The Most Comprehensive DFIR Event of the Year: SANS DFIRCON! Save $200 thru 10/3.

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Sep 21, 2018Powering IR/SOC with Code Reuse Detection - The Emotet Case StudyIntezerMatt Bromiley, Itai Tevet
Sep 20, 2018Meeting the Critical Security Controls Using OSSECAtomicorpScott Shinn, Michael Shinn, John Pescatore
Sep 20, 2018Threat Hunting in Action: SANS 2018 Survey Results, Part IIAnomali

DomainTools

IBM

Malwarebytes

Qualys

RiskIQ
Rob Lee, Robert M. Lee, Sid Pearl, Benjamin Powell, Justin Swisher
Sep 20, 2018Detecting Industrial Network Anomalies Without the Risk of DisruptionClaroty Inc. Stefan Waronka, Patrick McBride
Sep 19, 2018Cloud Services - Look before you LeapDavid R. Miller
Sep 19, 2018Threat Hunting Is a Process, Not a Thing: SANS 2018 Survey Results, Part IAnomali

DomainTools

IBM

Malwarebytes

Qualys

RiskIQ
Chris Carlson, Helen Johnson, Rob Lee, Robert M. Lee, Dana Torgersen
Sep 19, 2018SSL Traffic Inspection: Needed Visibility But At What Cost?A10 NetworksParth Jagirdar, Barbara Filkins
Sep 18, 2018Dissecting a Ransomware AttackVMRay Jacob Williams, Rohan Viegas
Sep 18, 2018Perimeter Security and Why it is ObsoleteJustin Henderson
Sep 18, 2018Trust No One: Introducing SEC530: Defensible Security ArchitectureEric Conrad
Sep 17, 2018Hacker Techniques: Covert Command and ControlDerek Rook
Sep 13, 2018Password Cracking: Beyond the BasicsJon Gorenflo
Sep 13, 2018Over Exposed and being Phished? Stop Sophisticated AttacksSymantecMark Urban, John Pescatore
Sep 13, 2018How to achieve autonomous (and optimized) hunting and detectionSecBIAlex Vaystikh, Matt Bromiley
Sep 12, 2018The Need for Speed: Integrated Threat ResponseLookingglass Cyber Solutions, Inc.Matt Bromiley, Allan Thomson
Sep 12, 2018How to be prepared for the next cyber-attack?CymulateAvihai Ben-Yossef, Jonathan Gad
Sep 11, 2018Breach Avoidance: Yes, You Can!BalbixJohn Pescatore, Gaurav Banga
Sep 11, 2018YARA - Effectively using and generating rulesErik Van Buggenhout
Sep 10, 2018What the CISO REALLY wants out of your SOCRussell Eubanks
Sep 6, 2018ICS Network HygienePaul Piotrowski, Kevin Van Der Veen, Manjit Duhra
Sep 6, 2018Pen Testing with PowerShell: Automating the Boring so You Can Focus on the FUN!Mick Douglas
Sep 5, 2018It's All About Your Assets: Inline Vulnerability and Event ManagementDavid Hazar
Sep 5, 2018The Convergence of Cybersecurity and Process SafetyDoug Wylie, Marty Edwards, Larry O'Brien
Sep 4, 2018Pen Testing with PowerShell: Local Privilege Escalation TechniqueMick Douglas
Aug 30, 2018Stronger Security with Global IT Asset InventoryQualysMatt Bromiley, Pablo Quiroga
Aug 29, 2018Break Silos and respond to threats faster; Eliminating network and security silos to speed attack responseInfoBloxJohn Pescatore, Chintan Udeshi
Aug 23, 2018Weaponizing Browser-Based Memory Leak Bugs - Stephen SimsStephen Sims
Aug 23, 2018How Network Traffic Analytics Eliminates Darkspace for the SOCExtraHopBarbara Kay, Chris Crowley
Aug 23, 2018Pen Testing with PowerShell: Data Exfiltration TechniquesMick Douglas
Aug 22, 2018Youre Probably Not Red Teaming (And Usually Im Not, Either)Deviant Ollam
Aug 21, 2018The Keys to Managing Insider Threats & Stopping Data ExfiltrationObserveITTim Armstrong, John Pescatore
Aug 20, 20187 Steps to Protecting Data in the Era of Digital CareAbsolute Software Corp.Dave Shackleford, Josh Mayfield
Aug 16, 2018SOC Capabilities and Usefulness: Part II of the SANS SOC Survey Results WebcastAuthentic8

