The Best Online Cybersecurity Training in the World - SANS OnDemand

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
December 31, 2019
1:00pm EST
(18:00:00 UTC)
What you Need To Know About The Critical Citrix Gateway (Netscaler) Vulnerability CVE-2019-19781Jason Lam, Johannes Ullrich
December 20, 2019
10:30am EST
(15:30:00 UTC)
Dont Patch - Transformative Security Programs go Beyond the VulnerabilityMatthew Toussain
December 19, 2019
1:00pm EST
(18:00:00 UTC)
How to Leverage a CASB for Your AWS EnvironmentAWS MarketplaceKyle Dickinson, David Aiken
December 18, 2019
3:30pm EST
(20:30:00 UTC)
Cloud Security Vulnerabilities, Management, and CommunicationDavid Hazar
December 18, 2019
1:00pm EST
(18:00:00 UTC)
Workforce Transformation and Risk: A SANS SurveyRSADavid Hazar, Tony Karam
December 18, 2019
10:30am EST
(15:30:00 UTC)
How to use Strategic CTI to address shortfalls in understanding systemic cyber riskLincoln Kaffenberger
December 17, 2019
1:00pm EST
(18:00:00 UTC)
Accuracy Before Automation: How to Implement SOARStratozenKevin Prince, John Pescatore
December 17, 2019
10:30am EST
(15:30:00 UTC)
WhatsApp End To End Encryption DemystifiedRaul Siles
December 13, 2019
3:30pm EST
(20:30:00 UTC)
Hacking Common AD MisconfigurationsTim Medin
December 13, 2019
1:00pm EST
(18:00:00 UTC)
10 Visibility Gaps Every CISO Must FillCisco Systems Inc. Russell Eubanks
December 12, 2019
3:30pm EST
(20:30:00 UTC)
Getting Your Head in the Cloud: Implementing Security Monitoring for Public CloudsCisco Systems Inc. Sunil Amin
December 12, 2019
1:00pm EST
(18:00:00 UTC)
Protecting the User: A Review of Mimecasts Web Security ServiceMimecast Services LimitedDan Sloshberg, David Szili
December 11, 2019
3:30pm EST
(20:30:00 UTC)
7 Myths of Security Automation: Be Clear on What It Can AchieveFiremonTim Woods
December 11, 2019
1:00pm EST
(18:00:00 UTC)
OUTFIGHT the adversary: Anticipate threats instead of reacting to themFidelis Cybersecurity Dr. Abdul Rahman, Dave Shackleford
December 11, 2019
10:30am EST
(15:30:00 UTC)
The SANS Purple Team Curriculum - SEC599 and SEC699Erik Van Buggenhout
December 10, 2019
3:30pm EDT
(20:30:00 UTC)
Securing Microservices in Containerized EnvironmentsThreat StackTim Buntel, Jacob Williams
December 10, 2019
1:00pm EST
(18:00:00 UTC)
How To Threat Hunt in Encrypted Network TrafficCorelight Aaron Soto, Matt Bromiley
December 10, 2019
10:30am EST
(15:30:00 UTC)
Script malicieux et compilation de code source pour contourner les contrôles de sécurité. Xavier Mertens
December 9, 2019
10:30am EST
(15:30:00 UTC)
Threat Hunting with Consistency - A SANS WhitepaperVectra Networks Inc.Matt Bromiley, Chris Morales
December 6, 2019
1:00pm EST
(18:00:00 UTC)
You have to see the criminal to catch the criminal. The most relevant data to monitor, ranked.CI SecurityMike Simon, Brandon McCrillis
December 5, 2019
3:30pm EST
(20:30:00 UTC)
How to Build a Threat Hunting Capability in AWSAWS MarketplaceDavid Aiken, Shaun McCullough
December 5, 2019
1:00pm EST
(18:00:00 UTC)
Why Its Time for a New Link Analysis PlatformKing & UnionJohn Pescatore
December 5, 2019
10:30am EST
(15:30:00 UTC)
OUTMANEUVER the adversary-Alter your cyber terrain by making attacks more difficult Fidelis Cybersecurity Dr. Abdul Rahman, Dave Shackleford
December 4, 2019
3:30pm EST
(20:30:00 UTC)
Simplifying Response with the Mitre ATT&CK FrameworkOpenText Inc.Justin Henderson, Anthony Di Bello, JJ Cranford
December 4, 2019
10:30am EST
(15:30:00 UTC)
Workforce Development What Works Jason Jury Booz Allen HamiltonJason Jury, John Pescatore
December 3, 2019
3:30pm EST
(20:30:00 UTC)
Cloud Storage Forensics: Endpoint EvidenceChad Tilbury
December 3, 2019
1:00pm EDT
(18:00:00 UTC)
2019 SANS Survey on Next-Generation Endpoint Risks and ProtectionsCisco Systems

OpenText Inc.

Sophos Inc.

VMWare Carbon Black
Justin Henderson, John Hubbard
December 2, 2019
1:00pm EST
(18:00:00 UTC)
3 Critical Concepts That New SOC Analysts Must MasterJohn Hubbard
November 26, 2019
3:30pm EST
(20:30:00 UTC)
Accelerate Your Career By Building FIVE Critical Professional SkillsTed Demopoulos
November 26, 2019
1:00pm EST
(18:00:00 UTC)
Move to Cloud: A Chance to Finally Transform Security?Google LLCMatt Bromiley, Dr. Anton A. Chuvakin, Brandon Levene
November 22, 2019
3:30pm EST
(20:30:00 UTC)
Security Vulnerability Prioritization: Managing Millions of VulnsJonathan Risto
November 22, 2019
1:00pm EST
(18:00:00 UTC)
Six Steps to Effective ICS Threat Hunting Dragos, Inc.Tim Conway, Marc Seitz, Dan Gunter
November 21, 2019
1:00pm EST
(18:00:00 UTC)
Maximizing Threat Hunting Efficiency with Automated QueriesCisco Systems Inc. Eric Hulse, Daniel Bates
November 21, 2019
10:30am EST
(15:30:00 UTC)
Beyond detection: An Exploration of Key Pillars of the Next-gen SIEM Devo Technology Inc.Jason Mical, Justin Henderson
November 20, 2019
1:00pm EST
(18:00:00 UTC)
OUTPERFORM the adversary with tactical decision-making and rapid responseFidelis Cybersecurity Craig Harber, Dave Shackleford
November 20, 2019
10:30am EST
(15:30:00 UTC)
Threat Intelligence Driven Detect and Response OperationsBitdefender SRLJacob Williams, Daniel Clayton, Ryan Moon
November 19, 2019
1:00pm EST
(18:00:00 UTC)
Someone to Watch Over You: A Review of CrowdStrikes Falcon OverWatchCrowdStrike, Inc.Joe Sullivan, Scott Taschler
November 18, 2019
10:30am EST
(15:30:00 UTC)
A Blueprint for Designing a New Security PerimeterNetskopeBob Gilbert
November 15, 2019
8:30am EST
(13:30:00 UTC)
SANS Dark Web Solutions Forum - Illuminating the Dark Web: Harvesting and Using OSINT Data from Dark Web ResourcesTerbium Labs

Sophos Inc.

