SANS Cyber Defense Initiative® 2020 Live Online: 30+ Interactive Courses | Virtual NetWars Tournaments. Save $300 thru 11/18

Webcasts: Archive


Below you can find all webcasts that have already been presented since 2013. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Date Title Sponsor Speaker
Thursday, October 22, 2020
at 1:00 PM EDT
(2020-10-22 17:00 UTC)
Garmin vs WastedLocker: Cyber Resilience Lessons from the Biggest Cyberattacks of 2020Immersive Labs
Jacob Williams, Chris Pace, Kev Breen
Wednesday, October 21, 2020
at 7:30 PM CST
(2020-10-22 00:30 UTC)
Let's Dive into Powershell Obfuscation - SANS@MicXavier Mertens
Wednesday, October 21, 2020
at 7:30 PM EDT
(2020-10-21 23:30 UTC)
Cloud & Dev Ops Summit @NightPawel Rzepa, Matt Johnson, Travis Altman, Kat Traxler
Wednesday, October 21, 2020
at 3:30 PM EDT
(2020-10-21 19:30 UTC)
Modernizing Detection and Response with XDR in the Cloud Computing EraConfluera
Anoop Kartha, Mukesh Singh, John Pescatore
Wednesday, October 21, 2020
at 12:00 PM EST
(2020-10-21 16:00 UTC)
Cyber42 Game Day: CISO For A DayJoe Sullivan, Frank Kim
Tuesday, October 20, 2020
at 8:00 PM EST
(2020-10-21 00:00 UTC)
Tech Tuesday - Cloud Security Monitoring and Threat HuntingShaun McCullough
Monday, October 19, 2020
at 2:15 PM EDT
(2020-10-19 18:15 UTC)
Cloud & Dev Ops Summit, Lunch KeynoteEmily Fox
Thursday, October 15, 2020
at 1:00 PM EDT
(2020-10-15 17:00 UTC)
Stop attacks and reduce security operations workload with automated cross-domain (XDR) securityMicrosoft
Tim Woolford, Zvi Ben Sheffer
Thursday, October 15, 2020
at 10:30 AM EST
(2020-10-15 14:30 UTC)
Prioritizing the security backlogSnyk
Alyssa Miller, Ismael Valenzuela
Wednesday, October 14, 2020
at 7:30 PM EDT
(2020-10-14 23:30 UTC)
The Great Reboot: How Infosec Professionals Can Come Out of This (Extended) Mess Even Better Than Before – SANS@MicTed Demopoulos
Wednesday, October 14, 2020
at 3:30 PM EDT
(2020-10-14 19:30 UTC)
The Future of IT Security is SASEBitglass
Jonathan Andresen, Dave Shackleford
Tuesday, October 13, 2020
at 3:30 PM EDT
(2020-10-13 19:30 UTC)
Building a House on Sand – Why Foundational Knowledge and Skills in Digital Forensics are CrucialJason Jordaan
Monday, October 12, 2020
at 1:00 PM EDT
(2020-10-12 17:00 UTC)
LOCKED OUT! Detecting, Preventing, & Reacting to Human Operated RansomwareRyan Chapman
Wednesday, October 07, 2020
at 3:30 PM EDT
(2020-10-07 19:30 UTC)
Free and open hunting and protection with Elastic EndpointElasticsearch, Inc
Phil Roth, Mark Dufresne, Dave Shackleford
Wednesday, October 07, 2020
at 10:30 AM EDT
(2020-10-07 14:30 UTC)
Infosec Rock Star 2020 (COVID Edition): How to Accelerate Your CareerTed Demopoulos
Tuesday, October 06, 2020
at 3:30 PM EDT
(2020-10-06 19:30 UTC)
5 Considerations for ICS Incident ResponseDragos, Inc.
Kai Thomsen
Tuesday, October 06, 2020
at 1:00 PM EDT
(2020-10-06 17:00 UTC)
Securing Building Management Systems & Data Centers with OT Security MonitoringCyberX
Imran Mohiuddin, Phil Neray
Tuesday, October 06, 2020
at 1:00 PM EST
(2020-10-06 17:00 UTC)
Tech Tuesday - Firebase: Google Cloud's Evil Twin Brandon Evans
Tuesday, October 06, 2020
at 10:30 AM EST
(2020-10-06 14:30 UTC)
Building a Cybersecurity Risk Management ProgramMatthew Webster
Monday, October 05, 2020
at 1:00 PM EDT
(2020-10-05 17:00 UTC)
How to Continuously Monitor and Assess Your Security Posture in the AWS CloudAWS Marketplace
Dave Shackleford, Nam Le
Thursday, October 01, 2020
at 10:00 AM EDT
(2020-10-01 14:00 UTC)
ICS Solutions ForumArmis
Dispel
Revolutionary Security
Dragos, Inc.
Nozomi Networks
Don Weber, Trevor Houck, Ian Schmertzler, Jack Marsal, Sam Van Ryder, Alessandro Di Pinto, Chris Grove
Thursday, October 01, 2020
at 10:00 AM EDT
(2020-10-01 14:00 UTC)
BIPOC in Cybersecurity Forum: From Inclusion to EquityLodrina Cherne, Chris Cochran, Ronald Eddings, Tomiko Evans, Mari Galloway, Jessica Gulick, Stephen A. Hart, InfoSteph, Christina Morillo, Xena Olsen, Mansi Thakar, Dominique West, Larry Whiteside
Wednesday, September 30, 2020
at 1:00 PM EDT
(2020-09-30 17:00 UTC)
More than a Buzzword: How to Deliver on the Promise of Machine LearningThreat Stack
Chris Ford, Jacob Williams
Wednesday, September 30, 2020
at 10:30 AM EST
(2020-09-30 14:30 UTC)
Hacking the Security Footprint of Open Source DependenciesSnyk
Liran Tal
Wednesday, September 30, 2020
at 5:30 PM AEST
(2020-09-30 07:30 UTC)
Extracting Evidence from ZIP FilesJosh Lemon
Tuesday, September 29, 2020
at 1:00 PM EDT
(2020-09-29 17:00 UTC)
Reimagining Endpoint Security: From EDR to XDRCisco Systems Inc.
Dave Gruber, Gedeon Hombrebueno, Ben Greenbaum
Monday, September 28, 2020
at 3:30 PM EDT
(2020-09-28 19:30 UTC)
Strategic Elements for a Next Gen SOC: A Leader’s PerspectiveCory A. Mazzola
Thursday, September 24, 2020
at 3:30 PM EDT
(2020-09-24 19:30 UTC)
AWS ID Prefixes: What AWS Doesn’t Cover is What You Need to KnowDan Girard
Thursday, September 24, 2020
at 3:30 PM EDT
(2020-09-24 19:30 UTC)
Leveraging Asset Visibility to Enhance Security OperationsQualys
Mehul Revankar
Thursday, September 24, 2020
at 1:00 PM EDT
(2020-09-24 17:00 UTC)
What Works in Secure Remote Access: Giving Users Seamless and Secure Connectivity with Always-On Visibility and ManagementPulse Secure
John Pescatore, Dan Connelly
Wednesday, September 23, 2020
at 7:30 PM PST
(2020-09-24 02:30 UTC)
SANS@Mic - OSINT Geolocation Techniques and How to Prevent ThemMicah Hoffman
Wednesday, September 23, 2020
at 3:30 PM EDT
(2020-09-23 19:30 UTC)
Automating Event Triage in the CloudSwimlane
Jay Spann
Wednesday, September 23, 2020
at 3:30 PM EDT
(2020-09-23 19:30 UTC)
Confidence in Security IntelligenceRecordedFuture
John Wetzel
Wednesday, September 23, 2020
at 3:30 PM EDT
(2020-09-23 19:30 UTC)
The Myths of Network SecurityExtraHop
Matt Cauthorn
Wednesday, September 23, 2020
at 12:00 PM EDT
(2020-09-23 16:00 UTC)
Cyber42 Game Day: Vulnerability ManagementJonathan Risto, David Hazar, Joe Sullivan
Wednesday, September 23, 2020
at 10:30 AM EST
(2020-09-23 14:30 UTC)
Power! Unlimited Power! Understanding the Techniques of Malicious Kernel-Mode CodeVMRay
Jacob Williams, Tamas Boczan
Wednesday, September 23, 2020
at 5:30 PM AEST
(2020-09-23 07:30 UTC)
SANS@MIC - Introduction to Writing Nmap NSE ScriptsJon Gorenflo
Tuesday, September 22, 2020
at 3:30 PM EDT
(2020-09-22 19:30 UTC)
Using OSINT to defend against critical infrastructure attacksDragos, Inc.
Selena Larson, Casey Brooks
Tuesday, September 22, 2020
at 3:30 PM EDT
(2020-09-22 19:30 UTC)
Defense Against the Dark Arts: Dissecting Sandbox Evasion TechniquesVMRay
Ben Abbott
Tuesday, September 22, 2020
at 3:30 PM EDT
(2020-09-22 19:30 UTC)
Solving Network and Security Challenges with SASECisco Umbrella
Nitin Kumar, Eric Trolan
Tuesday, September 22, 2020
at 3:30 PM EDT
(2020-09-22 19:30 UTC)
Moving Left: Driving Proactive Defense through Threat InvestigationDomainTools
Jackie Abrams
Tuesday, September 22, 2020
at 1:00 PM EDT
(2020-09-22 17:00 UTC)
2020 SANS Enterprise Cloud Incident Response Survey: A Panel DiscussionExtraHop
Gigamon
Bobby Mazzotti, Chris Dale, Tanner Payne
Monday, September 21, 2020
at 7:30 PM PST
(2020-09-22 02:30 UTC)
Network Security Keynote – SANS@Mic PowerShell 2020: State of the Art / Hack / InfectionJason Fossen
Monday, September 21, 2020
at 3:30 PM EDT
(2020-09-21 19:30 UTC)
Influencing a Software Vendor's RoadmapAnalyst1
James Nixon
Monday, September 21, 2020
at 3:30 PM EDT
(2020-09-21 19:30 UTC)
Back to the (Cyber) Future: Tomorrow’s Cybersecurity Relies on Today’s Asset ManagementAxonius
Andrew Senko
Monday, September 21, 2020
at 3:30 PM EDT
(2020-09-21 19:30 UTC)
Network Security Monitoring vs EncryptionCorelight
Richard Bejtlich
Thursday, September 17, 2020
at 3:30 PM EST
(2020-09-17 19:30 UTC)
The Great Reboot: How Infosec Professionals Can Come Out of This (Extended) Mess Even Better Than BeforeTed Demopoulos
Thursday, September 17, 2020
at 1:00 PM EDT
(2020-09-17 17:00 UTC)
SOAR Pitfall AvoidanceStratozen
Karn Griffen
Wednesday, September 16, 2020
at 7:00 PM EDT
(2020-09-16 23:00 UTC)
Cloud Penetration TestingMoses Frost
Wednesday, September 16, 2020
at 1:00 PM EDT
(2020-09-16 17:00 UTC)
Mitigate Access Risk by Enforcing Least Privilege in Cloud InfrastructureErmetic
Arick Goomanovsky, Dave Shackleford
Tuesday, September 15, 2020
at 3:30 PM EDT
(2020-09-15 19:30 UTC)
ICS Security and Asset Identification: A SANS RoundtablePalo Alto Networks
Mark Bristow, Del Rodillas, Xu Zuo
Tuesday, September 15, 2020
at 2:00 PM EDT
(2020-09-15 18:00 UTC)
Securing Common Web-Framework StacksRunSafe Security
Shane Fry
Tuesday, September 15, 2020
at 1:00 PM EDT
(2020-09-15 17:00 UTC)
2020 SANS Enterprise Cloud Incident Response Survey ResultsCisco Systems Inc.
ExtraHop
Gigamon
InfoBlox
RSA
Chris Dale, Matt Bromiley
Tuesday, September 15, 2020
at 11:00 AM EST
(2020-09-15 15:00 UTC)
STAR Webcast: The Value of Commercial Threat Intelligence SourcesKatie Nickels, Michel van Eeten, Xander Bouwman
Tuesday, September 15, 2020
at 8:30 AM EDT
(2020-09-15 12:30 UTC)
How to Achieve Security Visibility at Scale in the AWS CloudAWS Marketplace
Dave Shackleford, Chris Chapman
Monday, September 14, 2020
at 1:00 PM EDT
(2020-09-14 17:00 UTC)
Automating Security Across Cloud Infrastructure as CodeCesar Rodriguez
Thursday, September 10, 2020
at 3:30 PM EDT
(2020-09-10 19:30 UTC)
Threat Hunting for VisibilityElasticsearch, Inc
Devon Kerr, Jake Williams
Thursday, September 10, 2020
at 1:00 PM EDT
(2020-09-10 17:00 UTC)
Detecting Malicious Activity in Large EnterprisesChronicle
Matt Bromiley, Anton Chuvakin
Thursday, September 10, 2020
at 10:30 AM EDT
(2020-09-10 14:30 UTC)
What’s New in SEC401: Security Essentials Bootcamp StyleBryan Simon
Wednesday, September 09, 2020
at 3:30 PM EST
(2020-09-09 19:30 UTC)
PowerShell 2020: State of the Art / Hack / InfectionJason Fossen
Tuesday, September 08, 2020
at 10:30 AM EDT
(2020-09-08 14:30 UTC)
A Purple-Team Approach to Exploring AWS Security Services & CapabilitiesKenneth G. Hartman
Friday, September 04, 2020
at 10:30 AM EDT
(2020-09-04 14:30 UTC)
Dealing with an Adolescent CloudRoss Young
Thursday, September 03, 2020
at 10:30 AM EDT
(2020-09-03 14:30 UTC)
Ask the IoT/OT Security Experts: Industrial Cyber Resilience Beyond Covid-19 CyberX
Phil Neray
Wednesday, September 02, 2020
at 1:00 PM EDT
(2020-09-02 17:00 UTC)
Firewalls in the Modern Enterprise: A New SANS SurveyPalo Alto Networks
Matt Bromiley, Ganesh Balamitran
Wednesday, September 02, 2020
at 10:30 AM EDT
(2020-09-02 14:30 UTC)
How to Create a Comprehensive Zero Trust StrategyCisco Systems Inc.
