Last Day to Get a MacBook Air, Surface Pro 7, or $350 Off with OnDemand - Register Now!

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
Wednesday, December 19, 2018
at 9:00 PM EST
(2018-12-20 02:00 UTC)
Modern Information Security; Forget Cyber, It's All About AppSecAdrien de Beaupre
Wednesday, December 19, 2018
at 10:30 AM EST
(2018-12-19 15:30 UTC)
Introducing the NEW SANS Pen Test Poster - Pivots & Payloads Board GameJason Blanchard, Ed Skoudis, Mick Douglas
Tuesday, December 18, 2018
at 1:00 PM EST
(2018-12-18 18:00 UTC)
Palo Alto Networks and CyberX Integration: Accelerating the Time Between ICS/SCADA Threat Detection and PreventionCyberX
Dharminder Debisarun, Daniel Shugrue
Monday, December 17, 2018
at 1:00 PM EST
(2018-12-17 18:00 UTC)
Using OSINT for Cryptocurrency AttributionKirby Plessas
Thursday, December 13, 2018
at 1:00 PM EDT
(2018-12-13 18:00 UTC)
Demonstration of an ICS attack chain using non-technical exploitation techniques Honeywell International
Connor Leach, Jackson Evans-Davies
Thursday, December 13, 2018
at 10:30 AM EST
(2018-12-13 15:30 UTC)
Tips and Tricks for Customers and Pen Testers on How to Get Higher Value Pen TestsChris Dale
Wednesday, December 12, 2018
at 1:00 PM EST
(2018-12-12 18:00 UTC)
Efficient Alert Processing and Response: A SANS Review of SwimlaneSwimlane
Alissa Torres, Jay Spann
Wednesday, December 12, 2018
at 10:30 AM EST
(2018-12-12 15:30 UTC)
WhatWorks in Application Security: How to Detect and Remediate Application Vulnerabilities and Block Attacks with Contrast SecurityContrast Security
John Pescatore, Joshua Bentley
Tuesday, December 11, 2018
at 2:30 PM EST
(2018-12-11 19:30 UTC)
5 Endpoint Protection Best PracticesPalo Alto Networks
John Pescatore, Danny Milrad
Tuesday, December 11, 2018
at 1:00 PM EST
(2018-12-11 18:00 UTC)
NetMRI: Using Network Automation for Visibility and SecurityInfoBlox
Dave Signori
Tuesday, December 11, 2018
at 10:30 AM EST
(2018-12-11 15:30 UTC)
A Practical Introduction into How to Exploit Blind VulnerabilitiesChris Dale
Friday, December 07, 2018
at 11:00 AM EST
(2018-12-07 16:00 UTC)
Gearing up for 2019 - Best Practices to ConsiderInfoBlox
Carbon Black
Cybelangel
Cisco Systems Inc.
John Pescatore, John Strand, Jake Williams
Thursday, December 06, 2018
at 3:30 PM EST
(2018-12-06 20:30 UTC)
SSL Decryption - Why, Where and HowPalo Alto Networks
Dave Shackleford, Ronald Dodge, Arun Kumar
Thursday, December 06, 2018
at 1:00 PM EST
(2018-12-06 18:00 UTC)
An Evaluator's Guide to Next-Generation SIEMLogRhythm
Barbara Filkins, Christopher Crowley, Sara Kingsley
Wednesday, December 05, 2018
at 3:30 PM EST
(2018-12-05 20:30 UTC)
(JA)3 Reasons to Rethink Your Encrypted Traffic Analysis StrategiesAwake Security
Troy Kent, Dave Shackleford
Wednesday, December 05, 2018
at 1:00 PM EST
(2018-12-05 18:00 UTC)
MythBusters: ICS EditionDomainTools
Alissa Torres, Mike Thompson
Wednesday, December 05, 2018
at 10:30 AM EST
(2018-12-05 15:30 UTC)
EPP or EDR? Why not both? Choose Next Generation Endpoint SecurityCisco Systems
Neil Patel, Jake Williams
Tuesday, December 04, 2018
at 3:30 PM EST
(2018-12-04 20:30 UTC)
Machine Learning & Risk Engines for Security Data Analysis - How to Identify What's Real vs. What's BogusThreatX
Dave Shackleford, Jeremiah Cruit
Tuesday, December 04, 2018
at 1:00 PM EST
(2018-12-04 18:00 UTC)
Threat Black Hole: Visibility and IoT Security Pulse Secure
Dave Shackleford, James Tolosa, Ashur Kanoon
Tuesday, December 04, 2018
at 10:30 AM EST
(2018-12-04 15:30 UTC)
Infection to Remediation: Exploring the InfoStealer Kill ChainVMRay
Jake Williams, Rohan Viegas
Friday, November 30, 2018
at 8:30 AM EST
(2018-11-30 13:30 UTC)
SANS Cyber Threat Intelligence Briefing 2018: Efficiency and Effectiveness Through Cyber Threat IntelligenceDomainTools
RecordedFuture
Chronicle
ExtraHop
Please Check Back
Thursday, November 29, 2018
at 1:00 PM EST
(2018-11-29 18:00 UTC)
Threat Intelligence and Protecting Your Endpoints: A SANS Review of the CrowdStrike Falcon X PlatformCrowdStrike, Inc.
Kurt Baker, Dave Shackleford
Thursday, November 29, 2018
at 10:00 AM EST
(2018-11-29 15:00 UTC)
Finding the Human Side of MalwareIntezer
Or Fridman, Matt Bromiley
Wednesday, November 28, 2018
at 9:00 PM EST
(2018-11-29 02:00 UTC)
Demystifying Security Challenges in Control System Environments and How to Fix ThemLarry Vandenaweele
Tuesday, November 27, 2018
at 10:30 AM EST
(2018-11-27 15:30 UTC)
Passwords and Authentication - Get Up to Speed on Attacks and DefensesChris Dale
Monday, November 26, 2018
at 1:00 PM EST
(2018-11-26 18:00 UTC)
The ABCs of OT Cyber Program Planning, where to start… Honeywell International
Rusty Gavin
Wednesday, November 21, 2018
at 3:30 PM EST
(2018-11-21 20:30 UTC)
Zero Trust ArchitectureJustin Henderson
Friday, November 16, 2018
at 8:30 AM EST
(2018-11-16 13:30 UTC)
SANS Security Operations Center Briefing: Knowledge Retention, Staff Training, Automation & Operationalization 2018DFLabs
DomainTools
Protectwise
Symantec
Chris Crowley, Karen Buffo, Tim Helming
Wednesday, November 14, 2018
at 3:30 PM EST
(2018-11-14 20:30 UTC)
Using a Collection Management Framework for ICS Security Operations and Incident ResponseDragos, Inc.
Tim Conway, Ben Miller, Mark Stacey
Wednesday, November 14, 2018
at 12:15 PM EST
(2018-11-14 17:15 UTC)
Introducing VirusTotal EnterpriseChronicle
Evan Derheim
Tuesday, November 13, 2018
at 3:30 PM EST
(2018-11-13 20:30 UTC)
Building your Android application testing toolboxDomenica Crognale
Tuesday, November 13, 2018
at 1:00 PM EST
(2018-11-13 18:00 UTC)
Continuous Endpoint Monitoring for the Global EnterpriseOpenText Inc.
Rob Batzloff, Jacob Williams
Tuesday, November 13, 2018
at 10:00 AM EDT
(2018-11-13 15:00 UTC)
Detection and response services in the ICS environment – The management perspectiveSøren Egede Knudsen
Friday, November 09, 2018
at 1:00 PM EST
(2018-11-09 18:00 UTC)
Secure DevOps: Fact or Fiction? SANS Survey Looks at Reality, Part IIAqua Security Inc.
Veracode
Qualys
Rapid7 Inc.
Signal Sciences
WhiteHat Security
Jim Bird, Barbara Filkins, Chris Eng, Sandeep Potdar, Hari Srinivasan
Thursday, November 08, 2018
at 3:30 PM EST
(2018-11-08 20:30 UTC)
Automation NationJustin Henderson, John Hubbard
Thursday, November 08, 2018
at 1:00 PM EST
(2018-11-08 18:00 UTC)
Secure DevOps: Fact or Fiction? SANS Survey Looks at Reality, Part IAqua Security Inc.
Veracode
Qualys
Rapid7 Inc.