Viavi Solutions

RecordedFuture
Micah Hoffman
November 14, 2019
3:30pm EST
(20:30:00 UTC)
Hiring and retaining for the SOC: Recruit, Train, and Retain Talented and Dedicated StaffChris Crowley
November 14, 2019
1:00pm EST
(18:00:00 UTC)
How to Perform a Security Investigation in AWSAWS MarketplaceKyle Dickinson, David Aiken
November 13, 2019
3:30pm EST
(20:30:00 UTC)
Taming Linux for Enterprise SecurityCmdMatt Bromiley, John Brunn, Brian Gladstein
November 13, 2019
1:00pm EST
(18:00:00 UTC)
SOARing beyond aggregation: How to achieve meaningful correlation and prioritization of security alerts and actionsSwimlaneNick Tausek, Jake Williams
November 12, 2019
3:30pm EST
(20:30:00 UTC)
SEC588: Cloud Penetration Testing. What is it? What's different, and why?Moses Frost
November 12, 2019
1:00pm EST
(18:00:00 UTC)
Building on ICS Security BasicsWhats Next?Tripwire, Inc.Matthew Luallen, Kristen Poulos, Joseph Blankenship
November 12, 2019
10:30am EDT
(15:30:00 UTC)
Successful Infosec Consulting: Lessons from Three Decades in The FieldTed Demopoulos
November 8, 2019
1:00pm EST
(18:00:00 UTC)
Lessons from the Trenches: Implementing Zero Trust Data Centers in the Real WorldShieldXDave Karp, Chase Cunningham
November 8, 2019
10:30am EST
(15:30:00 UTC)
What's New in SEC575: Mobile Device Security and Ethical HackingErik Van Buggenhout, Jeroen Beckers
November 7, 2019
3:30pm EST
(20:30:00 UTC)
Data Governance: What Dark secrets lurk in your Salesforce instance?RevCultPete Thurston, Dave Shackleford
November 7, 2019
1:00pm EST
(18:00:00 UTC)
What Works in SOC/NOC Integration: Improving Time to Detect, Respond and Contain with ExtraHop Reveal(x)ExtraHopJohn Pescatore, Mitch Roberson
November 7, 2019
10:30am EST
(15:30:00 UTC)
Evade Me If You Can: Unmasking Context-Aware MalwareVMRay Brandon McCrillis, Tamas Boczan
November 6, 2019
3:30pm EST
(20:30:00 UTC)
Evaluating Network Traffic Analysis Systems Requirements and Challenges Awake SecurityDavid Pearson, Kevin Tolly
November 6, 2019
10:30am EST
(15:30:00 UTC)
Hear me SOAR - Using Elastic, ElastAlert and TheHive in an effective purple team pipeline
November 5, 2019
3:30pm EST
(20:30:00 UTC)
Interested in Smartphone Forensics?Domenica Crognale
October 30, 2019
3:30pm EDT
(19:30:00 UTC)
Threat Hunting for New and Experienced Hunters: Panel Discussion of the SANS 2019 Threat Hunting SurveyDomainTools

ExtraHop

ThreatConnect
Mathias Fuchs, Joshua Lemon, Matt Cauthorn, Alex Valdivia, Taylor Wilkes-Pierce
October 30, 2019
1:00pm EDT
(17:00:00 UTC)
Securing Your Modern Data Center Palo Alto NetworksChrister Swartz, Dave Shackleford
October 30, 2019
10:30am EDT
(14:30:00 UTC)
Attacking and Defending Cloud Metadata ServicesEric Johnson
October 29, 2019
3:30pm EDT
(19:30:00 UTC)
SANS 2019 Threat Hunting Survey: The Differing Needs of New and Experienced HuntersAnomali

Authentic8

VMWare Carbon Black

DomainTools

ExtraHop

Lastline

ThreatConnect

ThreatQuotient

Sophos Inc.

Verodin
Mathias Fuchs, Joshua Lemon
October 29, 2019
10:30am EDT
(14:30:00 UTC)
Real World Challenges for PCI Compliant ContainersThreat StackTim Buntel, John Pescatore, Katie Paugh
October 28, 2019
1:00pm EDT
(17:00:00 UTC)
Human Fingerprints in Malware and their Use in Cyber Threat Intelligence Robert M. Lee, Tobias Johansson
October 25, 2019
10:30am EST
(14:30:00 UTC)
Have You Taken The \"Endpoint Blue Pill\"? Debunking The Endpoint Protection Myth.Cisco Systems Inc. Justin Henderson, Ismael Valenzuela
October 24, 2019
3:30pm EDT
(19:30:00 UTC)
Successful Infosec Consulting 101Ted Demopoulos
October 24, 2019
10:30am EDT
(14:30:00 UTC)
Untapped Potential: Getting the most out of your SIEMJustin Henderson, John Hubbard
October 23, 2019
3:30pm EDT
(19:30:00 UTC)
Modern Web Application Penetration Testing Part 1, XSS and XSRF TogetherAdrien de Beaupré
October 23, 2019
1:00pm EDT
(17:00:00 UTC)
Lessons Learned from Over a Thousand Threat Hunting WorkshopsCisco Systems Inc. Brandon Newport
October 23, 2019
10:30am EDT
(14:30:00 UTC)
JumpStart Guide to Security Investigations and Posture Management in Amazon Web ServicesAWS MarketplaceKyle Dickinson, Tim Jefferson, David Aiken
October 22, 2019
3:30pm EST
(19:30:00 UTC)
Are you prepared for a Ransomware Attack?Cisco Systems Inc. Peter Romness, John Pescatore
October 22, 2019
1:00pm EDT
(17:00:00 UTC)
Converged Threat and Performance Management Listen to Your Network!Viavi SolutionsWard Cobleigh, John Pescatore
October 22, 2019
11:00am EDT
(15:00:00 UTC)
Are Your Security Controls Yesterday's News?CymulateMatt Bromiley, Eyal Ahraoni
October 21, 2019
1:00pm EDT
(17:00:00 UTC)
Windows User Enumeration, Living off the landDale Hobbs
October 18, 2019
8:30am MST
(14:30:00 UTC)
SANS Cloud Security Operations Solutions ForumCisco Systems Inc.

