Final Day to get an iPad Pro, Surface Pro or $400 Off Online Training!

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Nov 22, 2017GDPR - What to Train Your WorkforceBrian Honan, Lance Spitzner
Nov 21, 2017The Four Types of Threat Detection for ICS SecurityDragos, Inc.Robert M. Lee
Nov 21, 2017Memory Forensics: Sodium Pentothal for Your SecurityJake Williams, Alissa Torres
Nov 20, 2017Prevent-Detect-RESPONSE - How to Win at Security Part 3 - Implementing Proper Incident Response from SEC401Dr. Eric Cole
Nov 17, 2017SANS Security Operations Center (SOC) BriefingRecordedFuture

DomainTools

Authentic8

Digital Guardian
Nov 15, 2017Collaborative Development of Att&ck AnalyticsJohn Wunder
Nov 15, 2017Breaking Down the Data: How Secure Are You and Your Supply Chain?BitsightStephen Boyer, Jay Jacobs, G. Mark Hardy
Nov 14, 2017Integrated Security Operations - The Difference between Knowing and GuessingServiceNowMatthew O'Brien, Piero DePaoli, John Pescatore
Nov 14, 2017A day in the life doing incident response without Bro. And how it could be so much better.Corelight Vincent Stoffer, Matt Bromiley
Nov 14, 2017Using Malware Analysis to Explore the Potential of Malware VaccinationLenny Zeltser
Nov 13, 2017Secure DevOps: Three Keys for SuccessFrank Kim
Nov 13, 2017Making IoT RelevantMagnet ForensicsJessica Hyde
Nov 10, 2017Getting Started with the SIFT WorkstationRob Lee
Nov 9, 2017Which SANS Pen Test Course Should I Take? November 2017 EditionJason Blanchard, Larry Pesce, Ed Skoudis
Nov 9, 2017Preventing Persistent Attacks With Linux Micro VirtualizationBracket ComputingTom Gillis, John Pescatore
Nov 9, 2017Creating Understanding from DataJohn Bambenek
Nov 8, 2017Modern Log Parsing and Enrichment with SIEMJohn Hubbard, Justin Henderson
Nov 8, 2017iOS 11 isn't all fun and games. What we know so far and ways to handle unsupported data setsDomenica Crognale, Heather Mahalik
Nov 7, 2017Attack and Defend: Linux Privilege Escalation Techniques In DepthMichael C. Long
Nov 7, 2017Scripting Cloud Security CapabilitiesKenneth Hartman
Nov 6, 2017Managed Detection and Response and Business context-- where do they meet, how do they co-exist to help organizations understand true risk?LeidosJustin Lachesky, Mike Gotham, Anne Saunders, Ken Brown
Nov 3, 2017Catch, Investigate, Repeat: Automating Incident Response with Behavior-Based IOCsSECDOJoseph Pizzo, Jake Williams
Nov 3, 2017Updated FOR578 - Training for Security Personnel and Why Intelligence Matters to YouRobert M. Lee
Nov 2, 2017Office 365 Migration Checklist: Considerations for Midsize EnterprisesProofPointJennifer Cheng
Nov 2, 2017Cloud Security: Defense in Detail if Not in Depth. Part 2: Changes Make the Cloud More Secure, but Is InfoSec Changing Even More?BMC Software, Inc.

Forcepoint LLC

McAfee

Qualys
Nicolas Fischbach, Eric Boerger, Dave Shackleford
Nov 2, 2017Spamhaus DNS Firewall ( DNS RPZ ) - DNS as a 'Critical Choke Point' to Block Resolution of Known Malicious SitesSecurityZONESMatt Stith
Nov 1, 2017Cloud Security: Defense in Detail if Not in Depth. Part 1: Using Cloud Services to Address the Cloud Threat Environment BMC Software, Inc.

Forcepoint LLC

McAfee

Qualys
Mark Butler, Allison Cramer, Dave Shackleford
Nov 1, 2017The Role of AI in Cybersecurity and AuditingMuzamil Riffat
Oct 31, 2017Closing the Skills Gap with Analytics and Machine Learning RSAPeter M. Tran, Ahmed Tantawy
Oct 30, 2017Beyond layered securityPalo Alto NetworksNavneet Singh, John Pescatore
Oct 27, 2017Windows Credentials: Attacks, Mitigations & DefenseChad Tilbury
Oct 26, 2017Prevent-DETECT-Response - How to Win at Security Part 2 - Timely Detection Tips and Tricks from SEC401Eric Cole
Oct 26, 2017Enhance Your Investigations with Network DataCisco SystemsBrian Ford, Matt Bromiley
Oct 26, 2017The Science Behind the Hype: Machine Learning in Endpoint SecurityBarklyDavid Hoelzer, Jack Danahy
Oct 25, 20177-Step Process to Secure AWS and Custom ApplicationsSkyHigh NetworksJohn Pescatore, Brandon Cook, Niraj Patel, Anant Mahajan
Oct 25, 2017Application Breaches and Lifecycle Security: SANS 2017 Application Security Survey, Part 2Rapid7 Inc.