Awake Security

CYBERBIT Commercial Solutions

DFLabs

ExtraHop

LogRhythm
Christopher Crowley, Gary Golomb, Lital Grossman, John Moran, John Pescatore
Aug 15, 2018Whats covered in the SANS Advanced Web App Pen Testing Course SEC642? Thanks for Asking!Moses Hernandez
Aug 15, 2018Measuring and Evaluating Cyber Risk in Hazardous LocationsDoug Wylie, Ken Modeste
Aug 14, 2018No Single Definition of a SOC: Part I of the SANS 2018 SOC Survey Results WebcastAuthentic8

Awake Security

CYBERBIT Commercial Solutions

DFLabs

ExtraHop

LogRhythm
Chris Brazdziunas, Christopher Crowley, Barbara G. Kay, John Klassen, John Pescatore
Aug 14, 2018World-Class Cyber Security OperationsCarson Zimmerman
Aug 14, 2018Continuous Security: Monitoring & Active Defense in the CloudEric Johnson
Aug 8, 2018PHA Review: Combining Process Safety & CybersecurityDoug Wylie, Jim McGlone
Aug 2, 2018Software-Defined Microsegmentation for Regulatory ComplianceUnisysBill Parkinson, Jack Koons
Jul 31, 2018How Visibility of the Attack Surface Minimizes RiskSkybox Security, Inc.Sean Keef, Dave Shackleford
Jul 30, 2018Security Essentials Core ConceptsTed Demopoulos
Jul 27, 2018Windows Defender ATPs Advanced Hunting: Using Flexible Queries to Hunt Across Your EndpointsMicrosoftMatt Bromiley, Jonathan Bar Or
Jul 26, 2018Understanding the True Cost of Endpoint ManagementIBMTeresa Worth, Matt Bromiley
Jul 26, 2018Managing Cloud SecurityTenable Network Security Dave Shackleford, Greg Mayfield
Jul 26, 2018The Perimeter is Dead: Introducing SEC530: Defensible Security ArchitectureJustin Henderson, Eric Conrad
Jul 25, 2018All Your Network Traffic Are Belong to Us - VPNFilter Malware and Implications for ICSCyberXTim Conway, Doug Wylie, Phil Neray
Jul 25, 2018I Before R Except After IOCAndrew Hay
Jul 24, 20184 Techniques to Modernize Your DDoS DefensesA10 NetworksDon Shin, John Pescatore
Jul 24, 2018Single-Agent Cyber Security Analytics: A SANS Review of the Cybereason PlatformCybereasonDave Shackleford, Israel Barak
Jul 24, 2018High Fidelity Alerts: Alert vs Anomaly A sibling rivalryJustin Henderson, Tim Garcia
Jul 19, 2018Building Successful Awareness Programs - Key Findings and Lessons Learned from 2018 Security Awareness ReportDan DeBeaubien, Lance Spitzner
Jul 19, 2018The State of Industrial IoTIndegy