Microsoft

Swimlane

CloudPassage
October 17, 2019
1:00pm EST
(17:00:00 UTC)
How Attackers Exploit Office 365 VulnerabilitiesNetwrixJohn Pescatore, Jeff Melnick
October 16, 2019
11:00pm EST
(03:00:00 UTC)
Power up your Security Operations Centers human capital with the new SEC450 Part 2 - Blue Team FundamentalsFinding and training the right people!John Hubbard
October 15, 2019
3:30pm EDT
(19:30:00 UTC)
Launching APOLLO - Creating a Simple Tool for Advanced Forensic AnalysisSarah Edwards
October 15, 2019
1:00pm EDT
(17:00:00 UTC)
Pivotal Platform - Getting Started with Native Runtime Protection for PASAqua Security Inc. Bryan Morrow, Dave Shackleford
October 15, 2019
10:30am EDT
(14:30:00 UTC)
How to Inject Security Into Your Software Development Life Cycle - Close Security Gaps in Your Software Supply Chain Through Automation and Deep AnalysisReversing Labs
October 10, 2019
3:30pm EDT
(19:30:00 UTC)
Improve Network Security with Application IntelligenceIxiaChristophe Olivier, Sarah Gross
October 10, 2019
1:00pm EDT
(17:00:00 UTC)
How to Secure App Pipelines in AWSAWS MarketplaceDave Shackleford, David Aiken
October 7, 2019
1:00pm EDT
(17:00:00 UTC)
When Hacking Becomes Deadly InfoSec in the Age of Connected Medical DevicesKenneth May
October 4, 2019
3:30pm EST
(19:30:00 UTC)
Manage Vulnerabilities through the Software Lifecycle: How to Enable Secure DevOpsZeroNorthBrandon Helms, Andrei Bezdedeanu
October 3, 2019
3:30pm EDT
(19:30:00 UTC)
IT, OT, and IOT Oh, My! Learn to See and Secure It AllIxiaTim Jones, Dennis Carpio
October 3, 2019
1:00pm EDT
(17:00:00 UTC)
Red, Blue and Purple Teams: Combining Your Security Capabilities for the Best OutcomeCore Security TechnologiesChris Dale, Bobby Kuzma
October 2, 2019
3:30pm EDT
(19:30:00 UTC)
Dominating the Active DirectoryErik Van Buggenhout
October 2, 2019
1:00pm EDT
(17:00:00 UTC)
How to Effectively Use Segmentation and MicrosegmentationVMWare, IncDave Shackleford, Nick Furman
October 1, 2019
1:00pm EST
(17:00:00 UTC)
Demystifying The Hunt: How to Assess Your Threat Hunting Readiness and Prepare for the Next StepCorelight

Optiv
Gary Fisk, Fayyaz Rajpari, Matt Bromiley
October 1, 2019
10:30am EST
(14:30:00 UTC)
ExtraHop Reveal(x) Expands Attack Investigations to Cover All VectorsExtraHopDave Shackleford, Tom Stitt
September 30, 2019
1:00pm EDT
(17:00:00 UTC)
The perils and perks of cloud access securityDavid Hazar
September 27, 2019
8:00am EDT
(12:00:00 UTC)
Vulnerability Management Vendor Briefing: Decreasing the Attack Surface with Effective Vulnerability ManagementAkamai Technologies

Arctic Wolf Networks

Cisco Systems Inc.

CloudPassage

ZeroNorth
Matt Bromiley
September 26, 2019
3:30pm EDT
(19:30:00 UTC)
NetOps and SecOps: Cant We All Just Get Along?"IxiaScott Register, Ryan Davis
September 26, 2019
1:00pm EDT
(17:00:00 UTC)
Speaking the Language of the BoardUnisys
September 26, 2019
10:30am EDT
(14:30:00 UTC)
Learn about the New SIEM Poster - Architecture, Enrichment, and MoreJustin Henderson
September 25, 2019
3:30pm EDT
(19:30:00 UTC)
Threat Hunting in the Cloud: Time for a Power-Up?Ben Johnson
September 25, 2019
1:00pm EDT
(17:00:00 UTC)
Effectively Addressing Advanced ThreatsIBM SecurityMatt Bromiley, Lauren Horaist
September 25, 2019
10:30am EDT
(14:30:00 UTC)
Lights Out: Inside the Mind of a Utility HackerThycoticJoseph Carson
September 24, 2019
1:00pm EDT
(17:00:00 UTC)
The DNS Privacy Debate, Explained: Making the Right Choice between DNS over TLS and DNS over HTTPSInfoBloxPaul Adair, Dave Shackleford
September 24, 2019
10:30am EDT
(14:30:00 UTC)
Jumpstart Guide to Application Security in the CloudAWS MarketplaceNathan Getty, Aidan Walden, Nam Le
September 23, 2019
1:00pm EDT
(17:00:00 UTC)
Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security CapabilitiesFidelis Cybersecurity Matt Bromiley, Gerald Mancini
September 20, 2019
3:30pm EDT
(19:30:00 UTC)
Hacking Your Way to Business KnowledgeKevin Garvey
September 20, 2019
10:30am EDT
(14:30:00 UTC)
Easing Into Consulting; Consulting on The Side & Other ApproachesTed Demopoulos
September 19, 2019
1:00pm EDT
(17:00:00 UTC)
Modern Threat Hunting And Response: How TTPs Are Changing The GameExabeamOrion Cassetto, Trevor Daughney
September 19, 2019
10:30am EDT
(14:30:00 UTC)
Live Webinar: Micro-Segmentation for Network Security Strategy to ExecutionAlgoSec Systems, Ltd.Avishai Wool, Dave Shackleford
September 18, 2019
1:00pm EDT
(17:00:00 UTC)
Yes, IT and OT Are Converging. So How Does This Affect Compliance?Forescout Technologies BVDon C. Weber
September 17, 2019
1:00pm EDT
(17:00:00 UTC)
Elevating Enterprise Security with Fidelis Cybersecurity: Network and DeceptionFidelis Cybersecurity Matt Bromiley, Gerald Mancini
September 16, 2019
11:00pm EST
(03:00:00 UTC)
Power up your Security Operations Center with the new SEC450 Part 1 - Blue Team FundamentalsCreating an on-ramp for new defenders!John Hubbard
September 16, 2019
1:00pm EDT
(17:00:00 UTC)
Keeping the Technical in Technical ManagementKevin Garvey
September 12, 2019
1:00pm EDT
(17:00:00 UTC)
How to Build a Threat Detection Strategy in AWSAWS MarketplaceDavid Szili, David Aiken
September 10, 2019
1:00pm EDT
(17:00:00 UTC)
Success Patterns for Supply Chain SecurityInteros

