Join us for the FREE DFIR Summit | Live Online on July 16-17

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
Thursday, July 02, 2020
at 10:30 AM EDT
(2020-07-02 14:30 UTC)
Managing & Showing Value during Red Team Engagements & Purple Team ExercisesJorge Orchilles, Phil Wainwright
Wednesday, July 01, 2020
at 3:30 PM EDT
(2020-07-01 19:30 UTC)
SANS @MIC Talk - Defending Lift and Shift Cloud ApplicationsRyan Nicholson
Wednesday, July 01, 2020
at 1:00 PM EDT
(2020-07-01 17:00 UTC)
Extending Your Home Lab to include CloudIsmael Valenzuela, Justin Henderson
Tuesday, June 30, 2020
at 1:00 PM EDT
(2020-06-30 17:00 UTC)
Securing Assets Using Micro-Segmentation: A SANS Review of Guardicore CentraGuardicore LTD
Dave Shackleford, Dave Klein
Tuesday, June 30, 2020
at 1:00 PM EST
(2020-06-30 17:00 UTC)
Tech Tuesday Workshop - Introduction to OSINT Video & Image VerificationNico Dekens
Tuesday, June 30, 2020
at 10:30 AM EDT
(2020-06-30 14:30 UTC)
ICMP: A world beyond pingAndrew Laman
Monday, June 29, 2020
at 3:30 PM EDT
(2020-06-29 19:30 UTC)
SANS @MIC Talk - #LevelUpLabsMathias Fuchs
Monday, June 29, 2020
at 1:00 PM EDT
(2020-06-29 17:00 UTC)
CISSP Test-Taking Tactics: Successfully Navigating Adaptive Exams Seth Misenar
Friday, June 26, 2020
at 1:00 PM EDT
(2020-06-26 17:00 UTC)
Overt Operations | When the Red Team gets in your Face!Matthew Toussain
Friday, June 26, 2020
at 10:30 AM EDT
(2020-06-26 14:30 UTC)
Leading the Cloud transformation - Building the RoadmapJason Lam
Thursday, June 25, 2020
at 3:30 PM EDT
(2020-06-25 19:30 UTC)
How To Secure Remote Workers For The Long Haul: Protecting VPN, RDP, Webcams and BeyondExtraHop
Heather Mahalik, Josh Snow, Kyle Walsh
Thursday, June 25, 2020
at 1:00 PM EDT
(2020-06-25 17:00 UTC)
ICS Asset Identification: It's More Than Just Security: A SANS ReportCisco Systems Inc.
Palo Alto Networks
PAS
Tenable
Mark Bristow
Thursday, June 25, 2020
at 12:00 PM EDT
(2020-06-25 16:00 UTC)
The Power of Fusing Network Alerts and Evidence with Open-Source Suricata and Zeek (Bro) Corelight
Alex Kirk, John Gamble, Matt Bromiley
Thursday, June 25, 2020
at 10:30 AM EDT
(2020-06-25 14:30 UTC)
How to Present Cyber Security Risk to Senior LeadershipJames Tarala
Wednesday, June 24, 2020
at 8:30 PM EDT
(2020-06-25 00:30 UTC)
SANS @MIC Talk - SEC510: Multicloud Security Assessment and DefenseEric Johnson, Brandon Evans
Wednesday, June 24, 2020
at 3:30 PM EDT
(2020-06-24 19:30 UTC)
SANS@MIC -Threat Hunting via DNS Eric Conrad
Wednesday, June 24, 2020
at 2:00 PM EDT
(2020-06-24 18:00 UTC)
The New Rootkit: How Malicious Chrome Extensions Enabled a Global Surveillance CampaignAwake Security
Gary Golomb
Wednesday, June 24, 2020
at 3:00 AM EDT
(2020-06-24 07:00 UTC)
SANS @MIC Talk - No SQL Injection in MongoDB applicationsAdrien de Beaupre
Tuesday, June 23, 2020
at 3:30 PM EDT
(2020-06-23 19:30 UTC)
Detecting advanced persistent threats with behavior-based intrusion detectionAccedian
Andrey Yesyev, Michael Rezek
Tuesday, June 23, 2020
at 2:00 PM EDT
(2020-06-23 18:00 UTC)
The Best of Both Worlds: Cloud + SASEBitglass
Prasidh Srikanth, Kenneth G. Hartman
Tuesday, June 23, 2020
at 1:00 PM EDT
(2020-06-23 17:00 UTC)
Tech Tuesday Workshop - Collaborating at Scale; How to Contribute to and Profit from the SANS Internet Storm CenterDr. Johannes Ullrich
Tuesday, June 23, 2020
at 12:00 PM EDT
(2020-06-23 16:00 UTC)
Secure your data, your recovery and your missionCommVault Systems Inc.
Brian Brockway, David DeVries, John Pescatore
Monday, June 22, 2020
at 8:30 PM EDT
(2020-06-23 00:30 UTC)
SANS@MIC- Infrastructure as Code is REAL: Using the Cloud to Provision Infrastructure with Software Shaun McCullough
Monday, June 22, 2020
at 3:30 PM EDT
(2020-06-22 19:30 UTC)
SANS @MIC Talk -Hacking the SRUM and other Devious New Ways to Interrogate WindowsAlissa Torres
Monday, June 22, 2020
at 1:00 PM EDT
(2020-06-22 17:00 UTC)
The Reality of Digital Collaboration – Unknown Risks, Misconceptions and Real Time Privacy ConcernsCheck Point Software Technologies, Inc.
Iovations
Mark Ostrowski
Monday, June 22, 2020
at 3:00 AM EDT
(2020-06-22 07:00 UTC)
SANS @MIC Talk- Course Preview: Successful Infosec Consulting, Getting Clients Deep DiveTed Demopoulos
Friday, June 19, 2020
at 3:30 PM EDT
(2020-06-19 19:30 UTC)
Post Modern Web Attacks: Kubernetes Attack MatrixMoses Frost
Friday, June 19, 2020
at 1:00 PM EDT
(2020-06-19 17:00 UTC)
Domain Name & DNS Hijacking: Learn Best Practices to Mitigate Risk and View Latest Domain Security FindingsCSC
Mark Calandra, Jacob Williams
Friday, June 19, 2020
at 10:30 AM EDT
(2020-06-19 14:30 UTC)
Leveraging Organizational Change to Build a Strong Security CultureLance Spitzner
Thursday, June 18, 2020
at 1:00 PM EDT
(2020-06-18 17:00 UTC)
2020 Asset Management Trends: As IT Complexity Increases, Visibility PlummetsAxonius
Dave Gruber, Nathan Burke, Chris Dale
Thursday, June 18, 2020
at 12:30 PM EDT
(2020-06-18 16:30 UTC)
Effortlessly Immunize Software - Rapidly Inoculate Compiled Code Against Software Memory VulnerabilitiesRunSafe Security
Doug Britton
Thursday, June 18, 2020
at 12:30 PM EDT
(2020-06-18 16:30 UTC)
Expert Playbooks for Non-Expert UseCorelight
Alex Kirk
Thursday, June 18, 2020
at 12:30 PM EDT
(2020-06-18 16:30 UTC)
Tracking Down the Cyber Criminals: Revealing Malicious Infrastructures with UmbrellaCisco Umbrella
Chris Bilodeau
Thursday, June 18, 2020
at 10:30 AM EDT
(2020-06-18 14:30 UTC)
How to Use NERC CIP: An Overview of the Standards, Their Deployment and How to Use Fortinet Products for ComplianceFortinet, Inc.
