SANS OnDemand - 45+ Courses Available Today - View a Demo for an Hour of Free Content

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
December 19, 2018
9:00pm EST
(02:00:00 UTC)
Modern Information Security; Forget Cyber, It's All About AppSecAdrien de Beaupre
December 19, 2018
10:30am EST
(15:30:00 UTC)
Introducing the NEW SANS Pen Test Poster - Pivots & Payloads Board GameJason Blanchard, Ed Skoudis, Mick Douglas
December 18, 2018
1:00pm EST
(18:00:00 UTC)
Palo Alto Networks and CyberX Integration: Accelerating the Time Between ICS/SCADA Threat Detection and PreventionCyberXDharminder Debisarun, Daniel Shugrue
December 17, 2018
1:00pm EST
(18:00:00 UTC)
Using OSINT for Cryptocurrency AttributionKirby Plessas
December 13, 2018
1:00pm EDT
(18:00:00 UTC)
Demonstration of an ICS attack chain using non-technical exploitation techniques Honeywell International Connor Leach, Jackson Evans-Davies
December 13, 2018
10:30am EST
(15:30:00 UTC)
Tips and Tricks for Customers and Pen Testers on How to Get Higher Value Pen TestsChris Dale
December 12, 2018
1:00pm EST
(18:00:00 UTC)
Efficient Alert Processing and Response: A SANS Review of SwimlaneSwimlaneAlissa Torres, Jay Spann
December 12, 2018
10:30am EST
(15:30:00 UTC)
WhatWorks in Application Security: How to Detect and Remediate Application Vulnerabilities and Block Attacks with Contrast SecurityContrast SecurityJohn Pescatore, Joshua Bentley
December 11, 2018
2:30pm EST
(19:30:00 UTC)
5 Endpoint Protection Best PracticesPalo Alto NetworksJohn Pescatore, Danny Milrad
December 11, 2018
1:00pm EST
(18:00:00 UTC)
NetMRI: Using Network Automation for Visibility and SecurityInfoBloxDave Signori
December 11, 2018
10:30am EST
(15:30:00 UTC)
A Practical Introduction into How to Exploit Blind VulnerabilitiesChris Dale
December 7, 2018
11:00am EST
(16:00:00 UTC)
Gearing up for 2019 - Best Practices to ConsiderInfoBlox

Carbon Black

Cybelangel

Cisco Systems Inc.
John Pescatore, John Strand, Jake Williams
December 6, 2018
3:30pm EST
(20:30:00 UTC)
SSL Decryption - Why, Where and HowPalo Alto NetworksDave Shackleford, Ronald Dodge, Arun Kumar
December 6, 2018
1:00pm EST
(18:00:00 UTC)
An Evaluator's Guide to Next-Generation SIEMLogRhythmBarbara Filkins, Christopher Crowley, Sara Kingsley
December 5, 2018
3:30pm EST
(20:30:00 UTC)
(JA)3 Reasons to Rethink Your Encrypted Traffic Analysis StrategiesAwake SecurityTroy Kent, Dave Shackleford
December 5, 2018
1:00pm EST
(18:00:00 UTC)
MythBusters: ICS EditionDomainToolsAlissa Torres, Mike Thompson
December 5, 2018
10:30am EST
(15:30:00 UTC)
EPP or EDR? Why not both? Choose Next Generation Endpoint SecurityCisco SystemsNeil Patel, Jake Williams
December 4, 2018
3:30pm EST
(20:30:00 UTC)
Machine Learning & Risk Engines for Security Data Analysis - How to Identify What's Real vs. What's BogusThreatXDave Shackleford, Jeremiah Cruit
December 4, 2018
1:00pm EST
(18:00:00 UTC)
Threat Black Hole: Visibility and IoT Security Pulse SecureDave Shackleford, James Tolosa, Ashur Kanoon
December 4, 2018
10:30am EST
(15:30:00 UTC)
Infection to Remediation: Exploring the InfoStealer Kill ChainVMRay Jake Williams, Rohan Viegas
November 30, 2018
8:30am EST
(13:30:00 UTC)
SANS Cyber Threat Intelligence Briefing 2018: Efficiency and Effectiveness Through Cyber Threat IntelligenceDomainTools

RecordedFuture

Google LLC

ExtraHop
November 29, 2018
1:00pm EST
(18:00:00 UTC)
Threat Intelligence and Protecting Your Endpoints: A SANS Review of the CrowdStrike Falcon X PlatformCrowdStrike, Inc.Kurt Baker, Dave Shackleford
November 29, 2018
10:00am EST
(15:00:00 UTC)
Finding the Human Side of MalwareIntezerOr Fridman, Matt Bromiley
November 28, 2018
9:00pm EST
(02:00:00 UTC)
Demystifying Security Challenges in Control System Environments and How to Fix ThemLarry Vandenaweele
November 27, 2018
10:30am EST
(15:30:00 UTC)
Passwords and Authentication - Get Up to Speed on Attacks and DefensesChris Dale
November 26, 2018
1:00pm EST
(18:00:00 UTC)
The ABCs of OT Cyber Program Planning, where to start Honeywell International Rusty Gavin
November 21, 2018
3:30pm EST
(20:30:00 UTC)
Zero Trust ArchitectureJustin Henderson
November 16, 2018
8:30am EST
(13:30:00 UTC)
SANS Security Operations Center Briefing: Knowledge Retention, Staff Training, Automation & Operationalization 2018DFLabs

DomainTools

Protectwise

Symantec
Chris Crowley, Karen Buffo, Tim Helming
November 14, 2018
3:30pm EST
(20:30:00 UTC)
Using a Collection Management Framework for ICS Security Operations and Incident ResponseDragos, Inc.Tim Conway, Ben Miller, Mark Stacey
November 14, 2018
12:15pm EST
(17:15:00 UTC)
Introducing VirusTotal EnterpriseGoogle LLCEvan Derheim
November 13, 2018
3:30pm EST
(20:30:00 UTC)
Building your Android application testing toolboxDomenica Crognale
November 13, 2018
1:00pm EST
(18:00:00 UTC)
Continuous Endpoint Monitoring for the Global EnterpriseOpenText Inc.Rob Batzloff, Jacob Williams
November 13, 2018
10:00am EDT
(15:00:00 UTC)
Detection and response services in the ICS environment The management perspectiveSøren Egede Knudsen
November 9, 2018
1:00pm EST
(18:00:00 UTC)
Secure DevOps: Fact or Fiction? SANS Survey Looks at Reality, Part IIAqua Security Inc.

Veracode

Qualys

Rapid7 Inc.

Signal Sciences

WhiteHat Security
Jim Bird, Barbara Filkins, Chris Eng, Sandeep Potdar, Hari Srinivasan
November 8, 2018
3:30pm EST
(20:30:00 UTC)
Automation NationJustin Henderson, John Hubbard
November 8, 2018
1:00pm EST
(18:00:00 UTC)
Secure DevOps: Fact or Fiction? SANS Survey Looks at Reality, Part IAqua Security Inc.

