Get unparalleled cyber security training from real-world practitioners in Miami. Save $300 today!

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Nov 20, 2019OUTPERFORM the adversary with tactical decision-making and rapid responseFidelis Cybersecurity Craig Harber, Dave Shackleford
Nov 20, 2019Threat Intelligence Driven Detect and Response OperationsBitdefender SRLJacob Williams, Daniel Clayton, Ryan Moon
Nov 19, 2019Someone to Watch Over You: A Review of CrowdStrikes Falcon OverWatchCrowdStrike, Inc.Joe Sullivan, Scott Taschler
Nov 18, 2019A Blueprint for Designing a New Security PerimeterNetskopeBob Gilbert
Nov 15, 2019SANS Dark Web Solutions Forum - Illuminating the Dark Web: Harvesting and Using OSINT Data from Dark Web ResourcesTerbium Labs

Sophos Inc.

Viavi Solutions

RecordedFuture
Micah Hoffman
Nov 14, 2019Hiring and retaining for the SOC: Recruit, Train, and Retain Talented and Dedicated StaffChris Crowley
Nov 14, 2019How to Perform a Security Investigation in AWSAWS MarketplaceKyle Dickinson, David Aiken
Nov 13, 2019Taming Linux for Enterprise SecurityCmdMatt Bromiley, John Brunn, Brian Gladstein
Nov 13, 2019SOARing beyond aggregation: How to achieve meaningful correlation and prioritization of security alerts and actionsSwimlaneNick Tausek, Jake Williams
Nov 12, 2019SEC588: Cloud Penetration Testing. What is it? What's different, and why?Moses Frost
Nov 12, 2019Building on ICS Security BasicsWhats Next?Tripwire, Inc.Matthew Luallen, Kristen Poulos, Joseph Blankenship
Nov 12, 2019Successful Infosec Consulting: Lessons from Three Decades in The FieldTed Demopoulos
Nov 8, 2019Lessons from the Trenches: Implementing Zero Trust Data Centers in the Real WorldShieldXDave Karp, Chase Cunningham
Nov 8, 2019Whats New in SEC575: Mobile Device Security and Ethical HackingErik Van Buggenhout, Jeroen Beckers
Nov 7, 2019Data Governance: What Dark secrets lurk in your Salesforce instance?RevCultPete Thurston, Dave Shackleford
Nov 7, 2019What Works in SOC/NOC Integration: Improving Time to Detect, Respond and Contain with ExtraHop Reveal(x)ExtraHopJohn Pescatore, Mitch Roberson
Nov 7, 2019Evade Me If You Can: Unmasking Context-Aware MalwareVMRay Brandon McCrillis, Tamas Boczan
Nov 6, 2019Evaluating Network Traffic Analysis Systems Requirements and Challenges Awake SecurityDavid Pearson, Kevin Tolly
Nov 6, 2019Hear me SOAR - Using Elastic, ElastAlert and TheHive in an effective purple team pipeline
Nov 5, 2019Interested in Smartphone Forensics?Domenica Crognale
Oct 30, 2019Threat Hunting for New and Experienced Hunters: Panel Discussion of the SANS 2019 Threat Hunting SurveyDomainTools

ExtraHop

ThreatConnect
Mathias Fuchs, Joshua Lemon, Matt Cauthorn, Alex Valdivia, Taylor Wilkes-Pierce
Oct 30, 2019Securing Your Modern Data Center Palo Alto NetworksChrister Swartz, Dave Shackleford
Oct 30, 2019Attacking and Defending Cloud Metadata ServicesEric Johnson
Oct 29, 2019SANS 2019 Threat Hunting Survey: The Differing Needs of New and Experienced HuntersAnomali

Authentic8

VMWare Carbon Black

DomainTools

ExtraHop

Lastline

ThreatConnect

ThreatQuotient

Sophos Inc.