Synopsys

Tenable

Veracode

WhiteHat Security
Frank Kim, Anthony Bettini, Ryan O'Leary
Oct 25, 2017Forensic Timeline Analysis Using WiresharkDavid Fletcher
Oct 24, 2017Closing the Skills Gap Chasm with Automation and Actionable AnalyticsExabeamOrion Cassetto, Dave Shackleford
Oct 24, 2017Application Security on the Go! SANS Survey Results, Part 1Rapid7 Inc.

Synopsys

Tenable

Veracode

WhiteHat Security
Eric Johnson, Alfred Chung, Colin Domoney, Apoorva Phadke
Oct 24, 2017The Maturing of Endpoint Detection and Response (EDR): Choose the Right SolutionCrowdStrikeCon Mallon, John Pescatore
Oct 20, 2017EDR vs SIEM - Place your bet! The fight is onJustin Henderson
Oct 19, 2017The facts about KRACK and your WPA enabled WiFi networkLarry Pesce
Oct 19, 2017Threat Intelligence for Every Security FunctionRecordedFutureDave Shackleford, Chris Pace
Oct 18, 2017Security Awareness for Board of DirectorsLance Spitzner, John Pescatore
Oct 18, 2017New Threats Posed by Misuse of Legitimate Websites, End-to-End Encryption Technologies and Countermeasures, A SANS Technology Institute Masters Candidate PresentationPaul Tang
Oct 17, 2017Targeted Attack Protection: SANS Review of Endgame's endpoint security platformEndgameMike Nichols, Dave Shackleford
Oct 17, 2017There's A Secure App for That: How to Mitigate Attacks Targeting Automotive Mobile Application's CommunicationsColin DeWinter, Ben Gardiner
Oct 13, 2017Strut(s) your stuff.Moses Hernandez
Oct 12, 2017NotPetya, Dragonfly 2.0 & CrashOverride: Is Now the Time for Active Cyber Defense in ICS/SCADA Networks?CyberXPhil Neray, Mike Assante
Oct 11, 2017Isolate the Critical: How to Deploy Microsegmentation for Operational ResiliencyUnisysChip Yeager, Erin Kelly
Oct 11, 2017Turning Threat Data into Threat Intel Using Automated AnalysisVMRay Carsten Willems, Dave Shackleford
Oct 10, 2017DevSecOps - Building Continuous Security Into IT & App InfrastructuresQualysChris Carlson, John Pescatore
Oct 6, 2017Guide to Selecting and Sourcing a Managed Security Services ProviderCory Mazzola, Chris Crowley
Oct 5, 2017Simplified Segmentation for a Stronger Threat DefenseCisco SystemsKeti Kilcrease
Oct 5, 2017I'm in the cloud now so... I'm secure right?NetwrixJeff Melnick, John Pescatore
Oct 4, 2017Detecting Modern PowerShell Attacks with SIEMTim Garcia, Justin Henderson
Oct 4, 2017Beyond Scanning: Delivering Impact Driven Vulnerability AssessmentsMatthew Toussain
Oct 4, 2017SANS Asia-Pacific Webcast Series- Standard Logs Made into Actionable DetectsTim Garcia, Justin Henderson
Oct 3, 2017New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
Oct 3, 2017Shrinking Attack Dwell Times - A Phishing Case Study DemoSyncurityJohn Jolly, John Pescatore
Oct 3, 2017New SANS Course - How to Prevent, Detect & Respond to an Advanced AttackErik Van Buggenhout, Stephen Sims
Oct 2, 2017Accurate behavior analysis enables detection and of malicious insiders, outsiders and IoT deviceE8 SecurityMatt Rodgers, John Pescatore
Sep 29, 2017Understanding Fileless Attacks and How to Stop ThemCrowdStrikeJackie Castelli, John Pescatore
Sep 28, 2017Clustering, Sourcing, and Correlating All Things IndicatorsDomainToolsKyle Wilhoit, Rebekah Brown
Sep 28, 2017SANS CyberTalent VetSuccessBrian D. Ray, Sonny Sandelius
Sep 28, 2017SANS Asia-Pacific Webcast Series- 2017 SANS SOC Survey DiscussionChristopher Crowley
Sep 27, 2017PREVENT-Detect-Response - How to Win at Security Part 1 - The Secret to Prevention from SEC401Eric Cole
Sep 27, 2017Your Security Sandbox Won't Catch It All - The Phishing ProblemProofPointMark Guntrip, Robert M. Lee
Sep 26, 2017The True Cost of Ransomware: 5 Companies, 5 Attacks, and the Reality of RecoveryBarklyJohn Pescatore, Ryan Berg
Sep 20, 2017Outsmart Hackers by Coordinating Your DefensesSophos Inc.Seth Geftic, John Pescatore
Sep 19, 2017The Top 20 ICS Cyber Attacks And how to use them to improve IIoT and cloud security designsWaterfall SecurityAndrew Ginter, Tim Conway
Sep 18, 2017Breaking Red - Designing IOCs Using Red Team ToolsJoe Vest
Sep 15, 2017EDR + NGAV Working Together: SANS Review of Carbon Black Cb DefenseCarbon BlackJerry Shenk, Brian Gladstein
Sep 13, 2017What To Do About the Equifax HackLance Spitzner
Sep 13, 2017Harness the Hacker With Breach and Attack SimulationSafebreachItzik Kotler, John Pescatore
Sep 12, 2017Asking the Right Questions about Dynamic Scanning to Secure Web Applications: A Buyer's Guide to App Sec Scanning ToolsVeracodeJoe Pelletier, Barbara Filkins
Sep 12, 2017Hitting the Security Sweet Spot with Honeypots in ICS NetworksBrent Huston
Sep 7, 2017Windows PowerShell for AuditorsClay Risenhoover
Sep 6, 2017SIEM Design & ArchitectureJohn Hubbard, Justin Henderson
Sep 6, 2017Sensitive Data Everywhere: Results of SANS 2017 Data Protection SurveyInfoBlox