Veracode

Qualys

Rapid7 Inc.

Signal Sciences

WhiteHat Security
Jim Bird, Barbara Filkins, Dan Kuykendall, Zane Lackey, Rani Osnat
November 8, 2018
10:30am EST
(15:30:00 UTC)
The Perimeter is gone. How can you protect your company and your corporate data?OPSWATYiyi Miao, Serge Borso
November 7, 2018
3:30pm EST
(20:30:00 UTC)
More Bad DataJustin Henderson, John Hubbard
November 7, 2018
1:00pm EST
(18:00:00 UTC)
Operationalizing Zero Trust Model with Adaptive SecurityUnisysUsamah Hassan, Salvatore Sinno, Franco Negri
November 7, 2018
10:30am EST
(15:30:00 UTC)
How to use Machine Learning to protect Cloud InfrastructureOracleSubbu Iyer, Chaitanya Yinti
November 6, 2018
3:30pm EST
(20:30:00 UTC)
Prioritizing Log EnrichmentJustin Henderson, John Hubbard
November 6, 2018
10:30am EST
(15:30:00 UTC)
8 Keys to a Defensible Network Architecture And How Zeek Can Help You Get ThereCorelight Richard Bejtlich, Matt Bromiley
November 5, 2018
3:30pm EST
(20:30:00 UTC)
Cyber Threat Checklist: Are you prepared? Absolute Software Corp.Alissa Torres, Kevin Golas
November 5, 2018
1:00pm EST
(18:00:00 UTC)
Network Architecture with Security in MindGigamonMatt Bromiley, Sam Kumarsamy
November 1, 2018
1:00pm EDT
(17:00:00 UTC)
Improving the Incident Response Function: SANS 2018 Incident Response Survey Results Part IICoalfire Systems

Fidelis Cybersecurity

Forescout Technologies BV

1E

OpenText Inc.

ThreatQuotient
Matt Bromiley, Andy Schmid, Mike Stewart, Ryan Trost
October 31, 2018
3:30pm EDT
(19:30:00 UTC)
How to Build Your Modern Email Fraud DefenseProofPointRyan Terry, David Hoelzer
October 31, 2018
1:00pm EDT
(17:00:00 UTC)
How Are You Responding to Threats? SANS 2018 Incident Response Survey Results Part ICoalfire Systems

Fidelis Cybersecurity

Forescout Technologies BV

1E

OpenText Inc.

ThreatQuotient
Matt Bromiley, Anthony Di Bello, Jim Jaeger, Brennen Reynolds
October 30, 2018
3:30pm EDT
(19:30:00 UTC)
Windows Defender Exploit Guard for Windows 10Stephen Sims
October 30, 2018
1:00pm EDT
(17:00:00 UTC)
How to Conduct and Utilize Human Intelligence by Engaging Your Cyber AdversariesIntSightsItay Kozuch
October 29, 2018
10:00pm EDT
(02:00:00 UTC)
How Hackers Run Circles Around Our DefensesBryce Galbraith
October 26, 2018
1:00pm EDT
(17:00:00 UTC)
How to do Vulnerability Management for ContainersSysdig Apurva Dave, Dave Shackleford
October 25, 2018
3:30pm EDT
(19:30:00 UTC)
Building Your Zero Trust Security Strategy With Microsegmentation: Why Digital Businesses Need A Granular Software Defined Network Segmentation ApproachUnisysChase Cunningham, Jack Koons
October 25, 2018
1:00pm EST
(17:00:00 UTC)
Reinventing Prevention with Deep LearningDeep InstinctJake Williams, Mark Arapovic
October 25, 2018
10:30am EDT
(14:30:00 UTC)
Web Hacking with Burp Suite - Deep Dive into Burp Suite's Functionality for Pen TestersChris Dale
October 24, 2018
10:30am EST
(14:30:00 UTC)
SIEMterventionJustin Henderson
October 22, 2018
1:00pm EDT
(17:00:00 UTC)
Consulting on The Side - How to consult while keeping your day jobTed Demopoulos
October 18, 2018
3:30pm EDT
(19:30:00 UTC)
The Algorithm of You: Defeating Attackers by Being YourselfBehavioSecNeil Costigan, Matt Bromiley
October 17, 2018
3:30pm EDT
(19:30:00 UTC)
Web Application Scanning AutomationTimothy McKenzie
October 17, 2018
1:00pm EDT
(17:00:00 UTC)
The Cybersecurity Talent Gap: An Unforeseen Impediment to Fast and Effective Incident RemediationCrowdStrike, Inc.Austin Murphy, Brandon Wunderle
October 17, 2018
10:30am EST
(14:30:00 UTC)
Cyber kill-chain disruption with hypervisor memory introspectionBitdefender SRLKurt Roemer, Ramaswamy Chandramouli, Andrei Florescu
October 16, 2018
3:30pm EDT
(19:30:00 UTC)
Consuming OSINT: Watching You Eat, Drink, and SleepMicah Hoffman, John TerBush
October 16, 2018
1:00pm EDT
(17:00:00 UTC)
What You Need To Know to Evaluate Next-Gen Endpoint SecurityCarbon BlackChristopher Fielder, Barbara Filkins
October 16, 2018
10:30am EDT
(14:30:00 UTC)
Python Decorators DemystifiedCyberGRXMark Baggett
October 15, 2018
1:00pm EDT
(17:00:00 UTC)
Kolide & OSQuery - How to build solid queries & packs for incident detection & threat huntingErik Van Buggenhout, Stephen Sims
October 12, 2018
8:30am EDT
(12:30:00 UTC)
SANS Financial Services Briefing: Cyber Threat Intelligence in Security Operations: Am I Breached?Symantec
October 11, 2018
1:00pm EDT
(17:00:00 UTC)
Tales from the Trenches: An Asset Owners Take on Tackling ICS Cybersecurity Challenges SecurityMattersBrian Proctor, Alex Waitkus
October 10, 2018
10:30am EDT
(14:30:00 UTC)
Data-Centric SecurityJustin Henderson
October 4, 2018
1:00pm EDT
(17:00:00 UTC)
Investigate East-West Attack Activities to Defend Critical Assets: A SANS Review of ExtraHop Reveal(x)ExtraHopDave Shackleford, Barbara Kay
October 4, 2018
10:30am EDT
(14:30:00 UTC)
Getting Ready to Consult - Landing your first clientTed Demopoulos
October 3, 2018
3:30pm EDT
(19:30:00 UTC)
Shortcuts for Understanding Malicious ScriptsEvan Dygert
October 3, 2018
1:00pm EDT
(17:00:00 UTC)
Everything I Learned and Wanted to Forget about WAFs ThreatXSerge Borso, Jeremiah Cruit
October 2, 2018
3:30pm EDT
(19:30:00 UTC)
CCE INLs New Approach to Securing Critical Industrial InfrastructureCyberXAndy Bochman, Phil Neray
October 2, 2018
1:00pm EDT
(17:00:00 UTC)
Why the World Must Take Notice of the Rising Asian Dark WebIntSightsItay Kozuch, Brandon McCrillis
October 2, 2018
10:30am EDT
(14:30:00 UTC)
What Works in Endpoint Security: Surviving Advanced Targeted Attacks by Augmenting (or Replacing) Legacy AV with enSiloEnsiloJohn Pescatore
September 27, 2018
3:30pm EDT
(19:30:00 UTC)
Safety Systems Shutdown by Malware - Hype and RealityClaroty Inc. Pat Barry, Dave Weinstein
September 27, 2018
1:00pm EDT
(17:00:00 UTC)
Practical Industrial Control System (ICS) Cybersecurity: IT and OT Have Converged--Discover and Defend Your AssetsTenable Ted Gary, Dean Parsons, Doug Wylie
September 27, 2018
10:30am EDT
(14:30:00 UTC)
Automating Open Source Security: A SANS Review of WhiteSourceWhiteSourceRami Elron, Serge Borso
September 26, 2018
1:00pm EDT
(17:00:00 UTC)
10 Must-Have Features of a Modern SIEMExabeamOrion Cassetto
September 26, 2018
10:30am EDT
(14:30:00 UTC)
What Works in Certificate and Key Management: Enabling Secure Digital Business Using Venafis Trust Protection PlatformVenafi, IncJohn Pescatore
September 25, 2018
1:00pm EDT
(17:00:00 UTC)
Network Microsegmentation - Building Zero Trust Security from Data to DevicesUnisysErin Kelly, Jill Walsh
September 21, 2018
1:00pm EDT
(17:00:00 UTC)
Powering IR/SOC with Code Reuse Detection - The Emotet Case StudyIntezerMatt Bromiley, Itai Tevet
September 20, 2018
3:30pm EST
(19:30:00 UTC)
Meeting the Critical Security Controls Using OSSECAtomicorpScott Shinn, Michael Shinn, John Pescatore
September 20, 2018
1:00pm EDT
(17:00:00 UTC)
Threat Hunting in Action: SANS 2018 Survey Results, Part IIAnomali

