Be better armed to defend your environment with top-notch training in Chicago. Save $350 thru tomorrow!

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Jun 24, 2019Live from the Security Operations Summit: Rethinking the SOC for Long-Term Success & 2019 SANS SOC Survey PreviewJohn Hubbard, Chris Crowley
Jun 24, 2019Addressing Consumer Safety Concerns With Zero Trust SecurityUnisysChris Kloes
Jun 21, 2019Web App Testing 101 - Getting the Lay of the LandMike Saunders
Jun 20, 2019How To Increase MITRE ATT&CK Coverage with Network Traffic AnalysisExtraHopChris Crowley, John Smith
Jun 20, 2019Bolster your Cyber Terrain with Endpoint ForensicsFidelis Cybersecurity Alissa Torres, Justin Swisher
Jun 19, 2019Securing Microservices in Containerized EnvironmentsThreat StackTim Buntel, Jacob Williams
Jun 19, 2019Converging OT and IT Networks: Where and How to Evolve ICS for SecurityNozomi Networks

Radiflow

Yokogawa Corporation of America
Barbara Filkins, Doug Wylie, Ilan Barda, Camilo Gomez, Kim Legelis
Jun 19, 2019SANS FedRAMP Technology WorkshopAmazon Web Services, Inc.

IBM

Rackspace

CrowdStrike

Okta
John Pescatore
Jun 18, 2019Managing the Insider Threat: Why Visibility Is CriticalObserveITSai Chavali, John Pescatore
Jun 18, 2019Increasing Visibility with Ixia's Vision ONEIxiaSerge Borso, Taran Singh
Jun 14, 2019DDI data a Critical Enabler of SOAR InfoBloxSrikrupa Srivatsan, Dave Shackleford
Jun 14, 2019Five Keys for Successful Vulnerability ManagementJonathan Risto
Jun 13, 2019How to Build a Data Protection Strategy in AWSAWS MarketplaceDave Shackleford, David Aiken
Jun 12, 2019Using Zeek/Bro To Discover Network TTPs of MITRE ATT&CK​Corelight Richard Bejtlich, James Schweitzer
Jun 12, 2019SANS 2019 State of OT/ICS Cybersecurity SurveyCisco Systems Inc.

Forescout Technologies BV

Owl Cyber Defense

Nozomi Networks

Radiflow

Yokogawa Corporation of America
Jason Dely, Barbara Filkins, Doug Wylie
Jun 12, 2019Cybersecurity Frameworks for CISOsCisco Systems Inc. Frank Kim
Jun 11, 2019The 20 Critical Security Controls: From Framework to Operational to ImplementationRandy Marchany
Jun 10, 2019ICS Active Defense PrimerKai Thomsen
Jun 7, 2019SIEM as Alexa How Natural Language Processing Can Transform Your Cyber Security ExperienceEmpowDave Shackleford, Avi Chesla
Jun 6, 2019Missing Information About Security Misconfiguration? Explore this often-used vulnerability category through data from 1000+ pentestsCobalt Labs, Inc. c/o MindspaceJohn Pescatore, Joe Sechman
Jun 5, 2019Power up your Security Operations Centers human capital with the new SEC450 Part 2 - Blue Team FundamentalsFinding and training the right people!John Hubbard
Jun 5, 2019How SOC Superheroes WinUnisys

