Learn InfoSec skills you can implement immediately! Six courses available in Houston - Oct. 28-Nov. 2.

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Sep 20, 2019Hacking Your Way to Business KnowledgeKevin Garvey
Sep 20, 2019Easing Into Consulting; Consulting on The Side & Other ApproachesTed Demopoulos
Sep 19, 2019Modern Threat Hunting And Response: How TTPs Are Changing The GameExabeamOrion Cassetto, Trevor Daughney
Sep 19, 2019Live Webinar: Micro-Segmentation for Network Security Strategy to ExecutionAlgoSecAvishai Wool, Dave Shackleford
Sep 17, 2019Elevating Enterprise Security with Fidelis Cybersecurity: Network and DeceptionFidelis Cybersecurity Matt Bromiley, Gerald Mancini
Sep 17, 2019Power up your Security Operations Center with the new SEC450 Part 1 - Blue Team FundamentalsCreating an on-ramp for new defenders!John Hubbard
Sep 16, 2019Keeping the Technical in Technical ManagementKevin Garvey
Sep 12, 2019How to Build a Threat Detection Strategy in AWSAWS MarketplaceDavid Szili, David Aiken
Sep 10, 2019Success Patterns for Supply Chain SecurityInteros

Panorays
John Pescatore
Sep 10, 2019Advanced Zeek Usage: Scripting and FrameworkDavid Szili
Sep 9, 2019Enabling KAPE at ScaleMark Hallman
Sep 5, 2019How to accelerate your cyber security careerStephen Sims
Sep 3, 2019The State of Malware Analysis: Advice from the TrenchesJim Clausing, Evan Dygert, Anuj Soni, Jake Williams, Lenny Zeltser
Sep 3, 2019Getting the Knack of ATT&CKRapid7 Inc.Bob Rudis
Aug 29, 2019Don't Open These-- The Five Most Dangerous File TypesPalo Alto NetworksDave Shackleford, Erik Yunghans, John Harrison
Aug 29, 2019BloxOne Threat Defense: Strengthening and Optimizing Your Security Posture from the Foundation UpInfoBloxSrikrupa Srivatsan, Dave Shackleford
Aug 29, 2019New hosted course: ICS Cybersecurity for ManagersDoug Wylie, Paul Rostick, John Cusimano
Aug 28, 2019More Super Practical Blue Tips, Tools, and Lessons Learned from Team-Based Training: Coordinating Hand-Offs, Your Buddy RITA, and Microsoft Message Analyzer FOR THE WIN!Ed Skoudis, Joshua Wright
Aug 28, 2019JumpStart Guide for Security Information and Event Management (SIEM) in AWSAWS Marketplace