DomainTools

IBM

Malwarebytes

Qualys

RiskIQ
Rob Lee, Robert M. Lee, Sid Pearl, Benjamin Powell, Justin Swisher
September 20, 2018
10:30am EDT
(14:30:00 UTC)
Detecting Industrial Network Anomalies Without the Risk of DisruptionClaroty Inc. Stefan Waronka, Patrick McBride
September 19, 2018
3:30pm EDT
(19:30:00 UTC)
Cloud Services - Look before you LeapDavid R. Miller
September 19, 2018
1:00pm EDT
(17:00:00 UTC)
Threat Hunting Is a Process, Not a Thing: SANS 2018 Survey Results, Part IAnomali

DomainTools

IBM

Malwarebytes

Qualys

RiskIQ
Chris Carlson, Helen Johnson, Rob Lee, Robert M. Lee, Dana Torgersen
September 19, 2018
10:30am EDT
(14:30:00 UTC)
SSL Traffic Inspection: Needed Visibility But At What Cost?A10 NetworksParth Jagirdar, Barbara Filkins
September 18, 2018
1:00pm EDT
(17:00:00 UTC)
Dissecting a Ransomware AttackVMRay Jacob Williams, Rohan Viegas
September 18, 2018
10:30am EDT
(14:30:00 UTC)
Perimeter Security and Why it is ObsoleteJustin Henderson
September 17, 2018
10:00pm EDT
(02:00:00 UTC)
Trust No One: Introducing SEC530: Defensible Security ArchitectureEric Conrad
September 17, 2018
1:00pm EST
(17:00:00 UTC)
Hacker Techniques: Covert Command and ControlDerek Rook
September 13, 2018
3:30pm EDT
(19:30:00 UTC)
Password Cracking: Beyond the BasicsJon Gorenflo
September 13, 2018
1:00pm EST
(17:00:00 UTC)
Over Exposed and being Phished? Stop Sophisticated AttacksSymantecMark Urban, John Pescatore
September 13, 2018
10:30am EST
(14:30:00 UTC)
How to achieve autonomous (and optimized) hunting and detectionSecBIAlex Vaystikh, Matt Bromiley
September 12, 2018
1:00pm EDT
(17:00:00 UTC)
The Need for Speed: Integrated Threat ResponseLookingglass Cyber Solutions, Inc.Matt Bromiley, Allan Thomson
September 12, 2018
10:30am EDT
(14:30:00 UTC)
How to be prepared for the next cyber-attack?CymulateAvihai Ben-Yossef, Jonathan Gad
September 11, 2018
1:00pm EDT
(17:00:00 UTC)
Breach Avoidance: Yes, You Can!BalbixJohn Pescatore, Gaurav Banga
September 11, 2018
10:30am EDT
(14:30:00 UTC)
YARA - Effectively using and generating rulesErik Van Buggenhout
September 10, 2018
1:00pm EDT
(17:00:00 UTC)
What the CISO REALLY wants out of your SOCRussell Eubanks
September 6, 2018
3:30pm EDT
(19:30:00 UTC)
ICS Network HygienePaul Piotrowski, Kevin Van Der Veen, Manjit Duhra
September 6, 2018
10:30am EDT
(14:30:00 UTC)
Pen Testing with PowerShell: Automating the Boring so You Can Focus on the FUN!Mick Douglas
September 5, 2018
3:30pm EDT
(19:30:00 UTC)
It's All About Your Assets: Inline Vulnerability and Event ManagementDavid Hazar
September 5, 2018
10:30am EDT
(14:30:00 UTC)
The Convergence of Cybersecurity and Process SafetyDoug Wylie, Marty Edwards, Larry O'Brien
September 4, 2018
10:30am EDT
(14:30:00 UTC)
Pen Testing with PowerShell: Local Privilege Escalation TechniqueMick Douglas
August 30, 2018
1:00pm EST
(17:00:00 UTC)
Stronger Security with Global IT Asset InventoryQualysMatt Bromiley, Pablo Quiroga
August 29, 2018
1:00pm EDT
(17:00:00 UTC)
Break Silos and respond to threats faster; Eliminating network and security silos to speed attack responseInfoBloxJohn Pescatore, Chintan Udeshi
August 23, 2018
3:30pm EST
(19:30:00 UTC)
Weaponizing Browser-Based Memory Leak Bugs - Stephen SimsStephen Sims
August 23, 2018
1:00pm EDT
(17:00:00 UTC)
How Network Traffic Analytics Eliminates Darkspace for the SOCExtraHopBarbara Kay, Chris Crowley
August 23, 2018
10:30am EDT
(14:30:00 UTC)
Pen Testing with PowerShell: Data Exfiltration TechniquesMick Douglas
August 22, 2018
3:30pm EDT
(19:30:00 UTC)
Youre Probably Not Red Teaming (And Usually Im Not, Either)Deviant Ollam
August 21, 2018
1:00pm EDT
(17:00:00 UTC)
The Keys to Managing Insider Threats & Stopping Data ExfiltrationObserveITTim Armstrong, John Pescatore
August 20, 2018
1:00pm EDT
(17:00:00 UTC)
7 Steps to Protecting Data in the Era of Digital CareAbsolute Software Corp.Dave Shackleford, Josh Mayfield
August 16, 2018
1:00pm EDT
(17:00:00 UTC)
SOC Capabilities and Usefulness: Part II of the SANS SOC Survey Results WebcastAuthentic8