Tim Conway, Peter Newton, Christopher Blauvelt
Wednesday, June 17, 2020
at 8:30 PM EDT
(2020-06-18 00:30 UTC)
SANS@MIC - Maldocs: a bit of blue, a bit of redDidier Stevens
Wednesday, June 17, 2020
at 3:30 PM EDT
(2020-06-17 19:30 UTC)
SANS@MIC - Catch and release: phishing techniques for the good guysJan Kopřiva
Wednesday, June 17, 2020
at 12:30 PM EDT
(2020-06-17 16:30 UTC)
How Implementing SOAR Improves Efficiency In Your OrganizationSwimlane
Jay Spann
Wednesday, June 17, 2020
at 12:30 PM EDT
(2020-06-17 16:30 UTC)
Proactive Threat Hunting with SOARThreatConnect
Alex Valdivia
Tuesday, June 16, 2020
at 1:00 PM EDT
(2020-06-16 17:00 UTC)
STAR Webcast: The Only Constant is Change: Tracking Adversary TrendsKatie Nickels, Saher Naumaan
Tuesday, June 16, 2020
at 12:30 PM EDT
(2020-06-16 16:30 UTC)
Does Your Web Browser Need a Stunt Double?Cyberinc
Rajiv Raghunarayan
Monday, June 15, 2020
at 8:30 PM EDT
(2020-06-16 00:30 UTC)
SANS@MIC- A walk through logs hellXavier Mertens
Monday, June 15, 2020
at 3:30 PM EDT
(2020-06-15 19:30 UTC)
SANS@MIC -Arcane web and mobile application vulnerabilitiesBojan Zdrnja
Monday, June 15, 2020
at 1:00 PM EDT
(2020-06-15 17:00 UTC)
You Can Write an Infosec Book!Ted Demopoulos
Monday, June 15, 2020
at 12:30 PM EDT
(2020-06-15 16:30 UTC)
Cybersecurity: Why Asset Management MattersAxonius
Andrew Senko
Monday, June 15, 2020
at 12:30 PM EDT
(2020-06-15 16:30 UTC)
Leverage DNS OSINT at ScaleDomainTools
Taylor Wilkes-Pierce
Friday, June 12, 2020
at 1:00 PM EDT
(2020-06-12 17:00 UTC)
Jacobs Engineering's Perspective on IoT/OT SecurityCyberX
Heather Wishart-Smith, Raja R. Kadiyala, Ph.D., Adi Karisik, Robert Brokamp, Phil Neray
Friday, June 12, 2020
at 10:30 AM EDT
(2020-06-12 14:30 UTC)
Supercharge your security operations with the brand new MGT551 - Building and Leading Security Operations Centers!John Hubbard
Thursday, June 11, 2020
at 3:30 PM EDT
(2020-06-11 19:30 UTC)
Network Compromise for the Technically Challenged (Dummies)Doc Blackburn
Thursday, June 11, 2020
at 12:00 PM EDT
(2020-06-11 16:00 UTC)
How to Eliminate Alert Fatigue by Turbo-Charging Splunk Phantom with Corelight NSMCorelight
Wissam Ali-Ahmad, Troy Moore, Richard Bejtlich, Mark Overholser
Thursday, June 11, 2020
at 10:30 AM EDT
(2020-06-11 14:30 UTC)
A Wolf in Sheep's Clothing: Dissecting Living off the Land TechniquesVMRay
Tamas Boczan, Jake Williams
Wednesday, June 10, 2020
at 3:30 PM EDT
(2020-06-10 19:30 UTC)
SANS@MIC - Shellcode Analysis 101Jim Clausing
Wednesday, June 10, 2020
at 2:00 PM EDT
(2020-06-10 18:00 UTC)
Getting engineering and security teams building togetherCloudfare
Evan Johnson
Wednesday, June 10, 2020
at 10:30 AM EDT
(2020-06-10 14:30 UTC)
Putting Your SOC to the TestJohn Hubbard
Tuesday, June 09, 2020
at 3:30 PM EDT
(2020-06-09 19:30 UTC)
Implementing Lessons Learned from Threat Patterns on the EndpointCyberinc
Rajiv Raghunarayan, Jake Williams
Tuesday, June 09, 2020
at 1:00 PM EDT
(2020-06-09 17:00 UTC)
Breaking Down Zero Trust: What does it Actually Mean? Netskope
Vladimir Klasnja, Ross Asquith
Tuesday, June 09, 2020
at 12:00 PM EST
(2020-06-09 16:00 UTC)
Covid-19 Cybersecurity Attacks Match the Outbreak CurveBitdefender SRL
Liviu Arsene, John Pescatore
Monday, June 08, 2020
at 8:30 PM EDT
(2020-06-09 00:30 UTC)
SANS@MIC - CYA by Using CIA -- Correctly For a ChangeKeith Palmgren
Monday, June 08, 2020
at 3:30 PM EDT
(2020-06-08 19:30 UTC)
SANS@MIC - Remote Forensic Investigations in the Context of COVID-19Xavier Mertens
Monday, June 08, 2020
at 1:00 PM EDT
(2020-06-08 17:00 UTC)
CISSP Cram SessionEric Conrad
Friday, June 05, 2020
at 1:00 PM EDT
(2020-06-05 17:00 UTC)
Purple Team: How to Achieve Threat Informed DefenseAttackIQ
Chris Kennedy, Ben Opel, Alissa Torres
Friday, June 05, 2020
at 10:30 AM EDT
(2020-06-05 14:30 UTC)
Modern Web Application Penetration Testing Part 3, NoSQL injection with MongoDBAdrien de Beaupré
Thursday, June 04, 2020
at 3:30 PM EDT
(2020-06-04 19:30 UTC)
How Are Remote Workers Working? A SANS PollPulse Secure
Menlo Security
ExtraHop
InfoBlox
Heather Mahalik
Thursday, June 04, 2020
at 1:00 PM EDT
(2020-06-04 17:00 UTC)
Shift Left: Integrate security in your DevOps lifecycleCisco Systems Inc.
Remi Philippe
Thursday, June 04, 2020
at 10:30 AM EDT
(2020-06-04 14:30 UTC)
Enterprise and Cloud | Threat & Vulnerability AssessmentMatthew Toussain
Wednesday, June 03, 2020
at 8:30 PM EDT
(2020-06-04 00:30 UTC)
SANS @MIC Talk -User-Mode Process Dump Analysis with WinDbg: Take TwoAlissa Torres
Wednesday, June 03, 2020
at 3:30 PM EDT
(2020-06-03 19:30 UTC)
SANS@MIC - Waiting for a cyber range exercise is not enoughOlaf Schwarz
Wednesday, June 03, 2020
at 10:30 AM EDT
(2020-06-03 14:30 UTC)
Winning in the Dark - Defending Serverless Infrastructure in the CloudEric Johnson
Tuesday, June 02, 2020
at 12:00 PM EDT
(2020-06-02 16:00 UTC)
Improving ICS/OT Visibility and Threat Detection with the Dragos PlatformDragos, Inc.