Dave Shackleford, Tim Garner
Tuesday, September 01, 2020
at 3:30 PM EDT
(2020-09-01 19:30 UTC)
How to Improve Threat Detection and Hunting in the AWS Cloud Using the MITRE ATT&CK® MatrixAWS Marketplace
Dave Shackleford, Ross Warren
Tuesday, September 01, 2020
at 10:30 AM EST
(2020-09-01 14:30 UTC)
Aligning Your Security Program with the NIS DirectiveFortinet, Inc.
Matt Bromiley, Peter Newton, Antoine D'Haussy
Monday, August 31, 2020
at 1:00 PM EDT
(2020-08-31 17:00 UTC)
Analyzing the OWASP API Security Top 10 for Pen TestersDavin Jackson
Friday, August 28, 2020
at 10:30 AM EDT
(2020-08-28 14:30 UTC)
SANS Zero Trust Solutions Forum 2020Akamai Technologies
Cyberinc
Cyolo Security Ltd
Ismael Valenzuela
Thursday, August 27, 2020
at 3:30 PM EDT
(2020-08-27 19:30 UTC)
Hunting Logic Attacks - A Peak at SEC552: Bug Bounties & Responsible DisclosureHassan El Hadary
Thursday, August 27, 2020
at 1:00 PM EDT
(2020-08-27 17:00 UTC)
To build or not to build: Can SOC-aaS bridge your security skills gap?NetEnrich
IBM
Michael Spooner, Brandon Hoffman
Thursday, August 27, 2020
at 12:30 PM EDT
(2020-08-27 16:30 UTC)
Rethinking Security Detection in an XDR WorldChronicle
Ansh Patnaik, Anton Chuvakin, Matt Bromiley
Thursday, August 27, 2020
at 10:30 AM EDT
(2020-08-27 14:30 UTC)
Making the Digital Transformation: Re-evaluating your Security - How Automated Static Analysis Solves the Next Gen Security ChallengesReversing Labs
Chip Epps
Wednesday, August 26, 2020
at 2:00 PM EDT
(2020-08-26 18:00 UTC)
Looking Beyond IDS: What’s Next for Network Detection? ExtraHop
Sonal Shetkar, Dave Shackleford
Wednesday, August 26, 2020
at 1:00 PM EDT
(2020-08-26 17:00 UTC)
Securing Lift-and-Shift Cloud MigrationsCloudPassage
Dave Shackleford, Carson Sweet
Tuesday, August 25, 2020
at 9:00 PM EDT
(2020-08-26 01:00 UTC)
Using MITRE ATT&CK® 2020 Evaluation Data to Show How An Advanced Endpoint Detection/Response Product Mitigated APT29SentinelOne
John Pescatore, Jared Phipps
Tuesday, August 25, 2020
at 1:00 PM EDT
(2020-08-25 17:00 UTC)
Combating Malware in 2020 - Process, Trends and Tools Authentic8
Google
Jake Williams, Amir Khashayar Mohammadi, Svetla Yankova
Tuesday, August 25, 2020
at 12:00 PM EST
(2020-08-25 16:00 UTC)
Cyber42 Game Day: Vulnerability ManagementJonathan Risto, David Hazar, Frank Kim
Monday, August 24, 2020
at 8:30 PM EDT
(2020-08-25 00:30 UTC)
SANS @MIC Talk - New tools for your threat hunting toolbox.Mark Baggett
Monday, August 24, 2020
at 3:30 PM EDT
(2020-08-24 19:30 UTC)
SANS@MIC - Pen Testing ICS and Other Highly Restricted EnvironmentsDon C. Weber
Monday, August 24, 2020
at 1:00 PM EDT
(2020-08-24 17:00 UTC)
Using MITRE ATT&CK® As Your Cybersecurity Training FrameworkCYBERBIT Commercial Solutions
Stephen Burg, Wayne Pruitt
Thursday, August 20, 2020
at 3:30 PM EDT
(2020-08-20 19:30 UTC)
SANS Vulnerability Management Maturity ModelJonathan Risto
Thursday, August 20, 2020
at 2:00 PM EST
(2020-08-20 18:00 UTC)
STAR Webcast: Becoming the Adversary: Creating a Defensive Lab to Understand the OffenseKatie Nickels, Tyrone E. Wilson
Thursday, August 20, 2020
at 1:00 PM EDT
(2020-08-20 17:00 UTC)
So Many Tools So Little Time: Optimizing Threat Intelligence Effectiveness for SOC TeamsAnomali
John Pescatore, Scott Dowsett
Wednesday, August 19, 2020
at 3:30 PM EDT
(2020-08-19 19:30 UTC)
Decrypt all the Things: How Encryption is Impacting Network-Based Security ControlsEric Conrad
Wednesday, August 19, 2020
at 2:00 PM EDT
(2020-08-19 18:00 UTC)
Securing the Future of Work: How to Achieve Complete Malware and Phishing ProtectionMenlo Security
Kowsik Guruswamy, Serge Borso
Wednesday, August 19, 2020
at 1:00 PM EDT
(2020-08-19 17:00 UTC)
Real-World Use Cases of Metrics That Demonstrate Effective Security PracticesCode42
ThreatConnect
Barbara Filkins, John Pescatore, Steve Huehmer, Nathan Hunstad
Wednesday, August 19, 2020
at 12:00 PM EDT
(2020-08-19 16:00 UTC)
All for One, One for All: Bringing Data Together with DevoDevo Technology Inc.
Matt Bromiley, Fred Wilmot
Wednesday, August 19, 2020
at 10:30 AM EDT
(2020-08-19 14:30 UTC)
Evolving DefensesCisco Systems Inc.
Seth Misenar
Wednesday, August 19, 2020
at 6:00 AM EST
(2020-08-19 10:00 UTC)
SANS@MIC - $find_evil - Part II Threat hunting for "Lateral movement"Anurag Khanna
Tuesday, August 18, 2020
at 3:30 PM EDT
(2020-08-18 19:30 UTC)
Understanding Visibility, Alerts, and Gaps – Navigating MITRE ATT&CK®Justin Henderson
Tuesday, August 18, 2020
at 2:00 PM EDT
(2020-08-18 18:00 UTC)
Preventing Runtime Exploits: The SANS Implementation Guide for RunSafe Security’s AlkemistRunSafe Security
Chris Crowley
Tuesday, August 18, 2020
at 1:00 PM EDT
(2020-08-18 17:00 UTC)
How to Build a Robust Cyber Threat Intelligence ProgramDomainTools
Jackie Abrams, Katie Nickels
Tuesday, August 18, 2020
at 12:30 PM EDT
(2020-08-18 16:30 UTC)
SANS Data Incident 2020 - Technical Details WebcastMike Pilkington, Lance Spitzner, Rob Lee
Tuesday, August 18, 2020
at 10:30 AM EDT
(2020-08-18 14:30 UTC)
Intuitive Endpoint Security: A SANS Review of Morphisec Morphisec
Matt Bromiley, Netta Schmeidler
Monday, August 17, 2020
at 3:30 PM EDT
(2020-08-17 19:30 UTC)
SANS@MIC - Leveraging Telegram for OSINT purposesNico Dekens
Friday, August 14, 2020
at 1:00 PM EDT
(2020-08-14 17:00 UTC)
Stranger Things in the Cloud: How Do We Stop Breaches?Roger O’Farril
Thursday, August 13, 2020
at 1:00 PM EDT
(2020-08-13 17:00 UTC)
What’s in your Financial Services Software?Snyk
Alyssa Miller
Wednesday, August 12, 2020
at 2:00 PM EDT
(2020-08-12 18:00 UTC)
Comparing CASB Technologies: What's the Difference?Bitglass
Jacob Serpa, Dave Shackleford
Wednesday, August 12, 2020
at 1:00 PM EDT
(2020-08-12 17:00 UTC)
Improving the Bottom Line with Effective Security Metrics: A SANS SurveyCisco Systems Inc.
Code42
ThreatConnect
Barbara Filkins, John Pescatore
Tuesday, August 11, 2020
at 2:00 PM EDT
(2020-08-11 18:00 UTC)
How to Show Business Benefit by Moving to Risk-Based Vulnerability ManagementTenable
John Pescatore, Nathan Wenzler
Monday, August 10, 2020
at 3:30 PM EDT
(2020-08-10 19:30 UTC)
SANS@MIC - Remote Forensic Investigations in the Context of COVID-19Xavier Mertens
Friday, August 07, 2020
at 3:30 PM EDT
(2020-08-07 19:30 UTC)
Cleaning Up Our Cyber HygieneRussell Eubanks, Randy Marchany, Tony Sager
Friday, August 07, 2020
at 10:30 AM EDT
(2020-08-07 14:30 UTC)
In the Cloud. We don't need roads.Kyle Dickinson
Thursday, August 06, 2020
at 3:30 PM EDT
(2020-08-06 19:30 UTC)
Easing into Consulting, COVID edition: 10 Qs and AsTed Demopoulos
Thursday, August 06, 2020
at 1:00 PM EDT
(2020-08-06 17:00 UTC)
Understanding and Leveraging the MITRE ATT&CK® Framework: A SANS RoundtableExtraHop
Matt Cauthorn, John Hubbard
Wednesday, August 05, 2020
at 9:30 AM EST
(2020-08-05 13:30 UTC)
Security Awareness Virtual ForumLance Spitzner, Katie Nickels, Paige Ishii
Tuesday, August 04, 2020
at 1:00 PM EDT
(2020-08-04 17:00 UTC)
Ripple20: What you need to knowDragos, Inc.
Kate Vajda, Reid Wightman, Tim Conway
Monday, August 03, 2020
at 1:00 PM EST
(2020-08-03 17:00 UTC)
The Great Reboot: How Infosec Professionals Can Come Out of This Mess Even Better Than BeforeTed Demopoulos
Thursday, July 30, 2020
at 1:00 PM EDT
(2020-07-30 17:00 UTC)
Closing the Critical Skills Gap for Modern and Effective Security Operations Centers (SOCs): Panel DiscussionExtraHop
Reversing Labs
ThreatConnect
John Pescatore, Jeff Costlow, Chris Hoff, Glenn Taylor
Thursday, July 30, 2020
at 11:00 AM EDT
(2020-07-30 15:00 UTC)
Women in Cybersecurity Forum, presented by SANS SummitsTarah Wheeler, Parag Baxi, InfoSteph, Karen Jensen
Wednesday, July 29, 2020
at 3:30 PM EDT
(2020-07-29 19:30 UTC)
Social Engineering Your Way to SuccessJustin Henderson, Ismael Valenzuela
Wednesday, July 29, 2020
at 1:00 PM EDT
(2020-07-29 17:00 UTC)
Closing the Critical Skills Gap for Modern and Effective Security Operations Centers (SOCs): Survey ResultsAwake Security
Anomali
Cisco Systems Inc.