Panorays
John Pescatore
September 10, 2019
10:30am EDT
(14:30:00 UTC)
Advanced Zeek Usage: Scripting and FrameworkDavid Szili
September 9, 2019
1:00pm EDT
(17:00:00 UTC)
Enabling KAPE at ScaleMark Hallman
September 5, 2019
3:30pm EST
(19:30:00 UTC)
How to accelerate your cyber security careerStephen Sims
September 3, 2019
3:30pm EDT
(19:30:00 UTC)
The State of Malware Analysis: Advice from the TrenchesJim Clausing, Evan Dygert, Anuj Soni, Jake Williams, Lenny Zeltser
September 3, 2019
1:00pm EDT
(17:00:00 UTC)
Getting the Knack of ATT&CKRapid7 Inc.Bob Rudis
August 29, 2019
3:30pm EDT
(19:30:00 UTC)
Don't Open These-- The Five Most Dangerous File TypesPalo Alto NetworksDave Shackleford, Erik Yunghans, John Harrison
August 29, 2019
1:00pm EDT
(17:00:00 UTC)
Strengthening and Optimizing Your Security Posture from the Foundation UpInfoBloxSrikrupa Srivatsan, Dave Shackleford
August 29, 2019
10:30am EDT
(14:30:00 UTC)
New hosted course: ICS Cybersecurity for ManagersDoug Wylie, Paul Rostick, John Cusimano
August 28, 2019
3:30pm EDT
(19:30:00 UTC)
More Super Practical Blue Tips, Tools, and Lessons Learned from Team-Based Training: Coordinating Hand-Offs, Your Buddy RITA, and Microsoft Message Analyzer FOR THE WIN!Ed Skoudis, Joshua Wright
August 28, 2019
1:00pm EDT
(17:00:00 UTC)
JumpStart Guide for Security Information and Event Management (SIEM) in AWSAWS Marketplace

Optiv
J. Michael Butler, David Aiken, Jay Austad
August 27, 2019
3:30pm EDT
(19:30:00 UTC)
The Cycle of Cyber Threat IntelligenceKatie Nickels
August 27, 2019
1:00pm EDT
(17:00:00 UTC)
Meet Your New Best Friend: DNS SecurityCisco Systems Inc. Rachel Ackerly
August 27, 2019
10:30am EDT
(14:30:00 UTC)
How to Identify Hidden & Destructive Objects in Your EnvironmentReversing Labs
August 26, 2019
1:00pm EDT
(17:00:00 UTC)
So you Wanna Start a TI ProgramChristian Nicholson
August 22, 2019
3:30pm EDT
(19:30:00 UTC)
Purple Teaming: The Pen-Test Grows UpBryce Galbraith
August 21, 2019
3:30pm EDT
(19:30:00 UTC)
Kerberos & Attacks 101Tim Medin
August 21, 2019
10:30am EDT
(14:30:00 UTC)
ICS 612 Practitioner focused Hands on cybersecurityTim Conway
August 20, 2019
11:00pm EST
(03:00:00 UTC)
Leveraging OSINT for Better DFIR InvestigationsJeff Lomas, Micah Hoffman
August 20, 2019
1:00pm EDT
(17:00:00 UTC)
Focus On People, Process, and Technology to Take Your SOC to the Next LevelAnomali John Kitchen, John Pescatore
August 19, 2019
1:00pm EDT
(17:00:00 UTC)
Legacy Authentication and Password Spray, Understanding and Stopping Attackers Favorite TTPs in Azure ADMark Morowczynski, Ramiro Calderon
August 15, 2019
1:00pm EDT
(17:00:00 UTC)
The Beginners Guide to Applying Machine Learning to Incident ResponseDomainToolsDave Shackleford
August 14, 2019
1:00pm EDT
(17:00:00 UTC)
Stop Letting Security Fail. Identify the True ProblemEndgameIan McShane, Matt Bromiley
August 14, 2019
10:30am EDT
(14:30:00 UTC)
Practical tips to build a successful purple teamErik Van Buggenhout
August 13, 2019
3:30pm EDT
(19:30:00 UTC)
Triage Collection and Timeline Analysis with KAPEMari DeGrazia
August 13, 2019
1:00pm EDT
(17:00:00 UTC)
Visibility for Incident Response: A Review of Forescout 8.1Forescout Technologies BVDon Murdoch, Sandeep Kumar
August 8, 2019
3:30pm EDT
(19:30:00 UTC)
SANS Introduction to Python CourseMark Baggett
August 8, 2019
1:00pm EDT
(17:00:00 UTC)
How to Protect Enterprise Systems with Cloud-Based FirewallsAWS MarketplaceKevin Garvey, David Aiken
August 8, 2019
10:30am EST
(14:30:00 UTC)
Neighborhood Keeper: A Collaborative Initiative for Our ICS CommunityDragos, Inc.Robert M. Lee, Tim Conway, Matt Bodman
August 7, 2019
1:00pm EDT
(17:00:00 UTC)
The Age of Autonomous Breach Protection: Prepare, confront and Respond to Cyberthreats Across the Entire EnvironmentCynetYiftach Keshet, Dave Shackleford
August 7, 2019
10:30am EDT
(14:30:00 UTC)
A Ghidra Test DriveJim Clausing
August 6, 2019
1:00pm EDT
(17:00:00 UTC)
Backstory + VirusTotal: How to get the most out of your security dataGoogle LLCMatt Bromiley
August 5, 2019
1:00pm EDT
(17:00:00 UTC)
Security Inside the Perimeter with VMwareVMWare, IncArjun Narang
August 2, 2019
3:30pm EDT
(19:30:00 UTC)
ATT&CKing your Enterprise: Adversary Detection Pipelines & Adversary SimulationXena Olsen, Ben Goerz
August 2, 2019
1:00pm EDT
(17:00:00 UTC)
Integrated Incident Response: A Panel Discussion about the SANS 2019 IR SurveyDomainTools

ExtraHop
John Smith, Corin Imai, Matt Bromiley
August 2, 2019
10:30am EDT
(14:30:00 UTC)
Hunting LOLBin Activity with Process MemoryAlissa Torres
August 1, 2019
1:00pm EDT
(17:00:00 UTC)
Integrated Incident Response: A SANS SurveyDFLabs

DomainTools

ExtraHop

InfoBlox

King & Union

OpenText Inc.

Unisys

Swimlane
Matt Bromiley
July 31, 2019
10:30am EDT
(14:30:00 UTC)
JumpStart Guide to Cloud-Based Firewalls in AWSAWS Marketplace

Optiv
Brian Russell, Anthony Tanzi, David Aiken
July 30, 2019
1:00pm EDT
(17:00:00 UTC)
URL Filtering Best Practices-- Making Your Web Security Policy Work for YouPalo Alto NetworksDave Shackleford, Suzanne VanPatten, Kelvin Kwan
July 29, 2019
1:00pm EDT
(17:00:00 UTC)
Is Your Plant Cyber Resilient? Next Steps to Achieving Safe and Secure Plant OperationYokogawa Corporation of AmericaCamilo Gomez, Barbara Filkins
July 25, 2019
1:00pm EDT
(17:00:00 UTC)
A Cyber-First Approach to Disaster RecoverySemperis Darren Mar-Elia, John Pescatore
July 25, 2019
10:30am EDT
(14:30:00 UTC)
A BEAST and a POODLE celebrating SWEET32Bojan Zdrnja
July 24, 2019
11:00pm EST
(03:00:00 UTC)
The Global Privacy Law ImperativeBenjamin Wright, Grace Chong
July 24, 2019
3:30pm EDT
(19:30:00 UTC)
Rethinking Vulnerability ManagementKevin Garvey
July 23, 2019
1:00pm EDT
(17:00:00 UTC)
Tips, Tricks, and Cheats Gathered from Red vs. Blue Team-Based TrainingEd Skoudis, Joshua Wright
July 22, 2019
1:00pm EDT
(17:00:00 UTC)
UNDERSTANDING THE FORENSIC SCIENCE IN DIGITAL FORENSICSJason Jordaan
July 18, 2019
1:00pm EDT
(17:00:00 UTC)
How to Build an Endpoint Security Strategy in AWSAWS MarketplaceThomas Banasik, David Aiken
July 17, 2019
10:30am EDT
(14:30:00 UTC)
You can rest easy when protecting REST APIsJason Lam
July 11, 2019
1:00pm EDT
(17:00:00 UTC)
Common and Best Practices for Security Operations Centers: Panel DiscussionExtraHop