Signal Sciences
WhiteHat Security
Jim Bird, Barbara Filkins, Dan Kuykendall, Zane Lackey, Rani Osnat
Thursday, November 08, 2018
at 10:30 AM EST
(2018-11-08 15:30 UTC)
The Perimeter is gone. How can you protect your company and your corporate data?OPSWAT
Yiyi Miao, Serge Borso
Wednesday, November 07, 2018
at 3:30 PM EST
(2018-11-07 20:30 UTC)
More Bad DataJustin Henderson, John Hubbard
Wednesday, November 07, 2018
at 1:00 PM EST
(2018-11-07 18:00 UTC)
Operationalizing Zero Trust Model with Adaptive SecurityUnisys
Usamah Hassan, Salvatore Sinno, Franco Negri
Wednesday, November 07, 2018
at 10:30 AM EST
(2018-11-07 15:30 UTC)
How to use Machine Learning to protect Cloud InfrastructureOracle
Subbu Iyer, Chaitanya Yinti
Tuesday, November 06, 2018
at 3:30 PM EST
(2018-11-06 20:30 UTC)
Prioritizing Log EnrichmentJustin Henderson, John Hubbard
Tuesday, November 06, 2018
at 10:30 AM EST
(2018-11-06 15:30 UTC)
8 Keys to a Defensible Network Architecture And How Zeek Can Help You Get ThereCorelight
Richard Bejtlich, Matt Bromiley
Monday, November 05, 2018
at 3:30 PM EST
(2018-11-05 20:30 UTC)
Cyber Threat Checklist: Are you prepared? Absolute Software Corp.
Alissa Torres, Kevin Golas
Monday, November 05, 2018
at 1:00 PM EST
(2018-11-05 18:00 UTC)
Network Architecture with Security in MindGigamon
Matt Bromiley, Sam Kumarsamy
Thursday, November 01, 2018
at 1:00 PM EDT
(2018-11-01 17:00 UTC)
Improving the Incident Response Function: SANS 2018 Incident Response Survey Results Part IICoalfire Systems
Fidelis Cybersecurity
Forescout Technologies BV
1E
OpenText Inc.
ThreatQuotient
Matt Bromiley, Andy Schmid, Mike Stewart, Ryan Trost
Wednesday, October 31, 2018
at 3:30 PM EDT
(2018-10-31 19:30 UTC)
How to Build Your Modern Email Fraud DefenseProofPoint
Ryan Terry, David Hoelzer
Wednesday, October 31, 2018
at 1:00 PM EDT
(2018-10-31 17:00 UTC)
How Are You Responding to Threats? SANS 2018 Incident Response Survey Results Part ICoalfire Systems
Fidelis Cybersecurity
Forescout Technologies BV
1E
OpenText Inc.
ThreatQuotient
Matt Bromiley, Anthony Di Bello, Jim Jaeger, Brennen Reynolds
Tuesday, October 30, 2018
at 3:30 PM EDT
(2018-10-30 19:30 UTC)
Windows Defender Exploit Guard for Windows 10Stephen Sims
Tuesday, October 30, 2018
at 1:00 PM EDT
(2018-10-30 17:00 UTC)
How to Conduct and Utilize Human Intelligence by Engaging Your Cyber AdversariesIntSights
Itay Kozuch
Monday, October 29, 2018
at 10:00 PM EDT
(2018-10-30 02:00 UTC)
How Hackers Run Circles Around Our DefensesBryce Galbraith
Friday, October 26, 2018
at 1:00 PM EDT
(2018-10-26 17:00 UTC)
How to do Vulnerability Management for ContainersSysdig
Apurva Dave, Dave Shackleford
Thursday, October 25, 2018
at 3:30 PM EDT
(2018-10-25 19:30 UTC)
Building Your Zero Trust Security Strategy With Microsegmentation: Why Digital Businesses Need A Granular Software Defined Network Segmentation ApproachUnisys
Chase Cunningham, Jack Koons
Thursday, October 25, 2018
at 1:00 PM EST
(2018-10-25 17:00 UTC)
Reinventing Prevention with Deep LearningDeep Instinct
Jake Williams, Mark Arapovic
Thursday, October 25, 2018
at 10:30 AM EDT
(2018-10-25 14:30 UTC)
Web Hacking with Burp Suite - Deep Dive into Burp Suite's Functionality for Pen TestersChris Dale
Wednesday, October 24, 2018
at 10:30 AM EST
(2018-10-24 14:30 UTC)
SIEMterventionJustin Henderson
Monday, October 22, 2018
at 1:00 PM EDT
(2018-10-22 17:00 UTC)
Consulting on ”The Side” - How to consult while keeping your day jobTed Demopoulos
Thursday, October 18, 2018
at 3:30 PM EDT
(2018-10-18 19:30 UTC)
The Algorithm of You: Defeating Attackers by Being YourselfBehavioSec
Neil Costigan, Matt Bromiley
Wednesday, October 17, 2018
at 3:30 PM EDT
(2018-10-17 19:30 UTC)
Web Application Scanning AutomationTimothy McKenzie
Wednesday, October 17, 2018
at 1:00 PM EDT
(2018-10-17 17:00 UTC)
The Cybersecurity Talent Gap: An Unforeseen Impediment to Fast and Effective Incident RemediationCrowdStrike, Inc.
Austin Murphy, Brandon Wunderle
Wednesday, October 17, 2018
at 10:30 AM EST
(2018-10-17 14:30 UTC)
Cyber kill-chain disruption with hypervisor memory introspectionBitdefender SRL
Kurt Roemer, Ramaswamy Chandramouli, Andrei Florescu
Tuesday, October 16, 2018
at 3:30 PM EDT
(2018-10-16 19:30 UTC)
Consuming OSINT: Watching You Eat, Drink, and SleepMicah Hoffman, John TerBush
Tuesday, October 16, 2018
at 1:00 PM EDT
(2018-10-16 17:00 UTC)
What You Need To Know to Evaluate Next-Gen Endpoint SecurityCarbon Black
Christopher Fielder, Barbara Filkins
Tuesday, October 16, 2018
at 10:30 AM EDT
(2018-10-16 14:30 UTC)
Python Decorators DemystifiedCyberGRX
Mark Baggett
Monday, October 15, 2018
at 1:00 PM EDT
(2018-10-15 17:00 UTC)
Kolide & OSQuery - How to build solid queries & packs for incident detection & threat huntingErik Van Buggenhout, Stephen Sims
Friday, October 12, 2018
at 8:30 AM EDT
(2018-10-12 12:30 UTC)
SANS Financial Services Briefing: Cyber Threat Intelligence in Security Operations: Am I Breached?Symantec
Please Check Back
Thursday, October 11, 2018
at 1:00 PM EDT
(2018-10-11 17:00 UTC)
Tales from the Trenches: An Asset Owner’s Take on Tackling ICS Cybersecurity Challenges SecurityMatters
Brian Proctor, Alex Waitkus
Wednesday, October 10, 2018
at 10:30 AM EDT
(2018-10-10 14:30 UTC)
Data-Centric SecurityJustin Henderson
Thursday, October 04, 2018
at 1:00 PM EDT
(2018-10-04 17:00 UTC)
Investigate East-West Attack Activities to Defend Critical Assets: A SANS Review of ExtraHop Reveal(x)ExtraHop
Dave Shackleford, Barbara Kay
Thursday, October 04, 2018
at 10:30 AM EDT
(2018-10-04 14:30 UTC)
Getting Ready to Consult - Landing your first clientTed Demopoulos
Wednesday, October 03, 2018
at 3:30 PM EDT
(2018-10-03 19:30 UTC)
Shortcuts for Understanding Malicious ScriptsEvan Dygert
Wednesday, October 03, 2018
at 1:00 PM EDT
(2018-10-03 17:00 UTC)
Everything I Learned and Wanted to Forget about WAFs ThreatX
Serge Borso, Jeremiah Cruit
Tuesday, October 02, 2018
at 3:30 PM EDT
(2018-10-02 19:30 UTC)
CCE — INL’s New Approach to Securing Critical Industrial InfrastructureCyberX
Andy Bochman, Phil Neray
Tuesday, October 02, 2018
at 1:00 PM EDT
(2018-10-02 17:00 UTC)
Why the World Must Take Notice of the Rising Asian Dark WebIntSights
Itay Kozuch, Brandon McCrillis
Tuesday, October 02, 2018
at 10:30 AM EDT
(2018-10-02 14:30 UTC)
What Works in Endpoint Security: Surviving Advanced Targeted Attacks by Augmenting (or Replacing) Legacy AV with enSiloEnsilo
John Pescatore
Thursday, September 27, 2018
at 3:30 PM EDT
(2018-09-27 19:30 UTC)
Safety Systems Shutdown by Malware - Hype and RealityClaroty Inc.
