Your organizations information is at risk. Learn how to protect it at SANS Minneapolis - August 12-17.

Webcasts: Upcoming

Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Jun 18, 2019Increasing Visibility with Ixia's Vision ONEIxiaSerge Borso, Taran Singh
Jun 18, 2019Managing the Insider Threat: Why Visibility Is CriticalObserveITSai Chavali, John Pescatore
Jun 19, 2019SANS FedRAMP Technology WorkshopAmazon Web Services, Inc.




John Pescatore
Jun 19, 2019Converging OT and IT Networks: Where and How to Evolve ICS for SecurityNozomi Networks


Yokogawa Corporation of America
Barbara Filkins, Doug Wylie, Ilan Barda, Camilo Gomez, Kim Legelis
Jun 19, 2019Securing Microservices in Containerized EnvironmentsThreat StackTim Buntel, Jacob Williams
Jun 20, 2019Bolster your Cyber Terrain with Endpoint ForensicsFidelis Cybersecurity Alissa Torres, Justin Swisher
Jun 20, 2019How To Increase MITRE ATT&CK Coverage with Network Traffic AnalysisExtraHopChris Crowley, John Smith
Jun 21, 2019Web App Testing 101 - Getting the Lay of the LandMike Saunders
Jun 24, 2019Addressing Consumer Safety Concerns With Zero Trust SecurityUnisysChris Kloes
Jun 24, 2019Live from the Security Operations Summit: Rethinking the SOC for Long-Term Success & 2019 SANS SOC Survey PreviewJohn Hubbard, Chris Crowley
Jun 25, 2019JumpStart Guide for Endpoint Security in AWSAWS MarketplaceDavid Hazar, Joe Vadakkan, David Aiken
Jun 25, 2019Building and Maturing Your Threat Hunt ProgramCisco SystemsDavid Szili
Jun 25, 2019Cloud Data ProtectionMark Geeslin
Jun 26, 2019Gaining Complete Visibility of Your Environment with Attack Surface MonitoringRapid7 Inc.Jon Hart, Tori Sitcawich
Jun 26, 2019Malicious Bots: How they became #1 New Threat and How to Stop ThemCequenceArif Husain
Jun 26, 2019Practical Approach to Vendor Risk Management & Data PrivacyNorman Levine
Jun 27, 2019Hitting the Silent Alarm on Banking Trojans VMRay Jacob Williams, Rohan Viegas, Tamas Boczan
Jun 27, 2019Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksForescout Technologies BVSandeep Lota, Dean Parsons
Jun 27, 2019Modernize Your Security Platform to Prepare for the Latest ThreatsIBMJohn Pescatore, Tom Obremski
Jun 28, 2019Why Traditional EDR Is Not Working--and What to Do About ItMcafee LLCJake Williams, Ismael Valenzuela
Jun 28, 2019Next-Gen Vulnerability Management: Clarity, Consistency, and CloudDavid Hazar
Jul 1, 2019Adversaries have goals too!
Jul 3, 2019Leading Change for CISOsLance Spitzner
Jul 9, 2019Simplify Your Office 365 MigrationValimail Sibrina Subedar
Jul 10, 2019Common and Best Practices for Security Operations Centers: Results of the 2019 SOC SurveyAnomali

BTB Security

CYBERBIT Commercial Solutions




Christopher Crowley, John Pescatore
Jul 10, 2019The Critical Security Controls and Some Recent Data Breaches
Jul 11, 2019Managed Security Services for OT Networks Simplifying Your OT Security JourneyRadiflowIlan Barda
Jul 11, 2019Common and Best Practices for Security Operations Centers: Panel DiscussionExtraHop


Christopher Crowley, John Pescatore, Jody Caldwell, Jeff Costlow, Steve Salinas
Jul 16, 2019Speaking the Language of the BoardUnisys
Jul 17, 2019You can rest easy when protecting REST APIsJason Lam
Jul 18, 2019SANS Oil & Gas Cybersecurity Vendor Briefing: Objective-based Security Drives Effective SolutionsJason Dely
Jul 18, 2019How to Build an Endpoint Security Strategy in AWSAWS MarketplaceThomas Banasik, David Aiken
Jul 31, 2019JumpStart Guide to Cloud-Based Firewalls in AWSAWS MarketplaceBrian Russell, Anthony Tanzi, David Aiken
Aug 1, 2019Integrated Incident Response: A SANS SurveyDFLabs



King & Union

Open Text Inc.

Matt Bromiley
Aug 2, 2019Integrated Incident Response: A Panel Discussion about the SANS 2019 IR SurveyDomainTools

Matt Bromiley
Aug 8, 2019Neighborhood Keeper: A Collaborative Initiative for Our ICS CommunityDragos, Inc.Robert M. Lee
Aug 8, 2019How to Protect Enterprise Systems with Cloud-Based FirewallsAWS MarketplaceKevin Garvey, David Aiken
Aug 13, 2019Visibility for Incident Response: A Review of Forescout 8.1Forescout Technologies BVDon Murdoch
Aug 14, 2019Stop Letting Security Fail. Identify the True ProblemEndgameIan McShane, Matt Bromiley
Aug 21, 2019Leveraging OSINT for Better DFIR InvestigationsJeff Lomas, Micah Hoffman
Aug 23, 201910 Visibility Gaps Every CISO Must FillRussell Eubanks
Sep 17, 2019Power up your Security Operations Center with the new SEC450 Part 1 - Blue Team FundamentalsCreating an on-ramp for new defenders!John Hubbard
Sep 27, 2019Vulnerability Management Vendor Briefing: Decreasing the Attack Surface with Effective Vulnerability ManagementMatt Bromiley
Oct 17, 2019Power up your Security Operations Centers human capital with the new SEC450 Part 2 - Blue Team FundamentalsFinding and training the right people!John Hubbard
Oct 22, 2019SANS 2019 Threat Hunting Survey: The Differing Needs of New and Experienced HuntersDomainTools


Rob Lee, Robert M. Lee
Oct 23, 2019Threat Hunting for New and Experienced Hunters: Panel Discussion of the SANS 2019 Threat Hunting SurveyDomainTools


Robert M. Lee, Rob Lee

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.