Online Training Special: Get a GIAC Certification Attempt Included or $350 Off through 5/29!

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Dec 18, 2017Lessons Learned from the TalkTalk Breach - A Master's Candidate WebcastEd Yuwono
Dec 15, 2017The Convergence of EPP and EDR: Tomorrow's Solution TodayFireEyeDan Reis, John Pescatore
Dec 14, 2017Who Owns ICS Security? Fusing IT, OT, & IIoT Security in the Corporate SOC. CyberXPhil Neray, Doug Wylie
Dec 13, 20172017 Trends and Strategies for Protecting Endpoints in Healthcare BarklyJustin Armstrong, Jack Danahy, Barbara Filkins
Dec 13, 2017Stop All Imposter Threats Coming Into and Going Out of your OrganizationProofPointRyan Terry, John Pescatore
Dec 13, 2017Global Response and Industrial Defense (GRID) Certification - What ICS Defenders Need to KnowRobert M. Lee
Dec 12, 2017
Dec 11, 2017Tackling DoD Cyber Red Team Deficiencies Through Systems Engineering A Master's Candidate WebcastJohn Schab
Dec 8, 2017Java on the server? What could possibly go wrong?Adrien de Beaupre, Jason Blanchard
Dec 8, 2017Driving Better Cybersecurity for Industrial Networks and Critical InfrastructureClaroty Inc. Dan Desruisseaux, Patrick McBride
Dec 8, 2017OWASP Top 10 2017: What You Need to KnowVeracodeDr. Johannes Ullrich, Chris Eng
Dec 7, 2017Using Anti-Evasion to Block Stealth Attacks with Minerva LabsMinerva LabsLenny Zeltser, Eric Cole, PhD
Dec 7, 2017Continuous Security Validation: How effective is your security?Forcepoint LLCAnil Nandigam
Dec 6, 2017Security and Ops HacksRapid7 Inc.Sonny Sarai
Dec 6, 2017Business-Driven Network Security Policy ManagementAlgoSecEdy Almer
Dec 5, 2017Top Network Security Products Revealed in Latest TestsForcepoint LLCThomas Skybakmoen
Dec 5, 2017Next-Generation Antivirus (NGAV) Buyer's Guide: Successful Strategies for Choosing and Implementing NGAVCarbon BlackBarbara Filkins, Brian Gladstein
Dec 5, 2017Bring the Fight to Them: Hunting down adversaries using OSQueryErik Van Buggenhout, Stephen Sims
Dec 4, 2017Secure DevOps Monitoring in the CloudBen Allen
Nov 30, 2017The ROI of AppSec: Getting your Money's Worth from Your AppSec ProgramVeracodeJim Bird, Maria Loughlin, Ellen Nussbaum
Nov 29, 2017Use Code Reuse to your Advantage: The Forgotten Component of your Incident Response PlanIntezerItai Tevet, Jake Williams
Nov 22, 2017GDPR - What to Train Your WorkforceBrian Honan, Lance Spitzner
Nov 21, 2017The Four Types of Threat Detection for ICS SecurityDragos, Inc.Robert M. Lee
Nov 21, 2017Memory Forensics: Sodium Pentothal for Your SecurityJake Williams, Alissa Torres
Nov 20, 2017Prevent-Detect-RESPONSE - How to Win at Security Part 3 - Implementing Proper Incident Response from SEC401Dr. Eric Cole
Nov 17, 2017SANS Security Operations Center (SOC) BriefingRecordedFuture