Ben Miller, John Lavender
Tuesday, June 02, 2020
at 10:30 AM EDT
(2020-06-02 14:30 UTC)
Introduction to Writing Nmap NSE ScriptsJon Gorenflo
Monday, June 01, 2020
at 8:30 PM EDT
(2020-06-02 00:30 UTC)
SANS@MIC - WinSCP: Yeah you know me! Mari DeGrazia
Friday, May 29, 2020
at 1:00 PM EDT
(2020-05-29 17:00 UTC)
Responding to Incidents in Industrial Control Systems (ICS): Identifying Threats, Reactions and Developing the IR ProcessHoneywell International
Don C. Weber, Eric Knapp, Matt Wiseman
Friday, May 29, 2020
at 10:30 AM EDT
(2020-05-29 14:30 UTC)
Zero Trust: Fast forwarding into working without boundariesMicrosoft
Chase Cunningham, Alex Weinert
Thursday, May 28, 2020
at 1:00 PM EDT
(2020-05-28 17:00 UTC)
Factoring IoT Devices into Detection and Response: A SANS WhitepaperExtraHop
Matt Bromiley, Michael Sanders
Thursday, May 28, 2020
at 12:00 PM EDT
(2020-05-28 16:00 UTC)
7 Ways to Find Encrypted Network Threats Without DecryptionCorelight
John Gamble, Vincent Stoffer
Thursday, May 28, 2020
at 10:30 AM EDT
(2020-05-28 14:30 UTC)
How Dangerous File Uploads Disrupt Business-Critical Web & Mobile AppsReversing Labs
Chip Epps, Brian Soldato
Wednesday, May 27, 2020
at 8:30 PM EDT
(2020-05-28 00:30 UTC)
SANS @MIC Talk - Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish While Leadership Defines a Security ProgramDon C. Weber
Wednesday, May 27, 2020
at 3:30 PM EDT
(2020-05-27 19:30 UTC)
SANS @MIC Talk - Introduction to Docker for security workChris Dale
Wednesday, May 27, 2020
at 1:00 PM EDT
(2020-05-27 17:00 UTC)
Is Your Threat Hunting Effective? A New SANS SurveyCyborg Security
Dave Amsler, Mathias Fuchs
Wednesday, May 27, 2020
at 12:00 PM EDT
(2020-05-27 16:00 UTC)
Weaponizing N-Day- A Crash Course on Exploit DevelopmentRandori
David Cowen, Evan Anderson
Wednesday, May 27, 2020
at 10:30 AM EDT
(2020-05-27 14:30 UTC)
How to Implement a Software-Defined Network Security Fabric in AWSAWS Marketplace
Dave Shackleford, Sagar Khasnis
Tuesday, May 26, 2020
at 3:30 PM EDT
(2020-05-26 19:30 UTC)
Danger Stewards – Measuring Risk and Predicting the Future for Fun and ProfitDoc Blackburn
Tuesday, May 26, 2020
at 1:00 PM EDT
(2020-05-26 17:00 UTC)
STAR Webcast: Threat Hunting and the Rise of Targeted eCrime IntrusionsKatie Nickels, Karl Scheuerman, Jason Wood
Tuesday, May 26, 2020
at 12:00 PM EDT
(2020-05-26 16:00 UTC)
Mobile Application Dynamic AnalysisJeroen Beckers
Tuesday, May 26, 2020
at 10:30 AM EDT
(2020-05-26 14:30 UTC)
HOW TO LEVERAGE CTI TO DEFEND FROM RANSOMWAREEclecticIQ
Jess García, Ippolito Forni
Friday, May 22, 2020
at 3:30 PM EDT
(2020-05-22 19:30 UTC)
Post Modern Web Attacks: Cloud EditionMoses Frost, Molly Stewart
Friday, May 22, 2020
at 1:00 PM EDT
(2020-05-22 17:00 UTC)
MITRE ATT&CK for ICS: A Technical Deep DiveCyberX
Phil Neray, Joe DiPietro
Friday, May 22, 2020
at 10:30 AM EDT
(2020-05-22 14:30 UTC)
Open Season: Building a Threat Hunting Program with Open Source ToolsCorelight
James Schweitzer, Ken Westin
Thursday, May 21, 2020
at 3:30 PM EDT
(2020-05-21 19:30 UTC)
Five Ways To Cut Costs in Your SOCMark Orlando
Thursday, May 21, 2020
at 1:00 PM EDT
(2020-05-21 17:00 UTC)
SOAR is Not a Product: Steps to Achieve Meaningful and Measurable Cyber Defense with a Proper SOAR Strategy.Stratozen
John Pescatore, Kevin Prince
Thursday, May 21, 2020
at 10:30 AM EDT
(2020-05-21 14:30 UTC)
How to Better Understand HR to Accomplish our Cybersecurity GoalsJim Michaud
Wednesday, May 20, 2020
at 8:30 PM EDT
(2020-05-21 00:30 UTC)
SANS @MIC Talk - Moving Past Just Googling It: Harvesting and Using OSINTMicah Hoffman
Wednesday, May 20, 2020
at 1:00 PM EDT
(2020-05-20 17:00 UTC)
SANS 2020 Automation and Integration Survey Panel DiscussionCloudPassage
DomainTools
ThreatConnect
Don Murdoch, Barbara Filkins, John Madray, Sean McNee, Carson Sweet
Wednesday, May 20, 2020
at 10:30 AM EDT
(2020-05-20 14:30 UTC)
Using MITRE’s 2020 ATT&CK Evaluation Data to Show How An Advanced Endpoint Detection/Response Product Mitigated APT29SentinelOne
John Pescatore, Jared Phipps
Tuesday, May 19, 2020
at 10:00 PM PST
(2020-05-20 05:00 UTC)
SANS @MIC Talk - Find_Evil - Threat HuntingAnurag Khanna
Tuesday, May 19, 2020
at 5:45 PM EDT
(2020-05-19 21:45 UTC)
Ransomware recovery best practices: Importance of immutable backupsCommVault Systems Inc.
Dan Trivett
Tuesday, May 19, 2020
at 5:35 PM EDT
(2020-05-19 21:35 UTC)
What’s Next in Vulnerability ManagementQualys
Chris Carlson
Tuesday, May 19, 2020
at 5:30 PM EDT
(2020-05-19 21:30 UTC)
Defend better, Respond fasterCisco Systems Inc.
Chris Bilodeau, Pierre Cadieux
Tuesday, May 19, 2020
at 5:20 PM EDT
(2020-05-19 21:20 UTC)
NTA/NSM and the MITRE ATT&CKCorelight
James Schweitzer
Tuesday, May 19, 2020
at 5:10 PM EDT
(2020-05-19 21:10 UTC)
Arming your SOC with SOAR in Today’s Threat LandscapeSwimlane
Jay Spann
Tuesday, May 19, 2020
at 5:00 PM EDT
(2020-05-19 21:00 UTC)
Mastering the Pivot from Alert to Investigate to HuntDevo Technology Inc.
Jason Mical
Tuesday, May 19, 2020
at 3:30 PM EDT
(2020-05-19 19:30 UTC)
Attack Simulation: Docker ApplicationThreat Stack
Tim Buntel
Tuesday, May 19, 2020
at 1:00 PM EDT
(2020-05-19 17:00 UTC)
SANS 2020 Automation and Integration Survey ResultsCloudPassage
Devo Technology Inc.
DomainTools
Siemplify
SIRP
Swimlane
ThreatConnect
Don Murdoch, Barbara Filkins
Tuesday, May 19, 2020
at 11:00 AM EDT
(2020-05-19 15:00 UTC)
Zooming Ahead Safely and Securely: SANS Interviews Zoom’s Head of Product SecurityJohn Pescatore, Randolph Barr
Tuesday, May 19, 2020
at 10:30 AM EDT
(2020-05-19 14:30 UTC)
Quick, everyone BYOD! Simplifying remote work and reducing risk with Microsoft and DuoDuo Security
Dave Shackleford, Ganesh Umapathy, Leya Leydiker
Monday, May 18, 2020
at 3:30 PM EDT
(2020-05-18 19:30 UTC)
SANS @MIC Talk - Tricking modern endpoint security productsMichel Coene
Monday, May 18, 2020
at 1:00 PM EDT
(2020-05-18 17:00 UTC)
Infosec Rock Star 2020: How to Accelerate Your CareerTed Demopoulos
Sunday, May 17, 2020
at 10:00 PM PST
(2020-05-18 05:00 UTC)
SANS @MIC Talk - Modern Domain Deception - The risk, issues and potentialityAgostino Panico
Friday, May 15, 2020
at 3:30 PM EDT
(2020-05-15 19:30 UTC)
Zero Trust: A Cybersecurity Essential and the Key to SuccessInfoBlox
Michael Zuckerman
Friday, May 15, 2020
at 10:30 AM EDT
(2020-05-15 14:30 UTC)
Enabling Consistent Multi-Cloud Security, Forensics and Incident ResponseCisco Systems Inc.
Chris McHenry
Thursday, May 14, 2020
at 3:30 PM EDT
(2020-05-14 19:30 UTC)
Is OT security monitoring safe?Waterfall Security
Andrew Ginter
Thursday, May 14, 2020
at 1:00 PM EDT
(2020-05-14 17:00 UTC)
Making and Keeping Work at Home Operations Safe and ProductivePulse Secure
Menlo Security
BlackBerry Cylance
InfoBlox
John Pescatore, Lance Spitzner, Randy Marchany
Wednesday, May 13, 2020
at 8:30 PM EDT
(2020-05-14 00:30 UTC)
SANS @Mic Talk - Cloud Native Payloads: A Matryoshka Doll of ExploitsMoses Frost
Wednesday, May 13, 2020
at 3:30 PM EDT
(2020-05-13 19:30 UTC)
SANS @MIC Talk - Incident Response in ICS in times of LockdownKai Thomsen
Wednesday, May 13, 2020
at 1:00 PM EDT
(2020-05-13 17:00 UTC)
Building an Enterprise Grade Home LabIsmael Valenzuela, Justin Henderson
Wednesday, May 13, 2020
at 10:30 AM EDT
(2020-05-13 14:30 UTC)
Privilege Escalation in GCP - A Transitive PathKat Traxler
Wednesday, May 13, 2020
at 10:30 AM EDT
(2020-05-13 14:30 UTC)
Enabling Consistent Multi-Cloud Security, Forensics and Incident ResponseCisco Systems Inc.