McAfee
Barbara Filkins, Benjamin Wright, Cindy Chen, Sam Kumarsamy
Sep 6, 2017The latest 2017 NSS Labs NGFW test results reveals many NGFWs may be vulnerable to evasions. Does your current firewall or IPS protect against AETs?Forcepoint LLCJim Fulton
Sep 5, 2017The Efficiency of Context: Review of WireX Network Forensics PlatformWireX SystemsPhilip Campeau, Jerry Shenk
Sep 5, 2017Five Facets of DevOps SuccessFrank Kim
Aug 31, 2017Threat Hunting with Endpoints: A Methodology for Effective Detection and Agile ResponseRSAJack "Wes" Riley, John Pescatore
Aug 24, 2017Building Your Own Super-Duper Home LabJeff McJunkin, Jason Blanchard
Aug 23, 2017Which SANS Pen Test Course Should I Take?Ed Skoudis, Mark Baggett, Jason Blanchard
Aug 23, 2017Protect and Prevent: 3 strategies for blocking fileless attacks and exploitsBarklyPhilip Maio, John Pescatore, Jack Danahy
Aug 22, 2017Using COIN doctrine to improve Cyber DefenseSebastien Godin
Aug 17, 2017Detect & Prevent Data Exfiltration: A Unique Approach with InfobloxInfoBloxSam Kumarsamy, Andrew Hay
Aug 17, 2017Put Some Power in Your Network Security: Detect, Hunt & Prevent ThreatsBricataDruce MacFarlane, John Pescatore
Aug 16, 2017Continuous Security: Implementing the Critical Controls in a DevOps Environment, A SANS Technology Institute Masters Degree PresentationAlyssa Robinson
Aug 15, 2017Making Sense of the Critical Security Controls in the CloudEric Johnson
Aug 15, 2017Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyCylance

FireEye

McAfee

Qualys
Chad Skipper, Sean Murphy, Robert Leong, Mark Butler, Lee Neely
Aug 15, 2017Know Thy Network - Cisco Firepower and CIS Critical Security Controls 1 & 2Ryan Firth
Aug 14, 20175.3 Billion Reasons to Keep Up-to-date with BECProofPointRyan Terry, Johannes Ullrich
Aug 10, 2017Roadmap to a Secure Smart InfrastructureRapid7 Inc.Tod Beardsley, Barbara Filkins
Aug 9, 2017Dissecting various real-world DGA variantsCybereasonSean Ennis, John Pescatore
Aug 8, 2017Protecting the Critical: An innovative approach to defending your Industrial Control SystemsUnisysStuart Phillips, Christopher Blask, Mike Assante
Aug 3, 2017Machine Learning: Practical Applications for Cyber SecurityRecordedFutureChris Pace, Ismael Valenzuela
Aug 3, 2017Using Docker to Create Multi-Container Research EnvironmentsShaun McCullough
Aug 1, 2017Risk-based privilege managementChristoph Eckstein
Aug 1, 2017 The SANS 2017 Insider Threat Survey: Mounting an Effective Defense Against Insider ThreatDtex Systems