Optiv
J. Michael Butler, David Aiken, Jay Austad
Aug 27, 2019The Cycle of Cyber Threat IntelligenceKatie Nickels
Aug 27, 2019Meet Your New Best Friend: DNS SecurityCisco Systems Inc. Rachel Ackerly
Aug 27, 2019How to Identify Hidden & Destructive Objects in Your EnvironmentReversing Labs
Aug 26, 2019So you Wanna Start a TI ProgramChristian Nicholson
Aug 22, 2019Purple Teaming: The Pen-Test Grows UpBryce Galbraith
Aug 21, 2019Kerberos & Attacks 101Tim Medin
Aug 21, 2019 ICS 612 Practitioner focused Hands on cybersecurityTim Conway
Aug 21, 2019Leveraging OSINT for Better DFIR InvestigationsJeff Lomas, Micah Hoffman
Aug 20, 2019Focus On People, Process, and Technology to Take Your SOC to the Next LevelAnomali John Kitchen, John Pescatore
Aug 19, 2019Legacy Authentication and Password Spray, Understanding and Stopping Attackers Favorite TTPs in Azure ADMark Morowczynski, Ramiro Calderon
Aug 15, 2019The Beginners Guide to Applying Machine Learning to Incident ResponseDomainToolsDave Shackleford
Aug 14, 2019Stop Letting Security Fail. Identify the True ProblemEndgameIan McShane, Matt Bromiley
Aug 14, 2019Practical tips to build a successful purple teamErik Van Buggenhout
Aug 13, 2019Triage Collection and Timeline Analysis with KAPEMari DeGrazia
Aug 13, 2019Visibility for Incident Response: A Review of Forescout 8.1Forescout Technologies BVDon Murdoch, Sandeep Kumar
Aug 8, 2019SANS Introduction to Python CourseMark Baggett
Aug 8, 2019How to Protect Enterprise Systems with Cloud-Based FirewallsAWS MarketplaceKevin Garvey, David Aiken
Aug 8, 2019Neighborhood Keeper: A Collaborative Initiative for Our ICS CommunityDragos, Inc.Robert M. Lee, Tim Conway, Matt Bodman
Aug 7, 2019The Age of Autonomous Breach Protection: Prepare, confront and Respond to Cyberthreats Across the Entire EnvironmentCynetYiftach Keshet, Dave Shackleford
Aug 7, 2019 A Ghidra Test DriveJim Clausing
Aug 6, 2019Backstory + VirusTotal: How to get the most out of your security dataChronicle Matt Bromiley
Aug 5, 2019Security Inside the Perimeter with VMwareVMWare, IncArjun Narang
Aug 2, 2019ATT&CKing your Enterprise: Adversary Detection Pipelines & Adversary SimulationXena Olsen, Ben Goerz
Aug 2, 2019Integrated Incident Response: A Panel Discussion about the SANS 2019 IR SurveyDomainTools

ExtraHop
John Smith, Corin Imai, Matt Bromiley
Aug 2, 2019Hunting LOLBin Activity with Process MemoryAlissa Torres
Aug 1, 2019Integrated Incident Response: A SANS SurveyDFLabs

DomainTools

ExtraHop

InfoBlox

King & Union

OpenText Inc.

Swimlane

Unisys
Matt Bromiley
Jul 31, 2019JumpStart Guide to Cloud-Based Firewalls in AWSAWS Marketplace

Optiv
Brian Russell, Anthony Tanzi, David Aiken
Jul 30, 2019URL Filtering Best Practices-- Making Your Web Security Policy Work for YouPalo Alto NetworksDave Shackleford, Suzanne VanPatten, Kelvin Kwan
Jul 29, 2019Is Your Plant Cyber Resilient? Next Steps to Achieving Safe and Secure Plant OperationYokogawa Corporation of AmericaCamilo Gomez, Barbara Filkins
Jul 25, 2019A Cyber-First Approach to Disaster RecoverySemperis Darren Mar-Elia, John Pescatore
Jul 25, 2019A BEAST and a POODLE celebrating SWEET32Bojan Zdrnja
Jul 25, 2019The Global Privacy Law ImperativeBenjamin Wright, Grace Chong
Jul 24, 2019Rethinking Vulnerability ManagementKevin Garvey
Jul 23, 2019Tips, Tricks, and Cheats Gathered from Red vs. Blue Team-Based TrainingEd Skoudis, Joshua Wright
Jul 22, 2019UNDERSTANDING THE FORENSIC SCIENCE IN DIGITAL FORENSICSJason Jordaan
Jul 18, 2019How to Build an Endpoint Security Strategy in AWSAWS MarketplaceThomas Banasik, David Aiken
Jul 17, 2019You can rest easy when protecting REST APIsJason Lam
Jul 11, 2019Common and Best Practices for Security Operations Centers: Panel DiscussionExtraHop

Siemplify

ThreatConnect
Christopher Crowley, Jody Caldwell, Jeff Costlow, Steve Salinas
Jul 11, 2019Managed Security Services for OT Networks Simplifying Your OT Security JourneyRadiflowIlan Barda
Jul 10, 2019The Critical Security Controls and Some Recent Data Breaches
Jul 10, 2019Common and Best Practices for Security Operations Centers: Results of the 2019 SOC SurveyAnomali