Pat Barry, Dave Weinstein
Thursday, September 27, 2018
at 1:00 PM EDT
(2018-09-27 17:00 UTC)
Practical Industrial Control System (ICS) Cybersecurity: IT and OT Have Converged--Discover and Defend Your AssetsTenable
Ted Gary, Dean Parsons, Doug Wylie
Thursday, September 27, 2018
at 10:30 AM EDT
(2018-09-27 14:30 UTC)
Automating Open Source Security: A SANS Review of WhiteSourceWhiteSource
Rami Elron, Serge Borso
Wednesday, September 26, 2018
at 1:00 PM EDT
(2018-09-26 17:00 UTC)
10 Must-Have Features of a Modern SIEMExabeam
Orion Cassetto
Wednesday, September 26, 2018
at 10:30 AM EDT
(2018-09-26 14:30 UTC)
What Works in Certificate and Key Management: Enabling Secure Digital Business Using Venafi’s Trust Protection PlatformVenafi, Inc
John Pescatore
Tuesday, September 25, 2018
at 1:00 PM EDT
(2018-09-25 17:00 UTC)
Network Microsegmentation - Building Zero Trust Security from Data to DevicesUnisys
Erin Kelly, Jill Walsh
Friday, September 21, 2018
at 1:00 PM EDT
(2018-09-21 17:00 UTC)
Powering IR/SOC with Code Reuse Detection - The Emotet Case StudyIntezer
Matt Bromiley, Itai Tevet
Thursday, September 20, 2018
at 3:30 PM EST
(2018-09-20 19:30 UTC)
Meeting the Critical Security Controls Using OSSECAtomicorp
Scott Shinn, Michael Shinn, John Pescatore
Thursday, September 20, 2018
at 1:00 PM EDT
(2018-09-20 17:00 UTC)
Threat Hunting in Action: SANS 2018 Survey Results, Part IIAnomali
DomainTools
IBM
Malwarebytes
Qualys
RiskIQ
Rob Lee, Robert M. Lee, Sid Pearl, Benjamin Powell, Justin Swisher
Thursday, September 20, 2018
at 10:30 AM EDT
(2018-09-20 14:30 UTC)
Detecting Industrial Network Anomalies Without the Risk of DisruptionClaroty Inc.
Stefan Waronka, Patrick McBride
Wednesday, September 19, 2018
at 3:30 PM EDT
(2018-09-19 19:30 UTC)
Cloud Services - Look before you LeapDavid R. Miller
Wednesday, September 19, 2018
at 1:00 PM EDT
(2018-09-19 17:00 UTC)
Threat Hunting Is a Process, Not a Thing: SANS 2018 Survey Results, Part IAnomali
DomainTools
IBM
Malwarebytes
Qualys
RiskIQ
Chris Carlson, Helen Johnson, Rob Lee, Robert M. Lee, Dana Torgersen
Wednesday, September 19, 2018
at 10:30 AM EDT
(2018-09-19 14:30 UTC)
SSL Traffic Inspection: Needed Visibility But At What Cost?A10 Networks
Parth Jagirdar, Barbara Filkins
Tuesday, September 18, 2018
at 1:00 PM EDT
(2018-09-18 17:00 UTC)
Dissecting a Ransomware AttackVMRay
Jacob Williams, Rohan Viegas
Tuesday, September 18, 2018
at 10:30 AM EDT
(2018-09-18 14:30 UTC)
Perimeter Security and Why it is ObsoleteJustin Henderson
Monday, September 17, 2018
at 10:00 PM EDT
(2018-09-18 02:00 UTC)
Trust No One: Introducing SEC530: Defensible Security ArchitectureEric Conrad
Monday, September 17, 2018
at 1:00 PM EST
(2018-09-17 17:00 UTC)
Hacker Techniques: Covert Command and ControlDerek Rook
Thursday, September 13, 2018
at 3:30 PM EDT
(2018-09-13 19:30 UTC)
Password Cracking: Beyond the BasicsJon Gorenflo
Thursday, September 13, 2018
at 1:00 PM EST
(2018-09-13 17:00 UTC)
Over Exposed and being Phished? Stop Sophisticated AttacksSymantec
Mark Urban, John Pescatore
Thursday, September 13, 2018
at 10:30 AM EST
(2018-09-13 14:30 UTC)
How to achieve autonomous (and optimized) hunting and detectionSecBI
Alex Vaystikh, Matt Bromiley
Wednesday, September 12, 2018
at 1:00 PM EDT
(2018-09-12 17:00 UTC)
The Need for Speed: Integrated Threat ResponseLookingglass Cyber Solutions, Inc.
Matt Bromiley, Allan Thomson
Wednesday, September 12, 2018
at 10:30 AM EDT
(2018-09-12 14:30 UTC)
How to be prepared for the next cyber-attack?Cymulate
Avihai Ben-Yossef, Jonathan Gad
Tuesday, September 11, 2018
at 1:00 PM EDT
(2018-09-11 17:00 UTC)
Breach Avoidance: Yes, You Can!Balbix
John Pescatore, Gaurav Banga
Tuesday, September 11, 2018
at 10:30 AM EDT
(2018-09-11 14:30 UTC)
YARA - Effectively using and generating rulesErik Van Buggenhout
Monday, September 10, 2018
at 1:00 PM EDT
(2018-09-10 17:00 UTC)
What the CISO REALLY wants out of your SOCRussell Eubanks
Thursday, September 06, 2018
at 3:30 PM EDT
(2018-09-06 19:30 UTC)
ICS Network HygienePaul Piotrowski, Kevin Van Der Veen, Manjit Duhra
Thursday, September 06, 2018
at 10:30 AM EDT
(2018-09-06 14:30 UTC)
Pen Testing with PowerShell: Automating the Boring so You Can Focus on the FUN!Mick Douglas
Wednesday, September 05, 2018
at 3:30 PM EDT
(2018-09-05 19:30 UTC)
It's All About Your Assets: Inline Vulnerability and Event ManagementDavid Hazar
Wednesday, September 05, 2018
at 10:30 AM EDT
(2018-09-05 14:30 UTC)
The Convergence of Cybersecurity and Process Safety Doug Wylie, Marty Edwards, Larry O'Brien
Tuesday, September 04, 2018
at 10:30 AM EDT
(2018-09-04 14:30 UTC)
Pen Testing with PowerShell: Local Privilege Escalation TechniqueMick Douglas
Thursday, August 30, 2018
at 1:00 PM EST
(2018-08-30 17:00 UTC)
Stronger Security with Global IT Asset InventoryQualys
Matt Bromiley, Pablo Quiroga
Wednesday, August 29, 2018
at 1:00 PM EDT
(2018-08-29 17:00 UTC)
Break Silos and respond to threats faster; Eliminating network and security silos to speed attack responseInfoBlox
John Pescatore, Chintan Udeshi
Thursday, August 23, 2018
at 3:30 PM EST
(2018-08-23 19:30 UTC)
Weaponizing Browser-Based Memory Leak Bugs - Stephen SimsStephen Sims
Thursday, August 23, 2018
at 1:00 PM EDT
(2018-08-23 17:00 UTC)
How Network Traffic Analytics Eliminates Darkspace for the SOCExtraHop
Barbara Kay, Chris Crowley
Thursday, August 23, 2018
at 10:30 AM EDT
(2018-08-23 14:30 UTC)
Pen Testing with PowerShell: Data Exfiltration TechniquesMick Douglas
Wednesday, August 22, 2018
at 3:30 PM EDT
(2018-08-22 19:30 UTC)
You’re Probably Not Red Teaming (And Usually I’m Not, Either)Deviant Ollam
Tuesday, August 21, 2018
at 1:00 PM EDT
(2018-08-21 17:00 UTC)
The Keys to Managing Insider Threats & Stopping Data ExfiltrationObserveIT
Tim Armstrong, John Pescatore
Monday, August 20, 2018
at 1:00 PM EDT
(2018-08-20 17:00 UTC)