LogRhythm
Salvatore Sinno, Ismael Cervantes
Jun 4, 2019Lessons From the Front Lines of AppSec: Analysis of real-world attacks from 2019 and best practices for dealing with themThreatXChris Brazdziunas, Will Woodson
Jun 4, 2019The Future of Authentication: How Two Factor Authentication is Dying and Whats NextYubicoJohannes Ullrich, PhD
May 30, 2019Secure Kubernetes Application DeliveryAndrew Martin
May 29, 2019Fileless Malware FunHal Pomeranz
May 28, 2019Cloud Security Automation: Monitoring and OperationsFrank Kim
May 28, 2019Streamlining Your Security Process with Orchestration & AutomationRapid7 Inc.
May 24, 2019IoT vulnerability and security is the next frontierLee Reiber
May 24, 2019Defensible Security Architecture and Engineering Part 3: Protect your Lunch Money Keeping the Thieves at BayIsmael Valenzuela, Justin Henderson
May 23, 2019What Real-World Attacks Look Like and How to Stop Them in Their TracksNetwrixDave Shackleford, Brian Johnson
May 22, 2019Actionable IT/OT end point protection to: detect, contain, and respond to limit ICS cyber threatsVerveRon Brash
May 22, 2019SEC599: Defeating Advanced Adversaries Discover whats NEW in Purple Team.Latest course updates!Erik Van Buggenhout
May 21, 2019Passive Isn't Good Enough: Moving into Active EDRSentinelOneJustin Henderson, Migo Kedem
May 15, 2019Power up your Security Operations Center with the new SEC450 Part 1 - Blue Team Fundamentals: Creating an on-ramp for new defenders!John Hubbard
May 15, 2019Vetting Your Intel - Techniques and Tools for False Positive AnalysisDomainToolsRobert M. Lee, Tarik Saleh
May 15, 2019Web application defense Use headers to make pentesters job difficultJason Lam
May 14, 2019Hacking without Domain AdminTim Medin, Mike Saunders
May 13, 2019Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need.SentryoTim Conway, Michael Thompson, Bob Foley, Fayce Daira
May 9, 2019How to Secure a Modern Web Application in AWSAWS MarketplaceShaun McCullough, David Aiken
May 8, 2019Gaining a Decisive Advantage Through Terrain Based Cyber Defense Fidelis Cybersecurity Craig Harber, Rami Mizrahi
May 7, 2019The State of Cloud Security: Panel DiscussionExtraHop

Sysdig
Dave Shackleford, Jim Reavis, Pawan Shankar, Eric Thomas
May 7, 2019Terraforming Azure: not as difficult as planetsAWS Marketplace: Telos CorporationDavid Hazar
May 2, 2019Rethinking Your Global Security PlatformChronicle Matt Bromiley, Brandon Levene
May 2, 2019How Effective is Your WAF Protection? - Metrics & Key ConsiderationsThreatXChris Brazdziunas, Will Woodson
May 2, 2019From Seizure to Actionable Intelligence in 90 Minutes or LessKevin Ripa
May 1, 2019Sharing Alerts and Threat Intelligence with MISPJustin Henderson, John Hubbard
May 1, 2019The State of Cloud Security: Results of the SANS 2019 Cloud Security SurveyExtraHop

Sophos Inc.

Sysdig
Dave Shackleford, Jim Reavis
May 1, 2019A CISO's Perspective on Presenting OT Risk to the BoardCyberXIlan Abadi, Daniel Shugrue
Apr 30, 2019The Future of Phishing: Its all about your customersSegasecDave Shackleford, Elad Schulman
Apr 30, 2019What Are Fileless Attacks and How Can You Stop Them?Unisys
Apr 30, 2019Defensible Security Architecture and Engineering Part 2: Thinking Red, Acting Blue Mindset & ActionsIsmael Valenzuela, Justin Henderson
Apr 24, 2019Take Back Control of Your DNS Traffic Palo Alto NetworksDave Shackleford
Apr 24, 2019Why Your Vulnerability Management Strategy Is Not Working and What to Do About It Lookingglass Cyber Solutions, Inc.Brandon Helms, Eric Olson
Apr 23, 2019Delivering Infrastructure, Security and Operations as Code across Multi-cloud EnvironmentsPalo Alto NetworksVinay Venkataraghavan, Matt Bromiley
Apr 19, 2019SANS Top New Attacks and Threat ReportAnomali

DomainTools

InfoBlox

Unisys

Veracode
John Pescatore
Apr 18, 2019New Year, Same Magecart: The Continuation of Web-based Supply Chain AttacksRiskIQYonathan Klijnsma, Dave Shackleford
Apr 18, 2019Resolved: How to protect your organization when your perimeter fails VMWare, IncTom Gillis, John Pescatore
Apr 17, 2019Simplifying Application Security with Software-Defined SecurityVMWare, IncMatt De Vincentis, Dave Shackleford
Apr 16, 2019Cryptojacking - What is it? Where is it? How to protect against it?Cisco SystemsBrandon Helms, Brian McMahon
Apr 11, 2019How to Automate Compliance Gaps for Public CloudLaceworkVikram Varakantam, John Pescatore
Apr 11, 2019How to Build a Security Visibility Strategy in the CloudAWS MarketplaceDave Shackleford, David Aiken
Apr 10, 2019Alert Investigations in the SOC - Building Your WorkflowJustin Henderson, John Hubbard
Apr 10, 2019Vulnerability Practices of Tomorrow: Part 2 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable

Veracode
Andrew Laman, David Hoelzer, Gaurav Banga, Nate Dyer
Apr 10, 2019Purple PowerShell: Current attack strategies & defensesErik Van Buggenhout
Apr 9, 2019Cloud Security and DevOps Automation: Keys for Modern Security SuccessEric Johnson
Apr 9, 2019Current State of Vulnerability Management: Part 1 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable

Veracode
Andrew Laman, David Hoelzer, RJ Gazarek, Michael Rosen
Apr 9, 2019Next-Gen Vulnerability Management: Clarity, Consistency, and CloudDavid Hazar
Apr 8, 2019The Cyber Kill Chain and MobileIron Threat DefenseMobileIronJames Saturnio, Ilya Geller
Apr 3, 2019The Foundation of Continuous Host MonitoringOpen Text Inc.Matt Bromiley, JJ Cranford
Apr 2, 2019Vulnerability Management for the Enterprise and CloudJonathan Risto
Apr 2, 2019Building a Zero Trust Model in the Cloud with MicrosegmentationUnisysJohn Kindervag, Salvatore Sinno
Apr 2, 2019All Your Data Belongs to Us: How to Defend Against Credential StuffingJohannes Ullrich, PhD
Mar 29, 2019Defensible Security Architecture and Engineering Part 1: How to become an All-Round Defender - the Secret SauceIsmael Valenzuela, Justin Henderson
Mar 28, 2019Best Practices for Network Security ResilienceIxiaJon Oltsik, Keith Bromley
Mar 27, 2019Taming the Endpoint Chaos Within: A Review of Panda Security Adaptive Defense 360Panda SecurityJustin Henderson, James Manning
Mar 26, 2019Security Gets Smart with AI: A SANS SurveyCylanceG.W. Ray Davidson, PhD, Barbara Filkins, Bret Lenmark
Mar 25, 2019Playing Moneyball in CybersecurityUnisysMatt Soderlund
Mar 22, 2019Empowering Incident Response via AutomationCisco Systems Inc. Matt Bromiley
Mar 21, 2019Alternative Network Visibility Strategies for an Encrypted WorldCorelight Gregory Bell, Matt Bromiley
Mar 21, 2019What's Next in Automation Support: Part 2 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Emily Laufer, Nick Tausek
Mar 21, 20192018 Holiday Hack Challenge Winner Announcement and More!Ed Skoudis, Joshua Wright
Mar 20, 2019Osquery: A Modern Approach to CSIRT AnalyticsUptycsDave Shackleford, Milan Shah
Mar 20, 2019Hiding in Plain Sight: Dissecting Popular Evasive Malware TechniquesVMRay Jake Williams, Rohan Viegas, Tamas Boczan
Mar 19, 2019The State of Automation/Integration Practice: Part 1 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Dan Cole, Stan Engelbrecht, Darren Thomas
Mar 18, 2019Securing Your Endpoints with Carbon Black: A SANS Review of the CB Predictive Security Cloud PlatformCarbon BlackDave Shackleford, Tristan Morris
Mar 15, 2019How to Automate Compliance and Risk Management for Cloud WorkloadsAWS MarketplaceMatt Bromiley, David Aiken
Mar 14, 2019USBs Behaving Badly - How to Control USB Usage in Operational NetworksHoneywell International Sam Wilson, Matt Wiseman
Mar 13, 2019Overcoming Obstacles to Secure Multi-cloud AccessPulse SecureRajoo Nagar, John Pescatore
Mar 12, 2019Maximizing SOC Effectiveness and Efficiency with Integrated Operations and DefenseNETSCOUT Systems, Inc.John Pescatore, Arabella Hallawell
Mar 11, 2019 Purple Kerberos: Current attack strategies & defensesErik Van Buggenhout
Mar 7, 2019Investigating WMI AttacksChad Tilbury
Mar 6, 2019The State of Kubernetes SecurityAqua Security Inc. Liz Rice
Mar 5, 2019SOF-ELK(R): A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security OperationsPhilip Hagen
Mar 1, 2019Taking SIEM to the Cloud: A SANS Review of Securonix Next-Gen SIEMSecuronixNitin Agale, Dave Shackleford
Feb 28, 2019NIST Recommendations for ICS & IIoT Security CyberXPhil Neray, Michael Powell, Jim McCarthy, Tim Zimmerman
Feb 27, 2019Improving Detection and Understanding the Adversary with Deception TechnologyTrapX SecurityMatt Bromiley, Ori Bach
Feb 26, 201972-Hours-to-Disclose Survival Guide: Accurate Scoping and Impact Assessment of BreachesExtraHopJohn Matthews, John Pescatore
Feb 22, 2019Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid ThemLenny Zeltser
Feb 21, 2019Leveraging MITRE ATT&CK and ATT&CK NavigatorErik Van Buggenhout
Feb 21, 2019Prioritizing Security Operations in the Cloud through the Lens of the NIST FrameworkAWS MarketplaceJohn Pescatore, David Aiken
Feb 20, 2019It's All About Scale! Succeeding in Enterprise DefenseAlissa Torres, Jeff McJunkin
Feb 20, 2019Identifying Emerging Threats with Security AnalyticsAlphaSOC, Inc.Chris McNab
Feb 19, 2019Modern AppSec Tools for Modern AppSec Problems: A Practical Introduction to the Next-Gen WAFThreatXKelly Brazil
Feb 18, 2019The SANS ICS Summit 2019 and What to ExpectTim Conway, Robert M. Lee, Michael Assante
Feb 14, 2019Dispelling GDPR Myths: Avoid the Compliance Trap, Make Real Security/Privacy GainsBrian Honan, John Pescatore, Gal Shpantzer, Mark Weatherford
Feb 13, 2019MITRE ATT&CK and Sigma AlertingJustin Henderson, John Hubbard
Feb 13, 2019Challenges we face, repeatedlyBTB SecurityDave Shackleford, Ron Schlecht, Jr.
Feb 12, 2019Offensive WMITim Medin
Feb 12, 2019Dealing with Remote Access to Critical ICS InfrastructureJustin Searle
Feb 8, 2019SANS Automation & Integration Security Briefing: SOARing to New Heights - Using Orchestration & Automation Tools in the Way They're IntendedSwimlane