ExtraHop
LogRhythm
Reversing Labs
Siemplify
Swimlane
ThreatConnect
John Pescatore, Barbara Filkins
Wednesday, July 29, 2020
at 10:30 AM EDT
(2020-07-29 14:30 UTC)
Browser Isolation: A SANS Review of Cyberinc's IslaCyberinc
Matt Bromiley, Rajiv Raghunarayan, Grant Langhus
Tuesday, July 28, 2020
at 10:00 PM EDT
(2020-07-29 02:00 UTC)
Lessons in Incident Response and Threat HuntingChad Tilbury
Tuesday, July 28, 2020
at 3:30 PM EDT
(2020-07-28 19:30 UTC)
How to Protect All Surfaces and Services in the AWS CloudAWS Marketplace
Dave Shackleford, Chris Chapman
Tuesday, July 28, 2020
at 1:00 PM EDT
(2020-07-28 17:00 UTC)
Measuring and Improving Cyber Defense Using the MITRE ATT&CK® Framework: A SANS Panel DiscussionAttackIQ
John Hubbard, Chris Kennedy, Jonathan Reiber
Tuesday, July 28, 2020
at 10:30 AM EDT
(2020-07-28 14:30 UTC)
What’s New in REMnux v7?Lenny Zeltser
Monday, July 27, 2020
at 8:30 PM EDT
(2020-07-28 00:30 UTC)
SANS@MIC - 10 Visibility Gaps Every CISO Must FillRussell Eubanks
Monday, July 27, 2020
at 3:30 PM EDT
(2020-07-27 19:30 UTC)
SANS @MIC Talk - No SQL Injection in MongoDB applications Adrien de Beaupré
Monday, July 27, 2020
at 1:00 PM EDT
(2020-07-27 17:00 UTC)
Leveraging the Security Awareness Planning KitLance Spitzner
Friday, July 24, 2020
at 10:30 AM EDT
(2020-07-24 14:30 UTC)
SANS Malware & Ransomware Solutions ForumAkamai Technologies
Cisco Umbrella
Cyberinc
Malwarebytes
VMRay
Jake Williams
Thursday, July 23, 2020
at 1:00 PM EDT
(2020-07-23 17:00 UTC)
A New World of Endpoint Security: Unifying user and endpoint protectionCisco Systems Inc.
Farzad Bakhtiar, Eric Howard
Thursday, July 23, 2020
at 10:00 AM EDT
(2020-07-23 14:00 UTC)
XSOAR HANDS-ON WORKSHOP: Take Your SOC To The Next Level! Palo Alto Networks
Andy Shepherd, Patrick Bayle
Wednesday, July 22, 2020
at 8:30 PM EDT
(2020-07-23 00:30 UTC)
SANS@MIC -Get Involved! Use Your OSINT Powers for Good!Jeff Lomas
Wednesday, July 22, 2020
at 1:00 PM EDT
(2020-07-22 17:00 UTC)
Cyber Security 101 for Human Resource Professionals Kelli Tarala
Wednesday, July 22, 2020
at 10:30 AM EDT
(2020-07-22 14:30 UTC)
An Integrated Approach to Embedding Security into DevOpsCheckmarx Inc.
Jake Williams, Matt Rose
Tuesday, July 21, 2020
at 3:30 PM EDT
(2020-07-21 19:30 UTC)
What's New in SEC504: Hacker Tools, Techniques, Exploits, and Incident HandlingJoshua Wright
Tuesday, July 21, 2020
at 1:00 PM EDT
(2020-07-21 17:00 UTC)
Measuring and Improving Cyber Defense Using the MITRE ATT&CK® FrameworkAnomali
AttackIQ
Corelight
CyberProof
ExtraHop
InfoBlox
LogRhythm
RSA
ThreatQuotient
John Hubbard
Tuesday, July 21, 2020
at 10:30 AM EDT
(2020-07-21 14:30 UTC)
Eight Common OT / Industrial Firewall MistakesWaterfall Security
Michael Firstenberg
Monday, July 20, 2020
at 3:30 PM EDT
(2020-07-20 19:30 UTC)
SANS@MIC - smbtimeline - An automated timeline for SMB Traffic Olaf Schwarz
Monday, July 20, 2020
at 1:00 PM EDT
(2020-07-20 17:00 UTC)
Measuring and Improving Cyber Defense Using the MITRE ATT&CK® FrameworkInfoBlox
Michael Zuckerman
Thursday, July 16, 2020
at 3:30 PM EDT
(2020-07-16 19:30 UTC)
Force Multiplier: How we use SOAR to maximize our own SOC analyst efficiency while minimizing fatigue and burnoutStratozen
Chris Gebhardt, Chris Crowley
Thursday, July 16, 2020
at 1:00 PM EDT
(2020-07-16 17:00 UTC)
Securing the Remote Workforce without VPNs: Uptycs and JA3Uptycs
Guillaume Ross, Dave Shackleford
Thursday, July 16, 2020
at 10:30 AM EDT
(2020-07-16 14:30 UTC)
Attacking and Defending Cloud Native InfrastructureCisco Systems Inc.
Andy Martin
Thursday, July 16, 2020
at 1:00 AM EDT
(2020-07-16 05:00 UTC)
Updates to SANS' flagship penetration testing course SEC560 by SANS Certified Instructor, Erik Van BuggenhoutErik Van Buggenhout
Wednesday, July 15, 2020
at 3:30 PM EDT
(2020-07-15 19:30 UTC)
SANS@MIC- Git'ing Users for OSINT: Analysis of All GitHub UsersMicah Hoffman
Wednesday, July 15, 2020
at 1:00 PM EDT
(2020-07-15 17:00 UTC)
ICS Asset Identification: It’s More Than Just Security: A SANS Panel DiscussionCisco Systems Inc.
Palo Alto Networks
Tenable
Mark Bristow, Marc Blackmer, Marty Edwards, Del Rodillas
Wednesday, July 15, 2020
at 12:00 PM EDT
(2020-07-15 16:00 UTC)
The Essential Top SOAR use casesPalo Alto Networks
Lior Kolnik, Chris Crowley
Wednesday, July 15, 2020
at 12:00 PM EDT
(2020-07-15 16:00 UTC)
What You Need to Know About the Windows DNS Vulnerability - CVE-2020-1350Jorge Orchilles
Wednesday, July 15, 2020
at 10:30 AM EDT
(2020-07-15 14:30 UTC)
Threat Hunting through Log Analysis in AWSShaun McCullough
Tuesday, July 14, 2020
at 2:00 PM EDT
(2020-07-14 18:00 UTC)
Everything you need to know before trusting a zero-trust providerCyolo Security Ltd
Almog Apirion, Chris Dale
Tuesday, July 14, 2020
at 12:00 PM EDT
(2020-07-14 16:00 UTC)
Containers Vulnerability Management: Time to Step Things Up!Portshift
Dave Shackleford, Zohar Kaufman
Monday, July 13, 2020
at 3:30 PM EDT
(2020-07-13 19:30 UTC)
SANS @MIC Talk - Course Preview: Successful Infosec Consulting, Getting Clients Deep DiveTed Demopoulos
Friday, July 10, 2020
at 9:30 AM EDT
(2020-07-10 13:30 UTC)
SANS Oil & Gas Solutions Forum: Objective-based Security Drives Effective Solutions Cyberinc
Dispel
Siemplify
Swimlane
ThreatConnect
Tripwire, Inc.
Cisco Umbrella
Jason Dely
Thursday, July 09, 2020
at 3:30 PM EDT
(2020-07-09 19:30 UTC)
What Most Security Teams Don't Know But Should - Rethinking Human Risk MetricsLance Spitzner, Masha Sedova
Thursday, July 09, 2020
at 1:00 PM EDT
(2020-07-09 17:00 UTC)
The System Is People: Designing Security for Real-World UsersDuo Security
Dave Shackleford, Zoe Lindsey
Thursday, July 09, 2020
at 12:00 PM EDT
(2020-07-09 16:00 UTC)
Building Resilience for Advanced Attacks and Insider Threats in the “New Normal”Exabeam
CrowdStrike, Inc.
Chris Tillett, Chris Kachigian
Thursday, July 09, 2020
at 10:30 AM EDT
(2020-07-09 14:30 UTC)
AI and Emerging Threat Protection - the new security normalBlue Hexagon
John Pescatore, Nemi George, Nayeem Islam
Wednesday, July 08, 2020
at 3:30 PM EDT
(2020-07-08 19:30 UTC)
SANS@MIC - Checkm8, Checkra1n and the new "golden age" for iOS ForensicsMattia Epifani
Wednesday, July 08, 2020
at 1:00 PM EDT
(2020-07-08 17:00 UTC)
4 Secrets to Power Charge Your SOC - How prevention and detection can deliver new work stream efficienciesBroadcom
Jake Williams, Adam Licata, Alpesh Mote
Wednesday, July 08, 2020
at 12:00 PM EDT
(2020-07-08 16:00 UTC)
Insights on Remote Access Cybersecurity and Workplace Flexibility - A SANS WhitepaperPulse Secure
John Pescatore, Mike Riemer, Ken Weirman, Dan Connelly
Wednesday, July 08, 2020
at 10:30 AM EDT
(2020-07-08 14:30 UTC)
Becoming a CISO: Leading TransformationFrank Kim
Tuesday, July 07, 2020
at 3:30 PM EDT
(2020-07-07 19:30 UTC)
Consulting: What Makes a Good Consultant, from the “Hiring One” and “Being One” perspectivesTed Demopoulos
Tuesday, July 07, 2020
at 1:00 PM EDT
(2020-07-07 17:00 UTC)
Why you need OT-specific threat intelligenceDragos, Inc.
Selena Larson, Reid Wightman
Tuesday, July 07, 2020
at 1:00 PM EDT
(2020-07-07 17:00 UTC)
What Do I Need to Know About CVE-2020-5902; the F5 Networks BigIP RCE VulnerabilityDr. Johannes Ullrich
Tuesday, July 07, 2020
at 1:00 PM EDT
(2020-07-07 17:00 UTC)
How to work in ways that will make your boss take notice!Russell Eubanks
Tuesday, July 07, 2020
at 10:30 AM EDT
(2020-07-07 14:30 UTC)
Using Zero Trust to Enable Secure Remote AccessBlackBerry
Dave Shackleford, Rich Thompson
Monday, July 06, 2020
at 8:30 PM EDT
(2020-07-07 00:30 UTC)
SANS@MIC - The 14 Absolute Truths of SecurityKeith Palmgren
Monday, July 06, 2020
at 3:30 PM EDT
(2020-07-06 19:30 UTC)
SANS@MIC -Cyber Threat Management, connecting the dots with the Active Cyber Defense CycleCisco Systems Inc.
Samuel Rossier
Thursday, July 02, 2020
at 10:30 AM EDT
(2020-07-02 14:30 UTC)
Managing & Showing Value during Red Team Engagements & Purple Team ExercisesJorge Orchilles, Phil Wainwright
Wednesday, July 01, 2020
at 3:30 PM EDT
(2020-07-01 19:30 UTC)
SANS @MIC Talk - Defending Lift and Shift Cloud ApplicationsRyan Nicholson
Wednesday, July 01, 2020
at 1:00 PM EDT
(2020-07-01 17:00 UTC)
Extending Your Home Lab to include CloudIsmael Valenzuela, Justin Henderson
Tuesday, June 30, 2020
at 1:00 PM EDT
(2020-06-30 17:00 UTC)
Securing Assets Using Micro-Segmentation: A SANS Review of Guardicore CentraGuardicore LTD
Dave Shackleford, Dave Klein
Tuesday, June 30, 2020
at 10:30 AM EDT
(2020-06-30 14:30 UTC)
ICMP: A world beyond pingAndrew Laman
Monday, June 29, 2020
at 3:30 PM EDT
(2020-06-29 19:30 UTC)
SANS @MIC Talk - #LevelUpLabsMathias Fuchs
Monday, June 29, 2020
at 1:00 PM EDT
(2020-06-29 17:00 UTC)
CISSP Test-Taking Tactics: Successfully Navigating Adaptive Exams Seth Misenar
Friday, June 26, 2020
at 1:00 PM EDT
(2020-06-26 17:00 UTC)
Overt Operations | When the Red Team gets in your Face!Matthew Toussain
Friday, June 26, 2020
at 10:30 AM EDT
(2020-06-26 14:30 UTC)
Leading the Cloud transformation - Building the RoadmapJason Lam
Thursday, June 25, 2020
at 3:30 PM EDT
(2020-06-25 19:30 UTC)
How To Secure Remote Workers For The Long Haul: Protecting VPN, RDP, Webcams and BeyondExtraHop
Heather Mahalik, Josh Snow, Kyle Walsh
Thursday, June 25, 2020
at 1:00 PM EDT
(2020-06-25 17:00 UTC)
ICS Asset Identification: It's More Than Just Security: A SANS ReportCisco Systems Inc.
