Last Day to Save $200! Choose from six courses offered in Northern Virginia- Alexandria

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Mar 20, 2019Osquery: A Modern Approach to CSIRT AnalyticsUptycsDave Shackleford, Milan Shah
Mar 20, 2019Hiding in Plain Sight: Dissecting Popular Evasive Malware TechniquesVMRay Jake Williams, Rohan Viegas, Tamas Boczan
Mar 19, 2019The State of Automation/Integration Practice: Part 1 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Dan Cole, Stan Engelbrecht, Darren Thomas
Mar 18, 2019Securing Your Endpoints with Carbon Black: A SANS Review of the CB Predictive Security Cloud PlatformCarbon BlackDave Shackleford, Tristan Morris
Mar 15, 2019How to Automate Compliance and Risk Management for Cloud WorkloadsAWS MarketplaceMatt Bromiley, David Aiken
Mar 14, 2019USBs Behaving Badly - How to Control USB Usage in Operational NetworksHoneywell International Sam Wilson, Matt Wiseman
Mar 13, 2019Overcoming Obstacles to Secure Multi-cloud AccessPulse SecureRajoo Nagar, John Pescatore
Mar 12, 2019Maximizing SOC Effectiveness and Efficiency with Integrated Operations and DefenseNETSCOUT Systems, Inc.John Pescatore, Arabella Hallawell
Mar 11, 2019 Purple Kerberos: Current attack strategies & defensesErik Van Buggenhout
Mar 7, 2019Investigating WMI AttacksChad Tilbury
Mar 6, 2019The State of Kubernetes SecurityAqua Security Inc. Liz Rice
Mar 5, 2019SOF-ELK(R): A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security OperationsPhilip Hagen
Mar 1, 2019Taking SIEM to the Cloud: A SANS Review of Securonix Next-Gen SIEMSecuronixNitin Agale, Dave Shackleford
Feb 28, 2019NIST Recommendations for ICS & IIoT Security CyberXPhil Neray, Michael Powell, Jim McCarthy, Tim Zimmerman
Feb 27, 2019Improving Detection and Understanding the Adversary with Deception TechnologyTrapX SecurityMatt Bromiley, Ori Bach
Feb 26, 201972-Hours-to-Disclose Survival Guide: Accurate Scoping and Impact Assessment of BreachesExtraHopJohn Matthews, John Pescatore
Feb 22, 2019Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid ThemLenny Zeltser
Feb 21, 2019Leveraging MITRE ATT&CK and ATT&CK NavigatorErik Van Buggenhout
Feb 21, 2019Prioritizing Security Operations in the Cloud through the Lens of the NIST FrameworkAWS MarketplaceJohn Pescatore, David Aiken
Feb 20, 2019It's All About Scale! Succeeding in Enterprise DefenseAlissa Torres, Jeff McJunkin
Feb 20, 2019Identifying Emerging Threats with Security AnalyticsAlphaSOC, Inc.Chris McNab
Feb 19, 2019Modern AppSec Tools for Modern AppSec Problems: A Practical Introduction to the Next-Gen WAFThreatXKelly Brazil
Feb 18, 2019The SANS ICS Summit 2019 and What to ExpectTim Conway, Robert M. Lee, Michael Assante
Feb 14, 2019Dispelling GDPR Myths: Avoid the Compliance Trap, Make Real Security/Privacy GainsBrian Honan, John Pescatore, Gal Shpantzer, Mark Weatherford
Feb 13, 2019MITRE ATT&CK and Sigma AlertingJustin Henderson, John Hubbard
Feb 13, 2019Challenges we face, repeatedlyBTB SecurityDave Shackleford, Ron Schlecht, Jr.
Feb 12, 2019Offensive WMITim Medin
Feb 12, 2019Dealing with Remote Access to Critical ICS InfrastructureJustin Searle
Feb 7, 2019CTI Tools, Usage and a Look Ahead: Part 2 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Rebekah Brown, Jonathan Couch, Nicholas Hayden
Feb 5, 2019CTI Requirements and Inhibitors: Part 1 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Robert M. Lee, Nick Hayes, Helen Johnson, Allan Liska
Jan 31, 2019Best Practices to Get You CloudFit- 12 AWS Best Practices for Cloud SecurityPalo Alto NetworksJohn Martinez, Matt Bromiley
Jan 30, 2019Game Changing Defensive Strategies for 2019Fidelis Cybersecurity Alissa Torres, Dr. Abdul Rahman, Tom Clare
Jan 24, 2019Remediating Threats by Bridging Islands of SecurityInfoBloxJohn Pescatore, Chintan Udeshi
Jan 23, 2019Enterprise Security with a Fluid PerimeterAruba NetworksMatt Bromiley, Larry Lunetta
Jan 23, 2019Network Visualizations: Understand what's happening faster and easier than ever!Mick Douglas
Jan 22, 2019Malicious or Negligent? How to Understand User Intent to Stop Data ExfiltrationObserveITBrad Green, John Pescatore
Jan 22, 2019The Hitchhikers Guide to Evidence SourcesNick Klein
Jan 17, 2019Using Data Science to Secure Cloud WorkloadsCylanceMikkel Hansen, Aaron Bryson
Jan 17, 2019Falcon and the MITRE ATT&CK Framework Better Together; Feature UpdateCrowdStrikeKen Warren
Jan 16, 2019Lessons learned after Hundreds of Breach InvestigationsCisco Systems Inc. Robert Reyes, Gerard Johansen, Jake Williams
Jan 16, 2019Breaking Bad Bots - The New #1 Threat and How to Stop ThemCequenceShreyans Mehta, Franklyn Jones
Jan 14, 2019Whats new with FOR526 Advanced Memory Forensics and Threat DetectionAlissa Torres
Jan 11, 201924/7 CTI: Operationalizing Cyber Threat IntelligenceXena Olsen
Jan 9, 2019Assumption of a breach: How a new notion can help protect your enterpriseTim Medin
Jan 8, 2019Defeating Attackers with Preventive SecurityVMWare, IncDave Shackleford, Alex Berger

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.