7 Steps to Protecting Data in the Era of Digital CareAbsolute Software Corp.
Dave Shackleford, Josh Mayfield
Thursday, August 16, 2018
at 1:00 PM EDT
(2018-08-16 17:00 UTC)
SOC Capabilities and Usefulness: Part II of the SANS SOC Survey Results WebcastAuthentic8
Awake Security
CYBERBIT Commercial Solutions
DFLabs
ExtraHop
LogRhythm
Christopher Crowley, Gary Golomb, Lital Grossman, John Moran, John Pescatore
Wednesday, August 15, 2018
at 3:30 PM EDT
(2018-08-15 19:30 UTC)
What’s covered in the SANS Advanced Web App Pen Testing Course – SEC642? Thanks for Asking!Moses Hernandez
Wednesday, August 15, 2018
at 1:00 PM EDT
(2018-08-15 17:00 UTC)
Measuring and Evaluating Cyber Risk in Hazardous LocationsDoug Wylie, Ken Modeste
Tuesday, August 14, 2018
at 1:00 PM EDT
(2018-08-14 17:00 UTC)
No Single Definition of a SOC: Part I of the SANS 2018 SOC Survey Results WebcastAuthentic8
Awake Security
CYBERBIT Commercial Solutions
DFLabs
ExtraHop
LogRhythm
Chris Brazdziunas, Christopher Crowley, Barbara G. Kay, John Klassen, John Pescatore
Tuesday, August 14, 2018
at 10:30 AM EDT
(2018-08-14 14:30 UTC)
World-Class Cyber Security OperationsCarson Zimmerman
Tuesday, August 14, 2018
at 7:00 AM EDT
(2018-08-14 11:00 UTC)
Continuous Security: Monitoring & Active Defense in the CloudEric Johnson
Wednesday, August 08, 2018
at 10:30 AM EDT
(2018-08-08 14:30 UTC)
PHA Review: Combining Process Safety & CybersecurityDoug Wylie, Jim McGlone
Thursday, August 02, 2018
at 1:00 PM EDT
(2018-08-02 17:00 UTC)
Software-Defined Microsegmentation for Regulatory ComplianceUnisys
Bill Parkinson, Jack Koons
Tuesday, July 31, 2018
at 1:00 PM EDT
(2018-07-31 17:00 UTC)
How Visibility of the Attack Surface Minimizes RiskSkybox Security, Inc.
Sean Keef, Dave Shackleford
Monday, July 30, 2018
at 10:30 AM EST
(2018-07-30 14:30 UTC)
Security Essentials Core ConceptsTed Demopoulos
Friday, July 27, 2018
at 1:00 PM EDT
(2018-07-27 17:00 UTC)
Windows Defender ATP’s Advanced Hunting: Using Flexible Queries to Hunt Across Your EndpointsMicrosoft
Matt Bromiley, Jonathan Bar Or
Thursday, July 26, 2018
at 4:00 PM EDT
(2018-07-26 20:00 UTC)
Understanding the True Cost of Endpoint ManagementIBM
Teresa Worth, Matt Bromiley
Thursday, July 26, 2018
at 1:00 PM EDT
(2018-07-26 17:00 UTC)
Managing Cloud SecurityTenable
Dave Shackleford, Greg Mayfield
Thursday, July 26, 2018
at 10:30 AM EDT
(2018-07-26 14:30 UTC)
The Perimeter is Dead: Introducing SEC530: Defensible Security ArchitectureJustin Henderson, Eric Conrad
Wednesday, July 25, 2018
at 3:30 PM EDT
(2018-07-25 19:30 UTC)
All Your Network Traffic Are Belong to Us - VPNFilter Malware and Implications for ICSCyberX
Tim Conway, Doug Wylie, Phil Neray
Wednesday, July 25, 2018
at 10:30 AM EDT
(2018-07-25 14:30 UTC)
I Before R Except After IOCAndrew Hay
Tuesday, July 24, 2018
at 3:30 PM EDT
(2018-07-24 19:30 UTC)
4 Techniques to Modernize Your DDoS DefensesA10 Networks
Don Shin, John Pescatore
Tuesday, July 24, 2018
at 1:00 PM EDT
(2018-07-24 17:00 UTC)
Single-Agent Cyber Security Analytics: A SANS Review of the Cybereason PlatformCybereason
Dave Shackleford, Israel Barak
Tuesday, July 24, 2018
at 10:30 AM EDT
(2018-07-24 14:30 UTC)
High Fidelity Alerts: Alert vs Anomaly – A sibling rivalryJustin Henderson, Tim Garcia
Thursday, July 19, 2018
at 3:30 PM EDT
(2018-07-19 19:30 UTC)
Building Successful Awareness Programs - Key Findings and Lessons Learned from 2018 Security Awareness ReportDan DeBeaubien, Lance Spitzner
Thursday, July 19, 2018
at 1:00 PM EDT
(2018-07-19 17:00 UTC)
The State of Industrial IoTIndegy
Accenture
Forescout Technologies BV
Barbara Filkins, Doug Wylie, Barak Perelman, Bradford Hegrat, Wayne Dixon
Wednesday, July 18, 2018
at 3:30 PM EDT
(2018-07-18 19:30 UTC)
Intro to Smart Contract Security Jonathan Haas
Wednesday, July 18, 2018
at 10:30 AM EDT
(2018-07-18 14:30 UTC)
Managing vulnerabilities with the PIACT processJonathan Risto
Tuesday, July 17, 2018
at 11:00 PM EDT
(2018-07-18 03:00 UTC)
Collecting OSINT: Grabbing Your Data Now to Use LaterMicah Hoffman, Josh Huff
Tuesday, July 17, 2018
at 3:30 PM EDT
(2018-07-17 19:30 UTC)
PowerShell for PenTestingMick Douglas
Tuesday, July 17, 2018
at 9:00 AM EST
(2018-07-17 13:00 UTC)
Business Email Compromise & Office 365: Making Sense of All the NoiseMatt Bromiley
Thursday, July 12, 2018
at 10:30 AM EDT
(2018-07-12 14:30 UTC)
Fundamentals of Security Operations Chris Crowley
Wednesday, July 11, 2018
at 3:30 PM EDT
(2018-07-11 19:30 UTC)
Cloud Security Visibility: Establishing security control of the cloud estateAlgoSec Systems, Ltd.
Avishai Wool, Dave Shackleford
Tuesday, July 10, 2018
at 3:30 PM EDT
(2018-07-10 19:30 UTC)
No tool fits all – Why Building a solid Toolbox MattersHeather Mahalik
Tuesday, July 10, 2018
at 1:00 PM EST
(2018-07-10 17:00 UTC)
Best practices for Forensics and Incident Response in ContainersSysdig
Knox Anderson, Jake Williams
Tuesday, July 10, 2018
at 10:30 AM EDT
(2018-07-10 14:30 UTC)
Putting Out the Fire: Improving SecOps Retention From Day OneRedCanary
Frank McClain
Monday, July 02, 2018
at 11:00 PM EDT
(2018-07-03 03:00 UTC)
Enterprise Discovery: I Still Haven’t Found What I’m Looking ForTim Medin
Thursday, June 28, 2018
at 3:30 PM EDT
(2018-06-28 19:30 UTC)
Diffuse Cryptojacking & Ransomware Attacks with a SandboxFortinet, Inc.
Damien Lim, Dave Shackleford
Wednesday, June 27, 2018
at 1:00 PM EDT
(2018-06-27 17:00 UTC)
EnCase Forensic 8: A SANS Analyst Program Review OpenText Inc.