Awake Security

CYBERBIT Commercial Solutions

DFLabs

ExtraHop

LogRhythm
Christopher Crowley, Gary Golomb, Lital Grossman, John Moran, John Pescatore
August 15, 2018
3:30pm EDT
(19:30:00 UTC)
Whats covered in the SANS Advanced Web App Pen Testing Course SEC642? Thanks for Asking!Moses Hernandez
August 15, 2018
1:00pm EDT
(17:00:00 UTC)
Measuring and Evaluating Cyber Risk in Hazardous LocationsDoug Wylie, Ken Modeste
August 14, 2018
1:00pm EDT
(17:00:00 UTC)
No Single Definition of a SOC: Part I of the SANS 2018 SOC Survey Results WebcastAuthentic8

Awake Security

CYBERBIT Commercial Solutions

DFLabs

ExtraHop

LogRhythm
Chris Brazdziunas, Christopher Crowley, Barbara G. Kay, John Klassen, John Pescatore
August 14, 2018
10:30am EDT
(14:30:00 UTC)
World-Class Cyber Security OperationsCarson Zimmerman
August 14, 2018
7:00am EDT
(11:00:00 UTC)
Continuous Security: Monitoring & Active Defense in the CloudEric Johnson
August 8, 2018
10:30am EDT
(14:30:00 UTC)
PHA Review: Combining Process Safety & CybersecurityDoug Wylie, Jim McGlone
August 2, 2018
1:00pm EDT
(17:00:00 UTC)
Software-Defined Microsegmentation for Regulatory ComplianceUnisysBill Parkinson, Jack Koons
July 31, 2018
1:00pm EDT
(17:00:00 UTC)
How Visibility of the Attack Surface Minimizes RiskSkybox Security, Inc.Sean Keef, Dave Shackleford
July 30, 2018
10:30am EST
(14:30:00 UTC)
Security Essentials Core ConceptsTed Demopoulos
July 27, 2018
1:00pm EDT
(17:00:00 UTC)
Windows Defender ATPs Advanced Hunting: Using Flexible Queries to Hunt Across Your EndpointsMicrosoftMatt Bromiley, Jonathan Bar Or
July 26, 2018
4:00pm EDT
(20:00:00 UTC)
Understanding the True Cost of Endpoint ManagementIBMTeresa Worth, Matt Bromiley
July 26, 2018
1:00pm EDT
(17:00:00 UTC)
Managing Cloud SecurityTenable Dave Shackleford, Greg Mayfield
July 26, 2018
10:30am EDT
(14:30:00 UTC)
The Perimeter is Dead: Introducing SEC530: Defensible Security ArchitectureJustin Henderson, Eric Conrad
July 25, 2018
3:30pm EDT
(19:30:00 UTC)
All Your Network Traffic Are Belong to Us - VPNFilter Malware and Implications for ICSCyberXTim Conway, Doug Wylie, Phil Neray
July 25, 2018
10:30am EDT
(14:30:00 UTC)
I Before R Except After IOCAndrew Hay
July 24, 2018
3:30pm EDT
(19:30:00 UTC)
4 Techniques to Modernize Your DDoS DefensesA10 NetworksDon Shin, John Pescatore
July 24, 2018
1:00pm EDT
(17:00:00 UTC)
Single-Agent Cyber Security Analytics: A SANS Review of the Cybereason PlatformCybereasonDave Shackleford, Israel Barak
July 24, 2018
10:30am EDT
(14:30:00 UTC)
High Fidelity Alerts: Alert vs Anomaly A sibling rivalryJustin Henderson, Tim Garcia
July 19, 2018
3:30pm EDT
(19:30:00 UTC)
Building Successful Awareness Programs - Key Findings and Lessons Learned from 2018 Security Awareness ReportDan DeBeaubien, Lance Spitzner
July 19, 2018
1:00pm EDT
(17:00:00 UTC)
The State of Industrial IoTIndegy

Accenture

Forescout Technologies BV
Barbara Filkins, Doug Wylie, Barak Perelman, Bradford Hegrat, Wayne Dixon
July 18, 2018
3:30pm EDT
(19:30:00 UTC)
Intro to Smart Contract Security Jonathan Haas
July 18, 2018
10:30am EDT
(14:30:00 UTC)
Managing vulnerabilities with the PIACT processJonathan Risto
July 17, 2018
11:00pm EDT
(03:00:00 UTC)
Collecting OSINT: Grabbing Your Data Now to Use LaterMicah Hoffman, Josh Huff
July 17, 2018
3:30pm EDT
(19:30:00 UTC)
PowerShell for PenTestingMick Douglas
July 17, 2018
9:00am EST
(13:00:00 UTC)
Business Email Compromise & Office 365: Making Sense of All the NoiseMatt Bromiley
July 12, 2018
10:30am EDT
(14:30:00 UTC)
Fundamentals of Security Operations Chris Crowley
July 11, 2018
3:30pm EDT
(19:30:00 UTC)
Cloud Security Visibility: Establishing security control of the cloud estateAlgoSec Systems, Ltd.Avishai Wool, Dave Shackleford
July 10, 2018
3:30pm EDT
(19:30:00 UTC)
No tool fits all Why Building a solid Toolbox MattersHeather Mahalik
July 10, 2018
1:00pm EST
(17:00:00 UTC)
Best practices for Forensics and Incident Response in ContainersSysdig Knox Anderson, Jake Williams
July 10, 2018
10:30am EDT
(14:30:00 UTC)
Putting Out the Fire: Improving SecOps Retention From Day OneRedCanaryFrank McClain
July 2, 2018
11:00pm EDT
(03:00:00 UTC)
Enterprise Discovery: I Still Havent Found What Im Looking ForTim Medin
June 28, 2018
3:30pm EDT
(19:30:00 UTC)
Diffuse Cryptojacking & Ransomware Attacks with a SandboxFortinet, Inc.Damien Lim, Dave Shackleford
June 27, 2018
1:00pm EDT
(17:00:00 UTC)
EnCase Forensic 8: A SANS Analyst Program Review OpenText Inc.Jake Williams, Harp Thukral
June 27, 2018
10:30am EDT
(14:30:00 UTC)
High Fidelity Alerts: Context for your contextJustin Henderson
June 26, 2018
3:30pm EDT
(19:30:00 UTC)
Threat Intelligence Naming Conventions: Threat Actors, Activity Groups, and Other Ways of Tracking ThreatsRobert M. Lee
June 26, 2018
1:00pm EST
(17:00:00 UTC)
2018's Biggest Bugs and How to Beat ThemBugcrowdJohn Pescatore, Jason Haddix, Michael Blache
June 26, 2018
6:00am EDT
(10:00:00 UTC)
PCAP Command-Line MadnessHal Pomeranz
June 21, 2018
1:00pm EDT
(17:00:00 UTC)
10 Tips for Effective Modern Day Endpoint Protection SymantecJacob Williams, Adam Licata
June 21, 2018
10:30am EST
(14:30:00 UTC)
Three free Python apps to improve your defenses and response capabilitiesMark Baggett
June 20, 2018
3:30pm EDT
(19:30:00 UTC)
Sharpen Your Threat Hunting Capabilities with YARAGoogle LLCMatt Bromiley, Evan Derheim, Victor Manuel Alvarez
June 20, 2018
1:00pm EDT
(17:00:00 UTC)
LabMD: The Phony Data BreachMichael J. Daugherty, Benjamin Wright
June 20, 2018
11:00am EDT
(15:00:00 UTC)
What is Purple Team? Updates to SEC599Chris Gates, Erik Van Buggenhout, Stephen Sims
June 19, 2018
3:30pm EDT
(19:30:00 UTC)
So, You Wanna Be a Pen Tester? 3 Paths to ConsiderEd Skoudis
June 19, 2018
1:00pm EDT
(17:00:00 UTC)
Small Businesses, Big Threats: Protecting your Small and Medium Business Against Malware, Ransomware, Exploits and MoreBarklyJack Danahy, John Pescatore
June 19, 2018
10:30am EDT
(14:30:00 UTC)
Software Defined Radio for Penetration Testing and AnalysisLarry Pesce
June 18, 2018
10:30am EDT
(14:30:00 UTC)
Understanding the 2018 Updates to the CIS Critical Security ControlsJames Tarala
June 15, 2018
1:00pm EDT
(17:00:00 UTC)
Stopping IoT-based Attacks on Enterprise NetworksHP Michael Howard, Shivaun Albright, G.W. Ray Davidson, PhD
June 14, 2018
3:30pm EDT
(19:30:00 UTC)
What Works in Visibility, Access Control and IOT Security Pulse Secure NAC Outcomes at Energy ProviderPulse SecureDave Cullen, John Pescatore
June 14, 2018
1:00pm EDT
(17:00:00 UTC)
Endpoint Detection and Response: Part 2 of the SANS 2018 Endpoint Security Survey ResultsCarbon Black