BTB Security

CYBERBIT Commercial Solutions

DFLabs

ExtraHop

Siemplify

ThreatConnect

CyberProof
Christopher Crowley
Jul 9, 2019Simplify Your Office 365 MigrationValimail Sibrina Subedar, Brandon Helms
Jul 9, 2019Leveraging Your SIEM to Implement Security Best PracticesRapid7 Inc.
Jul 3, 2019Effective Threat HuntingChris Dale
Jul 3, 2019Leading Change for CISOsCisco Systems Inc. Lance Spitzner
Jul 1, 2019Adversaries have goals too!
Jun 28, 2019Next-Gen Vulnerability Management: Clarity, Consistency, and CloudDavid Hazar
Jun 28, 2019Why Traditional EDR Is Not Working--and What to Do About ItMcafee LLCJake Williams, Ismael Valenzuela
Jun 27, 2019Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksForescout Technologies BVSandeep Lota, Dean Parsons
Jun 27, 2019Hitting the Silent Alarm on Banking Trojans VMRay Jacob Williams, Rohan Viegas, Tamas Boczan
Jun 26, 2019Practical Approach to Vendor Risk Management & Data PrivacySpirionNorman Levine
Jun 26, 2019Malicious Bots: How they became #1 New Threat and How to Stop ThemCequenceArif Husain
Jun 26, 2019Gaining Complete Visibility of Your Environment with Attack Surface MonitoringRapid7 Inc.Jon Hart, Tori Sitcawich
Jun 25, 2019Cloud Data ProtectionMark Geeslin
Jun 25, 2019Building and Maturing Your Threat Hunt ProgramCisco SystemsDavid Szili
Jun 25, 2019JumpStart Guide for Endpoint Security in AWSAWS MarketplaceDavid Hazar, Joe Vadakkan, David Aiken
Jun 24, 2019Live from the Security Operations Summit: Rethinking the SOC for Long-Term Success & 2019 SANS SOC Survey PreviewJohn Hubbard, Chris Crowley
Jun 24, 2019Addressing Consumer Safety Concerns With Zero Trust SecurityUnisysChris Kloes
Jun 21, 2019Web App Testing 101 - Getting the Lay of the LandMike Saunders
Jun 20, 2019How To Increase MITRE ATT&CK Coverage with Network Traffic AnalysisExtraHopChris Crowley, John Smith
Jun 20, 2019Bolster your Cyber Terrain with Endpoint ForensicsFidelis Cybersecurity Alissa Torres, Justin Swisher
Jun 19, 2019Securing Microservices in Containerized EnvironmentsThreat StackTim Buntel, Jacob Williams
Jun 19, 2019Converging OT and IT Networks: Where and How to Evolve ICS for SecurityNozomi Networks

Radiflow

Yokogawa Corporation of America
Barbara Filkins, Doug Wylie, Ilan Barda, Camilo Gomez, Kim Legelis
Jun 19, 2019SANS FedRAMP Technology WorkshopAmazon Web Services, Inc.

IBM

Rackspace

CrowdStrike

Okta
John Pescatore
Jun 18, 2019Managing the Insider Threat: Why Visibility Is CriticalObserveITSai Chavali, John Pescatore
Jun 18, 2019Increasing Visibility with Ixia's Vision ONEIxiaSerge Borso, Taran Singh
Jun 14, 2019DDI data a Critical Enabler of SOAR InfoBloxSrikrupa Srivatsan, Dave Shackleford
Jun 14, 2019Five Keys for Successful Vulnerability ManagementJonathan Risto
Jun 13, 2019Authentication: It Is All About the User ExperienceYubicoMatt Bromiley, Hormazd Romer
Jun 13, 2019How to Build a Data Protection Strategy in AWSAWS MarketplaceDave Shackleford, David Aiken
Jun 12, 2019Using Zeek/Bro To Discover Network TTPs of MITRE ATT&CK​Corelight Richard Bejtlich, James Schweitzer
Jun 12, 2019SANS 2019 State of OT/ICS Cybersecurity SurveyCisco Systems Inc.