Palo Alto Networks
PAS
Tenable
Mark Bristow
Thursday, June 25, 2020
at 12:00 PM EDT
(2020-06-25 16:00 UTC)
The Power of Fusing Network Alerts and Evidence with Open-Source Suricata and Zeek (Bro) Corelight
Alex Kirk, John Gamble, Matt Bromiley
Thursday, June 25, 2020
at 10:30 AM EDT
(2020-06-25 14:30 UTC)
How to Present Cyber Security Risk to Senior LeadershipJames Tarala
Wednesday, June 24, 2020
at 8:30 PM EDT
(2020-06-25 00:30 UTC)
SANS @MIC Talk - SEC510: Multicloud Security Assessment and DefenseEric Johnson, Brandon Evans
Wednesday, June 24, 2020
at 3:30 PM EDT
(2020-06-24 19:30 UTC)
SANS@MIC -Threat Hunting via DNS Eric Conrad
Wednesday, June 24, 2020
at 2:00 PM EDT
(2020-06-24 18:00 UTC)
The New Rootkit: How Malicious Chrome Extensions Enabled a Global Surveillance CampaignAwake Security
Gary Golomb
Wednesday, June 24, 2020
at 3:00 AM EDT
(2020-06-24 07:00 UTC)
SANS @MIC Talk - No SQL Injection in MongoDB applicationsAdrien de Beaupre
Tuesday, June 23, 2020
at 3:30 PM EDT
(2020-06-23 19:30 UTC)
Detecting advanced persistent threats with behavior-based intrusion detectionAccedian
Andrey Yesyev, Michael Rezek
Tuesday, June 23, 2020
at 2:00 PM EDT
(2020-06-23 18:00 UTC)
The Best of Both Worlds: Cloud + SASEBitglass
Prasidh Srikanth, Kenneth G. Hartman
Tuesday, June 23, 2020
at 12:00 PM EDT
(2020-06-23 16:00 UTC)
Secure your data, your recovery and your missionCommVault Systems Inc.
Brian Brockway, David DeVries, John Pescatore
Monday, June 22, 2020
at 8:30 PM EDT
(2020-06-23 00:30 UTC)
SANS@MIC- Infrastructure as Code is REAL: Using the Cloud to Provision Infrastructure with Software Shaun McCullough
Monday, June 22, 2020
at 3:30 PM EDT
(2020-06-22 19:30 UTC)
SANS @MIC Talk -Hacking the SRUM and other Devious New Ways to Interrogate WindowsAlissa Torres
Monday, June 22, 2020
at 1:00 PM EDT
(2020-06-22 17:00 UTC)
The Reality of Digital Collaboration – Unknown Risks, Misconceptions and Real Time Privacy ConcernsCheck Point Software Technologies, Inc.
Iovations
Mark Ostrowski
Monday, June 22, 2020
at 3:00 AM EDT
(2020-06-22 07:00 UTC)
SANS @MIC Talk- Course Preview: Successful Infosec Consulting, Getting Clients Deep DiveTed Demopoulos
Friday, June 19, 2020
at 3:30 PM EDT
(2020-06-19 19:30 UTC)
Post Modern Web Attacks: Kubernetes Attack MatrixMoses Frost
Friday, June 19, 2020
at 1:00 PM EDT
(2020-06-19 17:00 UTC)
Domain Name & DNS Hijacking: Learn Best Practices to Mitigate Risk and View Latest Domain Security FindingsCSC
Mark Calandra, Jacob Williams
Friday, June 19, 2020
at 10:30 AM EDT
(2020-06-19 14:30 UTC)
Leveraging Organizational Change to Build a Strong Security CultureLance Spitzner
Thursday, June 18, 2020
at 1:00 PM EDT
(2020-06-18 17:00 UTC)
2020 Asset Management Trends: As IT Complexity Increases, Visibility PlummetsAxonius
Dave Gruber, Nathan Burke, Chris Dale
Thursday, June 18, 2020
at 12:30 PM EDT
(2020-06-18 16:30 UTC)
Effortlessly Immunize Software - Rapidly Inoculate Compiled Code Against Software Memory VulnerabilitiesRunSafe Security
Doug Britton
Thursday, June 18, 2020
at 12:30 PM EDT
(2020-06-18 16:30 UTC)
Expert Playbooks for Non-Expert UseCorelight
Alex Kirk
Thursday, June 18, 2020
at 12:30 PM EDT
(2020-06-18 16:30 UTC)
Tracking Down the Cyber Criminals: Revealing Malicious Infrastructures with UmbrellaCisco Umbrella
Chris Bilodeau
Thursday, June 18, 2020
at 10:30 AM EDT
(2020-06-18 14:30 UTC)
How to Use NERC CIP: An Overview of the Standards, Their Deployment and How to Use Fortinet Products for ComplianceFortinet, Inc.
Tim Conway, Peter Newton, Christopher Blauvelt
Wednesday, June 17, 2020
at 8:30 PM EDT
(2020-06-18 00:30 UTC)
SANS@MIC - Maldocs: a bit of blue, a bit of redDidier Stevens
Wednesday, June 17, 2020
at 3:30 PM EDT
(2020-06-17 19:30 UTC)
SANS@MIC - Catch and release: phishing techniques for the good guysJan Kopřiva
Wednesday, June 17, 2020
at 12:30 PM EDT
(2020-06-17 16:30 UTC)
How Implementing SOAR Improves Efficiency In Your OrganizationSwimlane
Jay Spann
Wednesday, June 17, 2020
at 12:30 PM EDT
(2020-06-17 16:30 UTC)
Proactive Threat Hunting with SOARThreatConnect
Alex Valdivia
Tuesday, June 16, 2020
at 1:00 PM EDT
(2020-06-16 17:00 UTC)
STAR Webcast: The Only Constant is Change: Tracking Adversary TrendsKatie Nickels, Saher Naumaan
Tuesday, June 16, 2020
at 12:30 PM EDT
(2020-06-16 16:30 UTC)
Does Your Web Browser Need a Stunt Double?Cyberinc
Rajiv Raghunarayan
Monday, June 15, 2020
at 8:30 PM EDT
(2020-06-16 00:30 UTC)
SANS@MIC- A walk through logs hellXavier Mertens
Monday, June 15, 2020
at 3:30 PM EDT
(2020-06-15 19:30 UTC)
SANS@MIC -Arcane web and mobile application vulnerabilitiesBojan Zdrnja
Monday, June 15, 2020
at 1:00 PM EDT
(2020-06-15 17:00 UTC)
You Can Write an Infosec Book!Ted Demopoulos
Monday, June 15, 2020
at 12:30 PM EDT
(2020-06-15 16:30 UTC)
Cybersecurity: Why Asset Management MattersAxonius
Andrew Senko
Monday, June 15, 2020
at 12:30 PM EDT
(2020-06-15 16:30 UTC)
Leverage DNS OSINT at ScaleDomainTools
Taylor Wilkes-Pierce
Friday, June 12, 2020
at 1:00 PM EDT
(2020-06-12 17:00 UTC)
Jacobs Engineering's Perspective on IoT/OT SecurityCyberX
Heather Wishart-Smith, Raja R. Kadiyala, Ph.D., Adi Karisik, Robert Brokamp, Phil Neray
Friday, June 12, 2020
at 10:30 AM EDT
(2020-06-12 14:30 UTC)
Supercharge your security operations with the brand new MGT551 - Building and Leading Security Operations Centers!John Hubbard
Thursday, June 11, 2020
at 3:30 PM EDT
(2020-06-11 19:30 UTC)
Network Compromise for the Technically Challenged (Dummies)Doc Blackburn
Thursday, June 11, 2020
at 12:00 PM EDT
(2020-06-11 16:00 UTC)
How to Eliminate Alert Fatigue by Turbo-Charging Splunk Phantom with Corelight NSMCorelight
Wissam Ali-Ahmad, Troy Moore, Richard Bejtlich, Mark Overholser
Thursday, June 11, 2020
at 10:30 AM EDT
(2020-06-11 14:30 UTC)
A Wolf in Sheep's Clothing: Dissecting Living off the Land TechniquesVMRay
Tamas Boczan, Jake Williams
Wednesday, June 10, 2020
at 3:30 PM EDT
(2020-06-10 19:30 UTC)
SANS@MIC - Shellcode Analysis 101Jim Clausing
Wednesday, June 10, 2020
at 2:00 PM EDT
(2020-06-10 18:00 UTC)
Getting engineering and security teams building togetherCloudfare
Evan Johnson
Wednesday, June 10, 2020
at 10:30 AM EDT
(2020-06-10 14:30 UTC)
Putting Your SOC to the TestJohn Hubbard
Tuesday, June 09, 2020
at 3:30 PM EDT
(2020-06-09 19:30 UTC)
Implementing Lessons Learned from Threat Patterns on the EndpointCyberinc
Rajiv Raghunarayan, Jake Williams
Tuesday, June 09, 2020
at 1:00 PM EDT
(2020-06-09 17:00 UTC)
Breaking Down Zero Trust: What does it Actually Mean? Netskope
Vladimir Klasnja, Ross Asquith
Tuesday, June 09, 2020
at 12:00 PM EST
(2020-06-09 16:00 UTC)
Covid-19 Cybersecurity Attacks Match the Outbreak CurveBitdefender SRL
Liviu Arsene, John Pescatore
Monday, June 08, 2020
at 8:30 PM EDT
(2020-06-09 00:30 UTC)
SANS@MIC - CYA by Using CIA -- Correctly For a ChangeKeith Palmgren
Monday, June 08, 2020
at 3:30 PM EDT
(2020-06-08 19:30 UTC)
SANS@MIC - Remote Forensic Investigations in the Context of COVID-19Xavier Mertens
Monday, June 08, 2020
at 1:00 PM EDT
(2020-06-08 17:00 UTC)
CISSP Cram SessionEric Conrad
Friday, June 05, 2020
at 1:00 PM EDT
(2020-06-05 17:00 UTC)
Purple Team: How to Achieve Threat Informed DefenseAttackIQ
Chris Kennedy, Ben Opel, Alissa Torres
Friday, June 05, 2020
at 10:30 AM EDT
(2020-06-05 14:30 UTC)
Modern Web Application Penetration Testing Part 3, NoSQL injection with MongoDBAdrien de Beaupré
Thursday, June 04, 2020
at 3:30 PM EDT
(2020-06-04 19:30 UTC)
How Are Remote Workers Working? A SANS PollPulse Secure
Menlo Security
ExtraHop
InfoBlox
Heather Mahalik
Thursday, June 04, 2020
at 1:00 PM EDT
(2020-06-04 17:00 UTC)
Shift Left: Integrate security in your DevOps lifecycleCisco Systems Inc.
Remi Philippe
Thursday, June 04, 2020
at 10:30 AM EDT
(2020-06-04 14:30 UTC)
Enterprise and Cloud | Threat & Vulnerability AssessmentMatthew Toussain
Wednesday, June 03, 2020
at 8:30 PM EDT
(2020-06-04 00:30 UTC)
SANS @MIC Talk -User-Mode Process Dump Analysis with WinDbg: Take TwoAlissa Torres
Wednesday, June 03, 2020
at 3:30 PM EDT
(2020-06-03 19:30 UTC)
SANS@MIC - Waiting for a cyber range exercise is not enoughOlaf Schwarz
Wednesday, June 03, 2020
at 10:30 AM EDT
(2020-06-03 14:30 UTC)
Winning in the Dark - Defending Serverless Infrastructure in the CloudEric Johnson
Tuesday, June 02, 2020
at 12:00 PM EDT
(2020-06-02 16:00 UTC)
Improving ICS/OT Visibility and Threat Detection with the Dragos PlatformDragos, Inc.