DomainTools

Authentic8

Digital Guardian
Nov 15, 2017Collaborative Development of Att&ck AnalyticsJohn Wunder
Nov 15, 2017Breaking Down the Data: How Secure Are You and Your Supply Chain?BitsightStephen Boyer, Jay Jacobs, G. Mark Hardy
Nov 14, 2017Integrated Security Operations - The Difference between Knowing and GuessingServiceNowMatthew O'Brien, Piero DePaoli, John Pescatore
Nov 14, 2017A day in the life doing incident response without Bro. And how it could be so much better.Corelight Vincent Stoffer, Matt Bromiley
Nov 14, 2017Using Malware Analysis to Explore the Potential of Malware VaccinationLenny Zeltser
Nov 13, 2017Secure DevOps: Three Keys for SuccessFrank Kim
Nov 13, 2017Making IoT RelevantMagnet ForensicsJessica Hyde
Nov 10, 2017Getting Started with the SIFT WorkstationRob Lee
Nov 9, 2017Which SANS Pen Test Course Should I Take? November 2017 EditionJason Blanchard, Larry Pesce, Ed Skoudis
Nov 9, 2017Preventing Persistent Attacks With Linux Micro VirtualizationImmutable SystemsTom Gillis, John Pescatore
Nov 9, 2017Creating Understanding from DataJohn Bambenek
Nov 8, 2017Modern Log Parsing and Enrichment with SIEMJohn Hubbard, Justin Henderson
Nov 8, 2017iOS 11 isn't all fun and games. What we know so far and ways to handle unsupported data setsDomenica Crognale, Heather Mahalik
Nov 7, 2017Attack and Defend: Linux Privilege Escalation Techniques In DepthMichael C. Long
Nov 7, 2017Scripting Cloud Security CapabilitiesKenneth Hartman
Nov 6, 2017Managed Detection and Response and Business context-- where do they meet, how do they co-exist to help organizations understand true risk?LeidosJustin Lachesky, Mike Gotham, Anne Saunders, Ken Brown
Nov 3, 2017Catch, Investigate, Repeat: Automating Incident Response with Behavior-Based IOCsSECDOJoseph Pizzo, Jake Williams
Nov 3, 2017Updated FOR578 - Training for Security Personnel and Why Intelligence Matters to YouRobert M. Lee
Nov 2, 2017Office 365 Migration Checklist: Considerations for Midsize EnterprisesProofPointJennifer Cheng
Nov 2, 2017Cloud Security: Defense in Detail if Not in Depth. Part 2: Changes Make the Cloud More Secure, but Is InfoSec Changing Even More?BMC Software, Inc.

Forcepoint LLC

Mcafee LLC

Qualys
Nicolas Fischbach, Eric Boerger, Dave Shackleford
Nov 2, 2017Spamhaus DNS Firewall ( DNS RPZ ) - DNS as a 'Critical Choke Point' to Block Resolution of Known Malicious SitesSecurityZONESMatt Stith
Nov 1, 2017Cloud Security: Defense in Detail if Not in Depth. Part 1: Using Cloud Services to Address the Cloud Threat Environment BMC Software, Inc.

Forcepoint LLC

Mcafee LLC

Qualys
Mark Butler, Allison Cramer, Dave Shackleford
Nov 1, 2017The Role of AI in Cybersecurity and AuditingMuzamil Riffat
Oct 31, 2017Closing the Skills Gap with Analytics and Machine Learning RSAPeter M. Tran, Ahmed Tantawy
Oct 30, 2017Beyond layered securityPalo Alto NetworksNavneet Singh, John Pescatore
Oct 27, 2017Windows Credentials: Attacks, Mitigations & DefenseChad Tilbury
Oct 26, 2017Prevent-DETECT-Response - How to Win at Security Part 2 - Timely Detection Tips and Tricks from SEC401Eric Cole
Oct 26, 2017Enhance Your Investigations with Network DataCisco SystemsBrian Ford, Matt Bromiley
Oct 26, 2017The Science Behind the Hype: Machine Learning in Endpoint SecurityBarklyDavid Hoelzer, Jack Danahy
Oct 25, 20177-Step Process to Secure AWS and Custom ApplicationsSkyHigh NetworksJohn Pescatore, Brandon Cook, Niraj Patel, Anant Mahajan
Oct 25, 2017Application Breaches and Lifecycle Security: SANS 2017 Application Security Survey, Part 2Rapid7 Inc.

Synopsys

Tenable

Veracode

WhiteHat Security
Frank Kim, Anthony Bettini, Ryan O'Leary
Oct 25, 2017Forensic Timeline Analysis Using WiresharkDavid Fletcher
Oct 24, 2017Closing the Skills Gap Chasm with Automation and Actionable AnalyticsExabeamOrion Cassetto, Dave Shackleford
Oct 24, 2017Application Security on the Go! SANS Survey Results, Part 1Rapid7 Inc.