Verodin
Mathias Fuchs, Joshua Lemon
Oct 29, 2019Real World Challenges for PCI Compliant ContainersThreat StackTim Buntel, John Pescatore, Katie Paugh
Oct 28, 2019Human Fingerprints in Malware and their Use in Cyber Threat Intelligence Robert M. Lee, Tobias Johansson
Oct 25, 2019Have You Taken The \"Endpoint Blue Pill\"? Debunking The Endpoint Protection Myth.Cisco Systems Inc. Justin Henderson, Ismael Valenzuela
Oct 24, 2019Successful Infosec Consulting 101Ted Demopoulos
Oct 24, 2019Untapped Potential: Getting the most out of your SIEMJustin Henderson, John Hubbard
Oct 23, 2019Modern Web Application Penetration Testing Part 1, XSS and XSRF TogetherAdrien de Beaupré
Oct 23, 2019Lessons Learned from Over a Thousand Threat Hunting WorkshopsCisco Systems Inc. Brandon Newport
Oct 23, 2019JumpStart Guide to Security Investigations and Posture Management in Amazon Web ServicesAWS MarketplaceKyle Dickinson, Tim Jefferson, David Aiken
Oct 22, 2019Are you prepared for a Ransomware Attack?Cisco Systems Inc. Peter Romness, John Pescatore
Oct 22, 2019Converged Threat and Performance Management Listen to Your Network!Viavi SolutionsWard Cobleigh, John Pescatore
Oct 22, 2019Are Your Security Controls Yesterday's News?CymulateMatt Bromiley, Eyal Ahraoni
Oct 21, 2019Windows User Enumeration, Living off the landDale Hobbs
Oct 18, 2019SANS Cloud Security Operations Solutions ForumCisco Systems Inc.

Microsoft

Swimlane

CloudPassage
Oct 17, 2019How Attackers Exploit Office 365 VulnerabilitiesNetwrixJohn Pescatore, Jeff Melnick
Oct 17, 2019Power up your Security Operations Centers human capital with the new SEC450 Part 2 - Blue Team FundamentalsFinding and training the right people!John Hubbard
Oct 15, 2019Launching APOLLO - Creating a Simple Tool for Advanced Forensic AnalysisSarah Edwards
Oct 15, 2019Pivotal Platform - Getting Started with Native Runtime Protection for PASAqua Security Inc. Bryan Morrow, Dave Shackleford
Oct 15, 2019How to Inject Security Into Your Software Development Life Cycle - Close Security Gaps in Your Software Supply Chain Through Automation and Deep AnalysisReversing Labs
Oct 10, 2019Improve Network Security with Application IntelligenceIxiaChristophe Olivier, Sarah Gross
Oct 10, 2019How to Secure App Pipelines in AWSAWS MarketplaceDave Shackleford, David Aiken
Oct 7, 2019When Hacking Becomes Deadly InfoSec in the Age of Connected Medical DevicesKenneth May
Oct 4, 2019Manage Vulnerabilities through the Software Lifecycle: How to Enable Secure DevOpsZeroNorthBrandon Helms, Andrei Bezdedeanu
Oct 3, 2019IT, OT, and IOT Oh, My! Learn to See and Secure It AllIxiaTim Jones, Dennis Carpio
Oct 3, 2019Red, Blue and Purple Teams: Combining Your Security Capabilities for the Best OutcomeCore Security TechnologiesChris Dale, Bobby Kuzma
Oct 2, 2019Dominating the Active DirectoryErik Van Buggenhout
Oct 2, 2019How to Effectively Use Segmentation and MicrosegmentationVMWare, IncDave Shackleford, Nick Furman
Oct 1, 2019Demystifying The Hunt: How to Assess Your Threat Hunting Readiness and Prepare for the Next StepCorelight

Optiv
Gary Fisk, Fayyaz Rajpari, Matt Bromiley
Oct 1, 2019ExtraHop Reveal(x) Expands Attack Investigations to Cover All VectorsExtraHopDave Shackleford, Tom Stitt
Sep 30, 2019The perils and perks of cloud access securityDavid Hazar
Sep 27, 2019Vulnerability Management Vendor Briefing: Decreasing the Attack Surface with Effective Vulnerability ManagementAkamai Technologies

Arctic Wolf Networks

Cisco Systems Inc.