Haystax Technology

Rapid7 Inc.
Eric Cole, PhD, Bryan Ware, Matt Hathaway, Pramod Cherukumilli
Jul 27, 2017Win The Cyberwar With Zero TrustPalo Alto NetworksJohn Kindervag
Jul 21, 2017A glimpse into NEW FOR500: Windows Forensics Course: Windows 10 and beyond - what is your digital forensics investigation missing?Rob Lee
Jul 21, 2017SANS Asia-Pacific Webcast Series- Elevating Your Analysis Tactics: The New Forensics PosterPhilip Hagen
Jul 20, 2017Cloud Security MonitoringBalaji Balakrishnan
Jul 19, 2017Bridging the O365 Security Gap with CASBSkyHigh NetworksAndreas Zengel, Brandon Cook, John Pescatore
Jul 18, 2017PowerShell ProxyKenton Groombridge
Jul 18, 2017NSS Labs NGFW Test: Is your firewall a top performer?Forcepoint LLCThomas Skybakmoen, Jim Fulton
Jul 14, 2017Automating Cloud Security to Mitigate RiskSkybox Security, Inc.David Boardman, Dave Shackleford
Jul 13, 2017SANS ICS Briefing: Defending Energy SystemsWaterfall Security

PAS

Cylance

Arbor Networks

Tripwire, Inc.

Claroty
Jason Farmer, Nick Cappi, Stuart Bailey, Robert M. Lee
Jul 12, 2017The 2017 State of Industrial Control System SecurityPart 2: Protection, Prevention and ConvergenceGreat Bay Software

Nozomi Networks

PAS

Tempered Networks

Tripwire, Inc.
David Zahn, Erik Giesa, Katherine Brocklehurst, Doug Wylie, Bengt Gregory-Brown
Jul 12, 2017ICS Cyber Security in The Real-World: Demonstrating Threat Detection and Mitigation In Industrial Networks IndegyDana Tamir, Chris Grove
Jul 11, 2017The 2017 State of Industrial Control System Security-Part 1: Personnel, Threats and ToolsGreat Bay Software

Nozomi Networks

PAS

Tempered Networks

Tripwire, Inc.
Ty Powers, Edgard Capdevielle, Doug Wylie, Bengt Gregory-Brown
Jul 11, 2017Five Lessons Learned from Petya and WannaCryVeracodeJake Williams, Chris Wysopal
Jul 7, 2017CRASHOVERIDE - Detecting and Mitigating the Electric Grid Targeted MalwareDan Gunter, Robert M. Lee, Mike Assante
Jul 6, 2017IPv6 and Open Source IDS, A SANS Technology Institute Masters Degree PresentationJon Mark Allen
Jul 6, 2017 A glimpse of the NEW FOR585 Advanced Smartphone CourseHeather Mahalik
Jun 29, 2017Putting Digital Threat Investigation and Response into HyperdriveRiskIQBeckie Neumann, Dave Shackleford
Jun 29, 2017Using Endpoint Security Innovation and Next-Gen Capabilities to Counter Endpoint Threats At-ScaleCounterTackRaj Dodhiawala, John Pescatore
Jun 29, 2017Complying with Data Protection Law in a Changing WorldForcepoint LLCNeil Thacker, Benjamin Wright
Jun 28, 2017Effortless Detection and Investigation of Cloud Breaches: A Review of Lacework's Zero Touch Cloud Workload Security PlatformLaceworkSanjay Kalra, Matt Bromiley
Jun 28, 2017Securing Critical Infrastructure Organizations against the Next Cyber Breach: Best Practices for organizations leveraging Managed ServicesLeidos

RSA
Jim Hollar, Gib Sorebo
Jun 27, 2017New Threat Vectors for ICS/SCADA Networks -- and How to Prepare for ThemCyberXPhil Neray, Mike Assante
Jun 27, 2017Managing Your Top 5 Human RisksLance Spitzner
Jun 22, 2017Efficiently Contain Threats and Ease Operations with Security OrchestrationInfoBloxSrikrupa Srivatsan, Andrew Hay
Jun 20, 2017Live Demonstration: Automating Enterprise Security ResponseServiceNowAlex Cox, Piero DePaoli, John Strand
Jun 16, 2017SANS Finance Briefing: Practical Threat Modeling for Financial OrganizationsForcepoint LLC

RecordedFuture
Jun 15, 2017Catch Me if You can - Pentesting vs APTCybereasonMor Levi
Jun 14, 2017Intrusion Detection Through Relationship Analysis, A SANS Technology Institute Masters Degree PresentationPatrick Neise
Jun 14, 2017SANS 2017 Incident Response Survey ResultsPart 2: Threat Intelligence and Improving Incident Response CapabilitiesAlienVault

Anomali

Guidance Software

IBM

LogRhythm

McAfee
Matt Bromiley, Anthony Di Bello, George Mina, Travis Farral
Jun 13, 2017PKI Cartels: The Value of Trust, A SANS Technology Institute Masters Degree PresentationSandy Dunn
Jun 13, 2017SANS 2017 Incident Response Survey ResultsPart 1: Attack, Response and MaturityAlienVault