Accenture

ForeScout Technologies
Barbara Filkins, Doug Wylie, Barak Perelman, Bradford Hegrat, Wayne Dixon
Jul 18, 2018Intro to Smart Contract Security Jonathan Haas
Jul 18, 2018Managing vulnerabilities with the PIACT processJonathan Risto
Jul 18, 2018Collecting OSINT: Grabbing Your Data Now to Use LaterMicah Hoffman, Josh Huff
Jul 17, 2018PowerShell for PenTestingMick Douglas
Jul 17, 2018Business Email Compromise & Office 365: Making Sense of All the NoiseMatt Bromiley
Jul 12, 2018Fundamentals of Security Operations Chris Crowley
Jul 11, 2018Cloud Security Visibility: Establishing security control of the cloud estateAlgoSecAvishai Wool, Dave Shackleford
Jul 10, 2018No tool fits all Why Building a solid Toolbox MattersHeather Mahalik
Jul 10, 2018Best practices for Forensics and Incident Response in ContainersSysdig Knox Anderson, Jake Williams
Jul 10, 2018Putting Out the Fire: Improving SecOps Retention From Day OneRedCanaryFrank McClain
Jul 3, 2018Enterprise Discovery: I Still Havent Found What Im Looking ForTim Medin
Jun 28, 2018Diffuse Cryptojacking & Ransomware Attacks with a SandboxFortinet, Inc.Damien Lim, Dave Shackleford
Jun 27, 2018EnCase Forensic 8: A SANS Analyst Program Review Open Text Inc.Jake Williams, Harp Thukral
Jun 27, 2018High Fidelity Alerts: Context for your contextJustin Henderson
Jun 26, 2018Threat Intelligence Naming Conventions: Threat Actors, Activity Groups, and Other Ways of Tracking ThreatsRobert M. Lee
Jun 26, 20182018's Biggest Bugs and How to Beat ThemBugcrowdJohn Pescatore, Jason Haddix, Michael Blache
Jun 26, 2018PCAP Command-Line MadnessHal Pomeranz
Jun 21, 201810 Tips for Effective Modern Day Endpoint Protection SymantecJacob Williams, Adam Licata
Jun 21, 2018Three free Python apps to improve your defenses and response capabilitiesMark Baggett
Jun 20, 2018Sharpen Your Threat Hunting Capabilities with YARAVirusTotal Matt Bromiley, Evan Derheim, Victor Manuel Alvarez
Jun 20, 2018LabMD: The Phony Data BreachMichael J. Daugherty, Benjamin Wright
Jun 20, 2018What is Purple Team? Updates to SEC599Chris Gates, Erik Van Buggenhout, Stephen Sims
Jun 19, 2018So, You Wanna Be a Pen Tester? 3 Paths to ConsiderEd Skoudis
Jun 19, 2018Small Businesses, Big Threats: Protecting your Small and Medium Business Against Malware, Ransomware, Exploits and MoreBarklyJack Danahy, John Pescatore
Jun 19, 2018Software Defined Radio for Penetration Testing and AnalysisLarry Pesce
Jun 18, 2018Understanding the 2018 Updates to the CIS Critical Security ControlsJames Tarala
Jun 15, 2018Stopping IoT-based Attacks on Enterprise NetworksHP Michael Howard, Shivaun Albright, G.W. Ray Davidson, PhD
Jun 14, 2018What Works in Visibility, Access Control and IOT Security Pulse Secure NAC Outcomes at Energy ProviderPulse SecureDave Cullen, John Pescatore
Jun 14, 2018Endpoint Detection and Response: Part 2 of the SANS 2018 Endpoint Security Survey ResultsCarbon Black

CrowdStrike

Endgame

ForeScout Technologies

Malwarebytes

McAfee

Open Text Inc.
Lee Neely, Alissa Torres, Mike Nichols, Ratnesh Saxena, Rick McElroy, Sandeep Kumar
Jun 13, 2018Which SANS Pen Test Course Should I Take? SEC560 EditionEd Skoudis, Kevin Fiscus
Jun 13, 2018It Starts With The Endpoint: Part 1 of the SANS 2018 Endpoint Security Survey ResultsCarbon Black