Ben Miller, John Lavender
Tuesday, June 02, 2020
at 10:30 AM EDT
(2020-06-02 14:30 UTC)
Introduction to Writing Nmap NSE ScriptsJon Gorenflo
Monday, June 01, 2020
at 8:30 PM EDT
(2020-06-02 00:30 UTC)
SANS@MIC - WinSCP: Yeah you know me! Mari DeGrazia
Friday, May 29, 2020
at 1:00 PM EDT
(2020-05-29 17:00 UTC)
Responding to Incidents in Industrial Control Systems (ICS): Identifying Threats, Reactions and Developing the IR ProcessHoneywell International
Don C. Weber, Eric Knapp, Matt Wiseman
Friday, May 29, 2020
at 10:30 AM EDT
(2020-05-29 14:30 UTC)
Zero Trust: Fast forwarding into working without boundariesMicrosoft
Chase Cunningham, Alex Weinert
Thursday, May 28, 2020
at 1:00 PM EDT
(2020-05-28 17:00 UTC)
Factoring IoT Devices into Detection and Response: A SANS WhitepaperExtraHop
Matt Bromiley, Michael Sanders
Thursday, May 28, 2020
at 12:00 PM EDT
(2020-05-28 16:00 UTC)
7 Ways to Find Encrypted Network Threats Without DecryptionCorelight
John Gamble, Vincent Stoffer
Thursday, May 28, 2020
at 10:30 AM EDT
(2020-05-28 14:30 UTC)
How Dangerous File Uploads Disrupt Business-Critical Web & Mobile AppsReversing Labs
Chip Epps, Brian Soldato
Wednesday, May 27, 2020
at 8:30 PM EDT
(2020-05-28 00:30 UTC)
SANS @MIC Talk - Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish While Leadership Defines a Security ProgramDon C. Weber
Wednesday, May 27, 2020
at 3:30 PM EDT
(2020-05-27 19:30 UTC)
SANS @MIC Talk - Introduction to Docker for security workChris Dale
Wednesday, May 27, 2020
at 1:00 PM EDT
(2020-05-27 17:00 UTC)
Is Your Threat Hunting Effective? A New SANS SurveyCyborg Security
Dave Amsler, Mathias Fuchs
Wednesday, May 27, 2020
at 12:00 PM EDT
(2020-05-27 16:00 UTC)
Weaponizing N-Day- A Crash Course on Exploit DevelopmentRandori
David Cowen, Evan Anderson
Wednesday, May 27, 2020
at 10:30 AM EDT
(2020-05-27 14:30 UTC)
How to Implement a Software-Defined Network Security Fabric in AWSAWS Marketplace
Dave Shackleford, Sagar Khasnis
Tuesday, May 26, 2020
at 3:30 PM EDT
(2020-05-26 19:30 UTC)
Danger Stewards – Measuring Risk and Predicting the Future for Fun and ProfitDoc Blackburn
Tuesday, May 26, 2020
at 1:00 PM EDT
(2020-05-26 17:00 UTC)
STAR Webcast: Threat Hunting and the Rise of Targeted eCrime IntrusionsKatie Nickels, Karl Scheuerman, Jason Wood
Tuesday, May 26, 2020
at 12:00 PM EDT
(2020-05-26 16:00 UTC)
Mobile Application Dynamic AnalysisJeroen Beckers
Tuesday, May 26, 2020
at 10:30 AM EDT
(2020-05-26 14:30 UTC)
HOW TO LEVERAGE CTI TO DEFEND FROM RANSOMWAREEclecticIQ
Jess García, Ippolito Forni
Friday, May 22, 2020
at 3:30 PM EDT
(2020-05-22 19:30 UTC)
Post Modern Web Attacks: Cloud EditionMoses Frost, Molly Stewart
Friday, May 22, 2020
at 1:00 PM EDT
(2020-05-22 17:00 UTC)
MITRE ATT&CK® for ICS: A Technical Deep DiveCyberX
Phil Neray, Joe DiPietro
Friday, May 22, 2020
at 10:30 AM EDT
(2020-05-22 14:30 UTC)
Open Season: Building a Threat Hunting Program with Open Source ToolsCorelight
James Schweitzer, Ken Westin
Thursday, May 21, 2020
at 3:30 PM EDT
(2020-05-21 19:30 UTC)
Five Ways To Cut Costs in Your SOCMark Orlando
Thursday, May 21, 2020
at 1:00 PM EDT
(2020-05-21 17:00 UTC)
SOAR is Not a Product: Steps to Achieve Meaningful and Measurable Cyber Defense with a Proper SOAR Strategy.Stratozen
John Pescatore, Kevin Prince
Thursday, May 21, 2020
at 10:30 AM EDT
(2020-05-21 14:30 UTC)
How to Better Understand HR to Accomplish our Cybersecurity GoalsJim Michaud
Wednesday, May 20, 2020
at 8:30 PM EDT
(2020-05-21 00:30 UTC)
SANS @MIC Talk - Moving Past Just Googling It: Harvesting and Using OSINTMicah Hoffman
Wednesday, May 20, 2020
at 1:00 PM EDT
(2020-05-20 17:00 UTC)
SANS 2020 Automation and Integration Survey Panel DiscussionCloudPassage
DomainTools
ThreatConnect
Don Murdoch, Barbara Filkins, John Madray, Sean McNee, Carson Sweet
Tuesday, May 19, 2020
at 10:00 PM PST
(2020-05-20 05:00 UTC)
SANS @MIC Talk - Find_Evil - Threat HuntingAnurag Khanna
Tuesday, May 19, 2020
at 5:45 PM EDT
(2020-05-19 21:45 UTC)
Ransomware recovery best practices: Importance of immutable backupsCommVault Systems Inc.
Dan Trivett
Tuesday, May 19, 2020
at 5:35 PM EDT
(2020-05-19 21:35 UTC)
What’s Next in Vulnerability ManagementQualys
Chris Carlson
Tuesday, May 19, 2020
at 5:30 PM EDT
(2020-05-19 21:30 UTC)
Defend better, Respond fasterCisco Systems Inc.
Chris Bilodeau, Pierre Cadieux
Tuesday, May 19, 2020
at 5:20 PM EDT
(2020-05-19 21:20 UTC)
NTA/NSM and the MITRE ATT&CK®Corelight
James Schweitzer
Tuesday, May 19, 2020
at 5:10 PM EDT
(2020-05-19 21:10 UTC)
Arming your SOC with SOAR in Today’s Threat LandscapeSwimlane
Jay Spann
Tuesday, May 19, 2020
at 5:00 PM EDT
(2020-05-19 21:00 UTC)
Mastering the Pivot from Alert to Investigate to HuntDevo Technology Inc.
Jason Mical
Tuesday, May 19, 2020
at 3:30 PM EDT
(2020-05-19 19:30 UTC)
Attack Simulation: Docker ApplicationThreat Stack
Tim Buntel
Tuesday, May 19, 2020
at 1:00 PM EDT
(2020-05-19 17:00 UTC)
SANS 2020 Automation and Integration Survey ResultsCloudPassage
Devo Technology Inc.
DomainTools
Siemplify
SIRP
Swimlane
ThreatConnect
Don Murdoch, Barbara Filkins
Tuesday, May 19, 2020
at 11:00 AM EDT
(2020-05-19 15:00 UTC)
Zooming Ahead Safely and Securely: SANS Interviews Zoom’s Head of Product SecurityJohn Pescatore, Randolph Barr
Tuesday, May 19, 2020
at 10:30 AM EDT
(2020-05-19 14:30 UTC)
Quick, everyone BYOD! Simplifying remote work and reducing risk with Microsoft and DuoDuo Security
Dave Shackleford, Ganesh Umapathy, Leya Leydiker
Monday, May 18, 2020
at 3:30 PM EDT
(2020-05-18 19:30 UTC)
SANS @MIC Talk - Tricking modern endpoint security productsMichel Coene
Monday, May 18, 2020
at 1:00 PM EDT
(2020-05-18 17:00 UTC)
Infosec Rock Star 2020: How to Accelerate Your CareerTed Demopoulos
Sunday, May 17, 2020
at 10:00 PM PST
(2020-05-18 05:00 UTC)
SANS @MIC Talk - Modern Domain Deception - The risk, issues and potentialityAgostino Panico
Friday, May 15, 2020
at 3:30 PM EDT
(2020-05-15 19:30 UTC)
Zero Trust: A Cybersecurity Essential and the Key to SuccessInfoBlox
Michael Zuckerman
Friday, May 15, 2020
at 10:30 AM EDT
(2020-05-15 14:30 UTC)
Enabling Consistent Multi-Cloud Security, Forensics and Incident ResponseCisco Systems Inc.
Chris McHenry
Thursday, May 14, 2020
at 3:30 PM EDT
(2020-05-14 19:30 UTC)
Is OT security monitoring safe?Waterfall Security
Andrew Ginter
Thursday, May 14, 2020
at 1:00 PM EDT
(2020-05-14 17:00 UTC)
Making and Keeping Work at Home Operations Safe and ProductivePulse Secure
Menlo Security
BlackBerry
InfoBlox
John Pescatore, Lance Spitzner, Randy Marchany
Wednesday, May 13, 2020
at 8:30 PM EDT
(2020-05-14 00:30 UTC)
SANS @Mic Talk - Cloud Native Payloads: A Matryoshka Doll of ExploitsMoses Frost
Wednesday, May 13, 2020
at 3:30 PM EDT
(2020-05-13 19:30 UTC)
SANS @MIC Talk - Incident Response in ICS in times of LockdownKai Thomsen
Wednesday, May 13, 2020
at 1:00 PM EDT
(2020-05-13 17:00 UTC)
Building an Enterprise Grade Home LabIsmael Valenzuela, Justin Henderson
Wednesday, May 13, 2020
at 10:30 AM EDT
(2020-05-13 14:30 UTC)
Privilege Escalation in GCP - A Transitive PathKat Traxler
Wednesday, May 13, 2020
at 10:30 AM EDT
(2020-05-13 14:30 UTC)
Enabling Consistent Multi-Cloud Security, Forensics and Incident ResponseCisco Systems Inc.