Jake Williams, Harp Thukral
Wednesday, June 27, 2018
at 10:30 AM EDT
(2018-06-27 14:30 UTC)
High Fidelity Alerts: Context for your contextJustin Henderson
Tuesday, June 26, 2018
at 3:30 PM EDT
(2018-06-26 19:30 UTC)
Threat Intelligence Naming Conventions: Threat Actors, Activity Groups, and Other Ways of Tracking ThreatsRobert M. Lee
Tuesday, June 26, 2018
at 1:00 PM EST
(2018-06-26 17:00 UTC)
2018's Biggest Bugs and How to Beat ThemBugcrowd
John Pescatore, Jason Haddix, Michael Blache
Tuesday, June 26, 2018
at 6:00 AM EDT
(2018-06-26 10:00 UTC)
PCAP Command-Line MadnessHal Pomeranz
Thursday, June 21, 2018
at 1:00 PM EDT
(2018-06-21 17:00 UTC)
10 Tips for Effective Modern Day Endpoint Protection Symantec
Jacob Williams, Adam Licata
Thursday, June 21, 2018
at 10:30 AM EST
(2018-06-21 14:30 UTC)
Three free Python apps to improve your defenses and response capabilitiesMark Baggett
Wednesday, June 20, 2018
at 3:30 PM EDT
(2018-06-20 19:30 UTC)
Sharpen Your Threat Hunting Capabilities with YARAChronicle
Matt Bromiley, Evan Derheim, Victor Manuel Alvarez
Wednesday, June 20, 2018
at 1:00 PM EDT
(2018-06-20 17:00 UTC)
LabMD: The Phony Data BreachMichael J. Daugherty, Benjamin Wright
Wednesday, June 20, 2018
at 11:00 AM EDT
(2018-06-20 15:00 UTC)
What is Purple Team? Updates to SEC599Chris Gates, Erik Van Buggenhout, Stephen Sims
Tuesday, June 19, 2018
at 3:30 PM EDT
(2018-06-19 19:30 UTC)
So, You Wanna Be a Pen Tester? 3 Paths to ConsiderEd Skoudis
Tuesday, June 19, 2018
at 1:00 PM EDT
(2018-06-19 17:00 UTC)
Small Businesses, Big Threats: Protecting your Small and Medium Business Against Malware, Ransomware, Exploits and MoreBarkly
Jack Danahy, John Pescatore
Tuesday, June 19, 2018
at 10:30 AM EDT
(2018-06-19 14:30 UTC)
Software Defined Radio for Penetration Testing and AnalysisLarry Pesce
Monday, June 18, 2018
at 10:30 AM EDT
(2018-06-18 14:30 UTC)
Understanding the 2018 Updates to the CIS Critical Security ControlsJames Tarala
Friday, June 15, 2018
at 1:00 PM EDT
(2018-06-15 17:00 UTC)
Stopping IoT-based Attacks on Enterprise NetworksHP
Michael Howard, Shivaun Albright, G.W. Ray Davidson, PhD
Thursday, June 14, 2018
at 3:30 PM EDT
(2018-06-14 19:30 UTC)
What Works in Visibility, Access Control and IOT Security – Pulse Secure NAC Outcomes at Energy ProviderPulse Secure
Dave Cullen, John Pescatore
Thursday, June 14, 2018
at 1:00 PM EDT
(2018-06-14 17:00 UTC)
Endpoint Detection and Response: Part 2 of the SANS 2018 Endpoint Security Survey ResultsCarbon Black
CrowdStrike, Inc.
Endgame
Forescout Technologies BV
Malwarebytes
Mcafee LLC
OpenText Inc.
Lee Neely, Alissa Torres, Mike Nichols, Ratnesh Saxena, Rick McElroy, Sandeep Kumar
Wednesday, June 13, 2018
at 3:30 PM EDT
(2018-06-13 19:30 UTC)
Which SANS Pen Test Course Should I Take? SEC560 EditionEd Skoudis, Kevin Fiscus
Wednesday, June 13, 2018
at 1:00 PM EDT
(2018-06-13 17:00 UTC)
It Starts With The Endpoint: Part 1 of the SANS 2018 Endpoint Security Survey ResultsCarbon Black
CrowdStrike, Inc.
Endgame
Forescout Technologies BV
Malwarebytes
Mcafee LLC
OpenText Inc.
Lee Neely, Alissa Torres, Jackie Castelli, Charles Choe, Dana Torgersen
Wednesday, June 13, 2018
at 10:30 AM EDT
(2018-06-13 14:30 UTC)
Securing Against the Most Common Vectors of Cyber Attacks- A SANS Master's Degree PresentationRichard Hummel
Tuesday, June 12, 2018
at 1:00 PM EDT
(2018-06-12 17:00 UTC)
It’s 2 AM, do you know where your data is?MobileIron
James Plouffe, John Pescatore
Tuesday, June 12, 2018
at 10:30 AM EST
(2018-06-12 14:30 UTC)
Introduction to enterprise vulnerability assessment; finding StrutsAdrien de Beaupré
Monday, June 11, 2018
at 1:00 PM EDT
(2018-06-11 17:00 UTC)
The Cloud Browser: Enabling Safe and Secure OSINT Malware AnalysisAuthentic8
John Klassen, Nick Espinoza, John Pescatore
Monday, June 11, 2018
at 10:00 AM EDT
(2018-06-11 14:00 UTC)
Cryptography Essentials Made SimpleTed Demopoulos
Thursday, June 07, 2018
at 3:30 PM EDT
(2018-06-07 19:30 UTC)
Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So FarTed Demopoulos
Thursday, June 07, 2018
at 1:00 PM EDT
(2018-06-07 17:00 UTC)
Threat Management Made Easy: How to Protect Your ICS Network with Less EffortSecurityMatters
Dennis Murphy, Dean Parsons
Thursday, June 07, 2018
at 10:30 AM EDT
(2018-06-07 14:30 UTC)
Maximizing Your Existing Toolset… I Got 99 Tools, but Time Ain't OneJon Gorenflo
Wednesday, June 06, 2018
at 1:00 PM EDT
(2018-06-06 17:00 UTC)
Your Current Approach to Threat Detection & Neutralization is BrokenThreatX
John Pescatore, Bret Settle
Tuesday, June 05, 2018
at 1:00 PM EDT
(2018-06-05 17:00 UTC)
Introducing the New DFIR “Hunt Evil“ PosterRob Lee, Mike Pilkington
Monday, June 04, 2018
at 1:00 PM EDT
(2018-06-04 17:00 UTC)
A Sneak Peek at the New ICS410Justin Searle
Thursday, May 31, 2018
at 1:00 PM EDT
(2018-05-31 17:00 UTC)
We pass the costs to you! An analysis of cryptomining and cryptojackingCisco Systems Inc.
Ted Demopoulos, Josh Pyorre
Thursday, May 31, 2018
at 10:30 AM EDT
(2018-05-31 14:30 UTC)
Visibility on the Network: A Tactical CTI-Based Approach - A SANS Master's Degree PresentationAlfredo Hickman
Wednesday, May 30, 2018
at 1:00 PM EDT
(2018-05-30 17:00 UTC)
True Detective – Autopsy of latest O365 and AWS threatsSkyHigh Networks
Brandon Cook, John Pescatore
Wednesday, May 30, 2018
at 10:30 AM EDT
(2018-05-30 14:30 UTC)
High Fidelity Alerts: How to create custom alerts like a proJustin Henderson, John Hubbard
Wednesday, May 30, 2018
at 5:00 AM EDT
(2018-05-30 09:00 UTC)
SANS New Course for Cyber Defense - SEC599: Defeating Advanced Adversaries - Implementing Kill Chain DefensesErik Van Buggenhout
Tuesday, May 29, 2018
at 3:30 PM EDT
(2018-05-29 19:30 UTC)
What’s New with FOR518 - Mac and iOS Forensic Analysis & Incident ResponseSarah Edwards
Tuesday, May 29, 2018
at 1:00 PM EDT
(2018-05-29 17:00 UTC)
Ten Tenets of CISO SuccessFrank Kim
Tuesday, May 29, 2018
at 10:30 AM EDT
(2018-05-29 14:30 UTC)
Everything I Didn’t Learn in SchoolJonathan Haas
Friday, May 25, 2018
at 1:00 PM EDT
(2018-05-25 17:00 UTC)
Why Zero Trust Security is Essential for Your Cloud and Data CenterEdgewise
Adam LeWinter, Dave Shackleford
Wednesday, May 23, 2018
at 1:00 PM EDT
(2018-05-23 17:00 UTC)
Reclaim Your Freedom to Safely Access the WebFortinet, Inc.
John Pescatore, Shalini Sundaram, Kevin Gallaugher
Wednesday, May 23, 2018
at 10:30 AM EDT
(2018-05-23 14:30 UTC)
Defending Against the Rising Tide of Industrial CyberThreats: An OT CyberSecurity Case StudyClaroty Inc.