CrowdStrike

Endgame

ForeScout Technologies

Malwarebytes

McAfee

Open Text Inc.
Lee Neely, Alissa Torres, Jackie Castelli, Charles Choe, Dana Torgersen
Jun 13, 2018Securing Against the Most Common Vectors of Cyber Attacks- A SANS Master's Degree PresentationRichard Hummel
Jun 12, 2018Its 2 AM, do you know where your data is?MobileIronJames Plouffe, John Pescatore
Jun 12, 2018Introduction to enterprise vulnerability assessment; finding StrutsAdrien de Beaupré
Jun 11, 2018The Cloud Browser: Enabling Safe and Secure OSINT Malware AnalysisAuthentic8John Klassen, Nick Espinoza, John Pescatore
Jun 11, 2018Cryptography Essentials Made SimpleTed Demopoulos
Jun 7, 2018Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So FarTed Demopoulos
Jun 7, 2018Threat Management Made Easy: How to Protect Your ICS Network with Less EffortSecurity MattersDennis Murphy, Dean Parsons
Jun 7, 2018Maximizing Your Existing Toolset I Got 99 Tools, but Time Ain't OneJon Gorenflo
Jun 6, 2018Your Current Approach to Threat Detection & Neutralization is BrokenThreatXJohn Pescatore, Bret Settle
Jun 5, 2018Introducing the New DFIR Hunt Evil PosterRob Lee, Mike Pilkington
Jun 4, 2018A Sneak Peak At The New ICS410Justin Searle
May 31, 2018We pass the costs to you! An analysis of cryptomining and cryptojackingCisco Systems Inc. Ted Demopoulos, Josh Pyorre
May 31, 2018Visibility on the Network: A Tactical CTI-Based Approach - A SANS Master's Degree PresentationAlfredo Hickman
May 30, 2018True Detective Autopsy of latest O365 and AWS threatsSkyHigh NetworksBrandon Cook, John Pescatore
May 30, 2018High Fidelity Alerts: How to create custom alerts like a proJustin Henderson, John Hubbard
May 30, 2018SANS New Course for Cyber Defense - SEC599: Defeating Advanced Adversaries - Implementing Kill Chain DefensesErik Van Buggenhout
May 29, 2018Whats New with FOR518 - Mac and iOS Forensic Analysis & Incident ResponseSarah Edwards
May 29, 2018Ten Tenets of CISO SuccessFrank Kim
May 29, 2018Everything I Didnt Learn in SchoolJonathan Haas
May 25, 2018Why Zero Trust Security is Essential for Your Cloud and Data CenterEdgewiseAdam LeWinter, Dave Shackleford
May 23, 2018Reclaim Your Freedom to Safely Access the WebFortinet, Inc.John Pescatore, Shalini Sundaram, Kevin Gallaugher
May 23, 2018Defending Against the Rising Tide of Industrial CyberThreats: An OT CyberSecurity Case StudyClaroty Inc. Eduardo Di Monte, Patrick McBride
May 17, 2018So, You Want To Be An Infosec Consultant?Ted Demopoulos
May 17, 2018Passive, Active or Hybrid Monitoring: What is the right choice for your ICS Network?IndegyBarak Perelman
May 16, 2018Automate Threat Detection and Incident Response: SANS Review of RSA NetWitnessRSAMaor Franco, Ahmed Tantawy, Dave Shackleford
May 16, 2018Building a Cyber Deception Program: Tech Essentials and Business ValueCymmetria Matt Bromiley, Gadi Evron
May 15, 2018Software Defined Radio for Penetration Testing and AnalysisJames Leyte-Vidal
May 11, 2018ICS Active Defense Primer Part 2Kai Thomsen
May 10, 2018Raspberry Honey Pi: Botnet for Good- A SANS Masters Degree Candidate PresentationTim Collyer
May 9, 20185 Ways Bro Gives You Better Data for Incident Response and Threat HuntingCorelight Gregory Bell, Matt Bromiley
May 8, 2018Fingerprinting Threat Actors with Web AssetsDomainToolsRebekah Brown, Mike Thompson
May 3, 2018OSINT for Defenders: Adventures in Honeytokens and Leaked DataMicah Hoffman, Justin Henderson
May 3, 2018The Myths and Best Practices Surrounding SOC Automation: Use Cases and Success StoriesDFLabsJohn Pescatore, John Moran
May 2, 2018Why AV Cant Protect Your DatacenterCarbon BlackDave Shackleford, Adrianna Gugel
May 2, 2018Tailored Intelligence for Automated Remediation: SANS Review of IntSights' Enterprise Intelligence and Mitigation PlatformIntSightsSonny Sarai, Alon Arvatz
May 1, 2018From Ad Hoc to Automated: Proven Techniques to Operationalize Threat HuntingRedCanaryJoe Moles
May 1, 2018BreakingPoint: A Multi-Function Tool for Application and Security TestingIxiaSashi Jeyaretnam, Serge Borso
Apr 30, 2018 Fighting Account Takeover - Change The Battle and WinPerimeterXIdo Safruti
Apr 27, 2018Incident Response: Give Me Data or Give Me Death!Rapid7 Inc.Gary Harrison, Nick Schroeder
Apr 26, 2018Can Small and Midsize Organizations Get the Same Level of Endpoint Protection as the Big Guys?- A blueprint for prioritizing efforts and finding the right solutionCrowdStrikeJackie Castelli, John Pescatore
Apr 25, 2018You Can't Secure What You Can't See - The Importance of Visibility in the CloudSkybox Security, Inc.John Pescatore
Apr 25, 2018A Secure Approach to Deploying Wireless Networks- A SANS Master's Degree PresentationJoseph Matthews
Apr 24, 2018Advanced Malware Threat Hunting and Investigation with VirusTotal IntelligenceVirusTotal Shapor Naghibzadeh, Matt Bromiley
Apr 19, 2018Fighting Cybercrime with Artificial IntelligenceFortinet, Inc.Keith Rayle, Dave Shackleford
