DFIR Summit & Training - Register for a course by May 7 to save big on your Summit seat!

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Apr 19, 2018Fighting Cybercrime with Artificial IntelligenceFortinet, Inc.Keith Rayle, Dave Shackleford
Apr 18, 2018One Detect to Win: Tactical Application DetectionJustin Henderson, Tim Garcia
Apr 17, 2018ICS Active Defense Primer Kai Thomsen
Apr 13, 2018Python Regular Expressions for the Win!Joff Thyer
Apr 12, 2018Hitting every rock on the way down: A look back at 15 years of pentesting with John StrandJohn Strand
Apr 12, 2018A Pentesters perspective: Catching attackers living off the landBarklyJack Danahy, Dave Shackleford
Apr 12, 2018The Magic of Raw Data CarvingKevin Ripa
Apr 11, 2018Practical Approach to Detecting and Preventing Web Application Attacks over HTTP/2- A SANS Master's Degree PresentationRussel Van Tuyl
Apr 11, 2018No Vehicle is an IslandDoug Wylie
Apr 10, 2018Digital Trust in a Perimeter Less WorldUnisysJack Koons, Mark Alba
Apr 10, 2018Whats new in FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident ResponsePhilip Hagen
Apr 5, 2018Pausing the attack: deep dive on Pause-Process. A PowerShell script that allows you to pause and unpause potentially malicious attacksMick Douglas
Apr 4, 2018Securing Connected Vehicles what you need to knowMatt Carpenter, Kai Thomsen, Dr. André Weimerskirch
Apr 3, 2018Apple's latest file system - is APFS a blessing or a curse to digital investigators?Derrick Donnelly
Apr 2, 2018Securing the Hybrid Cloud: A Guide to Using Security Controls, Tools and Automation QualysDave Shackleford, Chris Carlson
Mar 30, 2018Anatomy of the TRITON ICS CyberattackCyberXPhil Neray, Justin Searle
Mar 29, 2018Being Offensive in the WorkplaceDerek Rook
Mar 29, 2018Combatting Business Email Compromise with Active Defense AGARIPatrick Peterson, Lance Spitzner, Markus Jakobsson
Mar 29, 2018Java on the Server? What Could Possibly Go wrong?Adrien de Beaupre
Mar 28, 2018Exploring Registry ExplorerEric Zimmerman
Mar 28, 2018Real-time Incident Remediation1EAndy Schmid, Jake Williams
Mar 28, 2018How hackers run circles around our defenses.Bryce Galbraith
Mar 27, 2018How to write malware that evades detectionBromiumAdrian Taylor, Alissa Torres
Mar 27, 2018Moving Endpoint Security to the Cloud: Replacing Traditional AntivirusCarbon BlackDave Gruber, Barbara Filkins
Mar 22, 2018Stop Really Nasty Malware, Pre- and Post-Execution: A SANS Review of the enSilo Endpoint Security PlatformEnsiloDave Shackleford
Mar 21, 2018One Detect to Win: Tactical Endpoint DetectionJustin Henderson, Stephen Mathezer
Mar 21, 2018SideSwipe: A PowerShell tool that allows you to detect lateral movement easily and quicklyMick Douglas
Mar 20, 2018Data on the Dark Web: finding your corporate data before the criminals doTerbium LabsTyler Carbone
Mar 20, 2018The Power of Bro - and why you should include it in your security infrastructureCorelight Seth Hall, Matt Bromiley
Mar 19, 2018Opening the Floodgates: How to Analyze 30+ TB of Endpoint Data Without Drowning Your Security TeamRedCanaryBrian Beyer
Mar 16, 2018Securing industrial control systems: A peek into building automation securityThomas Brandstetter
Mar 15, 2018Canadian Webcast Series Part 4: Protecting Data in a Multi-Cloud Environment & Pentesting Modern Web ApplicationsAdrien de Beaupre, Troy Davidson
Mar 15, 2018Pinpoint and Remediate Unknown Threats: SANS Review of EnCase Endpoint Security 6OpenText CorporationCharles Choe, Jake Williams
Mar 15, 20182017 SANS Holiday Hack Challenge Award Ceremony & TutorialEd Skoudis
Mar 14, 2018VMRay Analyzer, agentless malware analysis and rapid incident response: A SANS Product ReviewVMRay Matt Bromiley, Chad Loeven
Mar 13, 2018WEBCAST 3: TIPS AND TECHNIQUES FOR TESTIFYING SUCCESSFULLYJason Jordaan
Mar 12, 2018Secure DevOps: Encryption in the Cloud with KMSMark Geeslin
Mar 9, 2018Survey of Integrity Verification Solutions, Local and Remote AttestationColin DeWinter, Ben Gardiner
Mar 8, 2018Canadian Webcast Series Part 3: ICS Defense: Its Not a Copy-Paste From an IT Playbook & Importance of Intrusion Detection in a Compromised Prone WorldNik Alleyne, Dean Parsons
Mar 8, 2018Dramatically Reduce Incident Response Time with Splunk and BroCorelight Ken Hanson, Vincent Stoffer
Mar 8, 2018Baselines for Easier Detection: So easy there's no more excuses!Mick Douglas
Mar 7, 2018GIAC Certification for SIEMJustin Henderson
Mar 6, 2018Deep packet inspection: The key technology for network security and the question of whether to build or buy itRohde & Schwarz Cybersecurity GmbH Tanya Baccam, Alexander Müller
Mar 6, 2018Ready Forensicator OneLee Whitfield
Mar 5, 2018Could we have prepared for this? Attack Simulations for Blue Team HardeningAlissa Torres
Mar 2, 2018OSINT for Pentesters: Finding Targets and Enumerating SystemsMicah Hoffman, David Mashburn
Mar 1, 2018Canadian Webcast Series Part 2: Real-world Pentesting Its About Bringing Value, not Being l33t & Deeper Dive Digital ForensicsKevin Ripa, Stephen Mathezer
Mar 1, 201852 Percent of Companies Sacrifice Cybersecurity for SpeedThreat Stack

