40+ Cyber Security Courses at SANSFIRE in Washington DC! Save up to $350 thru 4/24.

Webcasts: Archive


Below you can find all webcasts that have already been presented in the past three years. You can view these webcasts and download the slides by logging into your SANS Portal Account or creating an Account. Once you have logged in, click the Register Now button on your webcast of choice to view the Webcast and download slides.

Archive Webcasts
Date (in UTC) Title Sponsor Speaker
Apr 19, 2019SANS Top New Attacks and Threat ReportAnomali

DomainTools

InfoBlox

Unisys

Veracode
John Pescatore
Apr 18, 2019New Year, Same Magecart: The Continuation of Web-based Supply Chain AttacksRiskIQYonathan Klijnsma, Dave Shackleford
Apr 18, 2019Resolved: How to protect your organization when your perimeter fails VMWare, IncTom Gillis, John Pescatore
Apr 17, 2019Simplifying Application Security with Software-Defined SecurityVMWare, IncMatt De Vincentis, Dave Shackleford
Apr 16, 2019Cryptojacking - What is it? Where is it? How to protect against it?Cisco SystemsBrandon Helms, Brian McMahon
Apr 11, 2019How to Automate Compliance Gaps for Public CloudLaceworkVikram Varakantam, John Pescatore
Apr 11, 2019How to Build a Security Visibility Strategy in the CloudAWS MarketplaceDave Shackleford, David Aiken
Apr 10, 2019Alert Investigations in the SOC - Building Your WorkflowJustin Henderson, John Hubbard
Apr 10, 2019Vulnerability Practices of Tomorrow: Part 2 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable

Veracode
Andrew Laman, David Hoelzer, Gaurav Banga, Nate Dyer
Apr 10, 2019Purple PowerShell: Current attack strategies & defensesErik Van Buggenhout
Apr 9, 2019Cloud Security and DevOps Automation: Keys for Modern Security SuccessEric Johnson
Apr 9, 2019Current State of Vulnerability Management: Part 1 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable

Veracode
Andrew Laman, David Hoelzer, RJ Gazarek, Michael Rosen
Apr 9, 2019Next-Gen Vulnerability Management: Clarity, Consistency, and CloudDavid Hazar
Apr 8, 2019The Cyber Kill Chain and MobileIron Threat DefenseMobileIronJames Saturnio, Ilya Geller
Apr 3, 2019The Foundation of Continuous Host MonitoringOpenText Inc.Matt Bromiley, JJ Cranford
Apr 2, 2019Vulnerability Management for the Enterprise and CloudJonathan Risto
Apr 2, 2019Building a Zero Trust Model in the Cloud with MicrosegmentationUnisysJohn Kindervag, Salvatore Sinno
Apr 2, 2019All Your Data Belongs to Us: How to Defend Against Credential StuffingJohannes Ullrich, PhD
Mar 29, 2019Defensible Security Architecture and Engineering Part 1: How to become an All-Round Defender - the Secret SauceIsmael Valenzuela, Justin Henderson
Mar 28, 2019Best Practices for Network Security ResilienceIxiaJon Oltsik, Keith Bromley
Mar 27, 2019Taming the Endpoint Chaos Within: A Review of Panda Security Adaptive Defense 360Panda SecurityJustin Henderson, James Manning
Mar 26, 2019Security Gets Smart with AI: A SANS SurveyCylanceG.W. Ray Davidson, PhD, Barbara Filkins, Bret Lenmark
Mar 25, 2019Playing Moneyball in CybersecurityUnisysMatt Soderlund
Mar 22, 2019Empowering Incident Response via AutomationCisco Systems Inc. Matt Bromiley
Mar 21, 2019Alternative Network Visibility Strategies for an Encrypted WorldCorelight Gregory Bell, Matt Bromiley
Mar 21, 2019What's Next in Automation Support: Part 2 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Emily Laufer, Nick Tausek
Mar 21, 20192018 Holiday Hack Challenge Winner Announcement and More!Ed Skoudis, Joshua Wright
Mar 20, 2019Osquery: A Modern Approach to CSIRT AnalyticsUptycsDave Shackleford, Milan Shah
Mar 20, 2019Hiding in Plain Sight: Dissecting Popular Evasive Malware TechniquesVMRay Jake Williams, Rohan Viegas, Tamas Boczan
Mar 19, 2019The State of Automation/Integration Practice: Part 1 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Dan Cole, Stan Engelbrecht, Darren Thomas
Mar 18, 2019Securing Your Endpoints with Carbon Black: A SANS Review of the CB Predictive Security Cloud PlatformCarbon BlackDave Shackleford, Tristan Morris
Mar 15, 2019How to Automate Compliance and Risk Management for Cloud WorkloadsAWS MarketplaceMatt Bromiley, David Aiken
Mar 14, 2019USBs Behaving Badly - How to Control USB Usage in Operational NetworksHoneywell International Sam Wilson, Matt Wiseman
Mar 13, 2019Overcoming Obstacles to Secure Multi-cloud AccessPulse SecureRajoo Nagar, John Pescatore
Mar 12, 2019Maximizing SOC Effectiveness and Efficiency with Integrated Operations and DefenseNETSCOUT Systems, Inc.John Pescatore, Arabella Hallawell
Mar 11, 2019 Purple Kerberos: Current attack strategies & defensesErik Van Buggenhout
Mar 7, 2019Investigating WMI AttacksChad Tilbury
Mar 6, 2019The State of Kubernetes SecurityAqua Security Inc. Liz Rice
Mar 5, 2019SOF-ELK(R): A Free, Scalable Analysis Platform for Forensic, Incident Response, and Security OperationsPhilip Hagen
Mar 1, 2019Taking SIEM to the Cloud: A SANS Review of Securonix Next-Gen SIEMSecuronixNitin Agale, Dave Shackleford
Feb 28, 2019NIST Recommendations for ICS & IIoT Security CyberXPhil Neray, Michael Powell, Jim McCarthy, Tim Zimmerman
Feb 27, 2019Improving Detection and Understanding the Adversary with Deception TechnologyTrapX SecurityMatt Bromiley, Ori Bach
Feb 26, 201972-Hours-to-Disclose Survival Guide: Accurate Scoping and Impact Assessment of BreachesExtraHopJohn Matthews, John Pescatore
Feb 22, 2019Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid ThemLenny Zeltser
Feb 21, 2019Leveraging MITRE ATT&CK and ATT&CK NavigatorErik Van Buggenhout
Feb 21, 2019Prioritizing Security Operations in the Cloud through the Lens of the NIST FrameworkAWS MarketplaceJohn Pescatore, David Aiken
Feb 20, 2019It's All About Scale! Succeeding in Enterprise DefenseAlissa Torres, Jeff McJunkin
Feb 20, 2019Identifying Emerging Threats with Security AnalyticsAlphaSOC, Inc.Chris McNab
Feb 19, 2019Modern AppSec Tools for Modern AppSec Problems: A Practical Introduction to the Next-Gen WAFThreatXKelly Brazil
Feb 18, 2019The SANS ICS Summit 2019 and What to ExpectTim Conway, Robert M. Lee, Michael Assante
Feb 14, 2019Dispelling GDPR Myths: Avoid the Compliance Trap, Make Real Security/Privacy GainsBrian Honan, John Pescatore, Gal Shpantzer, Mark Weatherford
Feb 13, 2019MITRE ATT&CK and Sigma AlertingJustin Henderson, John Hubbard
Feb 13, 2019Challenges we face, repeatedlyBTB SecurityDave Shackleford, Ron Schlecht, Jr.
Feb 12, 2019Offensive WMITim Medin
Feb 12, 2019Dealing with Remote Access to Critical ICS InfrastructureJustin Searle
Feb 8, 2019SANS Automation & Integration Security Briefing: SOARing to New Heights - Using Orchestration & Automation Tools in the Way They're IntendedSwimlane