CrowdStrike, Inc.

Endgame

Forescout Technologies BV

Malwarebytes

Mcafee LLC

OpenText Inc.
Lee Neely, Alissa Torres, Mike Nichols, Ratnesh Saxena, Rick McElroy, Sandeep Kumar
June 13, 2018
3:30pm EDT
(19:30:00 UTC)
Which SANS Pen Test Course Should I Take? SEC560 EditionEd Skoudis, Kevin Fiscus
June 13, 2018
1:00pm EDT
(17:00:00 UTC)
It Starts With The Endpoint: Part 1 of the SANS 2018 Endpoint Security Survey ResultsCarbon Black

CrowdStrike, Inc.

Endgame

Forescout Technologies BV

Malwarebytes

Mcafee LLC

OpenText Inc.
Lee Neely, Alissa Torres, Jackie Castelli, Charles Choe, Dana Torgersen
June 13, 2018
10:30am EDT
(14:30:00 UTC)
Securing Against the Most Common Vectors of Cyber Attacks- A SANS Master's Degree PresentationRichard Hummel
June 12, 2018
1:00pm EDT
(17:00:00 UTC)
Its 2 AM, do you know where your data is?MobileIronJames Plouffe, John Pescatore
June 12, 2018
10:30am EST
(14:30:00 UTC)
Introduction to enterprise vulnerability assessment; finding StrutsAdrien de Beaupré
June 11, 2018
1:00pm EDT
(17:00:00 UTC)
The Cloud Browser: Enabling Safe and Secure OSINT Malware AnalysisAuthentic8John Klassen, Nick Espinoza, John Pescatore
June 11, 2018
10:00am EDT
(14:00:00 UTC)
Cryptography Essentials Made SimpleTed Demopoulos
June 7, 2018
3:30pm EDT
(19:30:00 UTC)
Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So FarTed Demopoulos
June 7, 2018
1:00pm EDT
(17:00:00 UTC)
Threat Management Made Easy: How to Protect Your ICS Network with Less EffortSecurityMattersDennis Murphy, Dean Parsons
June 7, 2018
10:30am EDT
(14:30:00 UTC)
Maximizing Your Existing Toolset I Got 99 Tools, but Time Ain't OneJon Gorenflo
June 6, 2018
1:00pm EDT
(17:00:00 UTC)
Your Current Approach to Threat Detection & Neutralization is BrokenThreatXJohn Pescatore, Bret Settle
June 5, 2018
1:00pm EDT
(17:00:00 UTC)
Introducing the New DFIR Hunt Evil PosterRob Lee, Mike Pilkington
June 4, 2018
1:00pm EDT
(17:00:00 UTC)
A Sneak Peek at the New ICS410Justin Searle
May 31, 2018
1:00pm EDT
(17:00:00 UTC)
We pass the costs to you! An analysis of cryptomining and cryptojackingCisco Systems Inc. Ted Demopoulos, Josh Pyorre
May 31, 2018
10:30am EDT
(14:30:00 UTC)
Visibility on the Network: A Tactical CTI-Based Approach - A SANS Master's Degree PresentationAlfredo Hickman
May 30, 2018
1:00pm EDT
(17:00:00 UTC)
True Detective Autopsy of latest O365 and AWS threatsSkyHigh NetworksBrandon Cook, John Pescatore
May 30, 2018
10:30am EDT
(14:30:00 UTC)
High Fidelity Alerts: How to create custom alerts like a proJustin Henderson, John Hubbard
May 30, 2018
5:00am EDT
(09:00:00 UTC)
SANS New Course for Cyber Defense - SEC599: Defeating Advanced Adversaries - Implementing Kill Chain DefensesErik Van Buggenhout
May 29, 2018
3:30pm EDT
(19:30:00 UTC)
Whats New with FOR518 - Mac and iOS Forensic Analysis & Incident ResponseSarah Edwards
May 29, 2018
1:00pm EDT
(17:00:00 UTC)
Ten Tenets of CISO SuccessFrank Kim
May 29, 2018
10:30am EDT
(14:30:00 UTC)
Everything I Didnt Learn in SchoolJonathan Haas
May 25, 2018
1:00pm EDT
(17:00:00 UTC)
Why Zero Trust Security is Essential for Your Cloud and Data CenterEdgewiseAdam LeWinter, Dave Shackleford
May 23, 2018
1:00pm EDT
(17:00:00 UTC)
Reclaim Your Freedom to Safely Access the WebFortinet, Inc.John Pescatore, Shalini Sundaram, Kevin Gallaugher
May 23, 2018
10:30am EDT
(14:30:00 UTC)
Defending Against the Rising Tide of Industrial CyberThreats: An OT CyberSecurity Case StudyClaroty Inc. Eduardo Di Monte, Patrick McBride
May 17, 2018
3:30pm EDT
(19:30:00 UTC)
So, You Want To Be An Infosec Consultant?Ted Demopoulos
May 17, 2018
1:00pm EDT
(17:00:00 UTC)
Passive, Active or Hybrid Monitoring: What is the right choice for your ICS Network?IndegyBarak Perelman
May 16, 2018
1:00pm EDT
(17:00:00 UTC)
Automate Threat Detection and Incident Response: SANS Review of RSA NetWitnessRSAMaor Franco, Ahmed Tantawy, Dave Shackleford
May 16, 2018
10:30am EST
(14:30:00 UTC)
Building a Cyber Deception Program: Tech Essentials and Business ValueCymmetria Matt Bromiley, Gadi Evron
May 14, 2018
10:00pm EDT
(02:00:00 UTC)
Software Defined Radio for Penetration Testing and AnalysisJames Leyte-Vidal
May 11, 2018
3:30pm EDT
(19:30:00 UTC)
ICS Active Defense Primer Part 2Kai Thomsen
May 10, 2018
10:30am EDT
(14:30:00 UTC)
Raspberry Honey Pi: Botnet for Good- A SANS Masters Degree Candidate PresentationTim Collyer
May 9, 2018
3:30pm EDT
(19:30:00 UTC)
5 Ways Bro Gives You Better Data for Incident Response and Threat HuntingCorelight Gregory Bell, Matt Bromiley
May 8, 2018
1:00pm EDT
(17:00:00 UTC)
Fingerprinting Threat Actors with Web AssetsDomainToolsRebekah Brown, Mike Thompson
May 3, 2018
3:30pm EDT
(19:30:00 UTC)
OSINT for Defenders: Adventures in Honeytokens and Leaked DataMicah Hoffman, Justin Henderson
May 3, 2018
10:30am EDT
(14:30:00 UTC)
The Myths and Best Practices Surrounding SOC Automation: Use Cases and Success StoriesDFLabsJohn Pescatore, John Moran
May 2, 2018
1:00pm EDT
(17:00:00 UTC)
Why AV Cant Protect Your DatacenterCarbon BlackDave Shackleford, Adrianna Gugel
May 2, 2018
10:30am EDT
(14:30:00 UTC)
Tailored Intelligence for Automated Remediation: SANS Review of IntSights' Enterprise Intelligence and Mitigation PlatformIntSightsSonny Sarai, Alon Arvatz
May 1, 2018
3:30pm EDT
(19:30:00 UTC)
From Ad Hoc to Automated: Proven Techniques to Operationalize Threat HuntingRedCanaryJoe Moles
May 1, 2018
1:00pm EDT
(17:00:00 UTC)
BreakingPoint: A Multi-Function Tool for Application and Security TestingIxiaSashi Jeyaretnam, Serge Borso
April 30, 2018
1:00pm EDT
(17:00:00 UTC)
Fighting Account Takeover - Change The Battle and WinPerimeterXIdo Safruti
April 27, 2018
1:00pm EDT
(17:00:00 UTC)
Incident Response: Give Me Data or Give Me Death!Rapid7 Inc.Gary Harrison, Nick Schroeder
April 26, 2018
1:00pm EDT
(17:00:00 UTC)
Can Small and Midsize Organizations Get the Same Level of Endpoint Protection as the Big Guys?- A blueprint for prioritizing efforts and finding the right solutionCrowdStrike, Inc.Jackie Castelli, John Pescatore
April 25, 2018
1:00pm EDT
(17:00:00 UTC)
You Can't Secure What You Can't See - The Importance of Visibility in the CloudSkybox Security, Inc.John Pescatore
April 25, 2018
10:30am EDT
(14:30:00 UTC)
A Secure Approach to Deploying Wireless Networks- A SANS Master's Degree PresentationJoseph Matthews
April 24, 2018
1:00pm EDT
(17:00:00 UTC)
Advanced Malware Threat Hunting and Investigation with VirusTotal IntelligenceGoogle LLCShapor Naghibzadeh, Matt Bromiley