Apr 18, 2018One Detect to Win: Tactical Application DetectionJustin Henderson, Tim Garcia
Apr 17, 2018ICS Active Defense Primer Kai Thomsen
Apr 13, 2018Python Regular Expressions for the Win!Joff Thyer
Apr 12, 2018Hitting every rock on the way down: A look back at 15 years of pentesting with John StrandJohn Strand
Apr 12, 2018A Pentesters perspective: Catching attackers living off the landBarklyJack Danahy, Dave Shackleford
Apr 12, 2018The Magic of Raw Data CarvingKevin Ripa
Apr 11, 2018Practical Approach to Detecting and Preventing Web Application Attacks over HTTP/2- A SANS Master's Degree PresentationRussel Van Tuyl
Apr 11, 2018No Vehicle is an IslandDoug Wylie
Apr 10, 2018Digital Trust in a Perimeter Less WorldUnisysJack Koons, Mark Alba
Apr 10, 2018Whats new in FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident ResponsePhilip Hagen
Apr 5, 2018Pausing the attack: deep dive on Pause-Process. A PowerShell script that allows you to pause and unpause potentially malicious attacksMick Douglas
Apr 4, 2018Securing Connected Vehicles what you need to knowMatt Carpenter, Kai Thomsen, Dr. André Weimerskirch
Apr 3, 2018Apple's latest file system - is APFS a blessing or a curse to digital investigators?Derrick Donnelly
Apr 2, 2018Securing the Hybrid Cloud: A Guide to Using Security Controls, Tools and Automation QualysDave Shackleford, Chris Carlson
Mar 30, 2018Anatomy of the TRITON ICS CyberattackCyberXPhil Neray, Justin Searle
Mar 29, 2018Being Offensive in the WorkplaceDerek Rook
Mar 29, 2018Combatting Business Email Compromise with Active Defense AGARIPatrick Peterson, Lance Spitzner, Markus Jakobsson
Mar 29, 2018Java on the Server? What Could Possibly Go wrong?Adrien de Beaupre
Mar 28, 2018Exploring Registry ExplorerEric Zimmerman
Mar 28, 2018Real-time Incident Remediation1EAndy Schmid, Jake Williams
Mar 28, 2018How hackers run circles around our defenses.Bryce Galbraith
Mar 27, 2018How to write malware that evades detectionBromiumAdrian Taylor, Alissa Torres
Mar 27, 2018Moving Endpoint Security to the Cloud: Replacing Traditional AntivirusCarbon BlackDave Gruber, Barbara Filkins
Mar 22, 2018Stop Really Nasty Malware, Pre- and Post-Execution: A SANS Review of the enSilo Endpoint Security PlatformEnsiloDave Shackleford
Mar 21, 2018One Detect to Win: Tactical Endpoint DetectionJustin Henderson, Stephen Mathezer
Mar 21, 2018SideSwipe: A PowerShell tool that allows you to detect lateral movement easily and quicklyMick Douglas
Mar 20, 2018Data on the Dark Web: finding your corporate data before the criminals doTerbium LabsTyler Carbone
Mar 20, 2018The Power of Bro - and why you should include it in your security infrastructureCorelight Seth Hall, Matt Bromiley
Mar 19, 2018Opening the Floodgates: How to Analyze 30+ TB of Endpoint Data Without Drowning Your Security TeamRedCanaryBrian Beyer
Mar 16, 2018Securing industrial control systems: A peek into building automation securityThomas Brandstetter
Mar 15, 2018Canadian Webcast Series Part 4: Protecting Data in a Multi-Cloud Environment & Pentesting Modern Web ApplicationsAdrien de Beaupre, Troy Davidson
Mar 15, 2018Pinpoint and Remediate Unknown Threats: SANS Review of EnCase Endpoint Security 6Open Text Inc.Charles Choe, Jake Williams
Mar 15, 20182017 SANS Holiday Hack Challenge Award Ceremony & TutorialEd Skoudis
Mar 14, 2018VMRay Analyzer, agentless malware analysis and rapid incident response: A SANS Product ReviewVMRay Matt Bromiley, Chad Loeven
Mar 13, 2018WEBCAST 3: TIPS AND TECHNIQUES FOR TESTIFYING SUCCESSFULLYJason Jordaan
Mar 12, 2018Secure DevOps: Encryption in the Cloud with KMSMark Geeslin
Mar 9, 2018Survey of Integrity Verification Solutions, Local and Remote AttestationColin DeWinter, Ben Gardiner
Mar 8, 2018Canadian Webcast Series Part 3: ICS Defense: Its Not a Copy-Paste From an IT Playbook & Importance of Intrusion Detection in a Compromised Prone WorldNik Alleyne, Dean Parsons
Mar 8, 2018Dramatically Reduce Incident Response Time with Splunk and BroCorelight Ken Hanson, Vincent Stoffer
Mar 8, 2018Baselines for Easier Detection: So easy there's no more excuses!Mick Douglas
Mar 7, 2018GIAC Certification for SIEMJustin Henderson
Mar 6, 2018Deep packet inspection: The key technology for network security and the question of whether to build or buy itRohde & Schwarz Cybersecurity GmbH Tanya Baccam, Alexander Müller
Mar 6, 2018Ready Forensicator OneLee Whitfield
Mar 5, 2018Could we have prepared for this? Attack Simulations for Blue Team HardeningAlissa Torres
Mar 2, 2018OSINT for Pentesters: Finding Targets and Enumerating SystemsMicah Hoffman, David Mashburn
Mar 1, 2018Canadian Webcast Series Part 2: Real-world Pentesting Its About Bringing Value, not Being l33t & Deeper Dive Digital ForensicsKevin Ripa, Stephen Mathezer
Mar 1, 201852 Percent of Companies Sacrifice Cybersecurity for SpeedThreat Stack