Chris McHenry
Tuesday, May 12, 2020
at 3:30 PM EDT
(2020-05-12 19:30 UTC)
Act Like You’ve Been HackedViavi Solutions
Ward Cobleigh
Tuesday, May 12, 2020
at 1:00 PM EDT
(2020-05-12 17:00 UTC)
SANS Webinar: Cleveland Clinic Best Practices On Securing Unmanaged and IoT DevicesOrdr
Kevin Tambascio, Jason Sinchak, Russell Rice
Monday, May 11, 2020
at 8:30 PM EDT
(2020-05-12 00:30 UTC)
SANS @MIC Talk - Coalfire penetration testers charged with criminal trespassBen Wright
Monday, May 11, 2020
at 3:30 PM EDT
(2020-05-11 19:30 UTC)
SANS @MIC Talk - Using the OSINT Mind-State for Better Online InvestigationsNico Dekens
Monday, May 11, 2020
at 1:00 PM EDT
(2020-05-11 17:00 UTC)
Secure Remote Collaboration: Truth, lies and security marketing fluff when it comes to messaging, video conferencing and MFAHighside
Aaron Turner, Dave Shackleford
Friday, May 08, 2020
at 1:00 PM EDT
(2020-05-08 17:00 UTC)
Full Packet Capturing with TShark for Continuous Monitoring & Packet Threat Intelligence via IP, Domains and URLSNik Alleyne
Friday, May 08, 2020
at 10:30 AM EDT
(2020-05-08 14:30 UTC)
Develop Technical Recall Skills: Spaced Repetition with AnkiJoshua Wright
Thursday, May 07, 2020
at 1:00 PM EDT
(2020-05-07 17:00 UTC)
Using the MITRE ATT&CK® Framework for Detection and Threat HuntingExabeam
Trevor Daughney
Thursday, May 07, 2020
at 10:30 AM EDT
(2020-05-07 14:30 UTC)
Mobile Assessments : Attack Surface and FrameworksChris Crowley
Wednesday, May 06, 2020
at 8:00 PM PST
(2020-05-07 03:00 UTC)
Multi-factor authentication bypass techniques you need to know about.Bryce Galbraith
Wednesday, May 06, 2020
at 8:30 PM EDT
(2020-05-07 00:30 UTC)
SANS @MIC Talk - The Hackers Apprentice Mark Baggett
Wednesday, May 06, 2020
at 3:30 PM EDT
(2020-05-06 19:30 UTC)
SANS @MIC Talk - Information Security misconceptions 2020Chris Dale
Wednesday, May 06, 2020
at 1:00 PM EDT
(2020-05-06 17:00 UTC)
Transforming Detection and Response: A SANS Review of Cortex XDRPalo Alto Networks
Matt Bromiley, Kasey Cross
Wednesday, May 06, 2020
at 10:30 AM EDT
(2020-05-06 14:30 UTC)
All Roads Lead to the Browser: A SANS Buyer's Guide to Browser IsolationCyberinc
Matt Bromiley, Rajiv Raghunarayan
Tuesday, May 05, 2020
at 3:30 PM EDT
(2020-05-05 19:30 UTC)
Security Leadership: Managing in Turbulent Times, presented by SANS SummitsFrank Kim, Kathy Wang, Lance Spitzner, Lenny Zeltser, Russell Eubanks, Rick Holland
Tuesday, May 05, 2020
at 1:00 PM EDT
(2020-05-05 17:00 UTC)
Cryptography Essentials Made SimpleTed Demopoulos
Tuesday, May 05, 2020
at 10:30 AM EDT
(2020-05-05 14:30 UTC)
The Role of Machine Learning in Network Traffic AnalysisFidelis Cybersecurity
Abhishek Sharma, Alissa Torres
Monday, May 04, 2020
at 8:30 PM EDT
(2020-05-05 00:30 UTC)
SANS @MIC Talk - Accessing Data in the CloudKevin Ripa
Monday, May 04, 2020
at 3:30 PM EDT
(2020-05-04 19:30 UTC)
SANS @MIC Talk - Course Preview: Successful Infosec Consulting, Getting Clients Deep DiveTed Demopoulos
Monday, May 04, 2020
at 1:00 PM EDT
(2020-05-04 17:00 UTC)
Adversary emulation using CALDERA – Building custom plugins – Part #3Erik Van Buggenhout
Friday, May 01, 2020
at 10:00 AM EDT
(2020-05-01 14:00 UTC)
DISC – SANS ICS Virtual ConferenceTim Conway, Robert M. Lee, John Lavender, Sergio Caltagirone, Amy Bejtlich, Kate Vajda, Tom Van Norman, Don C. Weber, Jason D. Christopher, Jason Dely, Jeff Shearer, Austin Scott
Thursday, April 30, 2020
at 3:30 PM EDT
(2020-04-30 19:30 UTC)
Unwind Your SIEM: Improved Threat Hunting and Detection with ChronicleChronicle
Matt Bromiley, Ansh Patnaik, Dr. Anton Chavakin
Thursday, April 30, 2020
at 1:30 PM EDT
(2020-04-30 17:30 UTC)
The new normal: how employees stay secure and productive while working-from-homeHysolate
Tal Zamir
Thursday, April 30, 2020
at 10:30 AM EDT
(2020-04-30 14:30 UTC)
Using Visibility and Analytics to Secure and Optimize Today’s NetworksCisco Systems Inc.
Matthew Robertson
Wednesday, April 29, 2020
at 8:30 PM EDT
(2020-04-30 00:30 UTC)
SANS @MIC Talk - Reflections of a New CISO: 5 Lessons LearnedLenny Zeltser
Wednesday, April 29, 2020
at 3:30 PM EDT
(2020-04-29 19:30 UTC)
SANS @MIC Talk - Driving Cybersecurity Change – Establishing a Culture of Protect, Detect and Respond HighlightsLance Spitzner
Wednesday, April 29, 2020
at 1:00 PM EDT
(2020-04-29 17:00 UTC)
WhatWorks in Migrating to the Cloud while Maintaining Security and Network Performance (with a remote workforce)ExtraHop
John Pescatore
Wednesday, April 29, 2020
at 10:30 AM EDT
(2020-04-29 14:30 UTC)
How to Design a Least Privilege Architecture in AWSAWS Marketplace
Dave Shackleford, Sagar Khasnis
Tuesday, April 28, 2020
at 3:30 PM EDT
(2020-04-28 19:30 UTC)
How Operational Technology (OT) Security is Redefining the CISO RoleClaroty Inc.
Dave Weinstein, Don C. Weber
Tuesday, April 28, 2020
at 1:00 PM EDT
(2020-04-28 17:00 UTC)
SANS Top New Attacks and Threat ReportAnomali
Cisco Systems
Cyberinc
DomainTools
InfoBlox
RSA
Unisys
Verodin
John Pescatore
Monday, April 27, 2020
at 8:30 PM EDT
(2020-04-28 00:30 UTC)
SANS @MIC Talk - Modern Domain Deception - Risks, Limits and potentialityAgostino Panico
Friday, April 24, 2020
at 10:00 AM EDT
(2020-04-24 14:00 UTC)
SANS Women in Cybersecurity ForumCisco Systems Inc.
CommVault Systems Inc.
Lesley Carhart, Diana Kelley, Katie Nickels, Heather Mahalik, Alissa Torres, Sarah Edwards, Rob Lee, Larry Whiteside, Rushmi Hasham, Beverly Benson, Parag Baxi, Humberto Hilario
Thursday, April 23, 2020
at 3:30 PM EDT
(2020-04-23 19:30 UTC)
Addressing Practical Challenges to Implementing Micro-segmentationCisco Systems Inc.
Loy Evans
Thursday, April 23, 2020
at 1:00 PM EDT
(2020-04-23 17:00 UTC)
WhatWorks in High Security Alternatives for Remote Collaboration and CommunicationsHighside
John Pescatore
Thursday, April 23, 2020
at 10:30 AM EDT
(2020-04-23 14:30 UTC)
The Power of Open-Source Zeek (formerly Bro)Corelight
John Gamble
Wednesday, April 22, 2020
at 8:30 PM EDT
(2020-04-23 00:30 UTC)
SANS @MIC Talk - Secure Video Conferencing - What to Train Your Workforce OnLance Spitzner, Randy Marchany
Wednesday, April 22, 2020
at 3:30 PM EDT
(2020-04-22 19:30 UTC)
From the edge to the endpoint and back - using your security tools together for a faster threat response – even in a work from home worldCisco Systems Inc.
Ben Greenbaum, Player Pate
Wednesday, April 22, 2020
at 1:00 PM EDT
(2020-04-22 17:00 UTC)
Journey to Becoming an All-Around DefenderIsmael Valenzuela, Justin Henderson
Wednesday, April 22, 2020
at 10:30 AM EDT
(2020-04-22 14:30 UTC)
Securing the shift to cloud-based business operations Exabeam
GuidePoint
Samantha Humphries, Jean-Paul Bergeaux
Tuesday, April 21, 2020
at 3:30 PM EDT
(2020-04-21 19:30 UTC)
Securing Your Future in DFIRKathryn Hedley, Phill Moore, Jason Jordaan, Lee Whitfield
Tuesday, April 21, 2020
at 1:00 PM EDT
(2020-04-21 17:00 UTC)
Zero Trust: What You Need to Know to Secure Your Data and NetworksGigamon
Ricardo Font, Dave Shackleford
Monday, April 20, 2020
at 8:30 PM EDT
(2020-04-21 00:30 UTC)
SANS @MIC Talk - Learning From The Adversary: Automated Malware Analysis For The Win!Dean Parsons
Monday, April 20, 2020
at 3:30 PM EDT
(2020-04-20 19:30 UTC)
SANS @MIC Talk - Self-Compiling MalwareXavier Mertens
Monday, April 20, 2020
at 1:00 PM EDT
(2020-04-20 17:00 UTC)
Hacking JenkinsRoss Young
Friday, April 17, 2020
at 3:30 PM EDT
(2020-04-17 19:30 UTC)
How to Ensure Security and Productivity for Employees Working Remotely through Zoom, Teams, WebEx and other Collaboration ApplicationsMorphisec
Dan Petrillo, Andrew Homer, John Pescatore
Friday, April 17, 2020
at 1:00 PM EDT
(2020-04-17 17:00 UTC)
Leveraging Managed Threat Hunting for an Effective ICS/OT Cybersecurity ProgramDragos, Inc.
Robert M. Lee, Tim Conway
Friday, April 17, 2020
at 10:30 AM EDT
(2020-04-17 14:30 UTC)
SANS Live Online – A Brand New Training PlatformRob Lee
Thursday, April 16, 2020
at 3:30 PM EDT
(2020-04-16 19:30 UTC)
3 ways to advance your vulnerability management program TODAY!Jonathan Risto
Thursday, April 16, 2020
at 1:00 PM EDT
(2020-04-16 17:00 UTC)
Using Deception Technologies to Defend Against Active Directory and Ransomware AttacksFidelis Cybersecurity
Kyle Dickinson, Kevin Fiscus, Rami Mizrahi
Thursday, April 16, 2020
at 10:30 AM EDT
(2020-04-16 14:30 UTC)
Preventing File-Based ThreatsPalo Alto Networks
Erik Yunghans, Dave Shackleford
Wednesday, April 15, 2020
at 8:30 PM EDT
(2020-04-16 00:30 UTC)
SANS CyberCast SANS@MIC - C2 MatrixJorge Orchilles
Wednesday, April 15, 2020
at 3:30 PM EDT
(2020-04-15 19:30 UTC)
SANS @MIC Talk - Take Back The Advantage - Cyber Deception for the Win!Kevin Fiscus
Wednesday, April 15, 2020
at 1:00 PM EDT
(2020-04-15 17:00 UTC)
Outside-In Scanning Is Not Cyber Risk ManagementCyberGRX
Gary Phipps, Dave Shackleford
Wednesday, April 15, 2020
at 10:30 AM EDT
(2020-04-15 14:30 UTC)
Purple Team Tactics: A Technical Look at Windows 10 Exploit MitigationsStephen Sims
Tuesday, April 14, 2020
at 7:30 PM EST
(2020-04-14 23:30 UTC)
Detection, Meet Response: Why Automated Enrichment is Key to SOC EffectivenessDevo Technology Inc.
Jason Mical
Tuesday, April 14, 2020
at 5:30 PM EST
(2020-04-14 21:30 UTC)
What’s Next in Vulnerability ManagementQualys
Prateek Bhajanka
Tuesday, April 14, 2020
at 4:30 PM EST
(2020-04-14 20:30 UTC)
SANS.edu Undergraduate & Graduate Programs Information SessionPlease Check Back
Tuesday, April 14, 2020
at 3:30 PM EDT
(2020-04-14 19:30 UTC)
Consulting on The Side: Top Ten Questions Answered!Ted Demopoulos
Tuesday, April 14, 2020
at 1:00 PM EDT
(2020-04-14 17:00 UTC)
DNS is Changing. So What?Cisco Systems Inc.