April 19, 2018
1:00pm EDT
(17:00:00 UTC)
Fighting Cybercrime with Artificial IntelligenceFortinet, Inc.Keith Rayle, Dave Shackleford
April 18, 2018
3:30pm EDT
(19:30:00 UTC)
One Detect to Win: Tactical Application DetectionJustin Henderson, Tim Garcia
April 17, 2018
3:30pm EDT
(19:30:00 UTC)
ICS Active Defense Primer Kai Thomsen
April 13, 2018
3:30pm EDT
(19:30:00 UTC)
Python Regular Expressions for the Win!Joff Thyer
April 12, 2018
3:30pm EDT
(19:30:00 UTC)
Hitting every rock on the way down: A look back at 15 years of pentesting with John StrandJohn Strand
April 12, 2018
1:00pm EDT
(17:00:00 UTC)
A Pentesters perspective: Catching attackers living off the landBarklyJack Danahy, Dave Shackleford
April 12, 2018
10:30am EDT
(14:30:00 UTC)
The Magic of Raw Data CarvingKevin Ripa
April 11, 2018
3:30pm EDT
(19:30:00 UTC)
Practical Approach to Detecting and Preventing Web Application Attacks over HTTP/2- A SANS Master's Degree PresentationRussel Van Tuyl
April 11, 2018
10:30am EDT
(14:30:00 UTC)
No Vehicle is an IslandDoug Wylie
April 10, 2018
1:00pm EDT
(17:00:00 UTC)
Digital Trust in a Perimeter Less WorldUnisysJack Koons, Mark Alba
April 10, 2018
10:30am EDT
(14:30:00 UTC)
Whats new in FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident ResponsePhilip Hagen
April 5, 2018
10:30am EDT
(14:30:00 UTC)
Pausing the attack: deep dive on Pause-Process. A PowerShell script that allows you to pause and unpause potentially malicious attacksMick Douglas
April 4, 2018
10:30am EDT
(14:30:00 UTC)
Securing Connected Vehicles what you need to knowMatt Carpenter, Kai Thomsen, Dr. André Weimerskirch
April 3, 2018
1:00pm EDT
(17:00:00 UTC)
Apple's latest file system - is APFS a blessing or a curse to digital investigators?Derrick Donnelly
April 2, 2018
1:00pm EDT
(17:00:00 UTC)
Securing the Hybrid Cloud: A Guide to Using Security Controls, Tools and Automation QualysDave Shackleford, Chris Carlson
March 30, 2018
1:00pm EDT
(17:00:00 UTC)
Anatomy of the TRITON ICS CyberattackCyberXPhil Neray, Justin Searle
March 29, 2018
3:30pm EDT
(19:30:00 UTC)
Being Offensive in the WorkplaceDerek Rook
March 29, 2018
1:00pm EDT
(17:00:00 UTC)
Combatting Business Email Compromise with Active Defense AGARIPatrick Peterson, Lance Spitzner, Markus Jakobsson
March 28, 2018
9:00pm EDT
(01:00:00 UTC)
Java on the Server? What Could Possibly Go wrong?Adrien de Beaupre
March 28, 2018
3:30pm EDT
(19:30:00 UTC)
Exploring Registry ExplorerEric Zimmerman
March 28, 2018
1:00pm EDT
(17:00:00 UTC)
Real-time Incident Remediation1EAndy Schmid, Jake Williams
March 28, 2018
10:30am EDT
(14:30:00 UTC)
How hackers run circles around our defenses.Bryce Galbraith
March 27, 2018
3:30pm EDT
(19:30:00 UTC)
How to write malware that evades detectionBromiumAdrian Taylor, Alissa Torres
March 27, 2018
1:00pm EDT
(17:00:00 UTC)
Moving Endpoint Security to the Cloud: Replacing Traditional AntivirusCarbon BlackDave Gruber, Barbara Filkins
March 22, 2018
1:00pm EST
(17:00:00 UTC)
Stop Really Nasty Malware, Pre- and Post-Execution: A SANS Review of the enSilo Endpoint Security PlatformEnsiloDave Shackleford
March 21, 2018
3:30pm EST
(19:30:00 UTC)
One Detect to Win: Tactical Endpoint DetectionJustin Henderson, Stephen Mathezer
March 21, 2018
10:30am EST
(14:30:00 UTC)
SideSwipe: A PowerShell tool that allows you to detect lateral movement easily and quicklyMick Douglas
March 20, 2018
1:00pm EST
(17:00:00 UTC)
Data on the Dark Web: finding your corporate data before the criminals doTerbium LabsTyler Carbone
March 20, 2018
8:00am EDT
(12:00:00 UTC)
The Power of Bro - and why you should include it in your security infrastructureCorelight Seth Hall, Matt Bromiley
March 19, 2018
1:00pm EST
(17:00:00 UTC)
Opening the Floodgates: How to Analyze 30+ TB of Endpoint Data Without Drowning Your Security TeamRedCanaryBrian Beyer
March 16, 2018
11:00am EST
(15:00:00 UTC)
Securing industrial control systems: A peek into building automation securityThomas Brandstetter
March 15, 2018
3:30pm EST
(19:30:00 UTC)
Canadian Webcast Series Part 4: Protecting Data in a Multi-Cloud Environment & Pentesting Modern Web ApplicationsAdrien de Beaupre, Troy Davidson
March 15, 2018
1:00pm EST
(17:00:00 UTC)
Pinpoint and Remediate Unknown Threats: SANS Review of EnCase Endpoint Security 6OpenText Inc.Charles Choe, Jake Williams
March 15, 2018
11:00am EST
(15:00:00 UTC)
2017 SANS Holiday Hack Challenge Award Ceremony & TutorialEd Skoudis
March 14, 2018
1:00pm EST
(17:00:00 UTC)
VMRay Analyzer, agentless malware analysis and rapid incident response: A SANS Product ReviewVMRay Matt Bromiley, Chad Loeven
March 13, 2018
3:30pm EST
(19:30:00 UTC)
WEBCAST 3: TIPS AND TECHNIQUES FOR TESTIFYING SUCCESSFULLYJason Jordaan
March 12, 2018
1:00pm EST
(17:00:00 UTC)
Secure DevOps: Encryption in the Cloud with KMSMark Geeslin
March 9, 2018
3:30pm EST
(20:30:00 UTC)
Survey of Integrity Verification Solutions, Local and Remote AttestationColin DeWinter, Ben Gardiner
March 8, 2018
3:30pm EST
(20:30:00 UTC)
Canadian Webcast Series Part 3: ICS Defense: Its Not a Copy-Paste From an IT Playbook & Importance of Intrusion Detection in a Compromised Prone WorldNik Alleyne, Dean Parsons
March 8, 2018
1:00pm EST
(18:00:00 UTC)
Dramatically Reduce Incident Response Time with Splunk and BroCorelight Ken Hanson, Vincent Stoffer
March 8, 2018
10:30am EST
(15:30:00 UTC)
Baselines for Easier Detection: So easy there's no more excuses!Mick Douglas
March 7, 2018
10:30am EST
(15:30:00 UTC)
GIAC Certification for SIEMJustin Henderson
March 6, 2018
1:00pm EST
(18:00:00 UTC)
Deep packet inspection: The key technology for network security and the question of whether to build or buy itRohde & Schwarz Cybersecurity GmbH Tanya Baccam, Alexander Müller
March 6, 2018
10:30am EST
(15:30:00 UTC)
Ready Forensicator OneLee Whitfield
March 5, 2018
1:00pm EST
(18:00:00 UTC)
Could we have prepared for this? Attack Simulations for Blue Team HardeningAlissa Torres
March 2, 2018
3:30pm EST
(20:30:00 UTC)
OSINT for Pentesters: Finding Targets and Enumerating SystemsMicah Hoffman, David Mashburn
March 1, 2018
3:30pm EST
(20:30:00 UTC)
Canadian Webcast Series Part 2: Real-world Pentesting Its About Bringing Value, not Being l33t & Deeper Dive Digital ForensicsKevin Ripa, Stephen Mathezer
March 1, 2018
1:00pm EST
(18:00:00 UTC)
52 Percent of Companies Sacrifice Cybersecurity for SpeedThreat Stack