Siemplify

ThreatConnect
Christopher Crowley, Jody Caldwell, Jeff Costlow, Steve Salinas
July 11, 2019
10:30am EDT
(14:30:00 UTC)
Managed Security Services for OT Networks Simplifying Your OT Security JourneyRadiflowIlan Barda
July 10, 2019
3:30pm EDT
(19:30:00 UTC)
The Critical Security Controls and Some Recent Data Breaches
July 10, 2019
1:00pm EDT
(17:00:00 UTC)
Common and Best Practices for Security Operations Centers: Results of the 2019 SOC SurveyAnomali

BTB Security

CYBERBIT Commercial Solutions

DFLabs

ExtraHop

Siemplify

ThreatConnect

CyberProof
Christopher Crowley
July 9, 2019
3:30pm EDT
(19:30:00 UTC)
Simplify Your Office 365 MigrationValimail Sibrina Subedar, Brandon Helms
July 9, 2019
10:30am EDT
(14:30:00 UTC)
Leveraging Your SIEM to Implement Security Best PracticesRapid7 Inc.
July 3, 2019
3:30pm EST
(19:30:00 UTC)
Effective Threat HuntingChris Dale
July 3, 2019
10:30am EDT
(14:30:00 UTC)
Leading Change for CISOsCisco Systems Inc. Lance Spitzner
July 1, 2019
2:00pm EDT
(18:00:00 UTC)
Adversaries have goals too!
June 28, 2019
3:30pm EDT
(19:30:00 UTC)
Next-Gen Vulnerability Management: Clarity, Consistency, and CloudDavid Hazar
June 28, 2019
1:00pm EDT
(17:00:00 UTC)
Why Traditional EDR Is Not Working--and What to Do About ItMcafee LLCJake Williams, Ismael Valenzuela
June 27, 2019
1:00pm EDT
(17:00:00 UTC)
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksForescout Technologies BVSandeep Lota, Dean Parsons
June 27, 2019
10:30am EST
(14:30:00 UTC)
Hitting the Silent Alarm on Banking Trojans VMRay Jacob Williams, Rohan Viegas, Tamas Boczan
June 26, 2019
3:30pm EDT
(19:30:00 UTC)
Practical Approach to Vendor Risk Management & Data PrivacySpirionNorman Levine
June 26, 2019
1:00pm EDT
(17:00:00 UTC)
Malicious Bots: How they became #1 New Threat and How to Stop ThemCequenceArif Husain
June 26, 2019
10:30am EST
(14:30:00 UTC)
Gaining Complete Visibility of Your Environment with Attack Surface MonitoringRapid7 Inc.Jon Hart, Tori Sitcawich
June 25, 2019
3:30pm EDT
(19:30:00 UTC)
Cloud Data ProtectionMark Geeslin
June 25, 2019
1:00pm EDT
(17:00:00 UTC)
Building and Maturing Your Threat Hunt ProgramCisco SystemsDavid Szili
June 25, 2019
10:30am EDT
(14:30:00 UTC)
JumpStart Guide for Endpoint Security in AWSAWS MarketplaceDavid Hazar, Joe Vadakkan, David Aiken
June 24, 2019
4:00pm EST
(20:00:00 UTC)
Live from the Security Operations Summit: Rethinking the SOC for Long-Term Success & 2019 SANS SOC Survey PreviewJohn Hubbard, Chris Crowley
June 24, 2019
1:00pm EDT
(17:00:00 UTC)
Addressing Consumer Safety Concerns With Zero Trust SecurityUnisysChris Kloes
June 21, 2019
10:30am EDT
(14:30:00 UTC)
Web App Testing 101 - Getting the Lay of the LandMike Saunders
June 20, 2019
3:30pm EDT
(19:30:00 UTC)
How To Increase MITRE ATT&CK Coverage with Network Traffic AnalysisExtraHopChris Crowley, John Smith
June 20, 2019
1:00pm EDT
(17:00:00 UTC)
Bolster your Cyber Terrain with Endpoint ForensicsFidelis Cybersecurity Alissa Torres, Justin Swisher
June 19, 2019
1:00pm EDT
(17:00:00 UTC)
Converging OT and IT Networks: Where and How to Evolve ICS for SecurityNozomi Networks

Radiflow

Yokogawa Corporation of America
Barbara Filkins, Doug Wylie, Ilan Barda, Camilo Gomez, Kim Legelis
June 19, 2019
8:30am EST
(12:30:00 UTC)
SANS FedRAMP Technology WorkshopAmazon Web Services, Inc.

IBM

Rackspace

CrowdStrike, Inc.

Okta
John Pescatore
June 18, 2019
1:00pm EDT
(17:00:00 UTC)
Managing the Insider Threat: Why Visibility Is CriticalObserveITSai Chavali, John Pescatore
June 18, 2019
10:30am EDT
(14:30:00 UTC)
Increasing Visibility with Ixia's Vision ONEIxiaSerge Borso, Taran Singh
June 14, 2019
1:00pm EDT
(17:00:00 UTC)
DDI data a Critical Enabler of SOAR InfoBloxSrikrupa Srivatsan, Dave Shackleford
June 14, 2019
10:30am EDT
(14:30:00 UTC)
Five Keys for Successful Vulnerability ManagementJonathan Risto
June 13, 2019
3:30pm EDT
(19:30:00 UTC)
Authentication: It Is All About the User ExperienceYubicoMatt Bromiley, Hormazd Romer
June 13, 2019
1:00pm EDT
(17:00:00 UTC)
How to Build a Data Protection Strategy in AWSAWS MarketplaceDave Shackleford, David Aiken
June 12, 2019
3:30pm EDT
(19:30:00 UTC)
Using Zeek/Bro To Discover Network TTPs of MITRE ATT&CK​Corelight Richard Bejtlich, James Schweitzer
June 12, 2019
1:00pm EDT
(17:00:00 UTC)
SANS 2019 State of OT/ICS Cybersecurity SurveyCisco Systems Inc.