PagerDuty
Pete Cheslock, Franklin Mosley
Feb 28, 2018Security Visibility in the Enterprise: SOC, SIEM, Managed Security and Visibility - A Master's Degree PresentationJames Hendrick
Feb 28, 2018A Closer Look at Isolation: Hype or Next Gen Security?Menlo SecurityKowsik Guruswamy, John Pescatore
Feb 28, 2018Looking Under the Rock: Deployment Strategies for TLS Decryption- A Master's Degree PresentationChris Farrell
Feb 27, 2018WEBCAST 2: WORKING WITH THE LAWYERSJason Jordaan
Feb 27, 2018Why Insider Actions Matter: SANS Review of LogRhythm CloudAI for User and Entity Behavior AnalyticsLogRhythmMark Settle, Samir Jain, Dave Shackleford
Feb 27, 2018Mind the Gap: going beyond penetration testing for security improvementRapid7 Inc.Caspian Kilkelly
Feb 23, 2018Its Time to Move Endpoint Security to the CloudCarbon BlackJohn Pescatore
Feb 22, 2018Canadian Webcast Series Part 1: Managing Vulnerabilities in the Enterprise and an Overview of the PIACT Process & Frameworks: What Are They Good For?Kenton Smith, Jonathan Risto
Feb 22, 2018Walk, Run, Fly: Key Characteristics of Attaining an Advanced SOC Best practice tips on how to enter the advanced SOC dimensionDemistoRishi Bhargava, Christopher Crowley
Feb 22, 2018A pen-testers perspective on malware & ransomware attack techniques and the state of endpoint security BarklyJake Williams, Jack Danahy
Feb 21, 2018One Detect to Win: Tactical Network DetectionMick Douglas, Josh Johnson
Feb 21, 20185 Critical Success Factors for Identity When Moving to the CloudOracleEric Olden
Feb 20, 2018Exploiting esoteric SQL injection vulnerabilitiesBojan Zdrnja
Feb 19, 2018When IoT Attacks - Understanding the Safety Risks Associated with Connected DevicesBilly Rios
Feb 16, 2018Security is QA: My Path from Developer to Pen TesterJoshua Barone
Feb 16, 2018Windows Baselining and Remote System Assessment: For the Low-low Price of Free-ninety-freeChris Pizor, John Strand
Feb 15, 2018An Inside Look at the Newly Updated ICS515 CourseRobert M. Lee
Feb 14, 2018Which SANS Pen Test Course Should I Take? - February 2018 EditionEd Skoudis, Joshua Wright
Feb 14, 2018The Impact Of Enterprise Web Application Trends Going MainstreamCA Veracode . Saikrishna Chavali, Serge Borso
Feb 14, 2018Cloud Security: Taking charge of Security in Your Cloud- A Master's Degree PresentationLuciana Obregon
Feb 13, 2018WEBCAST 1: SO, YOU HAVE TO TESTIFY, NOW WHAT?Jason Jordaan
Feb 13, 2018Improving Your Defenses - EMET & Window Defender Exploit GuardErik Van Buggenhout, Stephen Sims
Feb 12, 2018Debugging Python Code for mere mortalsMark Baggett
Feb 12, 2018Secure DevOps: Microservices and API SecurityGregory Leonard
Feb 9, 2018Building Zero Trust Model with Microsegmentation in the CloudUnisysSalvatore Sinno, Jonathan Payne
Feb 8, 20182 > 1: Teaming Up for Social Engineering AdventuresJen Fox
Feb 7, 2018Cyber Threat Intelligence Skills and Usefulness: SANS CTI Survey Results, Part 2Anomali