Anomali

Guidance Software

IBM

LogRhythm

McAfee
Danielle Russell, Matt Bromiley, Riana Smalberger, James Carder
Jun 12, 2017You Have 24 Hours to Comply: Lessons Learned from Implementing a Behavioral Ransomware Detection FrameworkMark Mager
Jun 9, 2017What's New in the FOR610: Reverse-Engineering Malware Analysis Course in 2017?Lenny Zeltser
Jun 9, 2017SecOps principles to close gaps in Vulnerability ManagementFlexera SoftwareKen Hilker, John Pescatore
Jun 9, 2017A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint ProtectionCrowdStrikePeter Ingebrigtsen, Dave Shackleford
Jun 8, 2017What Works in Situational Awareness and Visibility: Reducing Time to Detect and Enhancing Business Outcomes with SplunkSplunkRyan Niemes, John Pescatore
Jun 7, 2017Evaluation Criteria for ICS Cyber Security Monitoring with Rockwell Automation and ClarotyClaroty

Rockwell Automation
Umair Masud, Patrick McBride
Jun 7, 2017 Fighting Account Takeover - Change The Battle and WinPerimeterXIdo Safruti
Jun 7, 2017Tackling Mobile Security with CiscoCisco SystemsBeth Barach
Jun 7, 2017Critical Security Controls for Home Networks, A SANS Technology Institute Masters Degree PresentationGlen Roberts
Jun 6, 2017Pin the Key on the App... and Other Transport Security FunMark Geeslin
Jun 6, 2017Elevating Your Analysis Tactics: The New Forensics Poster Philip Hagen
Jun 2, 2017FROM DETECTION TO RESPONSE, SOC 2.0 - 2017 State of Security Operations and What's Being Done!SiemplifyMiguel Carrero, Meny Har
May 31, 2017Using Dynamic Scanning to Secure Web Apps in Development and After DeploymentVeracodeChris Kirsch, Barbara Filkins
May 31, 2017Vulnerability Management LifecycleDavid R. Miller
May 31, 2017SANS Asia-Pacific Webcast Series- Powercat has Power: A PowerShell Implementation of NetcatMick Douglas
May 30, 20172017 SANS Security Awareness ReportThe Kogod Cybersecurity Governance Center (KCGC), Lance Spitzner
May 26, 2017Building Effective CTI Sharing for Network DefenseScott J. Roberts
May 26, 2017Defending the ICS Ahead of the Patch: WannaCry Lessons Learned Joe Slowik, Mike Assante, Ben Miller
May 25, 2017The Role of Vulnerability Scanning in Web App SecurityNetsparkerFerruh Mavituna, Barbara Filkins
May 25, 2017The New Reality: Centralizing Security when Your Network is DecentralizingForcepoint LLCDave Shackleford, Michael Knapp
May 24, 2017The Road to Increased Asset Visibility: Building an Effective ICS Security StrategyLeidosAruna Sreeram, Eric Cornelius
May 24, 2017Choosing the Right Path to Application SecurityVeracodeAdam Shostack, Chris Wysopal
May 24, 2017Fighting Fileless MalwareCybereasonSanat Chugh
May 23, 2017Network Security Infrastructure and Best Practices: A SANS SurveyNETSCOUT Systems, Inc.Matt Bromiley, John Pescatore, Barbara Filkins, Ann Sun
May 23, 2017The Power of Bro - and why you should include it in your security infrastructureCorelight Seth Hall, Matt Bromiley
May 19, 2017Prelude to Beats & Bytes: Striking the Right Chord in Digital ForensicsRyan Pittman, Matt Linton, Cindy Murphy
May 18, 2017Lingering Exploits Related to WannaCry Ransomware?Jake Williams, Gil Barak, Benjamin Wright
May 18, 2017Future SOCs: Results of the 2017 SANS Survey on Security Operations Centers, Part 2 Carbon Black

Endgame

LogRhythm

NETSCOUT Systems, Inc.

ThreatConnect

Tripwire, Inc.
Christopher Crowley, Braden Preston, Jim Wachhaus , Ksenia Coffman
May 18, 2017Threat Hunting for the MassesFrank McClain
May 17, 2017SOCs Grow Up to Protect, Defend, Respond: Results of the 2017 SANS Survey on Security Operations Centers, Part 1Carbon Black

Endgame

LogRhythm

NETSCOUT Systems, Inc.

