017www.google.com/search?q=what+does+this+all+mean?Phill Moore
May 10, 2017How to Conquer Targeted Email Threats: SANS Review of Agari Enterprise ProtectAGARIVidur Apparao, Dave Shackleford
May 10, 2017IIOT and Megacities 2025Andy Bochman, Mike Assante
May 9, 2017The Promise and Pitfalls of Security Testing TodayWhiteHat SecuritySetu Kulkarni, Mark Geeslin
May 9, 2017SANS Best of Awards Drilldown: Endpoint Detection and ResponseCarbon BlackJohn Pescatore, Justin Falck
May 5, 2017Obfuscated No More: Practical Steps for Defeating Android ObfuscationJoshua Wright
May 4, 2017Deploying DNSSEC at ScaleCloudFlareDani Grant, Matt Bromiley
May 3, 2017Improvements to Critical Control 12Steve Jaworski
May 2, 2017Taming and Securing the Internet of Things Infestation in Your EnterpriseGreat Bay SoftwareTy Powers, John Pescatore
May 2, 2017Deception Matters: Slowing the Adversary with illusive networksIllusive NetworksChad Gasaway, Eric Cole
May 1, 2017Speeding Up Triage and Incident Response By Speaking to MalwareTodd O'Boyle
Apr 28, 2017Establishing a Security Ambassador ProgramJohn Haren, Cassie Clark, Lance Spitzner
Apr 27, 2017Reducing Attacks and Improving Resiliency: The SANS 2017 Threat Hunting Survey Results | Part 2Anomali

DomainTools

Malwarebytes

Rapid7 Inc.

Sqrrl Data, Inc.

ThreatConnect
Robert M. Lee, Toni Gidwani, Mike Scutt, Dana Torgersen
Apr 27, 2017Attack Attribution: Its ComplicatedCybereasonRoss Rustici, Jake Williams
Apr 26, 2017WikiLeaks' Release of CIA Hacking Tools: What Security Professionals Need to KnowCarbon BlackRick McElroy, Jake Williams
Apr 26, 2017Threat Hunting-Modernizing Detection Operations: The SANS 2017 Threat Hunting Survey Results | Part 1Anomali

DomainTools

Malwarebytes

Rapid7 Inc.

Sqrrl Data, Inc.

ThreatConnect
Zach Hill, Travis Farral, Rob Lee, Ely Kahn
Apr 26, 2017Phoning it in: Heather talks about smartphone forensicsHeather Mahalik
Apr 21, 2017NoSQL Doesnt Make you NoVulnerableJohannes Ullrich
Apr 21, 2017Hiding in Plain Sight: When Malware Abuses Legitimate Services for CommunicationsCisco SystemsJosh Reynolds
Apr 20, 2017Impact of Isolated Cyber Security Functions: A SANS SurveyThreatConnectWade Baker, G.W. Ray Davidson, PhD
Apr 20, 2017Using the Power of Artificial Intelligence to Minimize Your Cybersecurity Attack SurfaceSparkCognition Inc.Bryan Lares, John Pescatore
Apr 19, 2017Real Steps to Build a Threat Intelligence FrameworkRecordedFutureChris Pace, Dave Shackleford
Apr 18, 2017Ready, Aim, Protect With Total Endpoint ProtectionSentinelOneEran Ashkenazi, G.W. Ray Davidson, PhD
Apr 18, 2017Influencing and Effectively Communicating to CEOs and Boards of DirectorsAGARIJohn Pescatore, Alan Paller
Apr 18, 2017Exploring the Unknown ICS Threat LandscapeDragos, Inc.Robert M. Lee, Ben Miller, Michael Assante
Apr 17, 2017AFF4: The New Standard in Forensic Image Format, and Why You Should CareDr. Bradley Schatz
Apr 13, 2017Preventing an IT Security Epidemic - Cybersecurity for Connected HealthcarePwnie ExpressAaron Turner, Tony Sager
Apr 13, 2017SANS Asia-Pacific Webcast Series- How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...Bryce Galbraith
Apr 11, 2017Learn how to protect your infrastructure against the widest range of DNS attacksInfoBloxCricket Liu, John Pescatore, Sam Kumarsamy
Apr 7, 2017Mobile App Security Trends and TechniquesGregory Leonard
Apr 7, 2017NEW SANS DFIR Cheat Sheet: A Guide to Eric Zimmerman's command line toolsEric Zimmerman
Apr 6, 2017How to Achieve Visibility, Security and Integrity for Forward Looking ResilienceUpGuard IncAndy Steigleder
Apr 6, 2017 Struts-Shock: Current Attacks against Struts2 and How to Defend Against ThemVeracodeJonathan Mandell, Johannes Ullrich
Apr 5, 2017Six stages of an attack: The Art of DetectionCybereasonRichard Harlan, Matt Bromiley
Apr 4, 2017Increasing Software Security Up and Down the Supply ChainVeracodeJohn Pescatore, Steve Lipner, John Martin, Chris Wysopal
Mar 29, 2017Forensic State Analysis: A New Approach to Threat HuntingInfocyteChris Gerritz, Alissa Torres
Mar 29, 2017SOC in the Cloud: A review of Arctic Wolf SOC ServicesArctic Wolf NetworksSridhar Karnam, Sonny Sarai
Mar 28, 2017Best practices for securing, analyzing, and mitigating threats to your AWS applicationsGigamon

