Cyber Skills Training at SANS Seattle Fall 2018. Save $400 thru 8/22!

Webcasts: Upcoming


Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Aug 16, 2018SOC Capabilities and Usefulness: Part II of the SANS SOC Survey Results WebcastAuthentic8

Awake Security

CYBERBIT Commercial Solutions

DFLabs

ExtraHop

LogRhythm
Christopher Crowley, Gary Golomb, Lital Grossman, John Moran, John Pescatore
Aug 20, 20187 Steps to Protecting Data in the Era of Digital CareAbsolute Software Corp.Dave Shackleford, Josh Mayfield
Aug 21, 2018The Keys to Managing Insider Threats & Stopping Data ExfiltrationObserveITTim Armstrong, John Pescatore
Aug 22, 2018Youre Probably Not Red Teaming (And Usually Im Not, Either)Deviant Ollam
Aug 23, 2018Pen Testing with PowerShell: Data Exfiltration TechniquesMick Douglas
Aug 23, 2018How Network Traffic Analytics Eliminates Darkspace for the SOCExtraHopBarbara Kay, Chris Crowley
Aug 23, 2018Weaponizing Browser-Based Memory Leak Bugs - Stephen SimsStephen Sims
Aug 29, 2018Break Silos and respond to threats faster; Eliminating network and security silos to speed attack responseInfoBloxJohn Pescatore, Chintan Udeshi, Larry Lunetta
Aug 30, 2018Stronger Security with Inventory ManagementQualysMatt Bromiley, Pablo Quiroga
Sep 4, 2018Pen Testing with PowerShell: Local Privilege Escalation TechniqueMick Douglas
Sep 5, 2018The Convergence of Cybersecurity and Process SafetyDoug Wylie, Marty Edwards, Larry O'Brien
Sep 5, 2018It's All About Your Assets: Inline Vulnerability and Event ManagementDavid Hazar
Sep 6, 2018Pen Testing with PowerShell: Automating the Boring so You Can Focus on the FUN!Mick Douglas
Sep 6, 2018ICS Network HygienePaul Piotrowski, Kevin Van Der Veen, Manjit Duhra
Sep 10, 2018What the CISO REALLY wants out of your SOCRussell Eubanks
Sep 11, 2018YARA - Effectively using and generating rulesErik Van Buggenhout
Sep 11, 2018Breach Avoidance: Yes, You Can!BalbixJohn Pescatore, Gaurav Banga
Sep 12, 2018The Need for Speed: Integrated Threat ResponseLookingglass Cyber Solutions, Inc.Matt Bromiley, Allan Thomson
Sep 18, 2018Trust No One: Introducing SEC530: Defensible Security ArchitectureEric Conrad
Sep 18, 2018Perimeter Security and Why it is ObsoleteJustin Henderson
Sep 19, 2018Threat Hunting Is a Process, Not a Thing: SANS 2018 Survey Results, Part IAnomali

DomainTools

IBM

Malwarebytes

Qualys

RiskIQ
Chris Carlson, Rob Lee, Robert M. Lee, Dana Torgersen, Taylor Wilkes-Pierce
Sep 19, 2018Cloud Services - Look before you LeapDavid R. Miller
Sep 20, 2018Threat Hunting in Action: SANS 2018 Survey Results, Part IIAnomali

DomainTools

IBM

Malwarebytes

Qualys

RiskIQ
Rob Lee, Robert M. Lee, Sid Pearl, Benjamin Powell, Justin Swisher
Sep 27, 2018Automating Open Source Security: A SANS Review of WhiteSourceWhiteSourceRami Elron, Serge Borso
Sep 27, 2018Listen, Respond, Repeat: How to Establish a Successful OT Security Risk Management ProgramTenable Network Security Ted Gary, Eitan Goldstein, Doug Wylie
Oct 4, 2018Investigate East-West Attack Activities to Defend Critical Assets: A SANS Review of ExtraHop Reveal(x)ExtraHopDave Shackleford, Barbara Kay
Oct 10, 2018Kolide & OSQuery - How to build solid queries & packs for incident detection & threat huntingErik Van Buggenhout, Stephen Sims
Oct 11, 2018Detection and response services in the ICS environment The management perspectiveSøren Egede Knudsen
Oct 12, 2018SANS Financial Services Briefing: Cyber Threat Intelligence in Security Operations: Am I Breached?
Oct 16, 2018Consuming OSINT: Watching You Eat, Drink, and SleepMicah Hoffman
Oct 18, 2018The Algorithm of You: Defeating Attackers by Being YourselfBehavioSecNeil Costigan, Matt Bromiley
Oct 24, 2018Cyber RangesJohn Pescatore, Ted Ritter
Oct 25, 2018Web Hacking with Burp Suite - Deep Dive into Burp Suite's Functionality for Pen TestersChris Dale
Oct 30, 2018Windows Defender Exploit Guard for Windows 10Stephen Sims
Oct 31, 2018How Are You Responding to Threats? SANS 2018 Incident Response Survey Results Part ICoalfire Systems

Fidelis Cybersecurity

ForeScout Technologies

1E

OpenText Corporation

ThreatQuotient
Matt Bromiley, Jim Jaeger, Shelly Muse, Brennen Reynolds
Nov 1, 2018Improving the Incident Response Function: SANS 2018 Incident Response Survey Results Part IICoalfire Systems

Fidelis Cybersecurity

ForeScout Technologies

1E

OpenText Corporation

ThreatQuotient
Matt Bromiley, Ryan Trost
Nov 5, 2018Network Architecture with Security FirstGigamonMatt Bromiley
Nov 8, 2018Secure DevOps: Fact or Fiction? SANS Survey Looks at Reality, Part IAqua Security

CA Veracode

Qualys

Rapid7 Inc.

Signal Sciences

WhiteHat Security
Jim Bird, Barbara Filkins
Nov 9, 2018Secure DevOps: Fact or Fiction? SANS Survey Looks at Reality, Part IIAqua Security

CA Veracode

Qualys

Rapid7 Inc.

Signal Sciences

WhiteHat Security
Jim Bird, Barbara Filkins
Nov 16, 2018SANS Security Operations Briefing: Knowledge retention, Staff training, Automation and OperationalizationDFLabs
Nov 27, 2018Passwords and Authentication - Get Up to Speed on Attacks and DefensesChris Dale
Nov 30, 2018SANS Cyber Threat Intelligence Briefing: Knowledge retention, Staff training, Automation and OperationalizationDomainTools
Dec 11, 2018A Practical Introduction into How to Exploit Blind VulnerabilitiesChris Dale
Dec 13, 2018Tips and Tricks for Customers and Pen Testers on How to Get Higher Value Pen TestsChris Dale
Jan 23, 2019Enterprise Security with a Fluid PerimeterAruba NetworksMatt Bromiley

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.