Eduardo Di Monte, Patrick McBride
Thursday, May 17, 2018
at 3:30 PM EDT
(2018-05-17 19:30 UTC)
So, You Want To Be An Infosec Consultant?Ted Demopoulos
Thursday, May 17, 2018
at 1:00 PM EDT
(2018-05-17 17:00 UTC)
Passive, Active or Hybrid Monitoring: What is the right choice for your ICS Network?Indegy
Barak Perelman
Wednesday, May 16, 2018
at 1:00 PM EDT
(2018-05-16 17:00 UTC)
Automate Threat Detection and Incident Response: SANS Review of RSA NetWitnessRSA
Maor Franco, Ahmed Tantawy, Dave Shackleford
Wednesday, May 16, 2018
at 10:30 AM EST
(2018-05-16 14:30 UTC)
Building a Cyber Deception Program: Tech Essentials and Business ValueCymmetria
Matt Bromiley, Gadi Evron
Monday, May 14, 2018
at 10:00 PM EDT
(2018-05-15 02:00 UTC)
Software Defined Radio for Penetration Testing and AnalysisJames Leyte-Vidal
Friday, May 11, 2018
at 3:30 PM EDT
(2018-05-11 19:30 UTC)
ICS Active Defense Primer Part 2Kai Thomsen
Thursday, May 10, 2018
at 10:30 AM EDT
(2018-05-10 14:30 UTC)
Raspberry Honey Pi: Botnet for Good- A SANS Masters Degree Candidate PresentationTim Collyer
Wednesday, May 09, 2018
at 3:30 PM EDT
(2018-05-09 19:30 UTC)
5 Ways Bro Gives You Better Data for Incident Response and Threat HuntingCorelight
Gregory Bell, Matt Bromiley
Tuesday, May 08, 2018
at 1:00 PM EDT
(2018-05-08 17:00 UTC)
Fingerprinting Threat Actors with Web AssetsDomainTools
Rebekah Brown, Mike Thompson
Thursday, May 03, 2018
at 3:30 PM EDT
(2018-05-03 19:30 UTC)
OSINT for Defenders: Adventures in Honeytokens and Leaked DataMicah Hoffman, Justin Henderson
Thursday, May 03, 2018
at 10:30 AM EDT
(2018-05-03 14:30 UTC)
The Myths and Best Practices Surrounding SOC Automation: Use Cases and Success StoriesDFLabs
John Pescatore, John Moran
Wednesday, May 02, 2018
at 1:00 PM EDT
(2018-05-02 17:00 UTC)
Why AV Can’t Protect Your DatacenterCarbon Black
Dave Shackleford, Adrianna Gugel
Wednesday, May 02, 2018
at 10:30 AM EDT
(2018-05-02 14:30 UTC)
Tailored Intelligence for Automated Remediation: SANS Review of IntSights' Enterprise Intelligence and Mitigation PlatformIntSights
Sonny Sarai, Alon Arvatz
Tuesday, May 01, 2018
at 3:30 PM EDT
(2018-05-01 19:30 UTC)
From Ad Hoc to Automated: Proven Techniques to Operationalize Threat HuntingRedCanary
Joe Moles
Tuesday, May 01, 2018
at 1:00 PM EDT
(2018-05-01 17:00 UTC)
BreakingPoint: A Multi-Function Tool for Application and Security TestingIxia
Sashi Jeyaretnam, Serge Borso
Monday, April 30, 2018
at 1:00 PM EDT
(2018-04-30 17:00 UTC)
Fighting Account Takeover - Change The Battle and WinPerimeterX
Ido Safruti
Friday, April 27, 2018
at 1:00 PM EDT
(2018-04-27 17:00 UTC)
Incident Response: Give Me Data or Give Me Death!Rapid7 Inc.
Gary Harrison, Nick Schroeder
Thursday, April 26, 2018
at 1:00 PM EDT
(2018-04-26 17:00 UTC)
Can Small and Midsize Organizations Get the Same Level of Endpoint Protection as the Big Guys?- A blueprint for prioritizing efforts and finding the right solutionCrowdStrike, Inc.
Jackie Castelli, John Pescatore
Wednesday, April 25, 2018
at 1:00 PM EDT
(2018-04-25 17:00 UTC)
You Can't Secure What You Can't See - The Importance of Visibility in the CloudSkybox Security, Inc.
John Pescatore
Wednesday, April 25, 2018
at 10:30 AM EDT
(2018-04-25 14:30 UTC)
A Secure Approach to Deploying Wireless Networks- A SANS Master's Degree PresentationJoseph Matthews
Tuesday, April 24, 2018
at 1:00 PM EDT
(2018-04-24 17:00 UTC)
Advanced Malware Threat Hunting and Investigation with VirusTotal IntelligenceChronicle
Shapor Naghibzadeh, Matt Bromiley
Thursday, April 19, 2018
at 1:00 PM EDT
(2018-04-19 17:00 UTC)
Fighting Cybercrime with Artificial IntelligenceFortinet, Inc.
Keith Rayle, Dave Shackleford
Wednesday, April 18, 2018
at 3:30 PM EDT
(2018-04-18 19:30 UTC)
One Detect to Win: Tactical Application DetectionJustin Henderson, Tim Garcia
Tuesday, April 17, 2018
at 3:30 PM EDT
(2018-04-17 19:30 UTC)
ICS Active Defense Primer Kai Thomsen
Friday, April 13, 2018
at 3:30 PM EDT
(2018-04-13 19:30 UTC)
Python Regular Expressions for the Win!Joff Thyer
Thursday, April 12, 2018
at 3:30 PM EDT
(2018-04-12 19:30 UTC)
Hitting every rock on the way down: A look back at 15 years of pentesting with John StrandJohn Strand
Thursday, April 12, 2018
at 1:00 PM EDT
(2018-04-12 17:00 UTC)
A Pentesters perspective: Catching attackers living off the landBarkly
Jack Danahy, Dave Shackleford
Thursday, April 12, 2018
at 10:30 AM EDT
(2018-04-12 14:30 UTC)
The Magic of Raw Data CarvingKevin Ripa
Wednesday, April 11, 2018
at 3:30 PM EDT
(2018-04-11 19:30 UTC)
Practical Approach to Detecting and Preventing Web Application Attacks over HTTP/2- A SANS Master's Degree PresentationRussel Van Tuyl
Wednesday, April 11, 2018
at 10:30 AM EDT
(2018-04-11 14:30 UTC)
No Vehicle is an IslandDoug Wylie
Tuesday, April 10, 2018
at 1:00 PM EDT
(2018-04-10 17:00 UTC)
Digital Trust in a Perimeter Less WorldUnisys
Jack Koons, Mark Alba
Tuesday, April 10, 2018
at 10:30 AM EDT
(2018-04-10 14:30 UTC)
What’s new in FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident ResponsePhilip Hagen
Thursday, April 05, 2018
at 10:30 AM EDT
(2018-04-05 14:30 UTC)
Pausing the attack: deep dive on Pause-Process. A PowerShell script that allows you to pause and unpause potentially malicious attacksMick Douglas
Wednesday, April 04, 2018
at 10:30 AM EDT
(2018-04-04 14:30 UTC)
Securing Connected Vehicles – what you need to knowMatt Carpenter, Kai Thomsen, Dr. André Weimerskirch
Tuesday, April 03, 2018
at 1:00 PM EDT
(2018-04-03 17:00 UTC)
Apple's latest file system - is APFS a blessing or a curse to digital investigators?Derrick Donnelly
Monday, April 02, 2018
at 1:00 PM EDT
(2018-04-02 17:00 UTC)
Securing the Hybrid Cloud: A Guide to Using Security Controls, Tools and Automation Qualys
Dave Shackleford, Chris Carlson
Friday, March 30, 2018
at 1:00 PM EDT
(2018-03-30 17:00 UTC)
Anatomy of the TRITON ICS CyberattackCyberX
Phil Neray, Justin Searle
Thursday, March 29, 2018
at 3:30 PM EDT
(2018-03-29 19:30 UTC)
Being Offensive in the WorkplaceDerek Rook
Thursday, March 29, 2018
at 1:00 PM EDT
(2018-03-29 17:00 UTC)