CloudPassage
Matt Bromiley
Sep 26, 2019NetOps and SecOps: Cant We All Just Get Along?"IxiaScott Register, Ryan Davis
Sep 26, 2019Speaking the Language of the BoardUnisys
Sep 26, 2019Learn about the New SIEM Poster - Architecture, Enrichment, and MoreJustin Henderson
Sep 25, 2019Threat Hunting in the Cloud: Time for a Power-Up?Ben Johnson
Sep 25, 2019Effectively Addressing Advanced ThreatsIBM SecurityMatt Bromiley, Lauren Horaist
Sep 25, 2019Lights Out: Inside the Mind of a Utility HackerThycoticJoseph Carson
Sep 24, 2019A Principal Control Engineer's Perspective on Defending Energy Utilities from IoT/ICS AttacksCyberXHenry Sierk
Sep 24, 2019The DNS Privacy Debate, Explained: Making the Right Choice between DNS over TLS and DNS over HTTPSInfoBloxPaul Adair, Dave Shackleford
Sep 24, 2019Jumpstart Guide to Application Security in the CloudAWS MarketplaceNathan Getty, Aidan Walden, Nam Le
Sep 23, 2019Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security CapabilitiesFidelis Cybersecurity Matt Bromiley, Gerald Mancini
Sep 20, 2019Hacking Your Way to Business KnowledgeKevin Garvey
Sep 20, 2019Easing Into Consulting; Consulting on The Side & Other ApproachesTed Demopoulos
Sep 19, 2019Modern Threat Hunting And Response: How TTPs Are Changing The GameExabeamOrion Cassetto, Trevor Daughney
Sep 19, 2019Live Webinar: Micro-Segmentation for Network Security Strategy to ExecutionAlgoSec Systems, Ltd.Avishai Wool, Dave Shackleford
Sep 18, 2019Yes, IT and OT Are Converging. So How Does This Affect Compliance?Forescout Technologies BVDon C. Weber
Sep 17, 2019Elevating Enterprise Security with Fidelis Cybersecurity: Network and DeceptionFidelis Cybersecurity Matt Bromiley, Gerald Mancini
Sep 17, 2019Power up your Security Operations Center with the new SEC450 Part 1 - Blue Team FundamentalsCreating an on-ramp for new defenders!John Hubbard
Sep 16, 2019Keeping the Technical in Technical ManagementKevin Garvey
Sep 12, 2019How to Build a Threat Detection Strategy in AWSAWS MarketplaceDavid Szili, David Aiken
Sep 10, 2019Success Patterns for Supply Chain SecurityInteros

Panorays
John Pescatore
Sep 10, 2019Advanced Zeek Usage: Scripting and FrameworkDavid Szili
Sep 9, 2019Enabling KAPE at ScaleMark Hallman
Sep 5, 2019How to accelerate your cyber security careerStephen Sims
Sep 3, 2019The State of Malware Analysis: Advice from the TrenchesJim Clausing, Evan Dygert, Anuj Soni, Jake Williams, Lenny Zeltser
Sep 3, 2019Getting the Knack of ATT&CKRapid7 Inc.Bob Rudis
Aug 29, 2019Don't Open These-- The Five Most Dangerous File TypesPalo Alto NetworksDave Shackleford, Erik Yunghans, John Harrison
Aug 29, 2019BloxOne Threat Defense: Strengthening and Optimizing Your Security Posture from the Foundation UpInfoBloxSrikrupa Srivatsan, Dave Shackleford
Aug 29, 2019New hosted course: ICS Cybersecurity for ManagersDoug Wylie, Paul Rostick, John Cusimano
Aug 28, 2019More Super Practical Blue Tips, Tools, and Lessons Learned from Team-Based Training: Coordinating Hand-Offs, Your Buddy RITA, and Microsoft Message Analyzer FOR THE WIN!Ed Skoudis, Joshua Wright
Aug 28, 2019JumpStart Guide for Security Information and Event Management (SIEM) in AWSAWS Marketplace

Optiv
J. Michael Butler, David Aiken, Jay Austad
Aug 27, 2019The Cycle of Cyber Threat IntelligenceKatie Nickels
Aug 27, 2019Meet Your New Best Friend: DNS SecurityCisco Systems Inc. Rachel Ackerly
Aug 27, 2019How to Identify Hidden & Destructive Objects in Your EnvironmentReversing Labs
Aug 26, 2019So you Wanna Start a TI ProgramChristian Nicholson
Aug 22, 2019Purple Teaming: The Pen-Test Grows UpBryce Galbraith
Aug 21, 2019Kerberos & Attacks 101Tim Medin
Aug 21, 2019 ICS 612 Practitioner focused Hands on cybersecurityTim Conway
Aug 21, 2019Leveraging OSINT for Better DFIR InvestigationsJeff Lomas, Micah Hoffman
Aug 20, 2019Focus On People, Process, and Technology to Take Your SOC to the Next LevelAnomali John Kitchen, John Pescatore
Aug 19, 2019Legacy Authentication and Password Spray, Understanding and Stopping Attackers Favorite TTPs in Azure ADMark Morowczynski, Ramiro Calderon
Aug 15, 2019The Beginners Guide to Applying Machine Learning to Incident ResponseDomainToolsDave Shackleford
Aug 14, 2019Stop Letting Security Fail. Identify the True ProblemEndgameIan McShane, Matt Bromiley
Aug 14, 2019Practical tips to build a successful purple teamErik Van Buggenhout
Aug 13, 2019Triage Collection and Timeline Analysis with KAPEMari DeGrazia
Aug 13, 2019Visibility for Incident Response: A Review of Forescout 8.1Forescout Technologies BVDon Murdoch, Sandeep Kumar
Aug 8, 2019SANS Introduction to Python CourseMark Baggett
Aug 8, 2019How to Protect Enterprise Systems with Cloud-Based FirewallsAWS MarketplaceKevin Garvey, David Aiken
Aug 8, 2019Neighborhood Keeper: A Collaborative Initiative for Our ICS CommunityDragos, Inc.Robert M. Lee, Tim Conway, Matt Bodman
Aug 7, 2019The Age of Autonomous Breach Protection: Prepare, confront and Respond to Cyberthreats Across the Entire EnvironmentCynetYiftach Keshet, Dave Shackleford
Aug 7, 2019 A Ghidra Test DriveJim Clausing
Aug 6, 2019Backstory + VirusTotal: How to get the most out of your security dataChronicle Matt Bromiley
Aug 5, 2019Security Inside the Perimeter with VMwareVMWare, IncArjun Narang
Aug 2, 2019ATT&CKing your Enterprise: Adversary Detection Pipelines & Adversary SimulationXena Olsen, Ben Goerz
Aug 2, 2019Integrated Incident Response: A Panel Discussion about the SANS 2019 IR SurveyDomainTools