Synopsys

Tenable

Veracode

WhiteHat Security
Eric Johnson, Alfred Chung, Colin Domoney, Apoorva Phadke
Oct 24, 2017The Maturing of Endpoint Detection and Response (EDR): Choose the Right SolutionCrowdStrikeCon Mallon, John Pescatore
Oct 20, 2017EDR vs SIEM - Place your bet! The fight is onJustin Henderson
Oct 19, 2017The facts about KRACK and your WPA enabled WiFi networkLarry Pesce
Oct 19, 2017Threat Intelligence for Every Security FunctionRecordedFutureDave Shackleford, Chris Pace
Oct 18, 2017Security Awareness for Board of DirectorsLance Spitzner, John Pescatore
Oct 18, 2017New Threats Posed by Misuse of Legitimate Websites, End-to-End Encryption Technologies and Countermeasures, A SANS Technology Institute Masters Candidate PresentationPaul Tang
Oct 17, 2017Targeted Attack Protection: SANS Review of Endgame's endpoint security platformEndgameMike Nichols, Dave Shackleford
Oct 17, 2017There's A Secure App for That: How to Mitigate Attacks Targeting Automotive Mobile Application's CommunicationsColin DeWinter, Ben Gardiner
Oct 13, 2017Strut(s) your stuff.Moses Hernandez
Oct 12, 2017NotPetya, Dragonfly 2.0 & CrashOverride: Is Now the Time for Active Cyber Defense in ICS/SCADA Networks?CyberXPhil Neray, Mike Assante
Oct 11, 2017Isolate the Critical: How to Deploy Microsegmentation for Operational ResiliencyUnisysChip Yeager, Erin Kelly
Oct 11, 2017Turning Threat Data into Threat Intel Using Automated AnalysisVMRay Carsten Willems, Dave Shackleford
Oct 10, 2017DevSecOps - Building Continuous Security Into IT & App InfrastructuresQualysChris Carlson, John Pescatore
Oct 6, 2017Guide to Selecting and Sourcing a Managed Security Services ProviderCory Mazzola, Chris Crowley
Oct 5, 2017Simplified Segmentation for a Stronger Threat DefenseCisco SystemsKeti Kilcrease
Oct 5, 2017I'm in the cloud now so... I'm secure right?NetwrixJeff Melnick, John Pescatore
Oct 4, 2017Detecting Modern PowerShell Attacks with SIEMTim Garcia, Justin Henderson
Oct 4, 2017Beyond Scanning: Delivering Impact Driven Vulnerability AssessmentsMatthew Toussain
Oct 4, 2017SANS Asia-Pacific Webcast Series- Standard Logs Made into Actionable DetectsTim Garcia, Justin Henderson
Oct 3, 2017New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
Oct 3, 2017Shrinking Attack Dwell Times - A Phishing Case Study DemoSyncurityJohn Jolly, John Pescatore
Oct 3, 2017New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
Oct 2, 2017Accurate behavior analysis enables detection and of malicious insiders, outsiders and IoT deviceE8 SecurityMatt Rodgers, John Pescatore
Sep 29, 2017Understanding Fileless Attacks and How to Stop ThemCrowdStrikeJackie Castelli, John Pescatore
Sep 28, 2017Clustering, Sourcing, and Correlating All Things IndicatorsDomainToolsKyle Wilhoit, Rebekah Brown
Sep 28, 2017SANS CyberTalent VetSuccessBrian D. Ray, Sonny Sandelius
Sep 28, 2017SANS Asia-Pacific Webcast Series- 2017 SANS SOC Survey DiscussionChristopher Crowley
Sep 27, 2017PREVENT-Detect-Response - How to Win at Security Part 1 - The Secret to Prevention from SEC401Eric Cole
Sep 27, 2017Your Security Sandbox Won't Catch It All - The Phishing ProblemProofPointMark Guntrip, Robert M. Lee
Sep 26, 2017The True Cost of Ransomware: 5 Companies, 5 Attacks, and the Reality of RecoveryBarklyJohn Pescatore, Ryan Berg
Sep 20, 2017Outsmart Hackers by Coordinating Your DefensesSophos Inc.Seth Geftic, John Pescatore
Sep 19, 2017The Top 20 ICS Cyber Attacks And how to use them to improve IIoT and cloud security designsWaterfall SecurityAndrew Ginter, Tim Conway
Sep 18, 2017Breaking Red - Designing IOCs Using Red Team ToolsJoe Vest
Sep 15, 2017EDR + NGAV Working Together: SANS Review of Carbon Black Cb DefenseCarbon BlackJerry Shenk, Brian Gladstein
Sep 13, 2017What To Do About the Equifax HackLance Spitzner
Sep 13, 2017Harness the Hacker With Breach and Attack SimulationSafebreachItzik Kotler, John Pescatore
Sep 12, 2017Asking the Right Questions about Dynamic Scanning to Secure Web Applications: A Buyer's Guide to App Sec Scanning ToolsVeracodeJoe Pelletier, Barbara Filkins
Sep 12, 2017Hitting the Security Sweet Spot with Honeypots in ICS NetworksBrent Huston
Sep 7, 2017Windows PowerShell for AuditorsClay Risenhoover
Sep 6, 2017SIEM Design & ArchitectureJohn Hubbard, Justin Henderson
Sep 6, 2017Sensitive Data Everywhere: Results of SANS 2017 Data Protection SurveyInfoBlox