Combatting Business Email Compromise with Active Defense AGARI
Patrick Peterson, Lance Spitzner, Markus Jakobsson
Wednesday, March 28, 2018
at 9:00 PM EDT
(2018-03-29 01:00 UTC)
Java on the Server? What Could Possibly Go wrong?Adrien de Beaupre
Wednesday, March 28, 2018
at 3:30 PM EDT
(2018-03-28 19:30 UTC)
Exploring Registry ExplorerEric Zimmerman
Wednesday, March 28, 2018
at 1:00 PM EDT
(2018-03-28 17:00 UTC)
Real-time Incident Remediation1E
Andy Schmid, Jake Williams
Wednesday, March 28, 2018
at 10:30 AM EDT
(2018-03-28 14:30 UTC)
How hackers run circles around our defenses.Bryce Galbraith
Tuesday, March 27, 2018
at 3:30 PM EDT
(2018-03-27 19:30 UTC)
How to write malware that evades detectionBromium
Adrian Taylor, Alissa Torres
Tuesday, March 27, 2018
at 1:00 PM EDT
(2018-03-27 17:00 UTC)
Moving Endpoint Security to the Cloud: Replacing Traditional AntivirusCarbon Black
Dave Gruber, Barbara Filkins
Thursday, March 22, 2018
at 1:00 PM EST
(2018-03-22 17:00 UTC)
Stop Really Nasty Malware, Pre- and Post-Execution: A SANS Review of the enSilo Endpoint Security PlatformEnsilo
Dave Shackleford
Wednesday, March 21, 2018
at 3:30 PM EST
(2018-03-21 19:30 UTC)
One Detect to Win: Tactical Endpoint DetectionJustin Henderson, Stephen Mathezer
Wednesday, March 21, 2018
at 10:30 AM EST
(2018-03-21 14:30 UTC)
SideSwipe: A PowerShell tool that allows you to detect lateral movement easily and quicklyMick Douglas
Tuesday, March 20, 2018
at 1:00 PM EST
(2018-03-20 17:00 UTC)
Data on the Dark Web: finding your corporate data before the criminals doTerbium Labs
Tyler Carbone
Tuesday, March 20, 2018
at 8:00 AM EDT
(2018-03-20 12:00 UTC)
The Power of Bro - and why you should include it in your security infrastructureCorelight
Seth Hall, Matt Bromiley
Monday, March 19, 2018
at 1:00 PM EST
(2018-03-19 17:00 UTC)
Opening the Floodgates: How to Analyze 30+ TB of Endpoint Data Without Drowning Your Security TeamRedCanary
Brian Beyer
Friday, March 16, 2018
at 11:00 AM EST
(2018-03-16 15:00 UTC)
Securing industrial control systems: A peek into building automation securityThomas Brandstetter
Thursday, March 15, 2018
at 3:30 PM EST
(2018-03-15 19:30 UTC)
Canadian Webcast Series Part 4: Protecting Data in a Multi-Cloud Environment & Pentesting Modern Web ApplicationsAdrien de Beaupre, Troy Davidson
Thursday, March 15, 2018
at 1:00 PM EST
(2018-03-15 17:00 UTC)
Pinpoint and Remediate Unknown Threats: SANS Review of EnCase Endpoint Security 6OpenText Inc.
Charles Choe, Jake Williams
Thursday, March 15, 2018
at 11:00 AM EST
(2018-03-15 15:00 UTC)
2017 SANS Holiday Hack Challenge Award Ceremony & TutorialEd Skoudis
Wednesday, March 14, 2018
at 1:00 PM EST
(2018-03-14 17:00 UTC)
VMRay Analyzer, agentless malware analysis and rapid incident response: A SANS Product ReviewVMRay
Matt Bromiley, Chad Loeven
Tuesday, March 13, 2018
at 3:30 PM EST
(2018-03-13 19:30 UTC)
WEBCAST 3: TIPS AND TECHNIQUES FOR TESTIFYING SUCCESSFULLYJason Jordaan
Monday, March 12, 2018
at 1:00 PM EST
(2018-03-12 17:00 UTC)
Secure DevOps: Encryption in the Cloud with KMSMark Geeslin
Friday, March 09, 2018
at 3:30 PM EST
(2018-03-09 20:30 UTC)
Survey of Integrity Verification Solutions, Local and Remote AttestationColin DeWinter, Ben Gardiner
Thursday, March 08, 2018
at 3:30 PM EST
(2018-03-08 20:30 UTC)
Canadian Webcast Series Part 3: ICS Defense: It’s Not a “Copy-Paste” From an IT Playbook & Importance of Intrusion Detection in a Compromised Prone WorldNik Alleyne, Dean Parsons
Thursday, March 08, 2018
at 1:00 PM EST
(2018-03-08 18:00 UTC)
Dramatically Reduce Incident Response Time with Splunk and BroCorelight
Ken Hanson, Vincent Stoffer
Thursday, March 08, 2018
at 10:30 AM EST
(2018-03-08 15:30 UTC)
Baselines for Easier Detection: So easy there's no more excuses!Mick Douglas
Wednesday, March 07, 2018
at 10:30 AM EST
(2018-03-07 15:30 UTC)
GIAC Certification for SIEMJustin Henderson
Tuesday, March 06, 2018
at 1:00 PM EST
(2018-03-06 18:00 UTC)
Deep packet inspection: The key technology for network security and the question of whether to build or buy itRohde & Schwarz Cybersecurity GmbH
Tanya Baccam, Alexander Müller
Tuesday, March 06, 2018
at 10:30 AM EST
(2018-03-06 15:30 UTC)
Ready Forensicator OneLee Whitfield
Monday, March 05, 2018
at 1:00 PM EST
(2018-03-05 18:00 UTC)
Could we have prepared for this? Attack Simulations for Blue Team HardeningAlissa Torres
Friday, March 02, 2018
at 3:30 PM EST
(2018-03-02 20:30 UTC)
OSINT for Pentesters: Finding Targets and Enumerating SystemsMicah Hoffman, David Mashburn
Thursday, March 01, 2018
at 3:30 PM EST
(2018-03-01 20:30 UTC)
Canadian Webcast Series Part 2: Real-world Pentesting – It’s About Bringing Value, not Being l33t & Deeper Dive Digital ForensicsKevin Ripa, Stephen Mathezer
Thursday, March 01, 2018
at 1:00 PM EST
(2018-03-01 18:00 UTC)
52 Percent of Companies Sacrifice Cybersecurity for SpeedThreat Stack
PagerDuty
Pete Cheslock, Franklin Mosley
Wednesday, February 28, 2018
at 3:30 PM EST
(2018-02-28 20:30 UTC)
Security Visibility in the Enterprise: SOC, SIEM, Managed Security and Visibility - A Master's Degree PresentationJames Hendrick
Wednesday, February 28, 2018
at 1:00 PM EST
(2018-02-28 18:00 UTC)
A Closer Look at Isolation: Hype or Next Gen Security?Menlo Security
Kowsik Guruswamy, John Pescatore
Wednesday, February 28, 2018
at 10:30 AM EST
(2018-02-28 15:30 UTC)
Looking Under the Rock: Deployment Strategies for TLS Decryption- A Master's Degree PresentationChris Farrell
Tuesday, February 27, 2018
at 3:30 PM EST
(2018-02-27 20:30 UTC)
WEBCAST 2: WORKING WITH THE LAWYERSJason Jordaan
Tuesday, February 27, 2018
at 1:00 PM EST
(2018-02-27 18:00 UTC)
Why Insider Actions Matter: SANS Review of LogRhythm CloudAI for User and Entity Behavior AnalyticsLogRhythm
Mark Settle, Samir Jain, Dave Shackleford
Tuesday, February 27, 2018
at 1:00 PM EST
(2018-02-27 18:00 UTC)
Improving Detection and Understanding the Adversary with Deception TechnologyTrapX Security
Please Check Back
Tuesday, February 27, 2018
at 10:30 AM EST
(2018-02-27 15:30 UTC)
Mind the Gap: going beyond penetration testing for security improvementRapid7 Inc.