ExtraHop
John Smith, Corin Imai, Matt Bromiley
Aug 2, 2019Hunting LOLBin Activity with Process MemoryAlissa Torres
Aug 1, 2019Integrated Incident Response: A SANS SurveyDFLabs

DomainTools

ExtraHop

InfoBlox

King & Union

OpenText Inc.

Unisys

Swimlane
Matt Bromiley
Jul 31, 2019JumpStart Guide to Cloud-Based Firewalls in AWSAWS Marketplace

Optiv
Brian Russell, Anthony Tanzi, David Aiken
Jul 30, 2019URL Filtering Best Practices-- Making Your Web Security Policy Work for YouPalo Alto NetworksDave Shackleford, Suzanne VanPatten, Kelvin Kwan
Jul 29, 2019Is Your Plant Cyber Resilient? Next Steps to Achieving Safe and Secure Plant OperationYokogawa Corporation of AmericaCamilo Gomez, Barbara Filkins
Jul 25, 2019A Cyber-First Approach to Disaster RecoverySemperis Darren Mar-Elia, John Pescatore
Jul 25, 2019A BEAST and a POODLE celebrating SWEET32Bojan Zdrnja
Jul 25, 2019The Global Privacy Law ImperativeBenjamin Wright, Grace Chong
Jul 24, 2019Rethinking Vulnerability ManagementKevin Garvey
Jul 23, 2019Tips, Tricks, and Cheats Gathered from Red vs. Blue Team-Based TrainingEd Skoudis, Joshua Wright
Jul 22, 2019UNDERSTANDING THE FORENSIC SCIENCE IN DIGITAL FORENSICSJason Jordaan
Jul 18, 2019How to Build an Endpoint Security Strategy in AWSAWS MarketplaceThomas Banasik, David Aiken
Jul 17, 2019You can rest easy when protecting REST APIsJason Lam
Jul 11, 2019Common and Best Practices for Security Operations Centers: Panel DiscussionExtraHop

Siemplify

ThreatConnect
Christopher Crowley, Jody Caldwell, Jeff Costlow, Steve Salinas
Jul 11, 2019Managed Security Services for OT Networks Simplifying Your OT Security JourneyRadiflowIlan Barda
Jul 10, 2019The Critical Security Controls and Some Recent Data Breaches
Jul 10, 2019Common and Best Practices for Security Operations Centers: Results of the 2019 SOC SurveyAnomali

