Over 45 Cyber Security Courses at SANS 2018 in Orlando! Save up to $200 thru 2/28.

Webcasts: Upcoming


Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Feb 27, 2018Mind the Gap: going beyond penetration testing for security improvementRapid7 Inc.Caspian Kilkelly
Feb 27, 2018Why Insider Actions Matter: SANS Review of LogRhythm CloudAI for User and Entity Behavior AnalyticsLogRhythmMark Settle, Samir Jain, Dave Shackleford
Feb 27, 2018WEBCAST 2: WORKING WITH THE LAWYERSJason Jordaan
Feb 28, 2018Looking Under the Rock: Deployment Strategies for TLS Decryption- A Master's Degree PresentationChris Farrell
Feb 28, 2018A Closer Look at Isolation: Hype or Next Gen Security?Menlo SecurityKowsik Guruswamy, John Pescatore
Feb 28, 2018Security Visibility in the Enterprise: SOC, SIEM, Managed Security and Visibility - A Master's Degree PresentationJames Hendrick
Mar 1, 201852% of Companies Sacrifice Cybersecurity for SpeedThreat Stack

PagerDuty
Pete Cheslock, Franklin Mosley
Mar 1, 2018Canadian Webcast Series Part 2: Real-world Pentesting Its About Bringing Value, not Being l33t & Deeper Dive Digital ForensicsKevin Ripa, Stephen Mathezer
Mar 2, 2018OSINT for Pentesters: Finding Targets and Enumerating SystemsMicah Hoffman, David Mashburn
Mar 5, 2018Could we have prepared for this? Attack Simulations for Blue Team HardeningAlissa Torres
Mar 6, 2018Ready Forensicator OneLee Whitfield
Mar 6, 2018Deep packet inspection: The key technology for network security and the question of whether to build or buy itRohde & Schwarz Cybersecurity GmbH Tanya Baccam, Alexander Müller
Mar 7, 2018GIAC Certification for SIEMJustin Henderson
Mar 8, 2018Baselines for Easier Detection: So easy there's no more excuses!Mick Douglas
Mar 8, 2018Dramatically Reduce Splunk Incident Response Time with BroCorelight Ken Hanson, Vincent Stoffer
Mar 8, 2018Canadian Webcast Series Part 3: ICS Defense: Its Not a Copy-Paste From an IT Playbook & Importance of Intrusion Detection in a Compromised Prone WorldNik Alleyne, Dean Parsons
Mar 9, 2018Survey of Integrity Verification Solutions, Local and Remote AttestationColin DeWinter, Ben Gardiner
Mar 12, 2018Secure DevOps: Encryption in the Cloud with KMSMark Geeslin
Mar 13, 2018WEBCAST 3: TIPS AND TECHNIQUES FOR TESTIFYING SUCCESSFULLYJason Jordaan
Mar 14, 2018VMRay Analyzer, agentless malware analysis and rapid incident response: A SANS Product ReviewVMRay Matt Bromiley, Chad Loeven
Mar 15, 2018SideSwipe: A PowerShell tool that allows you to detect lateral movement easily and quicklyMick Douglas
Mar 15, 2018Pinpoint and Remediate Unknown Threats: SANS Review of EnCase Endpoint Security 6OpenText CorporationCharles Choe, Jake Williams
Mar 15, 2018Canadian Webcast Series Part 4: Protecting Data in a Multi-Cloud Environment & Pentesting Modern Web ApplicationsAdrien de Beaupre, Troy Davidson
Mar 19, 2018Opening the Floodgates: How to Analyze 30+ TB of Endpoint Data Without Drowning Your Security TeamRedCanaryBrian Beyer
Mar 20, 2018The Power of Bro - and why you should include it in your security infrastructureCorelight Seth Hall, Matt Bromiley
Mar 20, 2018Data on the Dark Web: finding your corporate data before the criminals doTerbium LabsTyler Carbone
Mar 21, 2018One Detect to Win: Tactical Endpoint DetectionJustin Henderson, Stephen Mathezer
Mar 22, 2018Pausing the attack: deep dive on Pause-Process. A PowerShell script that allows you to pause and unpause potentially malicious attacksMick Douglas
Mar 22, 2018Stop Really Nasty Malware, Pre- and Post-Execution: A SANS Review of the enSilo Endpoint Security PlatformEnsiloDave Shackleford
Mar 27, 2018Moving Endpoint Security to the Cloud: Replacing Traditional AntivirusCarbon BlackBarbara Filkins
Mar 29, 2018Java on the Server? What Could Possibly Go wrong?Adrien de Beaupre
Mar 29, 2018Automate Threat Detection and Incident Response: SANS Review of RSA NetWitnessRSAAhmed Tantawy, Dave Shackleford
Mar 29, 2018Being Offensive in the WorkplaceDerek Rook
Mar 30, 2018Anatomy of the TRITON ICS CyberattackCyberXPhil Neray, Justin Searle
Apr 2, 2018Securing the Hybrid Cloud: A Guide to Using Security Controls, Tools and Automation QualysDave Shackleford, Chris Carlson
Apr 11, 2018No Vehicle is an IslandDoug Wylie
Apr 18, 2018One Detect to Win: Tactical Application DetectionJustin Henderson, Tim Garcia
May 2, 2018Tailored Intelligence for Automated Remediation: SANS Review of IntSights' Enterprise Intelligence and Mitigation PlatformIntsightsSonny Sarai, Alon Arvatz
Jun 13, 2018It Starts With The Endpoint: Part 1 of the SANS 2018 Endpoint Security Survey ResultsCrowdStrike

Endgame

Malwarebytes

McAfee

OpenText Corporation
Lee Neely, Alissa Torres
Jun 14, 2018Endpoint Detection and Response: Part 2 of the SANS 2018 Endpoint Security Survey ResultsCrowdStrike

Endgame

Malwarebytes

McAfee

OpenText Corporation
Lee Neely, Alissa Torres
Jun 19, 2018So, You Wanna Be a Pen Tester? 3 Paths to ConsiderEd Skoudis
Jul 19, 2018The State of Industrial IoTIndegyBarbara Filkins, Doug Wylie
Aug 15, 2018The Need for Speed: Integrated Threat ResponseLookingglass Cyber Solutions, Inc.Matt Bromiley, Allan Thomson

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.