Final Week - Save $350 or Get A GIAC Cert Attempt Included with Online Training!

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Feb 19, 2018When IoT Attacks - Understanding the Safety Risks Associated with Connected DevicesBilly Rios
Feb 16, 2018Security is QA: My Path from Developer to Pen TesterJoshua Barone
Feb 16, 2018Windows Baselining and Remote System Assessment: For the Low-low Price of Free-ninety-freeChris Pizor, John Strand
Feb 15, 2018An Inside Look at the Newly Updated ICS515 CourseRobert M. Lee
Feb 14, 2018Which SANS Pen Test Course Should I Take? - February 2018 EditionEd Skoudis, Joshua Wright
Feb 14, 2018The Impact Of Enterprise Web Application Trends Going MainstreamVeracodeSaikrishna Chavali, Serge Borso
Feb 14, 2018Cloud Security: Taking charge of Security in Your Cloud- A Master's Degree PresentationLuciana Obregon
Feb 13, 2018WEBCAST 1: SO, YOU HAVE TO TESTIFY, NOW WHAT?Jason Jordaan
Feb 13, 2018Improving Your Defenses - EMET & Window Defender Exploit GuardErik Van Buggenhout, Stephen Sims
Feb 12, 2018Debugging Python Code for mere mortalsMark Baggett
Feb 12, 2018Secure DevOps: Microservices and API SecurityGregory Leonard
Feb 9, 2018Building Zero Trust Model with Microsegmentation in the CloudUnisysSalvatore Sinno, Jonathan Payne
Feb 8, 20182 > 1: Teaming Up for Social Engineering AdventuresJen Fox
Feb 7, 2018Cyber Threat Intelligence Skills and Usefulness: SANS CTI Survey Results, Part 2Anomali

DomainTools

Intsights

Rapid7 Inc.

ThreatConnect
Dave Shackleford, John Hurd, Rebekah Brown
Feb 6, 2018Cyber Threat Intelligence Today: SANS CTI Survey Results, Part 1Anomali

DomainTools

Intsights

Rapid7 Inc.

ThreatConnect
Itay Kozuch, Dave Shackleford, Travis Farral, Zach Hill
Feb 1, 2018OSINT for Everyone: Understanding Risks and Protecting Your DataMicah Hoffman, Josh Huff
Jan 31, 2018Cyber Insurance Conundrum: Using CIS Critical Security Controls for Underwriting Cyber Risk- A Masters Degree Candidate PresentationOleg Bogomolniy
Jan 31, 2018DNS: An Asset, Not a LiabilityInfoBloxMatt Bromiley, Srikrupa Srivatsan
Jan 25, 2018Are You in Control? Managing the CIS Critical Security Controls within your EnterpriseHitachi Systems SecurityMatt Bromiley, Andrew Kozloski
Jan 24, 2018Multi-path TCP: Practical Approaches for Securing your Enterprise Network - A Masters Degree Candidate WebcastJosh Lewis
Jan 24, 2018In a Perfect World...Building the Network Security Architecture for the FutureNETSCOUT Systems, Inc.Sonny Sarai, John Pescatore, Arabella Hallawell
Jan 24, 2018How to Build & Maintain an Open Source SIEMJohn Hubbard, Justin Henderson
Jan 23, 2018Why and How to Take the GCTI - The Industry's Cyber Threat Intelligence CertificationRobert M. Lee
Jan 18, 2018What Event Logs? Part 2: Lateral Movement without Event LogsMatt Bromiley
Jan 18, 2018Use Case Development for Security OperationsChristopher Crowley
Jan 17, 20183 Steps Towards IT/OT ConvergenceEric Cosman, Doug Wylie, Gregory Hale
Jan 16, 2018Head HackingTim Medin
Jan 16, 2018Certifying Cyber Personnel Who Protect the Electric GridTim Conway
Jan 15, 2018Secure DevOps: Faster Feedback with Effective Security Unit Tests in CI / CDEric Johnson
Jan 11, 2018Third Party Risk Assessment: Using BitSight for Consistent and Continuous Risk RatingBitsightMichael Roling, John Pescatore
Jan 11, 2018What Event Logs? Part 1: Attacker Tricks to Remove Event LogsMatt Bromiley
Jan 9, 2018Introducing the *NEW* SANS Pen Test Poster - Building A Better Pen Tester - BlueprintEd Skoudis, Jason Blanchard
Jan 9, 2018Improving Your Defenses - CredentialGuard in Windows 10Erik Van Buggenhout, Stephen Sims
Jan 9, 2018Meltdown and Spectre - understanding and mitigating the threatsJake Williams
Jan 4, 2018Meltdown and Spectre - understanding and mitigating the threatsJake Williams

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.