ThreatConnect

Tripwire, Inc.
Alex Valdivia, Christopher Crowley, John Markott, James Carder
May 16, 2017Latest on WannaCry RansomwareRenato Marinho, Jake Williams, Benjamin Wright
May 15, 2017Elevating the Fraud in Point of Sale (PoS) to Another LevelThiago Bordini
May 13, 2017Special Webcast: WannaCry Ransomeware Threat - What we know so farJake Williams
May 11, 2017Prevent DNS Based Data Exfiltration and Disrupt Cyber Kill ChainInfoBloxSrikrupa Srivatsan, Andrew Hay
May 11, 2017www.google.com/search?q=what+does+this+all+mean?Phill Moore
May 10, 2017How to Conquer Targeted Email Threats: SANS Review of Agari Enterprise ProtectAGARIVidur Apparao, Dave Shackleford
May 10, 2017IIOT and Megacities 2025Andy Bochman, Mike Assante
May 9, 2017The Promise and Pitfalls of Security Testing TodayWhiteHat SecuritySetu Kulkarni, Mark Geeslin
May 9, 2017SANS Best of Awards Drilldown: Endpoint Detection and ResponseCarbon BlackJohn Pescatore, Justin Falck
May 5, 2017Obfuscated No More: Practical Steps for Defeating Android ObfuscationJoshua Wright
May 4, 2017Deploying DNSSEC at ScaleCloudFlareDani Grant, Matt Bromiley
May 3, 2017Improvements to Critical Control 12Steve Jaworski
May 2, 2017Taming and Securing the Internet of Things Infestation in Your EnterpriseGreat Bay SoftwareTy Powers, John Pescatore
May 2, 2017Deception Matters: Slowing the Adversary with illusive networksIllusive NetworksChad Gasaway, Eric Cole
May 1, 2017Speeding Up Triage and Incident Response By Speaking to MalwareTodd O'Boyle
Apr 28, 2017Establishing a Security Ambassador ProgramJohn Haren, Cassie Clark, Lance Spitzner
Apr 27, 2017Reducing Attacks and Improving Resiliency: The SANS 2017 Threat Hunting Survey Results | Part 2Anomali

DomainTools

Malwarebytes

Rapid7 Inc.

Sqrrl Data, Inc.

ThreatConnect
Robert M. Lee, Toni Gidwani, Mike Scutt, Dana Torgersen
Apr 27, 2017Attack Attribution: Its ComplicatedCybereasonRoss Rustici, Jake Williams
Apr 26, 2017WikiLeaks' Release of CIA Hacking Tools: What Security Professionals Need to KnowCarbon BlackRick McElroy, Jake Williams
Apr 26, 2017Threat Hunting-Modernizing Detection Operations: The SANS 2017 Threat Hunting Survey Results | Part 1Anomali

DomainTools

Malwarebytes

Rapid7 Inc.

Sqrrl Data, Inc.

ThreatConnect
Zach Hill, Travis Farral, Rob Lee, Ely Kahn
Apr 26, 2017Phoning it in: Heather talks about smartphone forensicsHeather Mahalik
Apr 21, 2017NoSQL Doesnt Make you NoVulnerableJohannes Ullrich
Apr 21, 2017Hiding in Plain Sight: When Malware Abuses Legitimate Services for CommunicationsCisco SystemsJosh Reynolds
Apr 20, 2017Impact of Isolated Cyber Security Functions: A SANS SurveyThreatConnectWade Baker, G.W. Ray Davidson, PhD
Apr 20, 2017Using the Power of Artificial Intelligence to Minimize Your Cybersecurity Attack SurfaceSparkCognition Inc.Bryan Lares, John Pescatore
Apr 19, 2017Real Steps to Build a Threat Intelligence FrameworkRecordedFutureChris Pace, Dave Shackleford
Apr 18, 2017Ready, Aim, Protect With Total Endpoint ProtectionSentinelOneEran Ashkenazi, G.W. Ray Davidson, PhD
Apr 18, 2017Influencing and Effectively Communicating to CEOs and Boards of DirectorsAGARIJohn Pescatore, Alan Paller
Apr 18, 2017Exploring the Unknown ICS Threat LandscapeDragos, Inc.Robert M. Lee, Ben Miller, Michael Assante
Apr 17, 2017AFF4: The New Standard in Forensic Image Format, and Why You Should CareDr. Bradley Schatz
Apr 13, 2017Preventing an IT Security Epidemic - Cybersecurity for Connected HealthcarePwnie ExpressAaron Turner, Tony Sager
Apr 13, 2017SANS Asia-Pacific Webcast Series- How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...Bryce Galbraith
Apr 11, 2017Learn how to protect your infrastructure against the widest range of DNS attacksInfoBloxCricket Liu, John Pescatore, Sam Kumarsamy
Apr 7, 2017Mobile App Security Trends and TechniquesGregory Leonard
Apr 7, 2017NEW SANS DFIR Cheat Sheet: A Guide to Eric Zimmerman's command line toolsEric Zimmerman
Apr 6, 2017How to Achieve Visibility, Security and Integrity for Forward Looking ResilienceUpGuard IncAndy Steigleder
Apr 6, 2017 Struts-Shock: Current Attacks against Struts2 and How to Defend Against ThemVeracodeJonathan Mandell, Johannes Ullrich
Apr 5, 2017Six stages of an attack: The Art of DetectionCybereasonRichard Harlan, Matt Bromiley
Apr 4, 2017Increasing Software Security Up and Down the Supply ChainVeracodeJohn Pescatore, Steve Lipner, John Martin, Chris Wysopal
Mar 29, 2017Forensic State Analysis: A New Approach to Threat HuntingInfocyteChris Gerritz, Alissa Torres
Mar 29, 2017SOC in the Cloud: A review of Arctic Wolf SOC ServicesArctic Wolf NetworksSridhar Karnam, Sonny Sarai
Mar 28, 2017Best practices for securing, analyzing, and mitigating threats to your AWS applicationsGigamon