DomainTools

IntSights

Rapid7 Inc.

ThreatConnect
Dave Shackleford, John Hurd, Rebekah Brown
Feb 6, 2018Cyber Threat Intelligence Today: SANS CTI Survey Results, Part 1Anomali

DomainTools

IntSights

Rapid7 Inc.

ThreatConnect
Itay Kozuch, Dave Shackleford, Travis Farral, Zach Hill
Feb 1, 2018OSINT for Everyone: Understanding Risks and Protecting Your DataMicah Hoffman, Josh Huff
Jan 31, 2018Cyber Insurance Conundrum: Using CIS Critical Security Controls for Underwriting Cyber Risk- A Masters Degree Candidate PresentationOleg Bogomolniy
Jan 31, 2018DNS: An Asset, Not a LiabilityInfoBloxMatt Bromiley, Srikrupa Srivatsan
Jan 25, 2018Are You in Control? Managing the CIS Critical Security Controls within your EnterpriseHitachi Systems SecurityMatt Bromiley, Andrew Kozloski
Jan 24, 2018Multi-path TCP: Practical Approaches for Securing your Enterprise Network - A Masters Degree Candidate WebcastJosh Lewis
Jan 24, 2018In a Perfect World...Building the Network Security Architecture for the FutureNETSCOUT Systems, Inc.Sonny Sarai, John Pescatore, Arabella Hallawell
Jan 24, 2018How to Build & Maintain an Open Source SIEMJohn Hubbard, Justin Henderson
Jan 23, 2018Why and How to Take the GCTI - The Industry's Cyber Threat Intelligence CertificationRobert M. Lee
Jan 18, 2018What Event Logs? Part 2: Lateral Movement without Event LogsMatt Bromiley
Jan 18, 2018Use Case Development for Security OperationsChristopher Crowley
Jan 17, 20183 Steps Towards IT/OT ConvergenceEric Cosman, Doug Wylie, Gregory Hale
Jan 16, 2018Head HackingTim Medin
Jan 16, 2018Certifying Cyber Personnel Who Protect the Electric GridTim Conway
Jan 15, 2018Secure DevOps: Faster Feedback with Effective Security Unit Tests in CI / CDEric Johnson
Jan 11, 2018Third Party Risk Assessment: Using BitSight for Consistent and Continuous Risk RatingBitsightMichael Roling, John Pescatore
Jan 11, 2018What Event Logs? Part 1: Attacker Tricks to Remove Event LogsMatt Bromiley
Jan 9, 2018Introducing the *NEW* SANS Pen Test Poster - Building A Better Pen Tester - BlueprintEd Skoudis, Jason Blanchard
Jan 9, 2018Improving Your Defenses - CredentialGuard in Windows 10Erik Van Buggenhout, Stephen Sims
Jan 9, 2018Meltdown and Spectre - understanding and mitigating the threatsJake Williams
Jan 4, 2018Meltdown and Spectre - understanding and mitigating the threatsJake Williams

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.