PagerDuty
Pete Cheslock, Franklin Mosley
Feb 28, 2018Security Visibility in the Enterprise: SOC, SIEM, Managed Security and Visibility - A Master's Degree PresentationJames Hendrick
Feb 28, 2018A Closer Look at Isolation: Hype or Next Gen Security?Menlo SecurityKowsik Guruswamy, John Pescatore
Feb 28, 2018Looking Under the Rock: Deployment Strategies for TLS Decryption- A Master's Degree PresentationChris Farrell
Feb 27, 2018WEBCAST 2: WORKING WITH THE LAWYERSJason Jordaan
Feb 27, 2018Why Insider Actions Matter: SANS Review of LogRhythm CloudAI for User and Entity Behavior AnalyticsLogRhythmMark Settle, Samir Jain, Dave Shackleford
Feb 27, 2018Mind the Gap: going beyond penetration testing for security improvementRapid7 Inc.Caspian Kilkelly
Feb 23, 2018Its Time to Move Endpoint Security to the CloudCarbon BlackJohn Pescatore
Feb 22, 2018Canadian Webcast Series Part 1: Managing Vulnerabilities in the Enterprise and an Overview of the PIACT Process & Frameworks: What Are They Good For?Kenton Smith, Jonathan Risto
Feb 22, 2018Walk, Run, Fly: Key Characteristics of Attaining an Advanced SOC Best practice tips on how to enter the advanced SOC dimensionDemistoRishi Bhargava, Christopher Crowley
Feb 22, 2018A pen-testers perspective on malware & ransomware attack techniques and the state of endpoint security BarklyJake Williams, Jack Danahy
Feb 21, 2018One Detect to Win: Tactical Network DetectionMick Douglas, Josh Johnson
Feb 21, 20185 Critical Success Factors for Identity When Moving to the CloudOracleEric Olden
Feb 20, 2018Exploiting esoteric SQL injection vulnerabilitiesBojan Zdrnja
Feb 19, 2018When IoT Attacks - Understanding the Safety Risks Associated with Connected DevicesBilly Rios
Feb 16, 2018Security is QA: My Path from Developer to Pen TesterJoshua Barone
Feb 16, 2018Windows Baselining and Remote System Assessment: For the Low-low Price of Free-ninety-freeChris Pizor, John Strand
Feb 15, 2018An Inside Look at the Newly Updated ICS515 CourseRobert M. Lee
Feb 14, 2018Which SANS Pen Test Course Should I Take? - February 2018 EditionEd Skoudis, Joshua Wright
Feb 14, 2018The Impact Of Enterprise Web Application Trends Going MainstreamVeracodeSaikrishna Chavali, Serge Borso
Feb 14, 2018Cloud Security: Taking charge of Security in Your Cloud- A Master's Degree PresentationLuciana Obregon
Feb 13, 2018WEBCAST 1: SO, YOU HAVE TO TESTIFY, NOW WHAT?Jason Jordaan
Feb 13, 2018Improving Your Defenses - EMET & Window Defender Exploit GuardErik Van Buggenhout, Stephen Sims
Feb 12, 2018Debugging Python Code for mere mortalsMark Baggett
Feb 12, 2018Secure DevOps: Microservices and API SecurityGregory Leonard
Feb 9, 2018Building Zero Trust Model with Microsegmentation in the CloudUnisysSalvatore Sinno, Jonathan Payne
Feb 8, 20182 > 1: Teaming Up for Social Engineering AdventuresJen Fox
Feb 7, 2018Cyber Threat Intelligence Skills and Usefulness: SANS CTI Survey Results, Part 2Anomali