Forescout Technologies BV

Owl Cyber Defense

Nozomi Networks

Radiflow

Yokogawa Corporation of America
Jason Dely, Barbara Filkins, Doug Wylie
Jun 12, 2019Cybersecurity Frameworks for CISOsCisco Systems Inc. Frank Kim
Jun 11, 2019The 20 Critical Security Controls: From Framework to Operational to ImplementationRandy Marchany
Jun 10, 2019ICS Active Defense PrimerKai Thomsen
Jun 7, 2019SIEM as Alexa How Natural Language Processing Can Transform Your Cyber Security ExperienceEmpowDave Shackleford, Avi Chesla
Jun 6, 2019Missing Information About Security Misconfiguration? Explore this often-used vulnerability category through data from 1000+ pentestsCobalt Labs, Inc. c/o MindspaceJohn Pescatore, Joe Sechman
Jun 5, 2019Power up your Security Operations Centers human capital with the new SEC450 Part 2 - Blue Team FundamentalsFinding and training the right people!John Hubbard
Jun 5, 2019How SOC Superheroes WinUnisys

LogRhythm
Salvatore Sinno, Ismael Cervantes
Jun 4, 2019Lessons From the Front Lines of AppSec: Analysis of real-world attacks from 2019 and best practices for dealing with themThreatXChris Brazdziunas, Will Woodson
Jun 4, 2019The Future of Authentication: How Two Factor Authentication is Dying and Whats NextYubicoJohannes Ullrich, PhD
May 30, 2019Secure Kubernetes Application DeliveryAndrew Martin
May 29, 2019Fileless Malware FunHal Pomeranz
May 28, 2019Cloud Security Automation: Monitoring and OperationsFrank Kim
May 28, 2019Streamlining Your Security Process with Orchestration & AutomationRapid7 Inc.
May 24, 2019IoT vulnerability and security is the next frontierLee Reiber
May 24, 2019Defensible Security Architecture and Engineering Part 3: Protect your Lunch Money Keeping the Thieves at BayIsmael Valenzuela, Justin Henderson
May 23, 2019What Real-World Attacks Look Like and How to Stop Them in Their TracksNetwrixDave Shackleford, Brian Johnson
May 22, 2019Actionable IT/OT end point protection to: detect, contain, and respond to limit ICS cyber threatsVerveRon Brash
May 22, 2019SEC599: Defeating Advanced Adversaries Discover whats NEW in Purple Team.Latest course updates!Erik Van Buggenhout
May 21, 2019Passive Isn't Good Enough: Moving into Active EDRSentinelOneJustin Henderson, Migo Kedem
May 15, 2019Power up your Security Operations Center with the new SEC450 Part 1 - Blue Team Fundamentals: Creating an on-ramp for new defenders!John Hubbard
May 15, 2019Vetting Your Intel - Techniques and Tools for False Positive AnalysisDomainToolsRobert M. Lee, Tarik Saleh
May 15, 2019Web application defense Use headers to make pentesters job difficultJason Lam
May 14, 2019Hacking without Domain AdminTim Medin, Mike Saunders
May 13, 2019Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need.SentryoTim Conway, Michael Thompson, Bob Foley, Fayce Daira
May 9, 2019How to Secure a Modern Web Application in AWSAWS MarketplaceShaun McCullough, David Aiken
May 8, 2019Gaining a Decisive Advantage Through Terrain Based Cyber Defense Fidelis Cybersecurity Craig Harber, Rami Mizrahi
May 7, 2019The State of Cloud Security: Panel DiscussionExtraHop