DomainTools

Amazon Web Services, Inc.

Siemplify

Anitian

RedCanary

DF LABS SPA
Chris Crowley
Feb 7, 2019CTI Tools, Usage and a Look Ahead: Part 2 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Rebekah Brown, Jonathan Couch, Nicholas Hayden
Feb 5, 2019CTI Requirements and Inhibitors: Part 1 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

DomainTools

IntSights

RecordedFuture

ThreatQuotient
Robert M. Lee, Nick Hayes, Helen Johnson, Allan Liska
Jan 31, 2019Best Practices to Get You CloudFit- 12 AWS Best Practices for Cloud SecurityPalo Alto NetworksJohn Martinez, Matt Bromiley
Jan 30, 2019Game Changing Defensive Strategies for 2019Fidelis Cybersecurity Alissa Torres, Dr. Abdul Rahman, Tom Clare
Jan 24, 2019Remediating Threats by Bridging Islands of SecurityInfoBloxJohn Pescatore, Chintan Udeshi
Jan 23, 2019Enterprise Security with a Fluid PerimeterAruba NetworksMatt Bromiley, Larry Lunetta
Jan 23, 2019Network Visualizations: Understand what's happening faster and easier than ever!Mick Douglas
Jan 22, 2019Malicious or Negligent? How to Understand User Intent to Stop Data ExfiltrationObserveITBrad Green, John Pescatore
Jan 22, 2019The Hitchhikers Guide to Evidence SourcesNick Klein
Jan 17, 2019Using Data Science to Secure Cloud WorkloadsCylanceMikkel Hansen, Aaron Bryson
Jan 17, 2019Falcon and the MITRE ATT&CK Framework Better Together; Feature UpdateCrowdStrikeKen Warren
Jan 16, 2019Lessons learned after Hundreds of Breach InvestigationsCisco Systems Inc. Robert Reyes, Gerard Johansen, Jake Williams
Jan 16, 2019Breaking Bad Bots - The New #1 Threat and How to Stop ThemCequenceShreyans Mehta, Franklyn Jones
Jan 14, 2019Whats new with FOR526 Advanced Memory Forensics and Threat DetectionAlissa Torres
Jan 11, 201924/7 CTI: Operationalizing Cyber Threat IntelligenceXena Olsen
Jan 9, 2019Assumption of a breach: How a new notion can help protect your enterpriseTim Medin
Jan 8, 2019Defeating Attackers with Preventive SecurityVMWare, IncDave Shackleford, Alex Berger

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.