DomainTools

Intsights

Rapid7 Inc.

ThreatConnect
Dave Shackleford, John Hurd, Rebekah Brown
Feb 6, 2018Cyber Threat Intelligence Today: SANS CTI Survey Results, Part 1Anomali

DomainTools

Intsights

Rapid7 Inc.

ThreatConnect
Itay Kozuch, Dave Shackleford, Travis Farral, Zach Hill
Feb 1, 2018OSINT for Everyone: Understanding Risks and Protecting Your DataMicah Hoffman, Josh Huff
Jan 31, 2018Cyber Insurance Conundrum: Using CIS Critical Security Controls for Underwriting Cyber Risk- A Masters Degree Candidate PresentationOleg Bogomolniy
Jan 31, 2018DNS: An Asset, Not a LiabilityInfoBloxMatt Bromiley, Srikrupa Srivatsan
Jan 25, 2018Are You in Control? Managing the CIS Critical Security Controls within your EnterpriseHitachi Systems SecurityMatt Bromiley, Andrew Kozloski
Jan 24, 2018Multi-path TCP: Practical Approaches for Securing your Enterprise Network - A Masters Degree Candidate WebcastJosh Lewis
Jan 24, 2018In a Perfect World...Building the Network Security Architecture for the FutureNETSCOUT Systems, Inc.Sonny Sarai, John Pescatore, Arabella Hallawell
Jan 24, 2018How to Build & Maintain an Open Source SIEMJohn Hubbard, Justin Henderson
Jan 23, 2018Why and How to Take the GCTI - The Industry's Cyber Threat Intelligence CertificationRobert M. Lee
Jan 18, 2018What Event Logs? Part 2: Lateral Movement without Event LogsMatt Bromiley
Jan 18, 2018Use Case Development for Security OperationsChristopher Crowley
Jan 17, 20183 Steps Towards IT/OT ConvergenceEric Cosman, Doug Wylie, Gregory Hale
Jan 16, 2018Head HackingTim Medin
Jan 16, 2018Certifying Cyber Personnel Who Protect the Electric GridTim Conway
Jan 15, 2018Secure DevOps: Faster Feedback with Effective Security Unit Tests in CI / CDEric Johnson
Jan 11, 2018Third Party Risk Assessment: Using BitSight for Consistent and Continuous Risk RatingBitsightMichael Roling, John Pescatore
Jan 11, 2018What Event Logs? Part 1: Attacker Tricks to Remove Event LogsMatt Bromiley
Jan 9, 2018Introducing the *NEW* SANS Pen Test Poster - Building A Better Pen Tester - BlueprintEd Skoudis, Jason Blanchard
Jan 9, 2018Improving Your Defenses - CredentialGuard in Windows 10Erik Van Buggenhout, Stephen Sims
Jan 9, 2018Meltdown and Spectre - understanding and mitigating the threatsJake Williams
Jan 4, 2018Meltdown and Spectre - understanding and mitigating the threatsJake Williams

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.