DomainTools

Amazon Web Services, Inc.

Siemplify

Anitian

RedCanary

DFLabs
Chris Crowley
Feb 7, 2019CTI Tools, Usage and a Look Ahead: Part 2 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Rebekah Brown, Jonathan Couch, Nicholas Hayden
Feb 5, 2019CTI Requirements and Inhibitors: Part 1 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Robert M. Lee, Nick Hayes, Helen Johnson, Allan Liska
Jan 31, 2019Best Practices to Get You CloudFit- 12 AWS Best Practices for Cloud SecurityPalo Alto NetworksJohn Martinez, Matt Bromiley
Jan 30, 2019Game Changing Defensive Strategies for 2019Fidelis Cybersecurity Alissa Torres, Dr. Abdul Rahman, Tom Clare
Jan 24, 2019Remediating Threats by Bridging Islands of SecurityInfoBloxJohn Pescatore, Chintan Udeshi
Jan 23, 2019Enterprise Security with a Fluid PerimeterAruba NetworksMatt Bromiley, Larry Lunetta
Jan 23, 2019Network Visualizations: Understand what's happening faster and easier than ever!Mick Douglas
Jan 22, 2019Malicious or Negligent? How to Understand User Intent to Stop Data ExfiltrationObserveITBrad Green, John Pescatore
Jan 22, 2019The Hitchhikers Guide to Evidence SourcesNick Klein
Jan 17, 2019Using Data Science to Secure Cloud WorkloadsCylanceMikkel Hansen, Aaron Bryson
Jan 17, 2019Falcon and the MITRE ATT&CK Framework Better Together; Feature UpdateCrowdStrikeKen Warren
Jan 16, 2019Lessons learned after Hundreds of Breach InvestigationsCisco Systems Inc. Robert Reyes, Gerard Johansen, Jake Williams
Jan 16, 2019Breaking Bad Bots - The New #1 Threat and How to Stop ThemCequenceShreyans Mehta, Franklyn Jones
Jan 14, 2019Whats new with FOR526 Advanced Memory Forensics and Threat DetectionAlissa Torres
Jan 11, 201924/7 CTI: Operationalizing Cyber Threat IntelligenceXena Olsen
Jan 9, 2019Assumption of a breach: How a new notion can help protect your enterpriseTim Medin
Jan 8, 2019Defeating Attackers with Preventive SecurityVMWare, IncDave Shackleford, Alex Berger

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.