Chris McHenry
Tuesday, May 12, 2020
at 3:30 PM EDT
(2020-05-12 19:30 UTC)
Act Like You’ve Been HackedViavi Solutions
Ward Cobleigh
Tuesday, May 12, 2020
at 1:00 PM EDT
(2020-05-12 17:00 UTC)
SANS Webinar: Cleveland Clinic Best Practices On Securing Unmanaged and IoT DevicesOrdr
Kevin Tambascio, Jason Sinchak, Russell Rice
Monday, May 11, 2020
at 8:30 PM EDT
(2020-05-12 00:30 UTC)
SANS @MIC Talk - Coalfire penetration testers charged with criminal trespassBen Wright
Monday, May 11, 2020
at 3:30 PM EDT
(2020-05-11 19:30 UTC)
SANS @MIC Talk - Using the OSINT Mind-State for Better Online InvestigationsNico Dekens
Monday, May 11, 2020
at 1:00 PM EDT
(2020-05-11 17:00 UTC)
Secure Remote Collaboration: Truth, lies and security marketing fluff when it comes to messaging, video conferencing and MFAHighside
Aaron Turner, Dave Shackleford
Friday, May 08, 2020
at 1:00 PM EDT
(2020-05-08 17:00 UTC)
Full Packet Capturing with TShark for Continuous Monitoring & Packet Threat Intelligence via IP, Domains and URLSNik Alleyne
Friday, May 08, 2020
at 10:30 AM EDT
(2020-05-08 14:30 UTC)
Develop Technical Recall Skills: Spaced Repetition with AnkiJoshua Wright
Thursday, May 07, 2020
at 1:00 PM EDT
(2020-05-07 17:00 UTC)
Using the MITRE ATT&CK Framework for Detection and Threat HuntingExabeam
Trevor Daughney
Thursday, May 07, 2020
at 10:30 AM EDT
(2020-05-07 14:30 UTC)
Mobile Assessments : Attack Surface and FrameworksChris Crowley
Wednesday, May 06, 2020
at 8:00 PM PST
(2020-05-07 03:00 UTC)
Multi-factor authentication bypass techniques you need to know about.Bryce Galbraith
Wednesday, May 06, 2020
at 8:30 PM EDT
(2020-05-07 00:30 UTC)
SANS @MIC Talk - The Hackers Apprentice Mark Baggett
Wednesday, May 06, 2020
at 3:30 PM EDT
(2020-05-06 19:30 UTC)
SANS @MIC Talk - Information Security misconceptions 2020Chris Dale
Wednesday, May 06, 2020
at 1:00 PM EDT
(2020-05-06 17:00 UTC)
Transforming Detection and Response: A SANS Review of Cortex XDRPalo Alto Networks
Matt Bromiley, Kasey Cross
Wednesday, May 06, 2020
at 10:30 AM EDT
(2020-05-06 14:30 UTC)
All Roads Lead to the Browser: A SANS Buyer's Guide to Browser IsolationCyberinc
Matt Bromiley, Rajiv Raghunarayan
Tuesday, May 05, 2020
at 3:30 PM EDT
(2020-05-05 19:30 UTC)
Security Leadership: Managing in Turbulent Times, presented by SANS SummitsFrank Kim, Kathy Wang, Lance Spitzner, Lenny Zeltser, Russell Eubanks, Rick Holland
Tuesday, May 05, 2020
at 1:00 PM EDT
(2020-05-05 17:00 UTC)
Cryptography Essentials Made SimpleTed Demopoulos
Tuesday, May 05, 2020
at 10:30 AM EDT
(2020-05-05 14:30 UTC)
The Role of Machine Learning in Network Traffic AnalysisFidelis Cybersecurity
Abhishek Sharma, Alissa Torres
Monday, May 04, 2020
at 8:30 PM EDT
(2020-05-05 00:30 UTC)
SANS @MIC Talk - Accessing Data in the CloudKevin Ripa
Monday, May 04, 2020
at 3:30 PM EDT
(2020-05-04 19:30 UTC)
SANS @MIC Talk - Course Preview: Successful Infosec Consulting, Getting Clients Deep DiveTed Demopoulos
Monday, May 04, 2020
at 1:00 PM EDT
(2020-05-04 17:00 UTC)
Adversary emulation using CALDERA – Building custom plugins – Part #3Erik Van Buggenhout
Friday, May 01, 2020
at 10:00 AM EDT
(2020-05-01 14:00 UTC)
DISC – SANS ICS Virtual ConferenceTim Conway, Robert M. Lee, John Lavender, Sergio Caltagirone, Amy Bejtlich, Kate Vajda, Tom Van Norman, Don C. Weber, Jason D. Christopher, Jason Dely, Jeff Shearer, Austin Scott
Thursday, April 30, 2020
at 3:30 PM EDT
(2020-04-30 19:30 UTC)
Unwind Your SIEM: Improved Threat Hunting and Detection with ChronicleChronicle
Matt Bromiley, Ansh Patnaik, Dr. Anton Chavakin
Thursday, April 30, 2020
at 1:30 PM EDT
(2020-04-30 17:30 UTC)
The new normal: how employees stay secure and productive while working-from-homeHysolate
Tal Zamir
Thursday, April 30, 2020
at 10:30 AM EDT
(2020-04-30 14:30 UTC)
Using Visibility and Analytics to Secure and Optimize Today’s NetworksCisco Systems Inc.
Matthew Robertson
Wednesday, April 29, 2020
at 8:30 PM EDT
(2020-04-30 00:30 UTC)
SANS @MIC Talk - Reflections of a New CISO: 5 Lessons LearnedLenny Zeltser
Wednesday, April 29, 2020
at 3:30 PM EDT
(2020-04-29 19:30 UTC)
SANS @MIC Talk - Driving Cybersecurity Change – Establishing a Culture of Protect, Detect and Respond HighlightsLance Spitzner
Wednesday, April 29, 2020
at 1:00 PM EDT
(2020-04-29 17:00 UTC)
WhatWorks in Migrating to the Cloud while Maintaining Security and Network Performance (with a remote workforce)ExtraHop
John Pescatore
Wednesday, April 29, 2020
at 10:30 AM EDT
(2020-04-29 14:30 UTC)
How to Design a Least Privilege Architecture in AWSAWS Marketplace
Dave Shackleford, Sagar Khasnis
Tuesday, April 28, 2020
at 3:30 PM EDT
(2020-04-28 19:30 UTC)
How Operational Technology (OT) Security is Redefining the CISO RoleClaroty Inc.
Dave Weinstein, Don C. Weber
Tuesday, April 28, 2020
at 1:00 PM EDT
(2020-04-28 17:00 UTC)
SANS Top New Attacks and Threat ReportAnomali
Cisco Systems
Cyberinc
DomainTools
InfoBlox
RSA
Unisys
Verodin
John Pescatore
Monday, April 27, 2020
at 8:30 PM EDT
(2020-04-28 00:30 UTC)
SANS @MIC Talk - Modern Domain Deception - Risks, Limits and potentialityAgostino Panico
Friday, April 24, 2020
at 10:00 AM EDT
(2020-04-24 14:00 UTC)
SANS Women in Cybersecurity ForumCisco Systems Inc.
CommVault Systems Inc.
Lesley Carhart, Diana Kelley, Katie Nickels, Heather Mahalik, Alissa Torres, Sarah Edwards, Rob Lee, Larry Whiteside, Rushmi Hasham, Beverly Benson, Parag Baxi, Humberto Hilario
Thursday, April 23, 2020
at 3:30 PM EDT
(2020-04-23 19:30 UTC)
Addressing Practical Challenges to Implementing Micro-segmentationCisco Systems Inc.