Caspian Kilkelly
Friday, February 23, 2018
at 1:00 PM EST
(2018-02-23 18:00 UTC)
It’s Time to Move Endpoint Security to the CloudCarbon Black
John Pescatore
Thursday, February 22, 2018
at 3:30 PM EST
(2018-02-22 20:30 UTC)
Canadian Webcast Series Part 1: Managing Vulnerabilities in the Enterprise and an Overview of the PIACT Process & Frameworks: What Are They Good For?Kenton Smith, Jonathan Risto
Thursday, February 22, 2018
at 1:00 PM EST
(2018-02-22 18:00 UTC)
Walk, Run, Fly: Key Characteristics of Attaining an Advanced SOC Best practice tips on how to enter the advanced SOC dimensionDemisto
Rishi Bhargava, Christopher Crowley
Thursday, February 22, 2018
at 10:30 AM EST
(2018-02-22 15:30 UTC)
A pen-testers perspective on malware & ransomware attack techniques and the state of endpoint security Barkly
Jake Williams, Jack Danahy
Wednesday, February 21, 2018
at 3:30 PM EST
(2018-02-21 20:30 UTC)
One Detect to Win: Tactical Network DetectionMick Douglas, Josh Johnson
Wednesday, February 21, 2018
at 1:00 PM EST
(2018-02-21 18:00 UTC)
5 Critical Success Factors for Identity When Moving to the CloudOracle
Eric Olden
Tuesday, February 20, 2018
at 10:30 AM EST
(2018-02-20 15:30 UTC)
Exploiting esoteric SQL injection vulnerabilitiesBojan Zdrnja
Monday, February 19, 2018
at 1:00 PM EST
(2018-02-19 18:00 UTC)
When IoT Attacks - Understanding the Safety Risks Associated with Connected DevicesBilly Rios
Friday, February 16, 2018
at 3:30 PM EST
(2018-02-16 20:30 UTC)
Security is QA: My Path from Developer to Pen TesterJoshua Barone
Friday, February 16, 2018
at 1:00 PM EST
(2018-02-16 18:00 UTC)
Windows Baselining and Remote System Assessment: For the Low-low Price of Free-ninety-freeChris Pizor, John Strand
Thursday, February 15, 2018
at 10:30 AM EST
(2018-02-15 15:30 UTC)
An Inside Look at the Newly Updated ICS515 CourseRobert M. Lee
Wednesday, February 14, 2018
at 3:30 PM EST
(2018-02-14 20:30 UTC)
Which SANS Pen Test Course Should I Take? - February 2018 EditionEd Skoudis, Joshua Wright
Wednesday, February 14, 2018
at 1:00 PM EST
(2018-02-14 18:00 UTC)
The Impact Of Enterprise Web Application Trends Going MainstreamVeracode
Saikrishna Chavali, Serge Borso
Wednesday, February 14, 2018
at 10:30 AM EST
(2018-02-14 15:30 UTC)
Cloud Security: Taking charge of Security in Your Cloud- A Master's Degree PresentationLuciana Obregon
Tuesday, February 13, 2018
at 3:30 PM EST
(2018-02-13 20:30 UTC)
WEBCAST 1: SO, YOU HAVE TO TESTIFY, NOW WHAT?Jason Jordaan
Tuesday, February 13, 2018
at 10:30 AM EST
(2018-02-13 15:30 UTC)
Improving Your Defenses - EMET & Window Defender Exploit GuardErik Van Buggenhout, Stephen Sims
Monday, February 12, 2018
at 3:30 PM EST
(2018-02-12 20:30 UTC)
Debugging Python Code for mere mortalsMark Baggett
Monday, February 12, 2018
at 1:00 PM EST
(2018-02-12 18:00 UTC)
Secure DevOps: Microservices and API SecurityGregory Leonard
Friday, February 09, 2018
at 1:00 PM EST
(2018-02-09 18:00 UTC)
Building Zero Trust Model with Microsegmentation in the CloudUnisys
Salvatore Sinno, Jonathan Payne
Thursday, February 08, 2018
at 3:30 PM EST
(2018-02-08 20:30 UTC)
2 > 1: Teaming Up for Social Engineering AdventuresJen Fox
Wednesday, February 07, 2018
at 1:00 PM EDT
(2018-02-07 18:00 UTC)
Cyber Threat Intelligence Skills and Usefulness: SANS CTI Survey Results, Part 2Anomali
DomainTools
IntSights
Rapid7 Inc.
ThreatConnect
Dave Shackleford, John Hurd, Rebekah Brown
Tuesday, February 06, 2018
at 1:00 PM EST
(2018-02-06 18:00 UTC)
Cyber Threat Intelligence Today: SANS CTI Survey Results, Part 1Anomali
DomainTools
IntSights
Rapid7 Inc.
ThreatConnect
Itay Kozuch, Dave Shackleford, Travis Farral, Zach Hill
Thursday, February 01, 2018
at 3:30 PM EST
(2018-02-01 20:30 UTC)
OSINT for Everyone: Understanding Risks and Protecting Your DataMicah Hoffman, Josh Huff
Wednesday, January 31, 2018
at 3:30 PM EST
(2018-01-31 20:30 UTC)
Cyber Insurance Conundrum: Using CIS Critical Security Controls for Underwriting Cyber Risk- A Masters Degree Candidate PresentationOleg Bogomolniy
Wednesday, January 31, 2018
at 1:00 PM EST
(2018-01-31 18:00 UTC)
DNS: An Asset, Not a LiabilityInfoBlox
Matt Bromiley, Srikrupa Srivatsan
Thursday, January 25, 2018
at 1:00 PM EST
(2018-01-25 18:00 UTC)
Are You in Control? Managing the CIS Critical Security Controls within your EnterpriseHitachi Systems Security
Matt Bromiley, Andrew Kozloski
Wednesday, January 24, 2018
at 3:30 PM EST
(2018-01-24 20:30 UTC)
Multi-path TCP: Practical Approaches for Securing your Enterprise Network - A Masters Degree Candidate WebcastJosh Lewis
Wednesday, January 24, 2018
at 1:00 PM EST
(2018-01-24 18:00 UTC)
In a Perfect World...Building the Network Security Architecture for the FutureNETSCOUT Systems, Inc.
Sonny Sarai, John Pescatore, Arabella Hallawell
Wednesday, January 24, 2018
at 10:30 AM EST
(2018-01-24 15:30 UTC)
How to Build & Maintain an Open Source SIEMJohn Hubbard, Justin Henderson
Tuesday, January 23, 2018
at 3:30 PM EST
(2018-01-23 20:30 UTC)
Why and How to Take the GCTI - The Industry's Cyber Threat Intelligence CertificationRobert M. Lee
Thursday, January 18, 2018
at 10:30 AM EST
(2018-01-18 15:30 UTC)
What Event Logs? Part 2: Lateral Movement without Event LogsMatt Bromiley
Wednesday, January 17, 2018
at 10:00 PM EST
(2018-01-18 03:00 UTC)
Use Case Development for Security OperationsChristopher Crowley
Wednesday, January 17, 2018
at 10:30 AM EST
(2018-01-17 15:30 UTC)
3 Steps Towards IT/OT ConvergenceEric Cosman, Doug Wylie, Gregory Hale
Tuesday, January 16, 2018
at 3:30 PM EST
(2018-01-16 20:30 UTC)
Head HackingTim Medin
Tuesday, January 16, 2018
at 1:00 PM EST
(2018-01-16 18:00 UTC)
Certifying Cyber Personnel Who Protect the Electric GridTim Conway
Monday, January 15, 2018
at 1:00 PM EST
(2018-01-15 18:00 UTC)
Secure DevOps: Faster Feedback with Effective Security Unit Tests in CI / CDEric Johnson
Thursday, January 11, 2018
at 1:00 PM EST
(2018-01-11 18:00 UTC)
Third Party Risk Assessment: Using BitSight for Consistent and Continuous Risk RatingBitsight
Michael Roling, John Pescatore
Thursday, January 11, 2018
at 10:30 AM EST
(2018-01-11 15:30 UTC)
What Event Logs? Part 1: Attacker Tricks to Remove Event LogsMatt Bromiley
Tuesday, January 09, 2018
at 1:00 PM EST
(2018-01-09 18:00 UTC)
Introducing the *NEW* SANS Pen Test Poster - Building A Better Pen Tester - BlueprintEd Skoudis, Jason Blanchard
Tuesday, January 09, 2018
at 10:30 AM EST
(2018-01-09 15:30 UTC)
Improving Your Defenses - CredentialGuard in Windows 10Erik Van Buggenhout, Stephen Sims
Monday, January 08, 2018
at 10:00 PM EST
(2018-01-09 03:00 UTC)
Meltdown and Spectre - understanding and mitigating the threatsJake Williams
Thursday, January 04, 2018
at 12:00 PM EST
(2018-01-04 17:00 UTC)
Meltdown and Spectre - understanding and mitigating the threatsJake Williams

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.