Johannes Ullrich
Tuesday, April 14, 2020
at 10:30 AM EDT
(2020-04-14 14:30 UTC)
Pre-Runtime vs. Runtime Protection: What's Best for your IaaS Security?Intezer
Dave Shackleford, Itai Tevet
Monday, April 13, 2020
at 8:30 PM EDT
(2020-04-14 00:30 UTC)
SANS CyberCast - SANS@Mic - Successful Infosec Consulting, Getting Clients Deep DiveTed Demopoulos
Monday, April 13, 2020
at 3:30 PM EDT
(2020-04-13 19:30 UTC)
SANS @MIC Talk- Check out SEC573! More Python3! More Pywars!Mark Baggett
S
aturday, April 11, 2020
at 4:00 PM EDT
(2020-04-11 20:00 UTC)
Introduction to Reverse Engineering with IDA Pro - Stephen SimsStephen Sims
Friday, April 10, 2020
at 1:00 PM EDT
(2020-04-10 17:00 UTC)
Star Webcast: How Threats are Responding to COVID-19ProofPoint
Katie Nickels, Alex Guirakhoo, Sherrod DeGrippo
Friday, April 10, 2020
at 10:30 AM EDT
(2020-04-10 14:30 UTC)
Enable secure, remote access for your workforce with Microsoft Azure Active DirectoryMicrosoft
David Gregory
Thursday, April 09, 2020
at 3:30 PM EDT
(2020-04-09 19:30 UTC)
Dirty Defense, Done Dirt Cheap: Make your life easier by making mine harderTim Medin
Thursday, April 09, 2020
at 1:00 PM EDT
(2020-04-09 17:00 UTC)
The Security Team is Working From Home Too. How To Deliver Great Security Outcomes While Working RemotelyAwake Security
Please Check Back
Thursday, April 09, 2020
at 10:30 AM EDT
(2020-04-09 14:30 UTC)
Got Sysmon? How to Deploy Sysmon and Collect the Logs in an Enterprise EnvironmentScott Lynch
Wednesday, April 08, 2020
at 8:30 PM EDT
(2020-04-09 00:30 UTC)
SANS @MIC Talk - Take Back The Advantage - Cyber Deception for the WinKevin Fiscus
Wednesday, April 08, 2020
at 3:30 PM EDT
(2020-04-08 19:30 UTC)
SANS CyberCast SANS@MIC - Memory Analysis Skillbuilder Series: Skeleton Key Deep Dive with WinDbgAlissa Torres
Wednesday, April 08, 2020
at 1:00 PM EDT
(2020-04-08 17:00 UTC)
Detecting the Deceivers through DeceptionAttivo Networks
Tony Cole, Kevin Fiscus
Wednesday, April 08, 2020
at 12:30 PM EDT
(2020-04-08 16:30 UTC)
Secure Your Users Everywhere Cisco Umbrella
Chris Bilodeau
Wednesday, April 08, 2020
at 12:30 PM EDT
(2020-04-08 16:30 UTC)
Cortex by Palo Alto Networks Presents: Journey to the Center of the SOCPalo Alto Networks
Please Check Back
Wednesday, April 08, 2020
at 12:30 PM EDT
(2020-04-08 16:30 UTC)
Effortlessly Immunize Software - Inoculating Compiled Code against Memory VulnerabilitiesRunSafe Security
Please Check Back
Tuesday, April 07, 2020
at 3:30 PM EDT
(2020-04-07 19:30 UTC)
Understanding EncryptionKevin Ripa
Tuesday, April 07, 2020
at 12:30 PM EDT
(2020-04-07 16:30 UTC)
Common SOAR Use Cases to Boost Your SOCSwimlane
Jay Spann
Tuesday, April 07, 2020
at 12:30 PM EDT
(2020-04-07 16:30 UTC)
Cybersecurity: Why Asset Management MattersAxonius
Please Check Back
Tuesday, April 07, 2020
at 10:30 AM EDT
(2020-04-07 14:30 UTC)
Driving Cybersecurity Change – Establishing a Culture of Protect, Detect and Respond HighlightsCisco Systems Inc.
Lance Spitzner
Monday, April 06, 2020
at 8:30 PM EDT
(2020-04-07 00:30 UTC)
SANS CyberCast SANS@MIC - Pen Testing ICS and Other Highly Restricted EnvironmentsDon C. Weber
Monday, April 06, 2020
at 3:30 PM EDT
(2020-04-06 19:30 UTC)
SANS CyberCast SANS@MIC - Domain Password Auditing with the CloudMatthew Toussain
Monday, April 06, 2020
at 12:30 PM EST
(2020-04-06 16:30 UTC)
Seven Strategies for CISOsCorelight
Richard Bejtlich
S
aturday, April 04, 2020
at 1:00 PM EST
(2020-04-04 17:00 UTC)
ZOMG it's ZOOMMick Douglas
Friday, April 03, 2020
at 1:00 PM EDT
(2020-04-03 17:00 UTC)
Shared Responsibility of Salesforce SecurityRevCult
Dave Shackleford, Pete Thurston
Friday, April 03, 2020
at 10:30 AM EDT
(2020-04-03 14:30 UTC)
Securing Unmanaged IoT Devices in Healthcare & Life SciencesCyberX
Christy Peel, Phil Neray
Thursday, April 02, 2020
at 3:30 PM EDT
(2020-04-02 19:30 UTC)
IDA Pro Challenge Walk Through & What's New in SEC760 'Advanced Exploit Dev'Huáscar Tejeda, Stephen Sims
Thursday, April 02, 2020
at 1:00 PM EDT
(2020-04-02 17:00 UTC)
MITRE ATT&CK® for ICS Live DemonstrationDragos, Inc.
Austin Scott, Robert M. Lee
Wednesday, April 01, 2020
at 8:30 PM EDT
(2020-04-02 00:30 UTC)
SANS CyberCast SANS@MIC - Are You Certifiable?Ron Hamann
Wednesday, April 01, 2020
at 3:30 PM EDT
(2020-04-01 19:30 UTC)
An Inside Look at Security and Compliance at a Hypergrowth StartupThreat Stack
Tim Buntel
Wednesday, April 01, 2020
at 1:00 PM EDT
(2020-04-01 17:00 UTC)
Network Visibility and Threat Detection: A SANS SurveyExtraHop
John Smith, Ian Reynolds
Wednesday, April 01, 2020
at 10:30 AM EDT
(2020-04-01 14:30 UTC)
Adversary emulation using CALDERA – Building custom abilities – Part #2Erik Van Buggenhout
Tuesday, March 31, 2020
at 10:30 AM EDT
(2020-03-31 14:30 UTC)
Explainable Threat Intelligence: Moving Beyond "Black Box" Threat ConvictionsReversing Labs
Please Check Back
Monday, March 30, 2020
at 8:30 PM EDT
(2020-03-31 00:30 UTC)
SANS CyberCast - SANS@Mic - The Hackers ApprenticeMark Baggett
Monday, March 30, 2020
at 3:30 PM EDT
(2020-03-30 19:30 UTC)
SANS CyberCast SANS@MIC - Stealth persistence strategiesErik Van Buggenhout
Monday, March 30, 2020
at 1:00 PM EDT
(2020-03-30 17:00 UTC)
What To Do When Moving to The CloudKenneth G. Hartman, Kyle Dickinson, Ryan Nicholson
Friday, March 27, 2020
at 8:30 AM EDT
(2020-03-27 12:30 UTC)
Cyber Threat Intelligence Solutions Forum: Intel-Use Cases for Destructive ScenariosReversing Labs
Keysight Technologies, Inc.
RecordedFuture
DomainTools
Cisco Umbrella
Robert M. Lee, Talal Balouch, Scott Register, Kyle Flaherty, Allan Liska, Taylor Wilkes-Pierce
Thursday, March 26, 2020
at 3:30 PM EDT
(2020-03-26 19:30 UTC)
CISO Priorities: Top Considerations for Rapidly Securing the Remote WorkforceAwake Security
Malcolm Harkins
Thursday, March 26, 2020
at 1:00 PM EDT
(2020-03-26 17:00 UTC)
7 Techniques for Ramping Your DevSecOps Program QuicklyCmd
Jake King
Thursday, March 26, 2020
at 10:30 AM EDT
(2020-03-26 14:30 UTC)
Building an Enterprise DevSecOps Program Veracode
Rich Mogull, Chris Kirsch
Wednesday, March 25, 2020
at 8:30 PM EDT
(2020-03-26 00:30 UTC)
SANS CyberCast - SANS@Mic -Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function RuntimesBrandon Evans
Wednesday, March 25, 2020
at 3:30 PM EDT
(2020-03-25 19:30 UTC)
Keeping Network Inspection Visibility in the Age of TLS 1.3: What To Do When The Network Goes Dark ExtraHop
Matt Bromiley, John Smith
Wednesday, March 25, 2020
at 1:00 PM EDT
(2020-03-25 17:00 UTC)
Stopping attacks in their tracks through behavioral blocking and containment Microsoft
Geoff McDonald, Shweta Jha
Wednesday, March 25, 2020
at 10:30 AM EDT
(2020-03-25 14:30 UTC)
STAR Webcast: xHunt - An Anime Fan's Attack Campaign in the Middle EastKatie Nickels, Brittany Barbehenn, Robert Falcone
Tuesday, March 24, 2020
at 3:30 PM EDT
(2020-03-24 19:30 UTC)
FOR572: Always Updating, Never at RestPhilip Hagen
Tuesday, March 24, 2020
at 1:00 PM EDT
(2020-03-24 17:00 UTC)
Women in Cybersecurity: A SANS Survey Panel DiscussionThreatConnect
Heather Mahalik, Marika Chauvin
Monday, March 23, 2020
at 8:30 PM EDT
(2020-03-24 00:30 UTC)
SANS CyberCast - SANS@Mic - I'm Sorry Dave, I Can't Do That: Practical Machine Learning for Information Security (New Course Preview!)David Hoelzer
Monday, March 23, 2020
at 3:30 PM EDT
(2020-03-23 19:30 UTC)
SANS CyberCast SANS@MIC - Building Your Foundation: Getting Started in Digital ForensicsJason Jordaan
Monday, March 23, 2020
at 10:30 AM EST
(2020-03-23 14:30 UTC)
Securing Your Kids OnlineLance Spitzner
Friday, March 20, 2020
at 3:30 PM EDT
(2020-03-20 19:30 UTC)
Using osquery & MITRE ATT&CK® to Provide Analytics for Incident Response and Threat HuntingUptycs
Guillaume Ross, Dave Shackleford
Friday, March 20, 2020
at 1:00 PM EDT
(2020-03-20 17:00 UTC)
Leveraging TheHive & Cortex for automated IRErik Van Buggenhout
Thursday, March 19, 2020
at 3:30 PM EDT
(2020-03-19 19:30 UTC)
Attack Simulation: Docker ApplicationThreat Stack
Tim Buntel
Thursday, March 19, 2020
at 1:00 PM EDT
(2020-03-19 17:00 UTC)
Anatomy of a Cloud Data BreachNetskope
Ray Canzanese, Ph.D., Nathan Smolenski
Thursday, March 19, 2020
at 10:30 AM EDT
(2020-03-19 14:30 UTC)
Container Security: Building a Solid Foundation for All Round DefendersJustin Henderson
Wednesday, March 18, 2020
at 8:30 PM EDT
(2020-03-19 00:30 UTC)
SANS CyberCast - SANS@Mic - How I Learned to Stop Worrying and Love TLSJohannes Ullrich, PhD
Wednesday, March 18, 2020
at 3:30 PM EDT
(2020-03-18 19:30 UTC)
Getting Started with Consulting: Top Ten Questions Answered!Ted Demopoulos
Wednesday, March 18, 2020
at 1:00 PM EDT
(2020-03-18 17:00 UTC)
Empower Your Security Team with Approachable Threat Intelligence Anomali
Chris Crowley, Sonny Day
Wednesday, March 18, 2020
at 10:30 AM EDT
(2020-03-18 14:30 UTC)
Family Matters: Practical Malware Family Identification for Incident Responders VMRay
Jacob Williams, Tamas Boczan
Wednesday, March 18, 2020
at 8:00 AM EDT
(2020-03-18 12:00 UTC)
Deployment Kit for Securing Your Workforce at HomeLance Spitzner
Tuesday, March 17, 2020
at 5:30 PM EDT
(2020-03-17 21:30 UTC)
Deployment Kit for Securing Your Workforce at HomeLance Spitzner
Tuesday, March 17, 2020
at 3:30 PM EDT
(2020-03-17 19:30 UTC)
Understanding SANS CyberCast - So Much More Than Live Virtual TrainingEd Skoudis, Rob Lee
Tuesday, March 17, 2020
at 1:00 PM EDT
(2020-03-17 17:00 UTC)
Women in Cybersecurity: A SANS SurveyCisco Systems
LogRhythm
ThreatConnect
ThreatQuotient
Heather Mahalik
Tuesday, March 17, 2020
at 10:30 AM EDT
(2020-03-17 14:30 UTC)
Faster, Better, AND Cheaper: Improving security operations using open source toolsJohn Hubbard
Monday, March 16, 2020
at 8:30 PM EDT
(2020-03-17 00:30 UTC)
SANS CyberCast - SANS@Mic - Moving Past Just Googling It: Harvesting and Using OSINTMicah Hoffman
Monday, March 16, 2020
at 3:30 PM EDT
(2020-03-16 19:30 UTC)
From X-rays to hex-raysMathias Fuchs
Friday, March 13, 2020
at 1:00 PM EST
(2020-03-13 17:00 UTC)
Secure Branch Connectivity With SD-WANPalo Alto Networks
John Pescatore
Thursday, March 12, 2020
at 1:00 PM EST
(2020-03-12 17:00 UTC)
Innovative Application Security Testing Techniques for Modern Software Development Veracode
Chris Kirsch
Thursday, March 12, 2020
at 10:30 AM EST
(2020-03-12 14:30 UTC)
Intro to Shellcode Analysis: Tools and TechniquesJim Clausing
Wednesday, March 11, 2020
at 3:30 PM EST
(2020-03-11 19:30 UTC)
Fast, Scalable Results with EZ Tools and the New Command-line poster.Mark Hallman
Wednesday, March 11, 2020
at 1:00 PM EST
(2020-03-11 17:00 UTC)
Knock, Knock: Is This Security Thing Working?VMWare, Inc
Matt Bromiley, Dhruv Jain
Tuesday, March 10, 2020
at 3:30 PM EST
(2020-03-10 19:30 UTC)
Analyzing User-mode Dumps with WinDbgAlissa Torres
Thursday, March 05, 2020
at 1:00 PM EST
(2020-03-05 18:00 UTC)
Unlocking the model- Zero Trust for the Real WorldMicrosoft
Nupur Goyal
Thursday, March 05, 2020
at 10:30 AM EST
(2020-03-05 15:30 UTC)
Mobile Application Static AnalysisJeroen Beckers
Wednesday, March 04, 2020
at 1:00 PM EST
(2020-03-04 18:00 UTC)
State of Cloud and ThreatsNetskope
Ray Canzanese, Ph.D.