Mcafee LLC
Barbara Filkins, Benjamin Wright, Cindy Chen, Sam Kumarsamy
Sep 6, 2017The latest 2017 NSS Labs NGFW test results reveals many NGFWs may be vulnerable to evasions. Does your current firewall or IPS protect against AETs?Forcepoint LLCJim Fulton
Sep 5, 2017The Efficiency of Context: Review of WireX Network Forensics PlatformWireX SystemsPhilip Campeau, Jerry Shenk
Aug 31, 2017Threat Hunting with Endpoints: A Methodology for Effective Detection and Agile ResponseRSAJack "Wes" Riley, John Pescatore
Aug 24, 2017Building Your Own Super-Duper Home LabJeff McJunkin, Jason Blanchard
Aug 23, 2017Which SANS Pen Test Course Should I Take?Ed Skoudis, Mark Baggett, Jason Blanchard
Aug 23, 2017Protect and Prevent: 3 strategies for blocking fileless attacks and exploitsBarklyPhilip Maio, John Pescatore, Jack Danahy
Aug 22, 2017Using COIN doctrine to improve Cyber DefenseSebastien Godin
Aug 17, 2017Detect & Prevent Data Exfiltration: A Unique Approach with InfobloxInfoBloxSam Kumarsamy, Andrew Hay
Aug 17, 2017Put Some Power in Your Network Security: Detect, Hunt & Prevent ThreatsBricataDruce MacFarlane, John Pescatore
Aug 16, 2017Continuous Security: Implementing the Critical Controls in a DevOps Environment, A SANS Technology Institute Masters Degree PresentationAlyssa Robinson
Aug 15, 2017Making Sense of the Critical Security Controls in the CloudEric Johnson
Aug 15, 2017Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyCylance

FireEye

Mcafee LLC

Qualys
Chad Skipper, Sean Murphy, Robert Leong, Mark Butler, Lee Neely
Aug 15, 2017Know Thy Network - Cisco Firepower and CIS Critical Security Controls 1 & 2Ryan Firth
Aug 14, 20175.3 Billion Reasons to Keep Up-to-date with BECProofPointRyan Terry, Johannes Ullrich
Aug 10, 2017Roadmap to a Secure Smart InfrastructureRapid7 Inc.Tod Beardsley, Barbara Filkins
Aug 9, 2017Dissecting various real-world DGA variantsCybereasonSean Ennis, John Pescatore
Aug 8, 2017Protecting the Critical: An innovative approach to defending your Industrial Control SystemsUnisysStuart Phillips, Christopher Blask, Mike Assante
Aug 3, 2017Machine Learning: Practical Applications for Cyber SecurityRecordedFutureChris Pace, Ismael Valenzuela
Aug 3, 2017Using Docker to Create Multi-Container Research EnvironmentsShaun McCullough
Aug 1, 2017Risk-based privilege managementChristoph Eckstein
Aug 1, 2017 The SANS 2017 Insider Threat Survey: Mounting an Effective Defense Against Insider ThreatDtex Systems