Sysdig
Dave Shackleford, Jim Reavis, Pawan Shankar, Eric Thomas
May 7, 2019Terraforming Azure: not as difficult as planetsAWS Marketplace: Telos CorporationDavid Hazar
May 2, 2019Rethinking Your Global Security PlatformChronicle Matt Bromiley, Brandon Levene
May 2, 2019How Effective is Your WAF Protection? - Metrics & Key ConsiderationsThreatXChris Brazdziunas, Will Woodson
May 2, 2019From Seizure to Actionable Intelligence in 90 Minutes or LessKevin Ripa
May 1, 2019Sharing Alerts and Threat Intelligence with MISPJustin Henderson, John Hubbard
May 1, 2019The State of Cloud Security: Results of the SANS 2019 Cloud Security SurveyExtraHop

Sophos Inc.

Sysdig
Dave Shackleford, Jim Reavis
May 1, 2019A CISO's Perspective on Presenting OT Risk to the BoardCyberXIlan Abadi, Daniel Shugrue
Apr 30, 2019The Future of Phishing: Its all about your customersSegasecDave Shackleford, Elad Schulman
Apr 30, 2019What Are Fileless Attacks and How Can You Stop Them?Unisys
Apr 30, 2019Defensible Security Architecture and Engineering Part 2: Thinking Red, Acting Blue Mindset & ActionsIsmael Valenzuela, Justin Henderson
Apr 24, 2019Take Back Control of Your DNS Traffic Palo Alto NetworksDave Shackleford
Apr 24, 2019Why Your Vulnerability Management Strategy Is Not Working and What to Do About It Lookingglass Cyber Solutions, Inc.Brandon Helms, Eric Olson
Apr 23, 2019Delivering Infrastructure, Security and Operations as Code across Multi-cloud EnvironmentsPalo Alto NetworksVinay Venkataraghavan, Matt Bromiley
Apr 19, 2019SANS Top New Attacks and Threat ReportAnomali

DomainTools

InfoBlox

Unisys

Veracode
John Pescatore
Apr 18, 2019New Year, Same Magecart: The Continuation of Web-based Supply Chain AttacksRiskIQYonathan Klijnsma, Dave Shackleford
Apr 18, 2019Resolved: How to protect your organization when your perimeter fails VMWare, IncTom Gillis, John Pescatore
Apr 17, 2019Simplifying Application Security with Software-Defined SecurityVMWare, IncMatt De Vincentis, Dave Shackleford
Apr 16, 2019Cryptojacking - What is it? Where is it? How to protect against it?Cisco SystemsBrandon Helms, Brian McMahon
Apr 11, 2019How to Automate Compliance Gaps for Public CloudLaceworkVikram Varakantam, John Pescatore
Apr 11, 2019How to Build a Security Visibility Strategy in the CloudAWS MarketplaceDave Shackleford, David Aiken
Apr 10, 2019Alert Investigations in the SOC - Building Your WorkflowJustin Henderson, John Hubbard
Apr 10, 2019Vulnerability Practices of Tomorrow: Part 2 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable

Veracode
Andrew Laman, David Hoelzer, Gaurav Banga, Nate Dyer
Apr 10, 2019Purple PowerShell: Current attack strategies & defensesErik Van Buggenhout
Apr 9, 2019Cloud Security and DevOps Automation: Keys for Modern Security SuccessEric Johnson
Apr 9, 2019Current State of Vulnerability Management: Part 1 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable

Veracode
Andrew Laman, David Hoelzer, RJ Gazarek, Michael Rosen
Apr 9, 2019Next-Gen Vulnerability Management: Clarity, Consistency, and CloudDavid Hazar
Apr 8, 2019The Cyber Kill Chain and MobileIron Threat DefenseMobileIronJames Saturnio, Ilya Geller
Apr 3, 2019The Foundation of Continuous Host MonitoringOpenText Inc.Matt Bromiley, JJ Cranford
Apr 2, 2019Vulnerability Management for the Enterprise and CloudJonathan Risto
Apr 2, 2019Building a Zero Trust Model in the Cloud with MicrosegmentationUnisysJohn Kindervag, Salvatore Sinno
Apr 2, 2019All Your Data Belongs to Us: How to Defend Against Credential StuffingJohannes Ullrich, PhD
Mar 29, 2019Defensible Security Architecture and Engineering Part 1: How to become an All-Round Defender - the Secret SauceIsmael Valenzuela, Justin Henderson
Mar 28, 2019Best Practices for Network Security ResilienceIxiaJon Oltsik, Keith Bromley
Mar 27, 2019Taming the Endpoint Chaos Within: A Review of Panda Security Adaptive Defense 360Panda SecurityJustin Henderson, James Manning
Mar 26, 2019Security Gets Smart with AI: A SANS SurveyCylanceG.W. Ray Davidson, PhD, Barbara Filkins, Bret Lenmark
Mar 25, 2019Playing Moneyball in CybersecurityUnisysMatt Soderlund
Mar 22, 2019Empowering Incident Response via AutomationCisco Systems Inc. Matt Bromiley
Mar 21, 2019Alternative Network Visibility Strategies for an Encrypted WorldCorelight Gregory Bell, Matt Bromiley
Mar 21, 2019What's Next in Automation Support: Part 2 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Emily Laufer, Nick Tausek
Mar 21, 20192018 Holiday Hack Challenge Winner Announcement and More!Ed Skoudis, Joshua Wright
Mar 20, 2019Osquery: A Modern Approach to CSIRT AnalyticsUptycsDave Shackleford, Milan Shah
Mar 20, 2019Hiding in Plain Sight: Dissecting Popular Evasive Malware TechniquesVMRay Jake Williams, Rohan Viegas, Tamas Boczan
Mar 19, 2019The State of Automation/Integration Practice: Part 1 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Dan Cole, Stan Engelbrecht, Darren Thomas
Mar 18, 2019Securing Your Endpoints with Carbon Black: A SANS Review of the CB Predictive Security Cloud PlatformCarbon BlackDave Shackleford, Tristan Morris
Mar 15, 2019How to Automate Compliance and Risk Management for Cloud WorkloadsAWS MarketplaceMatt Bromiley, David Aiken
Mar 14, 2019USBs Behaving Badly - How to Control USB Usage in Operational NetworksHoneywell International Sam Wilson, Matt Wiseman
Mar 13, 2019Overcoming Obstacles to Secure Multi-cloud AccessPulse SecureRajoo Nagar, John Pescatore
Mar 12, 2019Maximizing SOC Effectiveness and Efficiency with Integrated Operations and DefenseNETSCOUT Systems, Inc.John Pescatore, Arabella Hallawell
Mar 11, 2019 Purple Kerberos: Current attack strategies & defensesErik Van Buggenhout
Mar 7, 2019Investigating WMI AttacksChad Tilbury
Mar 6, 2019The State of Kubernetes SecurityAqua Security Inc. Liz Rice
Mar 5, 2019SOF-ELK(R): A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security OperationsPhilip Hagen
Mar 1, 2019Taking SIEM to the Cloud: A SANS Review of Securonix Next-Gen SIEMSecuronixNitin Agale, Dave Shackleford
Feb 28, 2019NIST Recommendations for ICS & IIoT Security CyberXPhil Neray, Michael Powell, Jim McCarthy, Tim Zimmerman
Feb 27, 2019Improving Detection and Understanding the Adversary with Deception TechnologyTrapX SecurityMatt Bromiley, Ori Bach
Feb 26, 201972-Hours-to-Disclose Survival Guide: Accurate Scoping and Impact Assessment of BreachesExtraHopJohn Matthews, John Pescatore
Feb 22, 2019Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid ThemLenny Zeltser
Feb 21, 2019Leveraging MITRE ATT&CK and ATT&CK NavigatorErik Van Buggenhout
Feb 21, 2019Prioritizing Security Operations in the Cloud through the Lens of the NIST FrameworkAWS MarketplaceJohn Pescatore, David Aiken
Feb 20, 2019It's All About Scale! Succeeding in Enterprise DefenseAlissa Torres, Jeff McJunkin
Feb 20, 2019Identifying Emerging Threats with Security AnalyticsAlphaSOC, Inc.Chris McNab
Feb 19, 2019Modern AppSec Tools for Modern AppSec Problems: A Practical Introduction to the Next-Gen WAFThreatXKelly Brazil
Feb 18, 2019The SANS ICS Summit 2019 and What to ExpectTim Conway, Robert M. Lee, Michael Assante
Feb 14, 2019Dispelling GDPR Myths: Avoid the Compliance Trap, Make Real Security/Privacy GainsBrian Honan, John Pescatore, Gal Shpantzer, Mark Weatherford
Feb 13, 2019MITRE ATT&CK and Sigma AlertingJustin Henderson, John Hubbard
Feb 13, 2019Challenges we face, repeatedlyBTB SecurityDave Shackleford, Ron Schlecht, Jr.
Feb 12, 2019Offensive WMITim Medin
Feb 12, 2019Dealing with Remote Access to Critical ICS InfrastructureJustin Searle
Feb 8, 2019SANS Automation & Integration Security Briefing: SOARing to New Heights - Using Orchestration & Automation Tools in the Way They're IntendedSwimlane