BTB Security

CYBERBIT Commercial Solutions

DFLabs

ExtraHop

Siemplify

ThreatConnect

cyberproof
Christopher Crowley
Jul 9, 2019Simplify Your Office 365 MigrationValimail Sibrina Subedar, Brandon Helms
Jul 9, 2019Leveraging Your SIEM to Implement Security Best PracticesRapid7 Inc.
Jul 3, 2019Effective Threat HuntingChris Dale
Jul 3, 2019Leading Change for CISOsCisco Systems Inc. Lance Spitzner
Jul 1, 2019Adversaries have goals too!
Jun 28, 2019Next-Gen Vulnerability Management: Clarity, Consistency, and CloudDavid Hazar
Jun 28, 2019Why Traditional EDR Is Not Working--and What to Do About ItMcafee LLCJake Williams, Ismael Valenzuela
Jun 27, 2019Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksForescout Technologies BVSandeep Lota, Dean Parsons
Jun 27, 2019Hitting the Silent Alarm on Banking Trojans VMRay Jacob Williams, Rohan Viegas, Tamas Boczan
Jun 26, 2019Practical Approach to Vendor Risk Management & Data PrivacySpirionNorman Levine
Jun 26, 2019Malicious Bots: How they became #1 New Threat and How to Stop ThemCequenceArif Husain
Jun 26, 2019Gaining Complete Visibility of Your Environment with Attack Surface MonitoringRapid7 Inc.Jon Hart, Tori Sitcawich
Jun 25, 2019Cloud Data ProtectionMark Geeslin
Jun 25, 2019Building and Maturing Your Threat Hunt ProgramCisco SystemsDavid Szili
Jun 25, 2019JumpStart Guide for Endpoint Security in AWSAWS MarketplaceDavid Hazar, Joe Vadakkan, David Aiken
Jun 24, 2019Live from the Security Operations Summit: Rethinking the SOC for Long-Term Success & 2019 SANS SOC Survey PreviewJohn Hubbard, Chris Crowley
Jun 24, 2019Addressing Consumer Safety Concerns With Zero Trust SecurityUnisysChris Kloes
Jun 21, 2019Web App Testing 101 - Getting the Lay of the LandMike Saunders
Jun 20, 2019How To Increase MITRE ATT&CK Coverage with Network Traffic AnalysisExtraHopChris Crowley, John Smith
Jun 20, 2019Bolster your Cyber Terrain with Endpoint ForensicsFidelis Cybersecurity Alissa Torres, Justin Swisher
Jun 19, 2019Converging OT and IT Networks: Where and How to Evolve ICS for SecurityNozomi Networks

Radiflow

Yokogawa Corporation of America
Barbara Filkins, Doug Wylie, Ilan Barda, Camilo Gomez, Kim Legelis
Jun 19, 2019SANS FedRAMP Technology WorkshopAmazon Web Services, Inc.

IBM

Rackspace

CrowdStrike, Inc.

Okta
John Pescatore
Jun 18, 2019Managing the Insider Threat: Why Visibility Is CriticalObserveITSai Chavali, John Pescatore
Jun 18, 2019Increasing Visibility with Ixia's Vision ONEIxiaSerge Borso, Taran Singh
Jun 14, 2019DDI data a Critical Enabler of SOAR InfoBloxSrikrupa Srivatsan, Dave Shackleford
Jun 14, 2019Five Keys for Successful Vulnerability ManagementJonathan Risto
Jun 13, 2019Authentication: It Is All About the User ExperienceYubicoMatt Bromiley, Hormazd Romer
Jun 13, 2019How to Build a Data Protection Strategy in AWSAWS MarketplaceDave Shackleford, David Aiken
Jun 12, 2019Using Zeek/Bro To Discover Network TTPs of MITRE ATT&CK​Corelight Richard Bejtlich, James Schweitzer
Jun 12, 2019SANS 2019 State of OT/ICS Cybersecurity SurveyCisco Systems Inc.

Forescout Technologies BV

Owl Cyber Defense

Nozomi Networks

Radiflow

Yokogawa Corporation of America
Jason Dely, Barbara Filkins, Doug Wylie
Jun 12, 2019Cybersecurity Frameworks for CISOsCisco Systems Inc. Frank Kim
Jun 11, 2019The 20 Critical Security Controls: From Framework to Operational to ImplementationRandy Marchany
Jun 10, 2019ICS Active Defense PrimerKai Thomsen
Jun 7, 2019SIEM as Alexa How Natural Language Processing Can Transform Your Cyber Security ExperienceEmpowDave Shackleford, Avi Chesla
Jun 6, 2019Missing Information About Security Misconfiguration? Explore this often-used vulnerability category through data from 1000+ pentestsCobalt Labs, Inc. c/o MindspaceJohn Pescatore, Joe Sechman
Jun 5, 2019Power up your Security Operations Centers human capital with the new SEC450 Part 2 - Blue Team FundamentalsFinding and training the right people!John Hubbard
Jun 5, 2019How SOC Superheroes WinUnisys