Loy Evans
Thursday, April 23, 2020
at 1:00 PM EDT
(2020-04-23 17:00 UTC)
WhatWorks in High Security Alternatives for Remote Collaboration and CommunicationsHighside
John Pescatore
Thursday, April 23, 2020
at 10:30 AM EDT
(2020-04-23 14:30 UTC)
The Power of Open-Source Zeek (formerly Bro)Corelight
John Gamble
Wednesday, April 22, 2020
at 8:30 PM EDT
(2020-04-23 00:30 UTC)
SANS @MIC Talk - Secure Video Conferencing - What to Train Your Workforce OnLance Spitzner, Randy Marchany
Wednesday, April 22, 2020
at 3:30 PM EDT
(2020-04-22 19:30 UTC)
From the edge to the endpoint and back - using your security tools together for a faster threat response – even in a work from home worldCisco Systems Inc.
Ben Greenbaum, Player Pate
Wednesday, April 22, 2020
at 1:00 PM EDT
(2020-04-22 17:00 UTC)
Journey to Becoming an All-Around DefenderIsmael Valenzuela, Justin Henderson
Wednesday, April 22, 2020
at 10:30 AM EDT
(2020-04-22 14:30 UTC)
Securing the shift to cloud-based business operations Exabeam
GuidePoint
Samantha Humphries, Jean-Paul Bergeaux
Tuesday, April 21, 2020
at 3:30 PM EDT
(2020-04-21 19:30 UTC)
Securing Your Future in DFIRKathryn Hedley, Phill Moore, Jason Jordaan, Lee Whitfield
Tuesday, April 21, 2020
at 1:00 PM EDT
(2020-04-21 17:00 UTC)
Zero Trust: What You Need to Know to Secure Your Data and NetworksGigamon
Ricardo Font, Dave Shackleford
Monday, April 20, 2020
at 8:30 PM EDT
(2020-04-21 00:30 UTC)
SANS @MIC Talk - Learning From The Adversary: Automated Malware Analysis For The Win!Dean Parsons
Monday, April 20, 2020
at 3:30 PM EDT
(2020-04-20 19:30 UTC)
SANS @MIC Talk - Self-Compiling MalwareXavier Mertens
Monday, April 20, 2020
at 1:00 PM EDT
(2020-04-20 17:00 UTC)
Hacking JenkinsRoss Young
Friday, April 17, 2020
at 3:30 PM EDT
(2020-04-17 19:30 UTC)
How to Ensure Security and Productivity for Employees Working Remotely through Zoom, Teams, WebEx and other Collaboration ApplicationsMorphisec
Dan Petrillo, Andrew Homer, John Pescatore
Friday, April 17, 2020
at 1:00 PM EDT
(2020-04-17 17:00 UTC)
Leveraging Managed Threat Hunting for an Effective ICS/OT Cybersecurity ProgramDragos, Inc.
Robert M. Lee, Tim Conway
Friday, April 17, 2020
at 10:30 AM EDT
(2020-04-17 14:30 UTC)
SANS Live Online – A Brand New Training PlatformRob Lee
Thursday, April 16, 2020
at 3:30 PM EDT
(2020-04-16 19:30 UTC)
3 ways to advance your vulnerability management program TODAY!Jonathan Risto
Thursday, April 16, 2020
at 1:00 PM EDT
(2020-04-16 17:00 UTC)
Using Deception Technologies to Defend Against Active Directory and Ransomware AttacksFidelis Cybersecurity
Kyle Dickinson, Kevin Fiscus, Rami Mizrahi
Thursday, April 16, 2020
at 10:30 AM EDT
(2020-04-16 14:30 UTC)
Preventing File-Based ThreatsPalo Alto Networks
Erik Yunghans, Dave Shackleford
Wednesday, April 15, 2020
at 8:30 PM EDT
(2020-04-16 00:30 UTC)
SANS CyberCast SANS@MIC - C2 MatrixJorge Orchilles
Wednesday, April 15, 2020
at 3:30 PM EDT
(2020-04-15 19:30 UTC)
SANS @MIC Talk - Take Back The Advantage - Cyber Deception for the Win!Kevin Fiscus
Wednesday, April 15, 2020
at 1:00 PM EDT
(2020-04-15 17:00 UTC)
Outside-In Scanning Is Not Cyber Risk ManagementCyberGRX
Gary Phipps, Dave Shackleford
Wednesday, April 15, 2020
at 10:30 AM EDT
(2020-04-15 14:30 UTC)
Purple Team Tactics: A Technical Look at Windows 10 Exploit MitigationsStephen Sims
Tuesday, April 14, 2020
at 7:30 PM EST
(2020-04-14 23:30 UTC)
Detection, Meet Response: Why Automated Enrichment is Key to SOC EffectivenessDevo Technology Inc.
Jason Mical
Tuesday, April 14, 2020
at 5:30 PM EST
(2020-04-14 21:30 UTC)
What’s Next in Vulnerability ManagementQualys
Prateek Bhajanka
Tuesday, April 14, 2020
at 4:30 PM EST
(2020-04-14 20:30 UTC)
SANS.edu Undergraduate & Graduate Programs Information SessionPlease Check Back
Tuesday, April 14, 2020
at 3:30 PM EDT
(2020-04-14 19:30 UTC)
Consulting on The Side: Top Ten Questions Answered!Ted Demopoulos
Tuesday, April 14, 2020
at 1:00 PM EDT
(2020-04-14 17:00 UTC)
DNS is Changing. So What?Cisco Systems Inc.
Johannes Ullrich
Tuesday, April 14, 2020
at 10:30 AM EDT
(2020-04-14 14:30 UTC)
Pre-Runtime vs. Runtime Protection: What's Best for your IaaS Security?Intezer
Dave Shackleford, Itai Tevet
Monday, April 13, 2020
at 8:30 PM EDT
(2020-04-14 00:30 UTC)
SANS CyberCast - SANS@Mic - Successful Infosec Consulting, Getting Clients Deep DiveTed Demopoulos
Monday, April 13, 2020
at 3:30 PM EDT
(2020-04-13 19:30 UTC)
SANS @MIC Talk- Check out SEC573! More Python3! More Pywars!Mark Baggett
S
aturday, April 11, 2020
at 4:00 PM EDT
(2020-04-11 20:00 UTC)
Introduction to Reverse Engineering with IDA Pro - Stephen SimsStephen Sims
Friday, April 10, 2020
at 1:00 PM EDT
(2020-04-10 17:00 UTC)
Star Webcast: How Threats are Responding to COVID-19ProofPoint
Katie Nickels, Alex Guirakhoo, Sherrod DeGrippo
Friday, April 10, 2020
at 10:30 AM EDT
(2020-04-10 14:30 UTC)
Enable secure, remote access for your workforce with Microsoft Azure Active DirectoryMicrosoft
David Gregory
Thursday, April 09, 2020
at 3:30 PM EDT
(2020-04-09 19:30 UTC)
Dirty Defense, Done Dirt Cheap: Make your life easier by making mine harderTim Medin
Thursday, April 09, 2020
at 1:00 PM EDT
(2020-04-09 17:00 UTC)
The Security Team is Working From Home Too. How To Deliver Great Security Outcomes While Working RemotelyAwake Security
Please Check Back
Thursday, April 09, 2020
at 10:30 AM EDT
(2020-04-09 14:30 UTC)
Got Sysmon? How to Deploy Sysmon and Collect the Logs in an Enterprise EnvironmentScott Lynch
Wednesday, April 08, 2020
at 8:30 PM EDT
(2020-04-09 00:30 UTC)
SANS @MIC Talk - Take Back The Advantage - Cyber Deception for the WinKevin Fiscus
Wednesday, April 08, 2020
at 3:30 PM EDT
(2020-04-08 19:30 UTC)
SANS CyberCast SANS@MIC - Memory Analysis Skillbuilder Series: Skeleton Key Deep Dive with WinDbgAlissa Torres
Wednesday, April 08, 2020
at 1:00 PM EDT
(2020-04-08 17:00 UTC)
Detecting the Deceivers through DeceptionAttivo Networks
Tony Cole, Kevin Fiscus
Wednesday, April 08, 2020
at 12:30 PM EDT
(2020-04-08 16:30 UTC)
Secure Your Users Everywhere Cisco Umbrella
Chris Bilodeau
Wednesday, April 08, 2020
at 12:30 PM EDT
(2020-04-08 16:30 UTC)
Cortex by Palo Alto Networks Presents: Journey to the Center of the SOCPalo Alto Networks
Please Check Back
Wednesday, April 08, 2020
at 12:30 PM EDT
(2020-04-08 16:30 UTC)
Effortlessly Immunize Software - Inoculating Compiled Code against Memory VulnerabilitiesRunSafe Security
Please Check Back
Tuesday, April 07, 2020
at 3:30 PM EDT
(2020-04-07 19:30 UTC)
Understanding EncryptionKevin Ripa
Tuesday, April 07, 2020
at 12:30 PM EDT
(2020-04-07 16:30 UTC)
Common SOAR Use Cases to Boost Your SOCSwimlane
Jay Spann
Tuesday, April 07, 2020
at 12:30 PM EDT
(2020-04-07 16:30 UTC)
Cybersecurity: Why Asset Management MattersAxonius
Please Check Back
Tuesday, April 07, 2020
at 10:30 AM EDT
(2020-04-07 14:30 UTC)
Driving Cybersecurity Change – Establishing a Culture of Protect, Detect and Respond HighlightsCisco Systems Inc.