RSA
Sesh Sayani, Mike Janik, Scott Ward
Mar 28, 2017ICS Hacking ExposedCyberXPhil Neray, Clint Bodungen
Mar 24, 2017A Case Study: Exploring Potential Attack Methods and Sophisticated Security Defenses for the World's Power PlantsClarotyPatrick McBride
Mar 24, 2017FISMA Compliance for Containerized AppsRed HatJason Callaway
Mar 23, 2017Threat Hunting 102: Beyond the Basics, Maturing Your Threat Hunting ProgramCybereasonBrad Mecha, Dave Shackleford
Mar 23, 2017MobileIron Security Labs: Combatting the Current State of Mobile Enterprise SecurityMobileIronJames Plouffe
Mar 23, 2017Profiling Online Personas: Are We Sharing Too Much?Lance Spitzner, Micah Hoffman
Mar 22, 2017Changing the Game in Public Cloud SecurityPalo Alto NetworksErik Yunghans, Scott Simkin, Dave Shackleford
Mar 21, 2017Threat Hunting with Indicators: Not for Prevention AnymorePhilip Hagen
Mar 21, 20172017 Cybersecurity Trends: Aiming Ahead of the Target to Increase SecurityQualysChris Carlson, John Pescatore
Mar 17, 2017Breaking Red - Understanding Threats through Red TeamingJames Tubberville, Joe Vest
Mar 17, 2017Protecting Business Mobility Against Emerging ThreatsInfoBloxPrakash Nagpal, John Pescatore
Mar 16, 2017I Don't Give One IoTA: Introducing the Internet of Things Attack MethodologyLarry Pesce
Mar 16, 2017Cyber Threat Intelligence in Action-Effectiveness of CTI Programs and Wish Lists for the Future: Results of the 2017 Cyber Threat Intelligence Survey Part 2Anomali

Arbor Networks

DomainTools

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.

ThreatConnect
Travis Farral, Rebekah Brown, Dave Shackleford, Allan Thomson
Mar 15, 2017Cyber Threat Intelligence in Action-Skills and Implementations: Results of the 2017 Cyber Threat Intelligence Survey Part 1Anomali

Arbor Networks

DomainTools

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.

ThreatConnect
Zach Hill, Robert Simmons, Paul Bowen, Dave Shackleford
Mar 15, 2017Going Past the Wire: Leveraging Social Engineering in Physical Security AssessmentsStephanie Carruthers
Mar 14, 2017How the new Preemptive Incident Response methodology can slash end-to-end IR time for SOC teams to minutes and solve alert fatigueSECDOGil Barak, John Pescatore
Mar 14, 2017Ransomware Remedies: Decoding and Dealing with Ransomware's Problematic BehaviorsCybereasonCortez Lake, Jessica Stanford, Alissa Torres
Mar 14, 2017Cybersecuring DoD ICS SystemsMichael Chipley
Mar 13, 2017The Impacts of JSON on Reversing Your FirmwareBen Gardiner
Mar 10, 2017The life and death of SHA-1Jake Williams
Mar 8, 2017Complying with the General Data Protection Regulation: A Guide for Security PractitionersSkybox Security, Inc.Kevin Flynn, Benjamin Wright
Mar 7, 2017What's new on the FOR572 Horizon Stockholm and BeyondPhilip Hagen
Mar 1, 2017Real DevSecOps for the Security PractitionerCloudPassageJenks Gibbons
Mar 1, 2017Next-Gen Endpoints Risks and Protections: A SANS Survey Part 2: Next-Gen Protection and ResponseCarbon Black

Great Bay Software

Guidance Software

IBM

Malwarebytes

Sophos Inc.
Matt Cooke, G.W. Ray Davidson, PhD, Mark Hafner, Stacia Tympanick
Feb 28, 2017Next-Gen Endpoints Risks and Protections: A SANS Survey Part 1: New Devices and RisksCarbon Black