Haystax Technology

Rapid7 Inc.
Eric Cole, PhD, Bryan Ware, Matt Hathaway, Pramod Cherukumilli
Jul 27, 2017Win The Cyberwar With Zero TrustPalo Alto NetworksJohn Kindervag
Jul 21, 2017A glimpse into NEW FOR500: Windows Forensics Course: Windows 10 and beyond - what is your digital forensics investigation missing?Rob Lee
Jul 21, 2017SANS Asia-Pacific Webcast Series- Elevating Your Analysis Tactics: The New Forensics PosterPhilip Hagen
Jul 20, 2017Cloud Security MonitoringBalaji Balakrishnan
Jul 19, 2017Bridging the O365 Security Gap with CASBSkyHigh NetworksAndreas Zengel, Brandon Cook, John Pescatore
Jul 18, 2017PowerShell ProxyKenton Groombridge
Jul 18, 2017NSS Labs NGFW Test: Is your firewall a top performer?Forcepoint LLCThomas Skybakmoen, Jim Fulton
Jul 14, 2017Automating Cloud Security to Mitigate RiskSkybox Security, Inc.David Boardman, Dave Shackleford
Jul 13, 2017SANS ICS Briefing: Defending Energy SystemsWaterfall Security

PAS

Cylance

Arbor Networks

Tripwire, Inc.

Claroty Inc.
Jason Farmer, Nick Cappi, Stuart Bailey, Robert M. Lee
Jul 12, 2017The 2017 State of Industrial Control System SecurityPart 2: Protection, Prevention and ConvergenceGreat Bay Software

Nozomi Networks

PAS

Tempered Networks

Tripwire, Inc.
David Zahn, Erik Giesa, Katherine Brocklehurst, Doug Wylie, Bengt Gregory-Brown
Jul 12, 2017ICS Cyber Security in The Real-World: Demonstrating Threat Detection and Mitigation In Industrial Networks IndegyDana Tamir, Chris Grove
Jul 11, 2017The 2017 State of Industrial Control System Security-Part 1: Personnel, Threats and ToolsGreat Bay Software

Nozomi Networks

PAS

Tempered Networks

Tripwire, Inc.
Ty Powers, Edgard Capdevielle, Doug Wylie, Bengt Gregory-Brown
Jul 11, 2017Five Lessons Learned from Petya and WannaCryVeracodeJake Williams, Chris Wysopal
Jul 7, 2017CRASHOVERIDE - Detecting and Mitigating the Electric Grid Targeted MalwareDan Gunter, Robert M. Lee, Mike Assante
Jul 6, 2017IPv6 and Open Source IDS, A SANS Technology Institute Masters Degree PresentationJon Mark Allen
Jul 6, 2017 A glimpse of the NEW FOR585 Advanced Smartphone CourseHeather Mahalik
Jun 29, 2017Putting Digital Threat Investigation and Response into HyperdriveRiskIQBeckie Neumann, Dave Shackleford
Jun 29, 2017Using Endpoint Security Innovation and Next-Gen Capabilities to Counter Endpoint Threats At-ScaleCounterTackRaj Dodhiawala, John Pescatore
Jun 29, 2017Complying with Data Protection Law in a Changing WorldForcepoint LLCNeil Thacker, Benjamin Wright
Jun 28, 2017Effortless Detection and Investigation of Cloud Breaches: A Review of Lacework's Zero Touch Cloud Workload Security PlatformLaceworkSanjay Kalra, Matt Bromiley
Jun 28, 2017Securing Critical Infrastructure Organizations against the Next Cyber Breach: Best Practices for organizations leveraging Managed ServicesLeidos

RSA
Jim Hollar, Gib Sorebo
Jun 27, 2017New Threat Vectors for ICS/SCADA Networks -- and How to Prepare for ThemCyberXPhil Neray, Mike Assante
Jun 27, 2017Managing Your Top 5 Human RisksLance Spitzner
Jun 22, 2017Efficiently Contain Threats and Ease Operations with Security OrchestrationInfoBloxSrikrupa Srivatsan, Andrew Hay
Jun 20, 2017Live Demonstration: Automating Enterprise Security ResponseServiceNowAlex Cox, Piero DePaoli, John Strand
Jun 16, 2017SANS Finance Briefing: Practical Threat Modeling for Financial OrganizationsForcepoint LLC