PagerDuty
Pete Cheslock, Franklin Mosley
February 28, 2018
3:30pm EST
(20:30:00 UTC)
Security Visibility in the Enterprise: SOC, SIEM, Managed Security and Visibility - A Master's Degree PresentationJames Hendrick
February 28, 2018
1:00pm EST
(18:00:00 UTC)
A Closer Look at Isolation: Hype or Next Gen Security?Menlo SecurityKowsik Guruswamy, John Pescatore
February 28, 2018
10:30am EST
(15:30:00 UTC)
Looking Under the Rock: Deployment Strategies for TLS Decryption- A Master's Degree PresentationChris Farrell
February 27, 2018
3:30pm EST
(20:30:00 UTC)
WEBCAST 2: WORKING WITH THE LAWYERSJason Jordaan
February 27, 2018
1:00pm EST
(18:00:00 UTC)
Improving Detection and Understanding the Adversary with Deception TechnologyTrapX Security
February 27, 2018
1:00pm EST
(18:00:00 UTC)
Why Insider Actions Matter: SANS Review of LogRhythm CloudAI for User and Entity Behavior AnalyticsLogRhythmMark Settle, Samir Jain, Dave Shackleford
February 27, 2018
10:30am EST
(15:30:00 UTC)
Mind the Gap: going beyond penetration testing for security improvementRapid7 Inc.Caspian Kilkelly
February 23, 2018
1:00pm EST
(18:00:00 UTC)
Its Time to Move Endpoint Security to the CloudCarbon BlackJohn Pescatore
February 22, 2018
3:30pm EST
(20:30:00 UTC)
Canadian Webcast Series Part 1: Managing Vulnerabilities in the Enterprise and an Overview of the PIACT Process & Frameworks: What Are They Good For?Kenton Smith, Jonathan Risto
February 22, 2018
1:00pm EST
(18:00:00 UTC)
Walk, Run, Fly: Key Characteristics of Attaining an Advanced SOC Best practice tips on how to enter the advanced SOC dimensionDemistoRishi Bhargava, Christopher Crowley
February 22, 2018
10:30am EST
(15:30:00 UTC)
A pen-testers perspective on malware & ransomware attack techniques and the state of endpoint security BarklyJake Williams, Jack Danahy
February 21, 2018
3:30pm EST
(20:30:00 UTC)
One Detect to Win: Tactical Network DetectionMick Douglas, Josh Johnson
February 21, 2018
1:00pm EST
(18:00:00 UTC)
5 Critical Success Factors for Identity When Moving to the CloudOracleEric Olden
February 20, 2018
10:30am EST
(15:30:00 UTC)
Exploiting esoteric SQL injection vulnerabilitiesBojan Zdrnja
February 19, 2018
1:00pm EST
(18:00:00 UTC)
When IoT Attacks - Understanding the Safety Risks Associated with Connected DevicesBilly Rios
February 16, 2018
3:30pm EST
(20:30:00 UTC)
Security is QA: My Path from Developer to Pen TesterJoshua Barone
February 16, 2018
1:00pm EST
(18:00:00 UTC)
Windows Baselining and Remote System Assessment: For the Low-low Price of Free-ninety-freeChris Pizor, John Strand
February 15, 2018
10:30am EST
(15:30:00 UTC)
An Inside Look at the Newly Updated ICS515 CourseRobert M. Lee
February 14, 2018
3:30pm EST
(20:30:00 UTC)
Which SANS Pen Test Course Should I Take? - February 2018 EditionEd Skoudis, Joshua Wright
February 14, 2018
1:00pm EST
(18:00:00 UTC)
The Impact Of Enterprise Web Application Trends Going MainstreamVeracodeSaikrishna Chavali, Serge Borso
February 14, 2018
10:30am EST
(15:30:00 UTC)
Cloud Security: Taking charge of Security in Your Cloud- A Master's Degree PresentationLuciana Obregon
February 13, 2018
3:30pm EST
(20:30:00 UTC)
WEBCAST 1: SO, YOU HAVE TO TESTIFY, NOW WHAT?Jason Jordaan
February 13, 2018
10:30am EST
(15:30:00 UTC)
Improving Your Defenses - EMET & Window Defender Exploit GuardErik Van Buggenhout, Stephen Sims
February 12, 2018
3:30pm EST
(20:30:00 UTC)
Debugging Python Code for mere mortalsMark Baggett
February 12, 2018
1:00pm EST
(18:00:00 UTC)
Secure DevOps: Microservices and API SecurityGregory Leonard
February 9, 2018
1:00pm EST
(18:00:00 UTC)
Building Zero Trust Model with Microsegmentation in the CloudUnisysSalvatore Sinno, Jonathan Payne
February 8, 2018
3:30pm EST
(20:30:00 UTC)
2 > 1: Teaming Up for Social Engineering AdventuresJen Fox
February 7, 2018
1:00pm EDT
(18:00:00 UTC)
Cyber Threat Intelligence Skills and Usefulness: SANS CTI Survey Results, Part 2Anomali