RSA
Sesh Sayani, Mike Janik, Scott Ward
Mar 28, 2017ICS Hacking ExposedCyberXPhil Neray, Clint Bodungen
Mar 24, 2017A Case Study: Exploring Potential Attack Methods and Sophisticated Security Defenses for the World's Power PlantsClarotyPatrick McBride
Mar 24, 2017FISMA Compliance for Containerized AppsRed HatJason Callaway
Mar 23, 2017Threat Hunting 102: Beyond the Basics, Maturing Your Threat Hunting ProgramCybereasonBrad Mecha, Dave Shackleford
Mar 23, 2017MobileIron Security Labs: Combatting the Current State of Mobile Enterprise SecurityMobileIronJames Plouffe
Mar 23, 2017Profiling Online Personas: Are We Sharing Too Much?Lance Spitzner, Micah Hoffman
Mar 22, 2017Changing the Game in Public Cloud SecurityPalo Alto NetworksErik Yunghans, Scott Simkin, Dave Shackleford
Mar 21, 2017Threat Hunting with Indicators: Not for Prevention AnymorePhilip Hagen
Mar 21, 20172017 Cybersecurity Trends: Aiming Ahead of the Target to Increase SecurityQualysChris Carlson, John Pescatore
Mar 17, 2017Breaking Red - Understanding Threats through Red TeamingJames Tubberville, Joe Vest
Mar 17, 2017Protecting Business Mobility Against Emerging ThreatsInfoBloxPrakash Nagpal, John Pescatore
Mar 16, 2017I Don't Give One IoTA: Introducing the Internet of Things Attack MethodologyLarry Pesce
Mar 16, 2017Cyber Threat Intelligence in Action-Effectiveness of CTI Programs and Wish Lists for the Future: Results of the 2017 Cyber Threat Intelligence Survey Part 2Anomali

Arbor Networks

DomainTools

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.

ThreatConnect
Travis Farral, Rebekah Brown, Dave Shackleford, Allan Thomson
Mar 15, 2017Cyber Threat Intelligence in Action-Skills and Implementations: Results of the 2017 Cyber Threat Intelligence Survey Part 1Anomali

Arbor Networks

DomainTools

Lookingglass Cyber Solutions, Inc.

Rapid7 Inc.

ThreatConnect
Zach Hill, Robert Simmons, Paul Bowen, Dave Shackleford
Mar 15, 2017Going Past the Wire: Leveraging Social Engineering in Physical Security AssessmentsStephanie Carruthers
Mar 14, 2017How the new Preemptive Incident Response methodology can slash end-to-end IR time for SOC teams to minutes and solve alert fatigueSECDOGil Barak, John Pescatore
Mar 14, 2017Ransomware Remedies: Decoding and Dealing with Ransomware's Problematic BehaviorsCybereasonCortez Lake, Jessica Stanford, Alissa Torres
Mar 14, 2017Cybersecuring DoD ICS SystemsMichael Chipley
Mar 13, 2017The Impacts of JSON on Reversing Your FirmwareBen Gardiner
Mar 10, 2017The life and death of SHA-1Jake Williams
Mar 8, 2017Complying with the General Data Protection Regulation: A Guide for Security PractitionersSkybox Security, Inc.Kevin Flynn, Benjamin Wright
Mar 7, 2017What's new on the FOR572 Horizon Stockholm and BeyondPhilip Hagen
Mar 1, 2017Real DevSecOps for the Security PractitionerCloudPassageJenks Gibbons
Mar 1, 2017Next-Gen Endpoints Risks and Protections: A SANS Survey Part 2: Next-Gen Protection and ResponseCarbon Black

Great Bay Software

Guidance Software

IBM

Malwarebytes

Sophos Inc.
Matt Cooke, G.W. Ray Davidson, PhD, Mark Hafner, Stacia Tympanick
Feb 28, 2017Next-Gen Endpoints Risks and Protections: A SANS Survey Part 1: New Devices and RisksCarbon Black