LogRhythm
Salvatore Sinno, Ismael Cervantes
Jun 4, 2019Lessons From the Front Lines of AppSec: Analysis of real-world attacks from 2019 and best practices for dealing with themThreatXChris Brazdziunas, Will Woodson
Jun 4, 2019The Future of Authentication: How Two Factor Authentication is Dying and Whats NextYubicoJohannes Ullrich, PhD
May 30, 2019Secure Kubernetes Application DeliveryAndrew Martin
May 29, 2019Fileless Malware FunHal Pomeranz
May 28, 2019Cloud Security Automation: Monitoring and OperationsFrank Kim
May 28, 2019Streamlining Your Security Process with Orchestration & AutomationRapid7 Inc.
May 24, 2019IoT vulnerability and security is the next frontierLee Reiber
May 24, 2019Defensible Security Architecture and Engineering Part 3: Protect your Lunch Money Keeping the Thieves at BayIsmael Valenzuela, Justin Henderson
May 23, 2019What Real-World Attacks Look Like and How to Stop Them in Their TracksNetwrixDave Shackleford, Brian Johnson
May 22, 2019Actionable IT/OT end point protection to: detect, contain, and respond to limit ICS cyber threatsVerveRon Brash
May 22, 2019SEC599: Defeating Advanced Adversaries Discover whats NEW in Purple Team.Latest course updates!Erik Van Buggenhout
May 21, 2019Passive Isn't Good Enough: Moving into Active EDRSentinelOneJustin Henderson, Migo Kedem
May 15, 2019Power up your Security Operations Center with the new SEC450 Part 1 - Blue Team Fundamentals: Creating an on-ramp for new defenders!John Hubbard
May 15, 2019Vetting Your Intel - Techniques and Tools for False Positive AnalysisDomainToolsRobert M. Lee, Tarik Saleh
May 15, 2019Web application defense Use headers to make pentesters job difficultJason Lam
May 14, 2019Hacking without Domain AdminTim Medin, Mike Saunders
May 13, 2019Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need.SentryoTim Conway, Michael Thompson, Bob Foley, Fayce Daira
May 9, 2019How to Secure a Modern Web Application in AWSAWS MarketplaceShaun McCullough, David Aiken
May 8, 2019Gaining a Decisive Advantage Through Terrain Based Cyber Defense Fidelis Cybersecurity Craig Harber, Rami Mizrahi
May 7, 2019The State of Cloud Security: Panel DiscussionExtraHop

Sysdig
Dave Shackleford, Jim Reavis, Pawan Shankar, Eric Thomas
May 7, 2019Terraforming Azure: not as difficult as planetsAWS Marketplace: Telos CorporationDavid Hazar
May 2, 2019Rethinking Your Global Security PlatformChronicle Matt Bromiley, Brandon Levene
May 2, 2019How Effective is Your WAF Protection? - Metrics & Key ConsiderationsThreatXChris Brazdziunas, Will Woodson
May 2, 2019From Seizure to Actionable Intelligence in 90 Minutes or LessKevin Ripa
May 1, 2019Sharing Alerts and Threat Intelligence with MISPJustin Henderson, John Hubbard
May 1, 2019The State of Cloud Security: Results of the SANS 2019 Cloud Security SurveyExtraHop

Sophos Inc.

Sysdig
Dave Shackleford, Jim Reavis
May 1, 2019A CISO's Perspective on Presenting OT Risk to the BoardCyberXIlan Abadi, Daniel Shugrue
Apr 30, 2019The Future of Phishing: Its all about your customersSegasecDave Shackleford, Elad Schulman
Apr 30, 2019What Are Fileless Attacks and How Can You Stop Them?Unisys
Apr 30, 2019Defensible Security Architecture and Engineering Part 2: Thinking Red, Acting Blue Mindset & ActionsIsmael Valenzuela, Justin Henderson
Apr 24, 2019Take Back Control of Your DNS Traffic Palo Alto NetworksDave Shackleford
Apr 24, 2019Why Your Vulnerability Management Strategy Is Not Working and What to Do About It Lookingglass Cyber Solutions, Inc.Brandon Helms, Eric Olson
Apr 23, 2019Delivering Infrastructure, Security and Operations as Code across Multi-cloud EnvironmentsPalo Alto NetworksVinay Venkataraghavan, Matt Bromiley
Apr 19, 2019SANS Top New Attacks and Threat ReportAnomali

DomainTools

InfoBlox

Unisys

Veracode
John Pescatore
Apr 18, 2019New Year, Same Magecart: The Continuation of Web-based Supply Chain AttacksRiskIQYonathan Klijnsma, Dave Shackleford
Apr 18, 2019Resolved: How to protect your organization when your perimeter fails VMWare, IncTom Gillis, John Pescatore
Apr 17, 2019Simplifying Application Security with Software-Defined SecurityVMWare, IncMatt De Vincentis, Dave Shackleford
Apr 16, 2019Cryptojacking - What is it? Where is it? How to protect against it?Cisco SystemsBrandon Helms, Brian McMahon
Apr 11, 2019How to Automate Compliance Gaps for Public CloudLaceworkVikram Varakantam, John Pescatore
Apr 11, 2019How to Build a Security Visibility Strategy in the CloudAWS MarketplaceDave Shackleford, David Aiken
Apr 10, 2019Alert Investigations in the SOC - Building Your WorkflowJustin Henderson, John Hubbard
Apr 10, 2019Vulnerability Practices of Tomorrow: Part 2 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable

Veracode
Andrew Laman, David Hoelzer, Gaurav Banga, Nate Dyer
Apr 10, 2019Purple PowerShell: Current attack strategies & defensesErik Van Buggenhout
Apr 9, 2019Cloud Security and DevOps Automation: Keys for Modern Security SuccessEric Johnson
Apr 9, 2019Current State of Vulnerability Management: Part 1 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable

Veracode
Andrew Laman, David Hoelzer, RJ Gazarek, Michael Rosen
Apr 9, 2019Next-Gen Vulnerability Management: Clarity, Consistency, and CloudDavid Hazar
Apr 8, 2019The Cyber Kill Chain and MobileIron Threat DefenseMobileIronJames Saturnio, Ilya Geller
Apr 3, 2019The Foundation of Continuous Host MonitoringOpenText Inc.Matt Bromiley, JJ Cranford
Apr 2, 2019Vulnerability Management for the Enterprise and CloudJonathan Risto
Apr 2, 2019Building a Zero Trust Model in the Cloud with MicrosegmentationUnisysJohn Kindervag, Salvatore Sinno
Apr 2, 2019All Your Data Belongs to Us: How to Defend Against Credential StuffingJohannes Ullrich, PhD
Mar 29, 2019Defensible Security Architecture and Engineering Part 1: How to become an All-Round Defender - the Secret SauceIsmael Valenzuela, Justin Henderson
Mar 28, 2019Best Practices for Network Security ResilienceIxiaJon Oltsik, Keith Bromley
Mar 27, 2019Taming the Endpoint Chaos Within: A Review of Panda Security Adaptive Defense 360Panda SecurityJustin Henderson, James Manning
Mar 26, 2019Security Gets Smart with AI: A SANS SurveyCylanceG.W. Ray Davidson, PhD, Barbara Filkins, Bret Lenmark
Mar 25, 2019Playing Moneyball in CybersecurityUnisysMatt Soderlund
Mar 22, 2019Empowering Incident Response via AutomationCisco Systems Inc. Matt Bromiley
Mar 21, 2019Alternative Network Visibility Strategies for an Encrypted WorldCorelight Gregory Bell, Matt Bromiley
Mar 21, 2019What's Next in Automation Support: Part 2 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Emily Laufer, Nick Tausek
Mar 21, 20192018 Holiday Hack Challenge Winner Announcement and More!Ed Skoudis, Joshua Wright
Mar 20, 2019Osquery: A Modern Approach to CSIRT AnalyticsUptycsDave Shackleford, Milan Shah
Mar 20, 2019Hiding in Plain Sight: Dissecting Popular Evasive Malware TechniquesVMRay Jake Williams, Rohan Viegas, Tamas Boczan
Mar 19, 2019The State of Automation/Integration Practice: Part 1 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Dan Cole, Stan Engelbrecht, Darren Thomas
Mar 18, 2019Securing Your Endpoints with Carbon Black: A SANS Review of the CB Predictive Security Cloud PlatformCarbon BlackDave Shackleford, Tristan Morris
Mar 15, 2019How to Automate Compliance and Risk Management for Cloud WorkloadsAWS MarketplaceMatt Bromiley, David Aiken
Mar 14, 2019USBs Behaving Badly - How to Control USB Usage in Operational NetworksHoneywell International Sam Wilson, Matt Wiseman
Mar 13, 2019Overcoming Obstacles to Secure Multi-cloud AccessPulse SecureRajoo Nagar, John Pescatore
Mar 12, 2019Maximizing SOC Effectiveness and Efficiency with Integrated Operations and DefenseNETSCOUT Systems, Inc.John Pescatore, Arabella Hallawell
Mar 11, 2019 Purple Kerberos: Current attack strategies & defensesErik Van Buggenhout
Mar 7, 2019Investigating WMI AttacksChad Tilbury
Mar 6, 2019The State of Kubernetes SecurityAqua Security Inc. Liz Rice
Mar 5, 2019SOF-ELK(R): A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security OperationsPhilip Hagen
Mar 1, 2019Taking SIEM to the Cloud: A SANS Review of Securonix Next-Gen SIEMSecuronixNitin Agale, Dave Shackleford
Feb 28, 2019NIST Recommendations for ICS & IIoT Security CyberXPhil Neray, Michael Powell, Jim McCarthy, Tim Zimmerman
Feb 27, 2019Improving Detection and Understanding the Adversary with Deception TechnologyTrapX SecurityMatt Bromiley, Ori Bach
Feb 26, 201972-Hours-to-Disclose Survival Guide: Accurate Scoping and Impact Assessment of BreachesExtraHopJohn Matthews, John Pescatore
Feb 22, 2019Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid ThemLenny Zeltser
Feb 21, 2019Leveraging MITRE ATT&CK and ATT&CK NavigatorErik Van Buggenhout
Feb 21, 2019Prioritizing Security Operations in the Cloud through the Lens of the NIST FrameworkAWS MarketplaceJohn Pescatore, David Aiken
Feb 20, 2019It's All About Scale! Succeeding in Enterprise DefenseAlissa Torres, Jeff McJunkin
Feb 20, 2019Identifying Emerging Threats with Security AnalyticsAlphaSOC, Inc.Chris McNab
Feb 19, 2019Modern AppSec Tools for Modern AppSec Problems: A Practical Introduction to the Next-Gen WAFThreatXKelly Brazil
Feb 18, 2019The SANS ICS Summit 2019 and What to ExpectTim Conway, Robert M. Lee, Michael Assante
Feb 14, 2019Dispelling GDPR Myths: Avoid the Compliance Trap, Make Real Security/Privacy GainsBrian Honan, John Pescatore, Gal Shpantzer, Mark Weatherford
Feb 13, 2019MITRE ATT&CK and Sigma AlertingJustin Henderson, John Hubbard
Feb 13, 2019Challenges we face, repeatedlyBTB SecurityDave Shackleford, Ron Schlecht, Jr.
Feb 12, 2019Offensive WMITim Medin
Feb 12, 2019Dealing with Remote Access to Critical ICS InfrastructureJustin Searle
Feb 8, 2019SANS Automation & Integration Security Briefing: SOARing to New Heights - Using Orchestration & Automation Tools in the Way They're IntendedSwimlane