DomainTools

IntSights

Rapid7 Inc.

ThreatConnect
Dave Shackleford, John Hurd, Rebekah Brown
February 6, 2018
1:00pm EST
(18:00:00 UTC)
Cyber Threat Intelligence Today: SANS CTI Survey Results, Part 1Anomali

DomainTools

IntSights

Rapid7 Inc.

ThreatConnect
Itay Kozuch, Dave Shackleford, Travis Farral, Zach Hill
February 1, 2018
3:30pm EST
(20:30:00 UTC)
OSINT for Everyone: Understanding Risks and Protecting Your DataMicah Hoffman, Josh Huff
January 31, 2018
3:30pm EST
(20:30:00 UTC)
Cyber Insurance Conundrum: Using CIS Critical Security Controls for Underwriting Cyber Risk- A Masters Degree Candidate PresentationOleg Bogomolniy
January 31, 2018
1:00pm EST
(18:00:00 UTC)
DNS: An Asset, Not a LiabilityInfoBloxMatt Bromiley, Srikrupa Srivatsan
January 25, 2018
1:00pm EST
(18:00:00 UTC)
Are You in Control? Managing the CIS Critical Security Controls within your EnterpriseHitachi Systems SecurityMatt Bromiley, Andrew Kozloski
January 24, 2018
3:30pm EST
(20:30:00 UTC)
Multi-path TCP: Practical Approaches for Securing your Enterprise Network - A Masters Degree Candidate WebcastJosh Lewis
January 24, 2018
1:00pm EST
(18:00:00 UTC)
In a Perfect World...Building the Network Security Architecture for the FutureNETSCOUT Systems, Inc.Sonny Sarai, John Pescatore, Arabella Hallawell
January 24, 2018
10:30am EST
(15:30:00 UTC)
How to Build & Maintain an Open Source SIEMJohn Hubbard, Justin Henderson
January 23, 2018
3:30pm EST
(20:30:00 UTC)
Why and How to Take the GCTI - The Industry's Cyber Threat Intelligence CertificationRobert M. Lee
January 18, 2018
10:30am EST
(15:30:00 UTC)
What Event Logs? Part 2: Lateral Movement without Event LogsMatt Bromiley
January 17, 2018
10:00pm EST
(03:00:00 UTC)
Use Case Development for Security OperationsChristopher Crowley
January 17, 2018
10:30am EST
(15:30:00 UTC)
3 Steps Towards IT/OT ConvergenceEric Cosman, Doug Wylie, Gregory Hale
January 16, 2018
3:30pm EST
(20:30:00 UTC)
Head HackingTim Medin
January 16, 2018
1:00pm EST
(18:00:00 UTC)
Certifying Cyber Personnel Who Protect the Electric GridTim Conway
January 15, 2018
1:00pm EST
(18:00:00 UTC)
Secure DevOps: Faster Feedback with Effective Security Unit Tests in CI / CDEric Johnson
January 11, 2018
1:00pm EST
(18:00:00 UTC)
Third Party Risk Assessment: Using BitSight for Consistent and Continuous Risk RatingBitsightMichael Roling, John Pescatore
January 11, 2018
10:30am EST
(15:30:00 UTC)
What Event Logs? Part 1: Attacker Tricks to Remove Event LogsMatt Bromiley
January 9, 2018
1:00pm EST
(18:00:00 UTC)
Introducing the *NEW* SANS Pen Test Poster - Building A Better Pen Tester - BlueprintEd Skoudis, Jason Blanchard
January 9, 2018
10:30am EST
(15:30:00 UTC)
Improving Your Defenses - CredentialGuard in Windows 10Erik Van Buggenhout, Stephen Sims
January 8, 2018
10:00pm EST
(03:00:00 UTC)
Meltdown and Spectre - understanding and mitigating the threatsJake Williams
January 4, 2018
12:00pm EST
(17:00:00 UTC)
Meltdown and Spectre - understanding and mitigating the threatsJake Williams

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.