Lance Spitzner
Monday, April 06, 2020
at 8:30 PM EDT
(2020-04-07 00:30 UTC)
SANS CyberCast SANS@MIC - Pen Testing ICS and Other Highly Restricted EnvironmentsDon C. Weber
Monday, April 06, 2020
at 3:30 PM EDT
(2020-04-06 19:30 UTC)
SANS CyberCast SANS@MIC - Domain Password Auditing with the CloudMatthew Toussain
Monday, April 06, 2020
at 12:30 PM EST
(2020-04-06 16:30 UTC)
Seven Strategies for CISOsCorelight
Richard Bejtlich
S
aturday, April 04, 2020
at 1:00 PM EST
(2020-04-04 17:00 UTC)
ZOMG it's ZOOMMick Douglas
Friday, April 03, 2020
at 1:00 PM EDT
(2020-04-03 17:00 UTC)
Shared Responsibility of Salesforce SecurityRevCult
Dave Shackleford, Pete Thurston
Friday, April 03, 2020
at 10:30 AM EDT
(2020-04-03 14:30 UTC)
Securing Unmanaged IoT Devices in Healthcare & Life SciencesCyberX
Christy Peel, Phil Neray
Thursday, April 02, 2020
at 3:30 PM EDT
(2020-04-02 19:30 UTC)
IDA Pro Challenge Walk Through & What's New in SEC760 'Advanced Exploit Dev'Huáscar Tejeda, Stephen Sims
Thursday, April 02, 2020
at 1:00 PM EDT
(2020-04-02 17:00 UTC)
MITRE ATT&CK for ICS Live DemonstrationDragos, Inc.
Austin Scott, Robert M. Lee
Wednesday, April 01, 2020
at 8:30 PM EDT
(2020-04-02 00:30 UTC)
SANS CyberCast SANS@MIC - Are You Certifiable?Ron Hamann
Wednesday, April 01, 2020
at 3:30 PM EDT
(2020-04-01 19:30 UTC)
An Inside Look at Security and Compliance at a Hypergrowth StartupThreat Stack
Tim Buntel
Wednesday, April 01, 2020
at 1:00 PM EDT
(2020-04-01 17:00 UTC)
Network Visibility and Threat Detection: A SANS SurveyExtraHop
John Smith, Ian Reynolds
Wednesday, April 01, 2020
at 10:30 AM EDT
(2020-04-01 14:30 UTC)
Adversary emulation using CALDERA – Building custom abilities – Part #2Erik Van Buggenhout
Tuesday, March 31, 2020
at 10:30 AM EDT
(2020-03-31 14:30 UTC)
Explainable Threat Intelligence: Moving Beyond "Black Box" Threat ConvictionsReversing Labs
Please Check Back
Monday, March 30, 2020
at 8:30 PM EDT
(2020-03-31 00:30 UTC)
SANS CyberCast - SANS@Mic - The Hackers ApprenticeMark Baggett
Monday, March 30, 2020
at 3:30 PM EDT
(2020-03-30 19:30 UTC)
SANS CyberCast SANS@MIC - Stealth persistence strategiesErik Van Buggenhout
Monday, March 30, 2020
at 1:00 PM EDT
(2020-03-30 17:00 UTC)
What To Do When Moving to The CloudKenneth G. Hartman, Kyle Dickinson, Ryan Nicholson
Friday, March 27, 2020
at 8:30 AM EDT
(2020-03-27 12:30 UTC)
Cyber Threat Intelligence Solutions Forum: Intel-Use Cases for Destructive ScenariosReversing Labs
Keysight Technologies, Inc.
RecordedFuture
DomainTools
Cisco Umbrella
Robert M. Lee, Talal Balouch, Scott Register, Kyle Flaherty, Allan Liska, Taylor Wilkes-Pierce
Thursday, March 26, 2020
at 3:30 PM EDT
(2020-03-26 19:30 UTC)
CISO Priorities: Top Considerations for Rapidly Securing the Remote WorkforceAwake Security
Malcolm Harkins
Thursday, March 26, 2020
at 1:00 PM EDT
(2020-03-26 17:00 UTC)
7 Techniques for Ramping Your DevSecOps Program QuicklyCmd
Jake King
Thursday, March 26, 2020
at 10:30 AM EDT
(2020-03-26 14:30 UTC)
Building an Enterprise DevSecOps Program Veracode
Rich Mogull, Chris Kirsch
Wednesday, March 25, 2020
at 8:30 PM EDT
(2020-03-26 00:30 UTC)
SANS CyberCast - SANS@Mic -Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function RuntimesBrandon Evans
Wednesday, March 25, 2020
at 3:30 PM EDT
(2020-03-25 19:30 UTC)
Keeping Network Inspection Visibility in the Age of TLS 1.3: What To Do When The Network Goes Dark ExtraHop
Matt Bromiley, John Smith
Wednesday, March 25, 2020
at 1:00 PM EDT
(2020-03-25 17:00 UTC)
Stopping attacks in their tracks through behavioral blocking and containment Microsoft
Geoff McDonald, Shweta Jha
Wednesday, March 25, 2020
at 10:30 AM EDT
(2020-03-25 14:30 UTC)
STAR Webcast: xHunt - An Anime Fan's Attack Campaign in the Middle EastKatie Nickels, Brittany Barbehenn, Robert Falcone
Tuesday, March 24, 2020
at 3:30 PM EDT
(2020-03-24 19:30 UTC)
FOR572: Always Updating, Never at RestPhilip Hagen
Tuesday, March 24, 2020
at 1:00 PM EDT
(2020-03-24 17:00 UTC)
Women in Cybersecurity: A SANS Survey Panel DiscussionThreatConnect
Heather Mahalik, Marika Chauvin
Monday, March 23, 2020
at 8:30 PM EDT
(2020-03-24 00:30 UTC)
SANS CyberCast - SANS@Mic - I'm Sorry Dave, I Can't Do That: Practical Machine Learning for Information Security (New Course Preview!)David Hoelzer
Monday, March 23, 2020
at 3:30 PM EDT
(2020-03-23 19:30 UTC)
SANS CyberCast SANS@MIC - Building Your Foundation: Getting Started in Digital ForensicsJason Jordaan
Monday, March 23, 2020
at 10:30 AM EST
(2020-03-23 14:30 UTC)
Securing Your Kids OnlineLance Spitzner
Friday, March 20, 2020
at 3:30 PM EDT
(2020-03-20 19:30 UTC)
Using osquery & MITRE ATT&CK to Provide Analytics for Incident Response and Threat HuntingUptycs
Guillaume Ross, Dave Shackleford
Friday, March 20, 2020
at 1:00 PM EDT
(2020-03-20 17:00 UTC)
Leveraging TheHive & Cortex for automated IRErik Van Buggenhout
Thursday, March 19, 2020
at 3:30 PM EDT
(2020-03-19 19:30 UTC)
Attack Simulation: Docker ApplicationThreat Stack
Tim Buntel
Thursday, March 19, 2020
at 1:00 PM EDT
(2020-03-19 17:00 UTC)
Anatomy of a Cloud Data BreachNetskope
Ray Canzanese, Ph.D., Nathan Smolenski
Thursday, March 19, 2020