Great Bay Software

Guidance Software

IBM

Malwarebytes

Sophos Inc.
G.W. Ray Davidson, PhD, Nick Charpentier, Anthony Di Bello, Dana Torgersen
Feb 28, 2017Reimagine Your Identity StrategyRSAChris Wraight, Jim Ducharme
Feb 27, 2017Malware Wants your Memory: Here's Why and How to Protect itAlissa Torres, Lance Spitzner
Feb 24, 2017Continuous Integration: Static Analysis with Visual Studio & RoslynEric Johnson
Feb 23, 2017The Problems with the Dark Web: From Crime to Complicated CrawlingTerbium LabsAlex Viana, Emily Wilson
Feb 22, 2017Application White-listing through Bit9 aka Parity aka Carbon Black Protect - A Masters Candidate WebcastMichael Weeks
Feb 21, 2017So What's It Mean To Hack a CarMatthew Carpenter
Feb 17, 2017Analyzing the Enhanced Analysis of GRIZZLY STEPPE ReportRobert M. Lee
Feb 10, 2017Operation Escalation: How Attackers Use Adware to Sell Corporate AssetsCybereasonIsrael Barak, G. Mark Hardy
Feb 9, 2017The Cost and Consequences of Security Complexity: New Ponemon Institute Research Identifies 8 Best PracticesMobileIronOjas Rege, Dr. Larry Ponemon
Feb 9, 2017Tools and Techniques for Assessing Android MalwareChristopher Crowley
Feb 8, 2017Go Beyond Incident Response: The Benefits of a Complete Incident Management PlatformD3 Security

Chertoff Group
Fraser Retallack, Bob Day, Jim Pflaging, Chris Crowley
Feb 8, 2017Beyond Feeds: A Deep Dive Into Threat Intelligence SourcesRecordedFutureChris Pace, Dave Shackleford
Feb 7, 2017Elevators as Security Risks... What Goes Up May Let You DownDeviant Ollam
Feb 3, 2017Cross Origin Resource Sharing: Using CORS to secure AJAXClay Risenhoover
Feb 1, 2017Digital Ghost: Turning the Tables on Cyber Attacks in Industrial SystemsGERobert Garry, Michael Assante
Jan 31, 20173 Cs of Security Awareness Lance Spitzner
Jan 31, 2017Automating Information SecurityMark Baggett
Jan 26, 2017Mimecast Targeted Threat ProtectionMimecastMatthew Gardiner, Jerry Shenk
Jan 26, 2017Dont get marooned on Analytic IslandsBAE Systems Applied IntelligenceMark Watkinson
Jan 25, 2017Stop Threats in their Tracks- An Introduction to Advanced Malware ProtectionCisco SystemsBrian McMahon, Tom Stitt
Jan 25, 2017Implementing and Maintaining a DevSecOps Approach in the Cloud - Tips, tricks, operational and security best practices Sumo LogicMark Bloom, George Gerchow
Jan 25, 2017Introducing the NEW SANS Pen Test Poster - White Board of Awesome Command Line Kung-FuEd Skoudis
Jan 24, 20172017 Cloud Security and Risk BenchmarksSkyHigh NetworksBrandon Cook, John Pescatore
Jan 24, 2017Next generation analysts for next generation threats - lessons from deploying best practices to hundreds of SOC teams!SiemplifyMeny Har, John Pescatore
Jan 23, 2017 Practical Application of Threat Intel for Network DefendersDomainToolsDave Shackleford, Tim Helming
Jan 20, 2017Attacks on Databases: When NoSQL became NoDatabaseMatt Bromiley
Jan 19, 2017Packets Dont Lie: Whats Really Happening on Your Network?LogRhythmRob McCovern, Dave Shackleford
Jan 18, 2017Hunting with Cyber Deception and Incident Response AutomationCymmetria Gadi Evron
Jan 17, 2017Enhanced Application Security for the Financial IndustrySynopsysMike Ware, Steve Kosten
Jan 13, 2017Using Cisco Stealthwatch to Increase Security By Enhancing Critical Security Control PerformanceCisco SystemsJamison Budacki, John Pescatore
Jan 12, 2017How To Use Your Network To Fend Off The Latest Cyber ThreatsNETSCOUT Systems, Inc.Arabella Hallawell, Paul Bowen, John Pescatore, Ann Sun
Jan 12, 2017Packet Capture + Flow Analytics = Holistic Network VisibilityCisco SystemsBrian Ford
Jan 10, 2017Taking Control of Your Application SecurityLance Spitzner, Eric Johnson
Jan 10, 2017 Hello Friend: Creating a Threat Intelligence CapabilityScott Roberts, Rebekah Brown
Jan 6, 2017Analyzing the DHS/FBI's GRIZZLY STEPPE ReportRobert M. Lee

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.