Great Bay Software

Guidance Software

IBM

Malwarebytes

Sophos Inc.
G.W. Ray Davidson, PhD, Nick Charpentier, Anthony Di Bello, Dana Torgersen
Feb 28, 2017Reimagine Your Identity StrategyRSAChris Wraight, Jim Ducharme
Feb 27, 2017Malware Wants your Memory: Here's Why and How to Protect itAlissa Torres, Lance Spitzner
Feb 24, 2017Continuous Integration: Static Analysis with Visual Studio & RoslynEric Johnson
Feb 23, 2017The Problems with the Dark Web: From Crime to Complicated CrawlingTerbium LabsAlex Viana, Emily Wilson
Feb 22, 2017Application White-listing through Bit9 aka Parity aka Carbon Black Protect - A Masters Candidate WebcastMichael Weeks
Feb 21, 2017So What's It Mean To Hack a CarMatthew Carpenter
Feb 17, 2017Analyzing the Enhanced Analysis of GRIZZLY STEPPE ReportRobert M. Lee
Feb 10, 2017Operation Escalation: How Attackers Use Adware to Sell Corporate AssetsCybereasonIsrael Barak, G. Mark Hardy
Feb 9, 2017The Cost and Consequences of Security Complexity: New Ponemon Institute Research Identifies 8 Best PracticesMobileIronOjas Rege, Dr. Larry Ponemon
Feb 9, 2017Tools and Techniques for Assessing Android MalwareChristopher Crowley
Feb 8, 2017Go Beyond Incident Response: The Benefits of a Complete Incident Management PlatformD3 Security

Chertoff Group
Fraser Retallack, Bob Day, Jim Pflaging, Chris Crowley
Feb 8, 2017Beyond Feeds: A Deep Dive Into Threat Intelligence SourcesRecordedFutureChris Pace, Dave Shackleford
Feb 7, 2017Elevators as Security Risks... What Goes Up May Let You DownDeviant Ollam
Feb 3, 2017Cross Origin Resource Sharing: Using CORS to secure AJAXClay Risenhoover
Feb 1, 2017Digital Ghost: Turning the Tables on Cyber Attacks in Industrial SystemsGERobert Garry, Michael Assante
Jan 31, 20173 Cs of Security Awareness Lance Spitzner
Jan 31, 2017Automating Information SecurityMark Baggett
Jan 26, 2017Mimecast Targeted Threat ProtectionMimecastMatthew Gardiner, Jerry Shenk
Jan 26, 2017Dont get marooned on Analytic IslandsBAE Systems Applied IntelligenceMark Watkinson
Jan 25, 2017Stop Threats in their Tracks- An Introduction to Advanced Malware ProtectionCisco SystemsBrian McMahon, Tom Stitt
Jan 25, 2017Implementing and Maintaining a DevSecOps Approach in the Cloud - Tips, tricks, operational and security best practices Sumo LogicMark Bloom, George Gerchow
Jan 25, 2017Introducing the NEW SANS Pen Test Poster - White Board of Awesome Command Line Kung-FuEd Skoudis
Jan 24, 20172017 Cloud Security and Risk BenchmarksSkyHigh NetworksBrandon Cook, John Pescatore
Jan 24, 2017Next generation analysts for next generation threats - lessons from deploying best practices to hundreds of SOC teams!SiemplifyMeny Har, John Pescatore
Jan 23, 2017 Practical Application of Threat Intel for Network DefendersDomainToolsDave Shackleford, Tim Helming
Jan 20, 2017Attacks on Databases: When NoSQL became NoDatabaseMatt Bromiley
Jan 19, 2017Packets Dont Lie: Whats Really Happening on Your Network?LogRhythmRob McCovern, Dave Shackleford
Jan 18, 2017Hunting with Cyber Deception and Incident Response AutomationCymmetria Gadi Evron
Jan 17, 2017Enhanced Application Security for the Financial IndustrySynopsysMike Ware, Steve Kosten
Jan 13, 2017Using Cisco Stealthwatch to Increase Security By Enhancing Critical Security Control PerformanceCisco SystemsJamison Budacki, John Pescatore
Jan 12, 2017How To Use Your Network To Fend Off The Latest Cyber ThreatsNETSCOUT Systems, Inc.Arabella Hallawell, Paul Bowen, John Pescatore, Ann Sun
Jan 12, 2017Packet Capture + Flow Analytics = Holistic Network VisibilityCisco SystemsBrian Ford
Jan 10, 2017Taking Control of Your Application SecurityLance Spitzner, Eric Johnson
Jan 10, 2017 Hello Friend: Creating a Threat Intelligence CapabilityScott Roberts, Rebekah Brown
Jan 6, 2017Analyzing the DHS/FBI's GRIZZLY STEPPE ReportRobert M. Lee

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.