at 10:30 AM EDT
(2020-03-19 14:30 UTC)
Container Security: Building a Solid Foundation for All Round DefendersJustin Henderson
Wednesday, March 18, 2020
at 8:30 PM EDT
(2020-03-19 00:30 UTC)
SANS CyberCast - SANS@Mic - How I Learned to Stop Worrying and Love TLSJohannes Ullrich, PhD
Wednesday, March 18, 2020
at 3:30 PM EDT
(2020-03-18 19:30 UTC)
Getting Started with Consulting: Top Ten Questions Answered!Ted Demopoulos
Wednesday, March 18, 2020
at 1:00 PM EDT
(2020-03-18 17:00 UTC)
Empower Your Security Team with Approachable Threat Intelligence Anomali
Chris Crowley, Sonny Day
Wednesday, March 18, 2020
at 10:30 AM EDT
(2020-03-18 14:30 UTC)
Family Matters: Practical Malware Family Identification for Incident Responders VMRay
Jacob Williams, Tamas Boczan
Wednesday, March 18, 2020
at 8:00 AM EDT
(2020-03-18 12:00 UTC)
Deployment Kit for Securing Your Workforce at HomeLance Spitzner
Tuesday, March 17, 2020
at 5:30 PM EDT
(2020-03-17 21:30 UTC)
Deployment Kit for Securing Your Workforce at HomeLance Spitzner
Tuesday, March 17, 2020
at 3:30 PM EDT
(2020-03-17 19:30 UTC)
Understanding SANS CyberCast - So Much More Than Live Virtual TrainingEd Skoudis, Rob Lee
Tuesday, March 17, 2020
at 1:00 PM EDT
(2020-03-17 17:00 UTC)
Women in Cybersecurity: A SANS SurveyCisco Systems
LogRhythm
ThreatConnect
ThreatQuotient
Heather Mahalik
Tuesday, March 17, 2020
at 10:30 AM EDT
(2020-03-17 14:30 UTC)
Faster, Better, AND Cheaper: Improving security operations using open source toolsJohn Hubbard
Monday, March 16, 2020
at 8:30 PM EDT
(2020-03-17 00:30 UTC)
SANS CyberCast - SANS@Mic - Moving Past Just Googling It: Harvesting and Using OSINTMicah Hoffman
Monday, March 16, 2020
at 3:30 PM EDT
(2020-03-16 19:30 UTC)
From X-rays to hex-raysMathias Fuchs
Friday, March 13, 2020
at 1:00 PM EST
(2020-03-13 17:00 UTC)
Secure Branch Connectivity With SD-WANPalo Alto Networks
John Pescatore
Thursday, March 12, 2020
at 1:00 PM EST
(2020-03-12 17:00 UTC)
Innovative Application Security Testing Techniques for Modern Software Development Veracode
Chris Kirsch
Thursday, March 12, 2020
at 10:30 AM EST
(2020-03-12 14:30 UTC)
Intro to Shellcode Analysis: Tools and TechniquesJim Clausing
Wednesday, March 11, 2020
at 3:30 PM EST
(2020-03-11 19:30 UTC)
Fast, Scalable Results with EZ Tools and the New Command-line poster.Mark Hallman
Wednesday, March 11, 2020
at 1:00 PM EST
(2020-03-11 17:00 UTC)
Knock, Knock: Is This Security Thing Working?VMWare, Inc
Matt Bromiley, Dhruv Jain
Tuesday, March 10, 2020
at 3:30 PM EST
(2020-03-10 19:30 UTC)
Analyzing User-mode Dumps with WinDbgAlissa Torres
Thursday, March 05, 2020
at 1:00 PM EST
(2020-03-05 18:00 UTC)
Unlocking the model- Zero Trust for the Real WorldMicrosoft
Nupur Goyal
Thursday, March 05, 2020
at 10:30 AM EST
(2020-03-05 15:30 UTC)
Mobile Application Static AnalysisJeroen Beckers
Wednesday, March 04, 2020
at 1:00 PM EST
(2020-03-04 18:00 UTC)
State of Cloud and ThreatsNetskope
Ray Canzanese, Ph.D.
Tuesday, March 03, 2020
at 9:00 PM EST
(2020-03-04 02:00 UTC)
Head In the CloudsKevin Ripa
Tuesday, March 03, 2020
at 3:30 PM EST
(2020-03-03 20:30 UTC)
How to Leverage Endpoint Detection and Response (EDR) in AWS InvestigationsAWS Marketplace
Sagar Khasnis, Justin Henderson
Friday, February 28, 2020
at 3:30 PM EST
(2020-02-28 20:30 UTC)
Finding Answers Faster Using OSINT and DFIR SkillsJeff Lomas
Friday, February 28, 2020
at 10:30 AM EST
(2020-02-28 15:30 UTC)
ICS515 update: what’s new in the course and why detection and response in ICS is more important than everKai Thomsen
Thursday, February 27, 2020
at 10:30 AM EST
(2020-02-27 15:30 UTC)
Purple Team Tactics: Detecting Adversary Discovery TechniquesAlissa Torres
Wednesday, February 26, 2020
at 3:30 PM EST
(2020-02-26 20:30 UTC)
Architecting for Security Operations: Divide and Conquer!Ismael Valenzuela, Rob Gresham
Wednesday, February 26, 2020
at 1:00 PM EST
(2020-02-26 18:00 UTC)
Adversary Emulation and the C2 MatrixJorge Orchilles
Tuesday, February 25, 2020
at 3:30 PM EST
(2020-02-25 20:30 UTC)
Skip this Webinar - It's just everything you need to know about smartphonesHeather Mahalik, Domenica Crognale
Thursday, February 20, 2020
at 3:30 PM EST
(2020-02-20 20:30 UTC)
Modern Web Application Penetration Testing Part 2, Hash Length Extension AttacksAdrien de Beaupre
Thursday, February 20, 2020
at 1:00 PM EST
(2020-02-20 18:00 UTC)
Threat Actor Analysis and Strategic Security Investments DomainTools
Jackie Abrams, Chris Crowley
Thursday, February 20, 2020
at 10:30 AM EST
(2020-02-20 15:30 UTC)
The NICE Cybersecurity Workforce Framework: What is it and Why is it Important?Rodney Petersen
Thursday, February 20, 2020
at 5:30 AM EST
(2020-02-20 10:30 UTC)
Internet Email: Insecure by Design and Building your Malware Analysis Home Lab for learning and funRobbie Honerkamp, Andre Shori, Yee Ching Tok, Delaney Ng, Kevin Hraybi
Wednesday, February 19, 2020
at 3:30 PM EST
(2020-02-19 20:30 UTC)
Will that be one log or two? Logging before, during, and after an attack.Craig Bowser
Wednesday, February 19, 2020
at 1:00 PM EST
(2020-02-19 18:00 UTC)
Real-World Implementation of Deception TechnologiesAcalvio Technologies, Inc.