Forescout Technologies BV

Owl Cyber Defense

Nozomi Networks

Radiflow

Yokogawa Corporation of America
Jason Dely, Barbara Filkins, Doug Wylie
June 12, 2019
10:30am EDT
(14:30:00 UTC)
Cybersecurity Frameworks for CISOsCisco Systems Inc. Frank Kim
June 11, 2019
3:30pm EDT
(19:30:00 UTC)
The 20 Critical Security Controls: From Framework to Operational to ImplementationRandy Marchany
June 10, 2019
2:00pm EDT
(18:00:00 UTC)
ICS Active Defense PrimerKai Thomsen
June 7, 2019
1:00pm EST
(17:00:00 UTC)
SIEM as Alexa How Natural Language Processing Can Transform Your Cyber Security ExperienceEmpowDave Shackleford, Avi Chesla
June 6, 2019
1:00pm EDT
(17:00:00 UTC)
Missing Information About Security Misconfiguration? Explore this often-used vulnerability category through data from 1000+ pentestsCobalt Labs, Inc. c/o MindspaceJohn Pescatore, Joe Sechman
June 5, 2019
3:30pm EDT
(19:30:00 UTC)
Power up your Security Operations Centers human capital with the new SEC450 Part 2 - Blue Team FundamentalsFinding and training the right people!John Hubbard
June 5, 2019
1:00pm EDT
(17:00:00 UTC)
How SOC Superheroes WinUnisys

LogRhythm
Salvatore Sinno, Ismael Cervantes
June 4, 2019
1:00pm EDT
(17:00:00 UTC)
Lessons From the Front Lines of AppSec: Analysis of real-world attacks from 2019 and best practices for dealing with themThreatXChris Brazdziunas, Will Woodson
June 4, 2019
10:30am EDT
(14:30:00 UTC)
The Future of Authentication: How Two Factor Authentication is Dying and Whats NextYubicoJohannes Ullrich, PhD
May 30, 2019
10:30am EDT
(14:30:00 UTC)
Secure Kubernetes Application DeliveryAndrew Martin
May 28, 2019
11:00pm EST
(03:00:00 UTC)
Fileless Malware FunHal Pomeranz
May 28, 2019
3:30pm EDT
(19:30:00 UTC)
Cloud Security Automation: Monitoring and OperationsFrank Kim
May 28, 2019
10:30am EST
(14:30:00 UTC)
Streamlining Your Security Process with Orchestration & AutomationRapid7 Inc.
May 24, 2019
3:30pm EDT
(19:30:00 UTC)
IoT vulnerability and security is the next frontierLee Reiber
May 24, 2019
10:30am EDT
(14:30:00 UTC)
Defensible Security Architecture and Engineering Part 3: Protect your Lunch Money Keeping the Thieves at BayIsmael Valenzuela, Justin Henderson
May 23, 2019
1:00pm EDT
(17:00:00 UTC)
What Real-World Attacks Look Like and How to Stop Them in Their TracksNetwrixDave Shackleford, Brian Johnson
May 22, 2019
1:00pm EDT
(17:00:00 UTC)
Actionable IT/OT end point protection to: detect, contain, and respond to limit ICS cyber threatsVerveRon Brash
May 22, 2019
10:30am EDT
(14:30:00 UTC)
SEC599: Defeating Advanced Adversaries Discover whats NEW in Purple Team.Latest course updates!Erik Van Buggenhout
May 21, 2019
1:00pm EDT
(17:00:00 UTC)
Passive Isn't Good Enough: Moving into Active EDRSentinelOneJustin Henderson, Migo Kedem
May 15, 2019
3:30pm EDT
(19:30:00 UTC)
Power up your Security Operations Center with the new SEC450 Part 1 - Blue Team Fundamentals: Creating an on-ramp for new defenders!John Hubbard
May 15, 2019
1:00pm EDT
(17:00:00 UTC)
Vetting Your Intel - Techniques and Tools for False Positive AnalysisDomainToolsRobert M. Lee, Tarik Saleh
May 15, 2019
10:30am EDT
(14:30:00 UTC)
Web application defense Use headers to make pentesters job difficultJason Lam
May 14, 2019
3:30pm EDT
(19:30:00 UTC)
Hacking without Domain AdminTim Medin, Mike Saunders
May 13, 2019
3:30pm EDT
(19:30:00 UTC)
Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need.SentryoTim Conway, Michael Thompson, Bob Foley, Fayce Daira
May 9, 2019
1:00pm EDT
(17:00:00 UTC)
How to Secure a Modern Web Application in AWSAWS MarketplaceShaun McCullough, David Aiken
May 8, 2019
12:00pm EDT
(16:00:00 UTC)
Gaining a Decisive Advantage Through Terrain Based Cyber Defense Fidelis Cybersecurity Craig Harber, Rami Mizrahi
May 7, 2019
1:00pm EDT
(17:00:00 UTC)
The State of Cloud Security: Panel DiscussionExtraHop

Sysdig
Dave Shackleford, Jim Reavis, Pawan Shankar, Eric Thomas
May 7, 2019
10:30am EDT
(14:30:00 UTC)
Terraforming Azure: not as difficult as planetsAWS Marketplace: Telos CorporationDavid Hazar
May 2, 2019
3:30pm EDT
(19:30:00 UTC)
Rethinking Your Global Security PlatformGoogle LLCMatt Bromiley, Brandon Levene
May 2, 2019
1:00pm EDT
(17:00:00 UTC)
How Effective is Your WAF Protection? - Metrics & Key ConsiderationsThreatXChris Brazdziunas, Will Woodson
May 2, 2019
10:30am EDT
(14:30:00 UTC)
From Seizure to Actionable Intelligence in 90 Minutes or LessKevin Ripa
May 1, 2019
3:30pm EDT
(19:30:00 UTC)
Sharing Alerts and Threat Intelligence with MISPJustin Henderson, John Hubbard
May 1, 2019
1:00pm EDT
(17:00:00 UTC)
The State of Cloud Security: Results of the SANS 2019 Cloud Security SurveyExtraHop

Sophos Inc.

