Register by Tomorrow to Save $300 on 4-6 Day Courses at SANS Cyber Defense Initiative® in Washington, DC!

Webcasts: Upcoming


Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Oct 17, 2019Power up your Security Operations Centers human capital with the new SEC450 Part 2 - Blue Team FundamentalsFinding and training the right people!John Hubbard
Oct 17, 2019How Attackers Exploit Office 365 VulnerabilitiesNetwrixJohn Pescatore, Jeff Melnick
Oct 18, 2019SANS Cloud Security Operations Solutions ForumCisco Systems Inc.

Microsoft

Swimlane

CloudPassage
Oct 21, 2019Windows User Enumeration, Living off the landDale Hobbs
Oct 22, 2019Are Your Security Controls Yesterday's News?CymulateMatt Bromiley, Eyal Ahraoni
Oct 22, 2019Converged Threat and Performance Management Listen to Your Network!Viavi SolutionsWard Cobleigh, John Pescatore
Oct 22, 2019Are you prepared for a Ransomware Attack?Cisco Systems Inc. Peter Romness, John Pescatore
Oct 23, 2019JumpStart Guide to Security Investigations and Posture Management in Amazon Web ServicesAWS MarketplaceKyle Dickinson, Tim Jefferson, David Aiken
Oct 23, 2019Lessons Learned from Over a Thousand Threat Hunting WorkshopsCisco Systems Inc. Brandon Newport
Oct 23, 2019Modern Web Application Penetration Testing Part 1, XSS and XSRF TogetherAdrien de Beaupré
Oct 24, 2019Untapped Potential: Getting the most out of your SIEMJustin Henderson, John Hubbard
Oct 24, 2019Successful Infosec Consulting 101Ted Demopoulos
Oct 25, 2019Have You Taken The \"Endpoint Blue Pill\"? Debunking The Endpoint Protection Myth.Cisco Systems Inc. Justin Henderson, Ismael Valenzuela
Oct 28, 2019Human Fingerprints in Malware and their Use in Cyber Threat Intelligence Robert M. Lee, Tobias Johansson
Oct 29, 2019Real World Challenges for PCI Compliant ContainersThreat StackTim Buntel, John Pescatore
Oct 29, 2019SANS 2019 Threat Hunting Survey: The Differing Needs of New and Experienced HuntersAnomali

CarbonBlack

DomainTools

ExtraHop

Lastline

Sophos

ThreatConnect

ThreatQuotient

Verodin
Mathias Fuchs, Joshua Lemon
Oct 30, 2019Attacking and Defending Cloud Metadata ServicesEric Johnson
Oct 30, 2019Securing Your Hybrid Data CenterPalo Alto NetworksChrister Swartz, Dave Shackleford
Oct 30, 2019Threat Hunting for New and Experienced Hunters: Panel Discussion of the SANS 2019 Threat Hunting SurveyDomainTools

ExtraHop

ThreatConnect
Mathias Fuchs, Joshua Lemon, Matt Cauthorn, Alex Valdivia, Taylor Wilkes-Pierce
Nov 6, 2019Evaluating Network Traffic Analysis Systems Requirements and Challenges Awake SecurityDavid Pearson, Kevin Tolly
Nov 7, 2019Evade Me If You Can: Unmasking Context-Aware MalwareVMRay Brandon McCrillis, Tamas Boczan
Nov 7, 2019Data Governance: What Dark secrets lurk in your instance?RevCultPete Thurston, Dave Shackleford
Nov 8, 2019Lessons from the Trenches: Implementing Zero Trust Data Centers in the Real WorldShieldXDave Karp, Chase Cunningham
Nov 12, 2019Successful Infosec Consulting: Lessons from Three Decades in The FieldTed Demopoulos
Nov 12, 2019Building on ICS Security BasicsWhats Next?Tripwire, Inc.Matthew Luallen, Kristen Poulos, Joseph Blankenship
Nov 13, 2019Taming Linux for Enterprise SecurityCmdJohn Brunn, Matt Bromiley
Nov 14, 2019How to Perform a Security Investigation in Amazon Web Services (AWS)AWS MarketplaceKyle Dickinson, Nam Le
Nov 14, 2019Hiring and retaining for the SOC: Recruit, Train, and Retain Talented and Dedicated StaffChris Crowley
Nov 15, 2019SANS Dark Web Solutions Forum - Illuminating the Dark Web: Harvesting and Using OSINT Data from Dark Web ResourcesTerbium Labs

Sophos Inc.
Micah Hoffman
Nov 19, 2019Someone to Watch Over You: A Review of CrowdStrikes Falcon OverWatchCrowdStrike, Inc.Joe Sullivan, Scott Taschler
Nov 20, 2019SANS/CIS Winter 2020 Program Overview
Nov 21, 2019Beyond detection: An Exploration of Key Pillars of the Next-gen SIEM Devo Technology Inc.Jason Mical, Justin Henderson
Dec 3, 20192019 SANS Survey on Next-Generation Endpoint Risks and ProtectionsCarbon Black

Cisco Systems

OpenText Inc.

Sophos Inc.
Justin Henderson, John Hubbard
Dec 5, 2019How to Build a Threat Hunting Capability in AWSAWS MarketplaceDavid Aiken, Shaun McCullough
Dec 12, 2019Protecting the User: A Review of Mimecasts Web Security ServiceMimecast Services LimitedDavid Szili
Dec 13, 201910 Visibility Gaps Every CISO Must FillCisco Systems Inc. Russell Eubanks
Dec 18, 2019Workforce Transformation and Risk: A SANS SurveyRSADavid Hazar, Tony Karam
Jan 29, 2020Spends and Trends: Results of the SANS 2020 Cybersecurity Spending SurveyExtraHopBarbara Filkins, John Pescatore
Jan 30, 2020Spends and Trends: SANS 2020 Cybersecurity Spending Survey Panel DiscussionExtraHopBarbara Filkins, John Pescatore
Feb 11, 20202020 SANS Cyber Threat Survey ResultsAnomali

DomainTools

RecordedFuture

Sophos Inc.

ThreatConnect
Robert M. Lee
Feb 12, 2020Discover and Eliminate Cyberattack Pathways to Critical Assets with Illusive Networks Attack Surface Manager Illusive NetworksWade Lance, Dave Shackleford
Feb 13, 20202020 SANS Cyber Threat Survey Panel DiscussionAnomali

DomainTools

ThreatConnect
Robert M. Lee
Mar 17, 2020Women in Cybersecurity: A SANS SurveyThreatConnectHeather Mahalik
Mar 19, 2020Women in Cybersecurity: A SANS Survey Panel DiscussionThreatConnectHeather Mahalik

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.