Kyle Dickinson, Rick Moy, Jim Mason
Tuesday, February 18, 2020
at 3:30 PM EST
(2020-02-18 20:30 UTC)
Innovative workforce development programs to reskill new cybersecurity professionalsMaxwell Shuftan, Bill Seaman, Rich Arellano, Sarah Kearsley
Tuesday, February 18, 2020
at 1:00 PM EST
(2020-02-18 18:00 UTC)
Bringing IT and security together: How Microsoft is reinventing threat and vulnerability managementMicrosoft
Tomer Teller
Tuesday, February 18, 2020
at 10:30 AM EST
(2020-02-18 15:30 UTC)
When a Plan Comes Together: Building a SOC “A-Team”Mark Orlando
Thursday, February 13, 2020
at 9:30 PM EST
(2020-02-14 02:30 UTC)
Passwords are a Solvable Problem!Matthew Toussain
Thursday, February 13, 2020
at 1:00 PM EST
(2020-02-13 18:00 UTC)
2020 SANS Cyber Threat Intelligence (CTI) Survey Panel DiscussionAnomali
DomainTools
ThreatConnect
Robert M. Lee, Kyle Ehmke, Nicholas Hayden, Ryan Weaver
Thursday, February 13, 2020
at 10:30 AM EST
(2020-02-13 15:30 UTC)
2019 SANS Holiday Hack Challenge Award CeremonyEd Skoudis, Joshua Wright, Evan Booth
Wednesday, February 12, 2020
at 10:00 PM EST
(2020-02-13 03:00 UTC)
Data-Centric SecurityJustin Henderson
Wednesday, February 12, 2020
at 3:30 PM EST
(2020-02-12 20:30 UTC)
How to Improve Security Visibility and Detection/Response Operations in AWSAWS Marketplace
Dave Shackleford, Vinay Sukumar
Wednesday, February 12, 2020
at 1:00 PM EST
(2020-02-12 18:00 UTC)
STAR Webcast: Cyber Threats To Electric Industry - What You Need to KnowKatie Nickels, Robert M. Lee, Tim Conway
Wednesday, February 12, 2020
at 10:30 AM EST
(2020-02-12 15:30 UTC)
Discover and Eliminate Cyberattack Pathways to Critical Assets with Illusive Networks Attack Surface Manager Illusive Networks
Wade Lance, Dave Shackleford
Tuesday, February 11, 2020
at 3:30 PM EST
(2020-02-11 20:30 UTC)
Top Five Vulnerability Management Failures (and Best Practices)David Hazar
Tuesday, February 11, 2020
at 1:00 PM EST
(2020-02-11 18:00 UTC)
2020 SANS Cyber Threat Intelligence (CTI) Survey ResultsAnomali
DomainTools
EclecticIQ
InfoBlox
RecordedFuture
Sophos Inc.
ThreatConnect
ThreatQuotient
Robert M. Lee
Tuesday, February 11, 2020
at 10:30 AM EST
(2020-02-11 15:30 UTC)
Cloud Logging and SecurityJustin Henderson
Monday, February 10, 2020
at 3:30 PM EST
(2020-02-10 20:30 UTC)
Why it’s easy being a hackerChris Dale
Thursday, February 06, 2020
at 3:30 PM EST
(2020-02-06 20:30 UTC)
Employee, Contractor, Consultant: Which Work Model is Best For You?Ted Demopoulos
Thursday, February 06, 2020
at 1:00 PM EST
(2020-02-06 18:00 UTC)
Implementer's Guide to Deception TechnologiesAcalvio Technologies, Inc.
Attivo Networks
Fidelis Cybersecurity
Kyle Dickinson
Wednesday, February 05, 2020
at 3:30 PM EST
(2020-02-05 20:30 UTC)
Your Password Doesn’t MatterMicrosoft
Alex Weinert
Wednesday, February 05, 2020
at 1:00 PM EST
(2020-02-05 18:00 UTC)
Securing ICS Using the NIST Cybersecurity Framework and Fortinet: Best Practices for the Real WorldFortinet, Inc.
Barbara Filkins, Don C. Weber, Peter Newton
Thursday, January 30, 2020
at 3:30 PM EST
(2020-01-30 20:30 UTC)
Spends and Trends: SANS 2020 Cybersecurity Spending Survey Panel DiscussionExtraHop
Gigamon
Netskope
Barbara Filkins, John Pescatore, Gordon Beith, Bob Gilbert, John Smith
Thursday, January 30, 2020
at 9:30 AM EST
(2020-01-30 14:30 UTC)
SANS Automation & Orchestration Solutions ForumSwimlane
ThreatConnect
SaltyCloud
Siemplify
Chris Crowley, Jay Spann
Wednesday, January 29, 2020
at 1:00 PM EST
(2020-01-29 18:00 UTC)
Spends and Trends: Results of the SANS 2020 Cybersecurity Spending SurveyExtraHop
Gigamon
Netskope
Barbara Filkins, John Pescatore
Wednesday, January 29, 2020
at 10:30 AM EST
(2020-01-29 15:30 UTC)
Elevate your endpoint security with Microsoft Defender ATPMicrosoft
Heike Ritter
Tuesday, January 28, 2020
at 3:30 PM EST
(2020-01-28 20:30 UTC)
Designing a Secure Microservices ArchitectureThreat Stack
Jake Williams, Tim Buntel
Tuesday, January 28, 2020
at 10:30 AM EST
(2020-01-28 15:30 UTC)
Shall We Play a Game?Timothy McKenzie
Monday, January 27, 2020
at 1:00 PM EST
(2020-01-27 18:00 UTC)
Secure by Default? Scoring the Big 3 Cloud ProvidersBrandon Evans
Thursday, January 23, 2020
at 1:00 PM EST
(2020-01-23 18:00 UTC)
United We Stand, Divided We Fall: 2019 Threat Landscape and the Influence of Sharing CommunitiesAnomali
Ghareeb Saad, Shaun McCullough
Wednesday, January 22, 2020
at 3:30 PM EST
(2020-01-22 20:30 UTC)
Optimize Decision Support through Verifiable Classification Reversing Labs
Please Check Back
Wednesday, January 22, 2020
at 1:00 PM EST
(2020-01-22 18:00 UTC)
Protecting your Cloud Native & Kubernetes environments from exposure and breach with Cisco Stealthwatch CloudCisco Systems Inc.
Jeff Moncrief
Tuesday, January 21, 2020
at 1:00 PM EST
(2020-01-21 18:00 UTC)
The Most Devastating Attacks and How to Prevent ThemPalo Alto Networks Cortex
Kasey Cross, Dave Shackleford
Thursday, January 16, 2020
at 3:30 PM EST
(2020-01-16 20:30 UTC)
How to Communicate about Security VulnerabilitiesJonathan Risto
Thursday, January 16, 2020
at 1:00 PM EST
(2020-01-16 18:00 UTC)
Threat Hunting and Discovery: A SANS Review of Vectra CognitoVectra Networks Inc.
Dave Shackleford, Tim Wade
Wednesday, January 15, 2020
at 1:00 PM EST
(2020-01-15 18:00 UTC)
Who’s there? — Using sender identity to stop modern phishing & BECValimail
Jake Williams, Sibrina Subedar, Garrett McCullum
Wednesday, January 15, 2020
at 12:00 PM EST
(2020-01-15 17:00 UTC)
Microsoft Patch Tuesday crypt32.dll Vulnerability OverviewJake Williams, Johannes Ullrich
Tuesday, January 14, 2020
at 3:30 PM EST
(2020-01-14 20:30 UTC)
Designing Security Policies Through Data IntelligenceCisco Systems Inc.
Matthew Robertson
Tuesday, January 14, 2020
at 1:00 PM EST
(2020-01-14 18:00 UTC)
What Really Matters to Security Teams: Endpoint Security Priorities for 2020Cisco Systems Inc.
Dave Gruber, Eric Howard
Tuesday, January 14, 2020
at 10:30 AM EST
(2020-01-14 15:30 UTC)
Why as a DoD Contractor Do I Need to Be CMMC CompliantKatie Arrington
Monday, January 13, 2020
at 1:00 PM EST
(2020-01-13 18:00 UTC)
SEC642: Killing snakes for fun, Flask SSTIs and RCEs in PythonMoses Frost
Thursday, January 09, 2020
at 10:30 AM EST
(2020-01-09 15:30 UTC)
Contain Thyself: How to Perform Log Collection and Analysis from Container Based TechnologiesJustin Henderson
Wednesday, January 08, 2020
at 10:00 PM EST
(2020-01-09 03:00 UTC)
From Seizure to Actionable Intelligence in 90 Minutes or LessEric Zimmerman
Tuesday, January 07, 2020
at 10:30 AM EST
(2020-01-07 15:30 UTC)
Operations Security (OPSEC) tradecraft tips for online Open Source Intelligence (OSINT) ResearchPlease Check Back

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.