DomainTools

Amazon Web Services, Inc.

Siemplify

Anitian

RedCanary

DFLabs
Chris Crowley
Feb 7, 2019CTI Tools, Usage and a Look Ahead: Part 2 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Rebekah Brown, Jonathan Couch, Nicholas Hayden
Feb 5, 2019CTI Requirements and Inhibitors: Part 1 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Robert M. Lee, Nick Hayes, Helen Johnson, Allan Liska
Jan 31, 2019Best Practices to Get You CloudFit- 12 AWS Best Practices for Cloud SecurityPalo Alto NetworksJohn Martinez, Matt Bromiley
Jan 30, 2019Game Changing Defensive Strategies for 2019Fidelis Cybersecurity Alissa Torres, Dr. Abdul Rahman, Tom Clare
Jan 24, 2019Remediating Threats by Bridging Islands of SecurityInfoBloxJohn Pescatore, Chintan Udeshi
Jan 23, 2019Enterprise Security with a Fluid PerimeterAruba NetworksMatt Bromiley, Larry Lunetta
Jan 23, 2019Network Visualizations: Understand what's happening faster and easier than ever!Mick Douglas
Jan 22, 2019Malicious or Negligent? How to Understand User Intent to Stop Data ExfiltrationObserveITBrad Green, John Pescatore
Jan 22, 2019The Hitchhikers Guide to Evidence SourcesNick Klein
Jan 17, 2019Using Data Science to Secure Cloud WorkloadsCylanceMikkel Hansen, Aaron Bryson
Jan 17, 2019Falcon and the MITRE ATT&CK Framework Better Together; Feature UpdateCrowdStrikeKen Warren
Jan 16, 2019Lessons learned after Hundreds of Breach InvestigationsCisco Systems Inc. Robert Reyes, Gerard Johansen, Jake Williams
Jan 16, 2019Breaking Bad Bots - The New #1 Threat and How to Stop ThemCequenceShreyans Mehta, Franklyn Jones
Jan 14, 2019Whats new with FOR526 Advanced Memory Forensics and Threat DetectionAlissa Torres
Jan 11, 201924/7 CTI: Operationalizing Cyber Threat IntelligenceXena Olsen
Jan 9, 2019Assumption of a breach: How a new notion can help protect your enterpriseTim Medin
Jan 8, 2019Defeating Attackers with Preventive SecurityVMWare, IncDave Shackleford, Alex Berger

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.