Last week to get a GIAC Certification Attempt Included with Online Training - Ends Soon!

Webcasts: Upcoming


Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Oct 24, 2017The Maturing of Endpoint Detection and Response (EDR): Choose the Right SolutionCrowdStrikeCon Mallon, John Pescatore
Oct 24, 2017Application Security on the Go! SANS Survey Results, Part 1Rapid7 Inc.

Synopsys

Tenable Network Security

Veracode

WhiteHat Security
Eric Johnson, Alfred Chung, Colin Domoney, Apoorva Phadke
Oct 24, 2017Closing the Skills Gap Chasm with Automation and Actionable AnalyticsExabeamOrion Cassetto, Dave Shackleford
Oct 25, 2017Forensic Timeline Analysis Using WiresharkDavid Fletcher
Oct 25, 2017Application Breaches and Lifecycle Security: SANS 2017 Application Security Survey, Part 2Rapid7 Inc.

Synopsys

Tenable Network Security

Veracode

WhiteHat Security
Frank Kim, Anthony Bettini, Ryan O'Leary
Oct 25, 20177-Step Process to Secure AWS and Custom ApplicationsSkyHigh NetworksJohn Pescatore, Brandon Cook, Niraj Patel
Oct 26, 2017The Science Behind the Hype: Machine Learning in Endpoint SecurityBarklyDavid Hoelzer, Jack Danahy
Oct 26, 2017Enhance Your Investigations with Network DataCisco SystemsBrian Ford, Matt Bromiley
Oct 26, 2017Prevent-DETECT-Response - How to Win at Security Part 2 - Timely Detection Tips and Tricks from SEC401Eric Cole
Oct 27, 2017Windows Credentials: Attacks, Mitigations & DefenseChad Tilbury
Oct 30, 2017Beyond layered securityPalo Alto NetworksNavneet Singh, John Pescatore
Oct 31, 2017Closing the Skills Gap with Analytics and Machine Learning RSAPeter M. Tran, Ahmed Tantawy
Nov 1, 2017The Role of AI in Cybersecurity and AuditingMuzamil Riffat
Nov 1, 2017Cloud Security: Defense in Detail if Not in Depth. Part 1: Using Cloud Services to Address the Cloud Threat Environment BMC Software, Inc.

Forcepoint LLC

McAfee

Qualys
Mark Butler, Allison Cramer, Dave Shackleford
Nov 2, 2017Spamhaus DNS Firewall ( DNS RPZ ) - DNS as a 'Critical Choke Point' to Block Resolution of Known Malicious SitesSecurityZONESMatt Stith
Nov 2, 2017Cloud Security: Defense in Detail if Not in Depth. Part 2: Changes Make the Cloud More Secure, but Is InfoSec Changing Even More?BMC Software, Inc.

Forcepoint LLC

McAfee

Qualys
Nicolas Fischbach, Eric Boerger, Dave Shackleford
Nov 2, 2017Office 365 Migration Checklist: Considerations for Midsize EnterprisesProofPointJennifer Cheng
Nov 3, 2017Updated FOR578 - Training for Security Personnel and Why Intelligence Matters to YouRobert M. Lee
Nov 3, 2017Catch, Investigate, Repeat: Automating Incident Response with Behavior-Based IOCsSECDOJoseph Pizzo, Jake Williams
Nov 6, 2017Managed Detection and Response and Business context-- where do they meet, how do they co-exist to help organizations understand true risk?LeidosMike Gotham, Justin Lachesky
Nov 7, 2017Cloud Security Capabilities (as Code)Kenneth Hartman
Nov 7, 2017What Works in Third Party Risk Assessment: Using BitSight for Consistent and Continuous Risk RatingBitsightJohn Pescatore
Nov 7, 2017Attack and Defend: Linux Privilege Escalation Techniques In DepthMichael C. Long
Nov 8, 2017Enabling Secure DevOps in the CloudBMC Software, Inc.Allison Cramer, Adam Shostack
Nov 8, 2017Modern Log Parsing and Enrichment with SIEMJohn Hubbard, Justin Henderson
Nov 9, 2017Preventing Persistent Attacks With Linux Micro VirtualizationBracket ComputingTom Gillis, John Pescatore
Nov 9, 2017Which SANS Pen Test Course Should I Take? November 2017 EditionJason Blanchard, Larry Pesce, Ed Skoudis
Nov 13, 2017Making IoT RelevantMagnet ForensicsJessica Hyde
Nov 14, 2017A day in the life doing incident response without Bro. And how it could be so much better.Corelight Vincent Stoffer
Nov 15, 2017Breaking Down the Data: How Secure Are You and Your Supply Chain?BitsightStephen Boyer, Jay Jacobs, G. Mark Hardy
Nov 16, 2017Proven Practices for Effectively Layering Network Security NETSCOUT Systems, Inc.Sonny Sarai, John Pescatore, Ann Sun
Nov 17, 2017SANS Security Operations Center (SOC) BriefingRecordedFuture

DomainTools

Authentic8
Nov 20, 2017Prevent-Detect-RESPONSE - How to Win at Security Part 3 - Implementing Proper Incident Response from SEC401Dr. Eric Cole
Nov 21, 2017The Four Types of Threat Detection for ICS SecurityDragos, Inc.Robert M. Lee
Nov 30, 2017The ROI of AppSec: Getting your Money's Worth from Your AppSec ProgramVeracodeJim Bird, Maria Loughlin, Ellen Nussbaum
Dec 5, 2017Next-Generation Antivirus (NGAV) Buyer's Guide: Successful Strategies for Choosing and Implementing NGAVCarbon BlackBarbara Filkins
Dec 6, 2017Security and Ops HacksRapid7 Inc.Sonny Sarai
Dec 7, 2017Using Anti-Evasion to Block Stealth Attacks with Minerva LabsMinerva LabsLenny Zeltser, Eric Cole, PhD
Dec 12, 2017Pinpoint and Remediate Unknown Threats: SANS Review of EnCase Endpoint Security 6OpenText CorporationCharles Choe, Eric Cole
Feb 6, 2018Cyber Threat Intelligence Today: Consumption, Usefulness and Best PracticesAnomali

DomainTools

Rapid7 Inc.

ThreatConnect
Dave Shackleford

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.