Learn cyber security skills you can implement immediately! Seven courses offered Jan. 20-25 in Anaheim, CA

Webcasts: Upcoming


Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Dec 13, 201910 Visibility Gaps Every CISO Must FillCisco Systems Inc. Russell Eubanks
Dec 13, 2019Hacking Common AD MisconfigurationsTim Medin
Dec 17, 2019WhatsApp End To End Encryption Demystified
Dec 17, 2019Accuracy Before Automation: How to Implement SOARStratozenKevin Prince, John Pescatore
Dec 18, 2019How to use Strategic CTI to address shortfalls in understanding systemic cyber riskLincoln Kaffenberger
Dec 18, 2019Workforce Transformation and Risk: A SANS SurveyRSADavid Hazar, Tony Karam
Dec 18, 2019Cloud Security Vulnerabilities, Management, and CommunicationDavid Hazar
Dec 19, 2019How to Leverage a CASB for Your AWS EnvironmentAWS MarketplaceKyle Dickinson, David Aiken
Dec 20, 2019Dont Patch - Transformative Security Programs go Beyond the VulnerabilityMatthew Toussain
Jan 7, 2020Operations Security (OPSEC) tradecraft tips for online Open Source Intelligence (OSINT) Research
Jan 9, 2020From Seizure to Actionable Intelligence in 90 Minutes or LessKevin Ripa
Jan 9, 2020Contain Thyself: How to Perform Log Collection and Analysis from Container Based TechnologiesJustin Henderson
Jan 14, 2020Why as a DoD Contractor Do I Need to Be CMMC CompliantKatie Arrington
Jan 14, 2020Designing Security Policies Through Data IntelligenceCisco Systems Inc. Matthew Robertson
Jan 16, 2020A SANS Review of Vectra CognitoVectra NetworksDave Shackleford, Tim Wade
Jan 16, 2020How to Communicate about Security VulnerabilitiesJonathan Risto
Jan 21, 2020The Most Devastating Attacks and How to Prevent ThemPalo Alto NetworksKasey Cross
Jan 22, 2020Protecting your Cloud Native & Kubernetes environments from exposure and breach with Cisco Stealthwatch CloudCisco Systems Inc. Jeff Moncrief
Jan 27, 2020Secure by Default? Scoring the Big 3 Cloud Providers
Jan 29, 2020Spends and Trends: Results of the SANS 2020 Cybersecurity Spending SurveyExtraHop

Netskope
Barbara Filkins, John Pescatore
Jan 30, 2020SANS Automation & Orchestration Solutions ForumSwimlane

ThreatConnect
Chris Crowley
Jan 30, 2020Spends and Trends: SANS 2020 Cybersecurity Spending Survey Panel DiscussionExtraHop

Netskope
Barbara Filkins, John Pescatore, Bob Gilbert
Feb 4, 2020Innovative workforce development programs to reskill new cybersecurity professionalsMaxwell Shuftan
Feb 5, 2020Securing ICS Using the NIST Cybersecurity Framework and Fortinet: Best Practices for the Real WorldFortinet, Inc.Barbara Filkins, Don C. Weber, Peter Newton
Feb 11, 2020Cloud Logging and SecurityJustin Henderson
Feb 11, 20202020 SANS Cyber Threat Intelligence (CTI) Survey ResultsAnomali

DomainTools

RecordedFuture

Sophos Inc.

ThreatConnect

ThreatQuotient
Robert M. Lee
Feb 11, 2020Top Five Vulnerability Management Failures (and Best Practices)David Hazar
Feb 12, 2020Discover and Eliminate Cyberattack Pathways to Critical Assets with Illusive Networks Attack Surface Manager Illusive NetworksWade Lance, Dave Shackleford
Feb 13, 20202020 SANS Cyber Threat Intelligence (CTI) Survey Panel DiscussionAnomali

DomainTools

ThreatConnect
Robert M. Lee
Feb 19, 2020Will that be one log or two? Logging before, during, and after an attack.Craig Bowser
Mar 11, 2020Knock, Knock: Is This Security Thing Working?VMWare, IncMatt Bromiley
Mar 17, 2020Women in Cybersecurity: A SANS SurveyThreatConnectHeather Mahalik
Mar 18, 2020Faster, Better, AND Cheaper: Improving security operations using open source toolsJohn Hubbard
Mar 24, 2020Women in Cybersecurity: A SANS Survey Panel DiscussionThreatConnectHeather Mahalik
Apr 1, 2020Network Visibility and Threat Detection: A SANS SurveyExtraHopIan Reynolds
Apr 7, 2020Driving Cybersecurity Change Establishing a Culture of Protect, Detect and Respond HighlightsLance Spitzner

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.