Online Training Special Offer: iPad Pro w/ Smart Keyboard, Surface Pro or $350 Off

Webcasts: Upcoming


Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Apr 24, 2018Advanced Malware Threat Hunting and Investigation with VirusTotal IntelligenceVirusTotal Shapor Naghibzadeh, Matt Bromiley
Apr 25, 2018A Secure Approach to Deploying Wireless Networks- A SANS Master's Degree PresentationJoseph Matthews
Apr 25, 2018You Can't Secure What You Can't See - The Importance of Visibility in the CloudSkybox Security, Inc.John Pescatore
Apr 26, 2018Can Small and Midsize Organizations Get the Same Level of Endpoint Protection as the Big Guys?- A blueprint for prioritizing efforts and finding the right solutionCrowdStrikeJackie Castelli, John Pescatore
Apr 27, 2018Incident Response: Give Me Data or Give Me Death!Rapid7 Inc.Gary Harrison, Nick Schroeder
Apr 30, 2018 Fighting Account Takeover - Change The Battle and WinPerimeterXIdo Safruti
May 1, 2018BreakingPoint: A Multi-Function Tool for Application and Security TestingIxiaSashi Jeyaretnam, Serge Borso
May 1, 2018From Ad Hoc to Automated: Proven Techniques to Operationalize Threat HuntingRedCanaryKyle Rainey, Joe Moles
May 2, 2018Tailored Intelligence for Automated Remediation: SANS Review of IntSights' Enterprise Intelligence and Mitigation PlatformIntsightsSonny Sarai, Alon Arvatz
May 2, 2018Why AV Cant Protect Your DatacenterCarbon BlackDave Shackleford, Adrianna Gugel
May 3, 2018The Myths and Best Practices Surrounding SOC Automation: Use Cases and Success StoriesDFLabsJohn Moran
May 3, 2018OSINT for Defenders: Adventures in Honeytokens and Leaked DataMicah Hoffman, Justin Henderson
May 9, 20185 Ways Bro Gives You Better Data for Incident Response and Threat HuntingCorelight Gregory Bell, Matt Bromiley
May 10, 2018Raspberry Honey Pi: Botnet for Good- A SANS Masters Degree Candidate PresentationTim Collyer
May 11, 2018ICS Active Defense Primer Kai Thomsen
May 16, 2018Automate Threat Detection and Incident Response: SANS Review of RSA NetWitnessRSAAhmed Tantawy, Dave Shackleford
May 17, 2018So, You Want To Be An Infosec Consultant?Ted Demopoulos
May 22, 2018Continuous Security: Monitoring & Active Defense in the CloudEric Johnson
May 24, 2018Threat Management Made Easy: How to Protect Your ICS Network with Less EffortSecurityMatters BVDennis Murphy
May 29, 2018Everything I Didnt Learn in SchoolJonathan Haas
May 29, 2018Ten Tenets of CISO SuccessFrank Kim
May 31, 2018We Pass the Costs to You! An analysis of CryptoMining and CryptoJackingCisco Systems Inc. Josh Pyorre
Jun 6, 2018Your Current Approach to Threat Detection & Neutralization is BrokenThreatXJohn Pescatore, Bret Settle
Jun 7, 2018Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So FarTed Demopoulos
Jun 11, 2018Cryptography Essentials Made SimpleTed Demopoulos
Jun 13, 2018It Starts With The Endpoint: Part 1 of the SANS 2018 Endpoint Security Survey ResultsCrowdStrike

Endgame

Malwarebytes

McAfee

OpenText Corporation
Lee Neely, Alissa Torres, Jackie Castelli, Charles Choe, Dana Torgersen
Jun 14, 2018Endpoint Detection and Response: Part 2 of the SANS 2018 Endpoint Security Survey ResultsCrowdStrike

Endgame

Malwarebytes

McAfee

OpenText Corporation
Lee Neely, Alissa Torres, Mike Nichols, Ratnesh Saxena
Jun 15, 2018Stopping IoT-based Attacks on Enterprise NetworksHP Michael Howard, Shivaun Albright, G.W. Ray Davidson, PhD
Jun 19, 2018So, You Wanna Be a Pen Tester? 3 Paths to ConsiderEd Skoudis
Jun 20, 2018What is Purple Team? Updates to SEC599Erik Van Buggenhout, Stephen Sims
Jul 12, 2018Fundamentals of Security Operations Chris Crowley
Jul 19, 2018The State of Industrial IoTAccenture

Indegy
Barbara Filkins, Doug Wylie
Jul 26, 2018Understanding the True Cost of Endpoint ManagementIBMTeresa Worth, Matt Bromiley
Aug 14, 2018No Single Definition of a SOC: Part I of the SANS 2018 SOC Survey Results WebcastAuthentic8

Awake Security

CYBERBIT Commercial Solutions

DFLabs

LogRhythm
Chris Brazdziunas, Christopher Crowley, John Pescatore, Richard Steinhart
Aug 15, 2018The Need for Speed: Integrated Threat ResponseLookingglass Cyber Solutions, Inc.Matt Bromiley, Allan Thomson
Aug 16, 2018SOC Capabilities and Usefulness: Part II of the SANS SOC Survey Results WebcastAuthentic8

Awake Security

CYBERBIT Commercial Solutions

DFLabs

LogRhythm
Ben Carr, Christopher Crowley, Gary Golomb, John Moran, John Pescatore

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.