Sysdig
Dave Shackleford, Jim Reavis
May 1, 2019
10:30am EDT
(14:30:00 UTC)
A CISO's Perspective on Presenting OT Risk to the BoardCyberXIlan Abadi, Daniel Shugrue
April 30, 2019
3:30pm EDT
(19:30:00 UTC)
The Future of Phishing: Its all about your customersSegasecDave Shackleford, Elad Schulman
April 30, 2019
1:00pm EDT
(17:00:00 UTC)
What Are Fileless Attacks and How Can You Stop Them?Unisys
April 30, 2019
10:30am EDT
(14:30:00 UTC)
Defensible Security Architecture and Engineering Part 2: Thinking Red, Acting Blue Mindset & ActionsIsmael Valenzuela, Justin Henderson
April 24, 2019
3:30pm EDT
(19:30:00 UTC)
Take Back Control of Your DNS Traffic Palo Alto NetworksDave Shackleford
April 24, 2019
10:30am EDT
(14:30:00 UTC)
Why Your Vulnerability Management Strategy Is Not Working and What to Do About It Lookingglass Cyber Solutions, Inc.Brandon Helms, Eric Olson
April 23, 2019
1:00pm EDT
(17:00:00 UTC)
Delivering Infrastructure, Security and Operations as Code across Multi-cloud EnvironmentsPalo Alto NetworksVinay Venkataraghavan, Matt Bromiley
April 19, 2019
1:00pm EDT
(17:00:00 UTC)
SANS Top New Attacks and Threat ReportAnomali

DomainTools

InfoBlox

Unisys

Veracode
John Pescatore
April 18, 2019
3:30pm EDT
(19:30:00 UTC)
New Year, Same Magecart: The Continuation of Web-based Supply Chain AttacksRiskIQYonathan Klijnsma, Dave Shackleford
April 18, 2019
1:00pm EDT
(17:00:00 UTC)
Resolved: How to protect your organization when your perimeter fails VMWare, IncTom Gillis, John Pescatore
April 17, 2019
1:00pm EDT
(17:00:00 UTC)
Simplifying Application Security with Software-Defined SecurityVMWare, IncMatt De Vincentis, Dave Shackleford
April 16, 2019
1:00pm EDT
(17:00:00 UTC)
Cryptojacking - What is it? Where is it? How to protect against it?Cisco SystemsBrandon Helms, Brian McMahon
April 11, 2019
3:30pm EDT
(19:30:00 UTC)
How to Automate Compliance Gaps for Public CloudLaceworkVikram Varakantam, John Pescatore
April 11, 2019
1:00pm EDT
(17:00:00 UTC)
How to Build a Security Visibility Strategy in the CloudAWS MarketplaceDave Shackleford, David Aiken
April 10, 2019
3:30pm EDT
(19:30:00 UTC)
Alert Investigations in the SOC - Building Your WorkflowJustin Henderson, John Hubbard
April 10, 2019
1:00pm EDT
(17:00:00 UTC)
Vulnerability Practices of Tomorrow: Part 2 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable

Veracode
Andrew Laman, David Hoelzer, Gaurav Banga, Nate Dyer
April 10, 2019
10:30am EDT
(14:30:00 UTC)
Purple PowerShell: Current attack strategies & defensesErik Van Buggenhout
April 9, 2019
3:30pm EDT
(19:30:00 UTC)
Cloud Security and DevOps Automation: Keys for Modern Security SuccessEric Johnson
April 9, 2019
1:00pm EDT
(17:00:00 UTC)
Current State of Vulnerability Management: Part 1 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable

Veracode
Andrew Laman, David Hoelzer, RJ Gazarek, Michael Rosen
April 9, 2019
10:30am EDT
(14:30:00 UTC)
Next-Gen Vulnerability Management: Clarity, Consistency, and CloudDavid Hazar
April 8, 2019
1:00pm EDT
(17:00:00 UTC)
The Cyber Kill Chain and MobileIron Threat DefenseMobileIronJames Saturnio, Ilya Geller
April 3, 2019
1:00pm EDT
(17:00:00 UTC)
The Foundation of Continuous Host MonitoringOpenText Inc.Matt Bromiley, JJ Cranford
April 2, 2019
3:30pm EDT
(19:30:00 UTC)
Vulnerability Management for the Enterprise and CloudJonathan Risto
April 2, 2019
1:00pm EDT
(17:00:00 UTC)
Building a Zero Trust Model in the Cloud with MicrosegmentationUnisysJohn Kindervag, Salvatore Sinno
April 2, 2019
10:30am EDT
(14:30:00 UTC)
All Your Data Belongs to Us: How to Defend Against Credential StuffingJohannes Ullrich, PhD
March 29, 2019
10:30am EDT
(14:30:00 UTC)
Defensible Security Architecture and Engineering Part 1: How to become an All-Round Defender - the Secret SauceIsmael Valenzuela, Justin Henderson
March 28, 2019
9:30am EDT
(13:30:00 UTC)
Best Practices for Network Security ResilienceIxiaJon Oltsik, Keith Bromley
March 27, 2019
11:00am EDT
(15:00:00 UTC)
Taming the Endpoint Chaos Within: A Review of Panda Security Adaptive Defense 360Panda SecurityJustin Henderson, James Manning
March 26, 2019
1:00pm EDT
(17:00:00 UTC)
Security Gets Smart with AI: A SANS SurveyCylanceG.W. Ray Davidson, PhD, Barbara Filkins, Bret Lenmark
March 25, 2019
1:00pm EDT
(17:00:00 UTC)
Playing Moneyball in CybersecurityUnisysMatt Soderlund
March 22, 2019
2:00pm EDT
(18:00:00 UTC)
Empowering Incident Response via AutomationCisco Systems Inc. Matt Bromiley
March 21, 2019
3:30pm EDT
(19:30:00 UTC)
Alternative Network Visibility Strategies for an Encrypted WorldCorelight Gregory Bell, Matt Bromiley
March 21, 2019
1:00pm EDT
(17:00:00 UTC)
What's Next in Automation Support: Part 2 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Emily Laufer, Nick Tausek
March 21, 2019
10:30am EDT
(14:30:00 UTC)
2018 Holiday Hack Challenge Winner Announcement and More!Ed Skoudis, Joshua Wright
March 20, 2019
3:30pm EDT
(19:30:00 UTC)
Osquery: A Modern Approach to CSIRT AnalyticsUptycsDave Shackleford, Milan Shah
March 20, 2019
10:30am EDT
(14:30:00 UTC)
Hiding in Plain Sight: Dissecting Popular Evasive Malware TechniquesVMRay Jake Williams, Rohan Viegas, Tamas Boczan
March 19, 2019
1:00pm EDT
(17:00:00 UTC)
The State of Automation/Integration Practice: Part 1 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Dan Cole, Stan Engelbrecht, Darren Thomas
March 18, 2019
1:00pm EDT
(17:00:00 UTC)
Securing Your Endpoints with Carbon Black: A SANS Review of the CB Predictive Security Cloud PlatformCarbon BlackDave Shackleford, Tristan Morris
March 15, 2019
1:00pm EDT
(17:00:00 UTC)
How to Automate Compliance and Risk Management for Cloud WorkloadsAWS MarketplaceMatt Bromiley, David Aiken
March 14, 2019
10:30am EDT
(14:30:00 UTC)
USBs Behaving Badly - How to Control USB Usage in Operational NetworksHoneywell International Sam Wilson, Matt Wiseman
March 13, 2019
1:00pm EDT
(17:00:00 UTC)
Overcoming Obstacles to Secure Multi-cloud AccessPulse SecureRajoo Nagar, John Pescatore
March 12, 2019
1:00pm EDT
(17:00:00 UTC)
Maximizing SOC Effectiveness and Efficiency with Integrated Operations and DefenseNETSCOUT Systems, Inc.John Pescatore, Arabella Hallawell
March 11, 2019
1:00pm EDT
(17:00:00 UTC)
Purple Kerberos: Current attack strategies & defensesErik Van Buggenhout
March 7, 2019
3:30pm EST
(20:30:00 UTC)
Investigating WMI AttacksChad Tilbury
March 6, 2019
1:00pm EST
(18:00:00 UTC)
The State of Kubernetes SecurityAqua Security Inc. Liz Rice
March 5, 2019
1:00pm EST
(18:00:00 UTC)
SOF-ELK(R): A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security OperationsPhilip Hagen
March 1, 2019
1:00pm EST
(18:00:00 UTC)
Taking SIEM to the Cloud: A SANS Review of Securonix Next-Gen SIEMSecuronixNitin Agale, Dave Shackleford
February 28, 2019
3:30pm EST
(20:30:00 UTC)
NIST Recommendations for ICS & IIoT Security CyberXPhil Neray, Michael Powell, Jim McCarthy, Tim Zimmerman
February 27, 2019
1:00pm EST
(18:00:00 UTC)
Improving Detection and Understanding the Adversary with Deception TechnologyTrapX SecurityMatt Bromiley, Ori Bach
February 26, 2019
1:00pm EST
(18:00:00 UTC)
72-Hours-to-Disclose Survival Guide: Accurate Scoping and Impact Assessment of BreachesExtraHopJohn Matthews, John Pescatore
February 22, 2019
1:00pm EST
(18:00:00 UTC)
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid ThemLenny Zeltser
February 21, 2019
3:30pm EST
(20:30:00 UTC)
Leveraging MITRE ATT&CK and ATT&CK NavigatorErik Van Buggenhout
February 21, 2019
1:00pm EST
(18:00:00 UTC)
Prioritizing Security Operations in the Cloud through the Lens of the NIST FrameworkAWS MarketplaceJohn Pescatore, David Aiken
February 20, 2019
3:30pm EST
(20:30:00 UTC)
It's All About Scale! Succeeding in Enterprise DefenseAlissa Torres, Jeff McJunkin
February 20, 2019
1:00pm EST
(18:00:00 UTC)
Identifying Emerging Threats with Security AnalyticsAlphaSOC, Inc.Chris McNab
February 19, 2019
1:00pm EST
(18:00:00 UTC)
Modern AppSec Tools for Modern AppSec Problems: A Practical Introduction to the Next-Gen WAFThreatXKelly Brazil
February 18, 2019
1:00pm EST
(18:00:00 UTC)
The SANS ICS Summit 2019 and What to ExpectTim Conway, Robert M. Lee, Michael Assante
February 14, 2019
1:00pm EST
(18:00:00 UTC)
Dispelling GDPR Myths: Avoid the Compliance Trap, Make Real Security/Privacy GainsBrian Honan, John Pescatore, Gal Shpantzer, Mark Weatherford
February 13, 2019
3:30pm EST
(20:30:00 UTC)
MITRE ATT&CK and Sigma AlertingJustin Henderson, John Hubbard
February 13, 2019
1:00pm EST
(18:00:00 UTC)
Challenges we face, repeatedlyBTB SecurityDave Shackleford, Ron Schlecht, Jr.
February 12, 2019
3:30pm EST
(20:30:00 UTC)
Offensive WMITim Medin
February 11, 2019
9:00pm EST
(02:00:00 UTC)
Dealing with Remote Access to Critical ICS InfrastructureJustin Searle
February 8, 2019
10:30am EST
(15:30:00 UTC)
SANS Automation & Integration Security Briefing: SOARing to New Heights - Using Orchestration & Automation Tools in the Way They're IntendedSwimlane