RecordedFuture
Jun 15, 2017Catch Me if You can - Pentesting vs APTCybereasonMor Levi
Jun 14, 2017Intrusion Detection Through Relationship Analysis, A SANS Technology Institute Masters Degree PresentationPatrick Neise
Jun 14, 2017SANS 2017 Incident Response Survey ResultsPart 2: Threat Intelligence and Improving Incident Response CapabilitiesAlienVault

Anomali

Guidance Software

IBM

LogRhythm

Mcafee LLC
Matt Bromiley, Anthony Di Bello, George Mina, Travis Farral
Jun 13, 2017PKI Cartels: The Value of Trust, A SANS Technology Institute Masters Degree PresentationSandy Dunn
Jun 13, 2017SANS 2017 Incident Response Survey Results - Part 1: Attack, Response and MaturityAlienVault

Anomali

Guidance Software

IBM

LogRhythm

Mcafee LLC
Danielle Russell, Matt Bromiley, Riana Smalberger, James Carder
Jun 12, 2017You Have 24 Hours to Comply: Lessons Learned from Implementing a Behavioral Ransomware Detection FrameworkMark Mager
Jun 9, 2017What's New in the FOR610: Reverse-Engineering Malware Analysis Course in 2017?Lenny Zeltser
Jun 9, 2017SecOps principles to close gaps in Vulnerability ManagementFlexera SoftwareKen Hilker, John Pescatore
Jun 9, 2017A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint ProtectionCrowdStrikePeter Ingebrigtsen, Dave Shackleford
Jun 8, 2017What Works in Situational Awareness and Visibility: Reducing Time to Detect and Enhancing Business Outcomes with SplunkSplunkRyan Niemes, John Pescatore
Jun 7, 2017Evaluation Criteria for ICS Cyber Security Monitoring with Rockwell Automation and ClarotyClaroty Inc.

Rockwell Automation
Umair Masud, Patrick McBride
Jun 7, 2017Tackling Mobile Security with CiscoCisco SystemsBeth Barach
Jun 7, 2017Critical Security Controls for Home Networks, A SANS Technology Institute Masters Degree PresentationGlen Roberts
Jun 6, 2017Pin the Key on the App... and Other Transport Security FunMark Geeslin
Jun 6, 2017Elevating Your Analysis Tactics: The New Forensics Poster Philip Hagen
Jun 2, 2017FROM DETECTION TO RESPONSE, SOC 2.0 - 2017 State of Security Operations and What's Being Done!SiemplifyMiguel Carrero, Meny Har
May 31, 2017Using Dynamic Scanning to Secure Web Apps in Development and After DeploymentVeracodeChris Kirsch, Barbara Filkins
May 31, 2017Vulnerability Management LifecycleDavid R. Miller
May 31, 2017SANS Asia-Pacific Webcast Series- Powercat has Power: A PowerShell Implementation of NetcatMick Douglas
May 30, 20172017 SANS Security Awareness ReportThe Kogod Cybersecurity Governance Center (KCGC), Lance Spitzner
May 26, 2017Building Effective CTI Sharing for Network DefenseScott J. Roberts
May 26, 2017Defending the ICS Ahead of the Patch: WannaCry Lessons Learned Joe Slowik, Mike Assante, Ben Miller
May 25, 2017The Role of Vulnerability Scanning in Web App SecurityNetsparkerFerruh Mavituna, Barbara Filkins
May 25, 2017The New Reality: Centralizing Security when Your Network is DecentralizingForcepoint LLCDave Shackleford, Michael Knapp
May 24, 2017The Road to Increased Asset Visibility: Building an Effective ICS Security StrategyLeidosAruna Sreeram, Eric Cornelius
May 24, 2017Choosing the Right Path to Application SecurityVeracodeAdam Shostack, Chris Wysopal
May 24, 2017Fighting Fileless MalwareCybereasonSanat Chugh
May 23, 2017Network Security Infrastructure and Best Practices: A SANS SurveyNETSCOUT Systems, Inc.Matt Bromiley, John Pescatore, Barbara Filkins, Ann Sun
May 19, 2017Prelude to Beats & Bytes: Striking the Right Chord in Digital ForensicsRyan Pittman, Matt Linton, Cindy Murphy

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.