DomainTools

Amazon Web Services, Inc.

Siemplify

Anitian

RedCanary

DFLabs
Chris Crowley
Feb 7, 2019CTI Tools, Usage and a Look Ahead: Part 2 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Rebekah Brown, Jonathan Couch, Nicholas Hayden
Feb 5, 2019CTI Requirements and Inhibitors: Part 1 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Robert M. Lee, Nick Hayes, Helen Johnson, Allan Liska
Jan 31, 2019Best Practices to Get You CloudFit- 12 AWS Best Practices for Cloud SecurityPalo Alto NetworksJohn Martinez, Matt Bromiley
Jan 30, 2019Game Changing Defensive Strategies for 2019Fidelis Cybersecurity Alissa Torres, Dr. Abdul Rahman, Tom Clare
Jan 24, 2019Remediating Threats by Bridging Islands of SecurityInfoBloxJohn Pescatore, Chintan Udeshi
Jan 23, 2019Enterprise Security with a Fluid PerimeterAruba NetworksMatt Bromiley, Larry Lunetta
Jan 23, 2019Network Visualizations: Understand what's happening faster and easier than ever!Mick Douglas
Jan 22, 2019Malicious or Negligent? How to Understand User Intent to Stop Data ExfiltrationObserveITBrad Green, John Pescatore
Jan 22, 2019The Hitchhikers Guide to Evidence SourcesNick Klein
Jan 17, 2019Using Data Science to Secure Cloud WorkloadsCylanceMikkel Hansen, Aaron Bryson
Jan 17, 2019Falcon and the MITRE ATT&CK Framework Better Together; Feature UpdateCrowdStrike, Inc.Ken Warren
Jan 16, 2019Lessons learned after Hundreds of Breach InvestigationsCisco Systems Inc. Robert Reyes, Gerard Johansen, Jake Williams
Jan 16, 2019Breaking Bad Bots - The New #1 Threat and How to Stop ThemCequenceShreyans Mehta, Franklyn Jones
Jan 14, 2019Whats new with FOR526 Advanced Memory Forensics and Threat DetectionAlissa Torres
Jan 11, 201924/7 CTI: Operationalizing Cyber Threat IntelligenceXena Olsen
Jan 9, 2019Assumption of a breach: How a new notion can help protect your enterpriseTim Medin
Jan 8, 2019Defeating Attackers with Preventive SecurityVMWare, IncDave Shackleford, Alex Berger

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.