Tuesday, March 03, 2020
at 9:00 PM EST
(2020-03-04 02:00 UTC)
Head In the CloudsKevin Ripa
Tuesday, March 03, 2020
at 3:30 PM EST
(2020-03-03 20:30 UTC)
How to Leverage Endpoint Detection and Response (EDR) in AWS InvestigationsAWS Marketplace
Sagar Khasnis, Justin Henderson
Friday, February 28, 2020
at 3:30 PM EST
(2020-02-28 20:30 UTC)
Finding Answers Faster Using OSINT and DFIR SkillsJeff Lomas
Friday, February 28, 2020
at 10:30 AM EST
(2020-02-28 15:30 UTC)
ICS515 update: what’s new in the course and why detection and response in ICS is more important than everKai Thomsen
Thursday, February 27, 2020
at 10:30 AM EST
(2020-02-27 15:30 UTC)
Purple Team Tactics: Detecting Adversary Discovery TechniquesAlissa Torres
Wednesday, February 26, 2020
at 3:30 PM EST
(2020-02-26 20:30 UTC)
Architecting for Security Operations: Divide and Conquer!Ismael Valenzuela, Rob Gresham
Wednesday, February 26, 2020
at 1:00 PM EST
(2020-02-26 18:00 UTC)
Adversary Emulation and the C2 MatrixJorge Orchilles
Tuesday, February 25, 2020
at 3:30 PM EST
(2020-02-25 20:30 UTC)
Skip this Webinar - It's just everything you need to know about smartphonesHeather Mahalik, Domenica Crognale
Thursday, February 20, 2020
at 3:30 PM EST
(2020-02-20 20:30 UTC)
Modern Web Application Penetration Testing Part 2, Hash Length Extension AttacksAdrien de Beaupre
Thursday, February 20, 2020
at 1:00 PM EST
(2020-02-20 18:00 UTC)
Threat Actor Analysis and Strategic Security Investments DomainTools
Jackie Abrams, Chris Crowley
Thursday, February 20, 2020
at 10:30 AM EST
(2020-02-20 15:30 UTC)
The NICE Cybersecurity Workforce Framework: What is it and Why is it Important?Rodney Petersen
Thursday, February 20, 2020
at 5:30 AM EST
(2020-02-20 10:30 UTC)
Internet Email: Insecure by Design and Building your Malware Analysis Home Lab for learning and funRobbie Honerkamp, Andre Shori, Yee Ching Tok, Delaney Ng, Kevin Hraybi
Wednesday, February 19, 2020
at 3:30 PM EST
(2020-02-19 20:30 UTC)
Will that be one log or two? Logging before, during, and after an attack.Craig Bowser
Wednesday, February 19, 2020
at 1:00 PM EST
(2020-02-19 18:00 UTC)
Real-World Implementation of Deception TechnologiesAcalvio Technologies, Inc.
Kyle Dickinson, Rick Moy, Jim Mason
Tuesday, February 18, 2020
at 3:30 PM EST
(2020-02-18 20:30 UTC)
Innovative workforce development programs to reskill new cybersecurity professionalsMaxwell Shuftan, Bill Seaman, Rich Arellano, Sarah Kearsley
Tuesday, February 18, 2020
at 1:00 PM EST
(2020-02-18 18:00 UTC)
Bringing IT and security together: How Microsoft is reinventing threat and vulnerability managementMicrosoft
Tomer Teller
Tuesday, February 18, 2020
at 10:30 AM EST
(2020-02-18 15:30 UTC)
When a Plan Comes Together: Building a SOC “A-Team”Mark Orlando
Thursday, February 13, 2020
at 9:30 PM EST
(2020-02-14 02:30 UTC)
Passwords are a Solvable Problem!Matthew Toussain
Thursday, February 13, 2020
at 1:00 PM EST
(2020-02-13 18:00 UTC)
2020 SANS Cyber Threat Intelligence (CTI) Survey Panel DiscussionAnomali
DomainTools
ThreatConnect
Robert M. Lee, Kyle Ehmke, Nicholas Hayden, Ryan Weaver
Thursday, February 13, 2020
at 10:30 AM EST
(2020-02-13 15:30 UTC)
2019 SANS Holiday Hack Challenge Award CeremonyEd Skoudis, Joshua Wright, Evan Booth
Wednesday, February 12, 2020
at 10:00 PM EST
(2020-02-13 03:00 UTC)
Data-Centric SecurityJustin Henderson
Wednesday, February 12, 2020
at 3:30 PM EST
(2020-02-12 20:30 UTC)
How to Improve Security Visibility and Detection/Response Operations in AWSAWS Marketplace
Dave Shackleford, Vinay Sukumar
Wednesday, February 12, 2020
at 1:00 PM EST
(2020-02-12 18:00 UTC)
STAR Webcast: Cyber Threats To Electric Industry - What You Need to KnowKatie Nickels, Robert M. Lee, Tim Conway
Wednesday, February 12, 2020
at 10:30 AM EST
(2020-02-12 15:30 UTC)
Discover and Eliminate Cyberattack Pathways to Critical Assets with Illusive Networks Attack Surface Manager Illusive Networks
Wade Lance, Dave Shackleford
Tuesday, February 11, 2020
at 3:30 PM EST
(2020-02-11 20:30 UTC)
Top Five Vulnerability Management Failures (and Best Practices)David Hazar
Tuesday, February 11, 2020
at 1:00 PM EST
(2020-02-11 18:00 UTC)
2020 SANS Cyber Threat Intelligence (CTI) Survey ResultsAnomali
DomainTools
EclecticIQ
InfoBlox
RecordedFuture
Sophos Inc.
ThreatConnect
ThreatQuotient
Robert M. Lee
Tuesday, February 11, 2020
at 10:30 AM EST
(2020-02-11 15:30 UTC)
Cloud Logging and SecurityJustin Henderson
Monday, February 10, 2020
at 3:30 PM EST
(2020-02-10 20:30 UTC)
Why it’s easy being a hackerChris Dale
Thursday, February 06, 2020
at 3:30 PM EST
(2020-02-06 20:30 UTC)
Employee, Contractor, Consultant: Which Work Model is Best For You?Ted Demopoulos
Thursday, February 06, 2020
at 1:00 PM EST
(2020-02-06 18:00 UTC)
Implementer's Guide to Deception TechnologiesAcalvio Technologies, Inc.
Attivo Networks
Fidelis Cybersecurity
Kyle Dickinson
Wednesday, February 05, 2020
at 3:30 PM EST
(2020-02-05 20:30 UTC)
Your Password Doesn’t MatterMicrosoft
Alex Weinert
Wednesday, February 05, 2020
at 1:00 PM EST
(2020-02-05 18:00 UTC)
Securing ICS Using the NIST Cybersecurity Framework and Fortinet: Best Practices for the Real WorldFortinet, Inc.
Barbara Filkins, Don C. Weber, Peter Newton
Thursday, January 30, 2020
at 3:30 PM EST
(2020-01-30 20:30 UTC)
Spends and Trends: SANS 2020 Cybersecurity Spending Survey Panel DiscussionExtraHop
Gigamon
Netskope
Barbara Filkins, John Pescatore, Gordon Beith, Bob Gilbert, John Smith
Thursday, January 30, 2020
at 9:30 AM EST
(2020-01-30 14:30 UTC)
SANS Automation & Orchestration Solutions ForumSwimlane
ThreatConnect
SaltyCloud
Siemplify
Chris Crowley, Jay Spann
Wednesday, January 29, 2020
at 1:00 PM EST
(2020-01-29 18:00 UTC)
Spends and Trends: Results of the SANS 2020 Cybersecurity Spending SurveyExtraHop
Gigamon
Netskope
Barbara Filkins, John Pescatore
Wednesday, January 29, 2020
at 10:30 AM EST
(2020-01-29 15:30 UTC)
Elevate your endpoint security with Microsoft Defender ATPMicrosoft
Heike Ritter
Tuesday, January 28, 2020
at 3:30 PM EST
(2020-01-28 20:30 UTC)
Designing a Secure Microservices ArchitectureThreat Stack
Jake Williams, Tim Buntel
Tuesday, January 28, 2020
at 10:30 AM EST
(2020-01-28 15:30 UTC)
Shall We Play a Game?Timothy McKenzie
Monday, January 27, 2020
at 1:00 PM EST
(2020-01-27 18:00 UTC)
Secure by Default? Scoring the Big 3 Cloud ProvidersBrandon Evans
Thursday, January 23, 2020
at 1:00 PM EST
(2020-01-23 18:00 UTC)
United We Stand, Divided We Fall: 2019 Threat Landscape and the Influence of Sharing CommunitiesAnomali
Ghareeb Saad, Shaun McCullough
Wednesday, January 22, 2020
at 3:30 PM EST
(2020-01-22 20:30 UTC)
Optimize Decision Support through Verifiable Classification Reversing Labs
Please Check Back
Wednesday, January 22, 2020
at 1:00 PM EST
(2020-01-22 18:00 UTC)
Protecting your Cloud Native & Kubernetes environments from exposure and breach with Cisco Stealthwatch CloudCisco Systems Inc.
Jeff Moncrief
Tuesday, January 21, 2020
at 1:00 PM EST
(2020-01-21 18:00 UTC)
The Most Devastating Attacks and How to Prevent ThemPalo Alto Networks Cortex
Kasey Cross, Dave Shackleford
Thursday, January 16, 2020
at 3:30 PM EST
(2020-01-16 20:30 UTC)
How to Communicate about Security VulnerabilitiesJonathan Risto
Thursday, January 16, 2020
at 1:00 PM EST
(2020-01-16 18:00 UTC)
Threat Hunting and Discovery: A SANS Review of Vectra CognitoVectra Networks Inc.
Dave Shackleford, Tim Wade
Wednesday, January 15, 2020
at 1:00 PM EST
(2020-01-15 18:00 UTC)
Who’s there? — Using sender identity to stop modern phishing & BECValimail
Jake Williams, Sibrina Subedar, Garrett McCullum
Wednesday, January 15, 2020
at 12:00 PM EST
(2020-01-15 17:00 UTC)
Microsoft Patch Tuesday crypt32.dll Vulnerability OverviewJake Williams, Johannes Ullrich
Tuesday, January 14, 2020
at 3:30 PM EST
(2020-01-14 20:30 UTC)
Designing Security Policies Through Data IntelligenceCisco Systems Inc.
Matthew Robertson
Tuesday, January 14, 2020
at 1:00 PM EST
(2020-01-14 18:00 UTC)
What Really Matters to Security Teams: Endpoint Security Priorities for 2020Cisco Systems Inc.
Dave Gruber, Eric Howard
Tuesday, January 14, 2020
at 10:30 AM EST
(2020-01-14 15:30 UTC)
Why as a DoD Contractor Do I Need to Be CMMC CompliantKatie Arrington
Monday, January 13, 2020
at 1:00 PM EST
(2020-01-13 18:00 UTC)
SEC642: Killing snakes for fun, Flask SSTIs and RCEs in PythonMoses Frost
Thursday, January 09, 2020
at 10:30 AM EST
(2020-01-09 15:30 UTC)
Contain Thyself: How to Perform Log Collection and Analysis from Container Based TechnologiesJustin Henderson
Wednesday, January 08, 2020
at 10:00 PM EST
(2020-01-09 03:00 UTC)
From Seizure to Actionable Intelligence in 90 Minutes or LessEric Zimmerman
Tuesday, January 07, 2020
at 10:30 AM EST
(2020-01-07 15:30 UTC)
Operations Security (OPSEC) tradecraft tips for online Open Source Intelligence (OSINT) ResearchPlease Check Back

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.