DomainTools

Amazon Web Services, Inc.

Siemplify

Anitian

RedCanary

DFLabs
Chris Crowley
February 7, 2019
1:00pm EST
(18:00:00 UTC)
CTI Tools, Usage and a Look Ahead: Part 2 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Rebekah Brown, Jonathan Couch, Nicholas Hayden
February 5, 2019
1:00pm EST
(18:00:00 UTC)
CTI Requirements and Inhibitors: Part 1 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Robert M. Lee, Nick Hayes, Helen Johnson, Allan Liska
January 31, 2019
1:00pm EST
(18:00:00 UTC)
Best Practices to Get You CloudFit- 12 AWS Best Practices for Cloud SecurityPalo Alto NetworksJohn Martinez, Matt Bromiley
January 30, 2019
1:00pm EST
(18:00:00 UTC)
Game Changing Defensive Strategies for 2019Fidelis Cybersecurity Alissa Torres, Dr. Abdul Rahman, Tom Clare
January 24, 2019
1:00pm EST
(18:00:00 UTC)
Remediating Threats by Bridging Islands of SecurityInfoBloxJohn Pescatore, Chintan Udeshi
January 23, 2019
12:30pm EST
(17:30:00 UTC)
Enterprise Security with a Fluid PerimeterAruba NetworksMatt Bromiley, Larry Lunetta
January 23, 2019
10:30am EST
(15:30:00 UTC)
Network Visualizations: Understand what's happening faster and easier than ever!Mick Douglas
January 22, 2019
1:00pm EST
(18:00:00 UTC)
Malicious or Negligent? How to Understand User Intent to Stop Data ExfiltrationObserveITBrad Green, John Pescatore
January 21, 2019
9:00pm EST
(02:00:00 UTC)
The Hitchhikers Guide to Evidence SourcesNick Klein
January 17, 2019
3:30pm EST
(20:30:00 UTC)
Using Data Science to Secure Cloud WorkloadsCylanceMikkel Hansen, Aaron Bryson
January 17, 2019
1:00pm EST
(18:00:00 UTC)
Falcon and the MITRE ATT&CK Framework Better Together; Feature UpdateCrowdStrike, Inc.Ken Warren
January 16, 2019
3:30pm EST
(20:30:00 UTC)
Lessons learned after Hundreds of Breach InvestigationsCisco Systems Inc. Robert Reyes, Gerard Johansen, Jake Williams
January 16, 2019
1:00pm EST
(18:00:00 UTC)
Breaking Bad Bots - The New #1 Threat and How to Stop ThemCequenceShreyans Mehta, Franklyn Jones
January 14, 2019
1:00pm EST
(18:00:00 UTC)
Whats new with FOR526 Advanced Memory Forensics and Threat DetectionAlissa Torres
January 11, 2019
3:30pm EST
(20:30:00 UTC)
24/7 CTI: Operationalizing Cyber Threat IntelligenceXena Olsen
January 9, 2019
3:30pm EST
(20:30:00 UTC)
Assumption of a breach: How a new notion can help protect your enterpriseTim Medin
January 8, 2019
1:00pm EST
(18:00:00 UTC)
Defeating Attackers with Preventive SecurityVMWare, IncDave Shackleford, Alex Berger

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.