OnDemand & vLive - Get a GIAC Cert Attempt Included or $350 Off thru 10/31

Webcasts: Upcoming


Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Oct 22, 2018Consulting on The Side - How to consult while keeping your day jobTed Demopoulos
Oct 24, 2018SIEMterventionJustin Henderson
Oct 25, 2018Web Hacking with Burp Suite - Deep Dive into Burp Suite's Functionality for Pen TestersChris Dale
Oct 25, 2018Reinventing Prevention with Deep LearningDeep InstinctJake Williams, Mark Arapovic
Oct 25, 2018Building Your Zero Trust Security Strategy With Microsegmentation: Why Digital Businesses Need A Granular Software Defined Network Segmentation ApproachUnisysChase Cunningham, Jack Koons
Oct 26, 2018How to do Vulnerability Management for ContainersSysdig Apurva Dave, Dave Shackleford
Oct 30, 2018How Hackers Run Circles Around Our DefensesBryce Galbraith
Oct 30, 2018How to Conduct and Utilize Human Intelligence by Engaging Your Cyber AdversariesIntSightsItay Kozuch
Oct 30, 2018Windows Defender Exploit Guard for Windows 10Stephen Sims
Oct 31, 2018How Are You Responding to Threats? SANS 2018 Incident Response Survey Results Part ICoalfire Systems

Fidelis Cybersecurity

ForeScout Technologies

1E

OpenText Inc.

ThreatQuotient
Matt Bromiley, Jim Jaeger, Shelly Muse, Brennen Reynolds
Oct 31, 2018 How to Build Your Modern Email Fraud DefenseProofPointRyan Terry, David Hoelzer
Nov 1, 2018Improving the Incident Response Function: SANS 2018 Incident Response Survey Results Part IICoalfire Systems

Fidelis Cybersecurity

ForeScout Technologies

1E

OpenText Inc.

ThreatQuotient
Matt Bromiley, Andy Schmid, Mike Stewart, Ryan Trost
Nov 5, 2018Network Architecture with Security in MindGigamonMatt Bromiley, Sam Kumarsamy
Nov 5, 2018Cyber Threat Checklist: Are you prepared? Absolute Software Corp.Alissa Torres, Kevin Golas
Nov 6, 20188 Keys to a Defensible Network Architecture And How Zeek Can Help You Get ThereCorelight Richard Bejtlich, Matt Bromiley
Nov 6, 2018Prioritizing Log EnrichmentJustin Henderson, John Hubbard
Nov 7, 2018How to use Machine Learning to protect Cloud InfrastructureOracleSubbu Iyer, Chaitanya Yinti
Nov 7, 2018Operationalizing Zero Trust Model with Adaptive SecurityUnisysSalvatore Sinno, Franco Negri
Nov 7, 2018More Bad DataJustin Henderson, John Hubbard
Nov 8, 2018The Perimeter is gone. How can you protect your company and your corporate data?OPSWATYiyi Miao, Serge Borso
Nov 8, 2018Secure DevOps: Fact or Fiction? SANS Survey Looks at Reality, Part IAqua Security

CA Veracode .

Qualys

Rapid7 Inc.

Signal Sciences

WhiteHat Security
Jim Bird, Barbara Filkins, Dan Kuykendall, Zane Lackey, Rani Osnat
Nov 8, 2018Automation NationJustin Henderson, John Hubbard
Nov 9, 2018Secure DevOps: Fact or Fiction? SANS Survey Looks at Reality, Part IIAqua Security

CA Veracode .

Qualys

Rapid7 Inc.

Signal Sciences

WhiteHat Security
Jim Bird, Barbara Filkins, Colin Domoney
Nov 13, 2018Detection and response services in the ICS environment The management perspectiveSøren Egede Knudsen
Nov 14, 2018Introducing VirusTotal EnterpriseVirusTotal Evan Derheim
Nov 14, 2018Using a Collection Management Framework for ICS Security Operations and Incident ResponseDragos, Inc.Tim Conway, Robert M. Lee, Mark Stacey
Nov 16, 2018SANS Security Operations Briefing: Knowledge retention, Staff training, Automation and OperationalizationDFLabs

DomainTools

Protectwise

Symantec
Nov 21, 2018Zero Trust ArchitectureJustin Henderson
Nov 27, 2018Passwords and Authentication - Get Up to Speed on Attacks and DefensesChris Dale
Nov 29, 2018Finding the Human Side of MalwareIntezerOr Fridman, Matt Bromiley
Nov 29, 2018Threat Intelligence and Protecting Your Endpoints: A SANS Review of the CrowdStrike Falcon X PlatformCrowdStrikeDave Shackleford
Nov 30, 2018SANS Cyber Threat Intelligence Briefing 2018: Efficiency and Effectiveness Through Cyber Threat IntelligenceDomainTools

RecordedFuture

VirusTotal

ExtraHop
Dec 6, 2018An Evaluator's Guide to Next-Generation SIEMLogRhythmBarbara Filkins, Christopher Crowley, Sara Kingsley
Dec 6, 2018An Evaluator's Guide to Next-Generation SIEMLogRhythmBarbara Filkins, Christopher Crowley, Sara Kingsley
Dec 7, 2018Gearing up for 2019 -- Best Practices to ConsiderJohn Pescatore, John Strand, Jake Williams
Dec 11, 2018A Practical Introduction into How to Exploit Blind VulnerabilitiesChris Dale
Dec 12, 2018Efficient Alert Processing and Response: A SANS Review of SwimlaneSwimlaneAlissa Torres
Dec 13, 2018Tips and Tricks for Customers and Pen Testers on How to Get Higher Value Pen TestsChris Dale
Jan 23, 2019Enterprise Security with a Fluid PerimeterAruba NetworksMatt Bromiley
Feb 5, 2019CTI Requirements and Inhibitors: Part 1 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

IntSights

RecordedFuture
Robert M. Lee
Feb 7, 2019CTI Tools, Usage and a Look Ahead: Part 2 of the 2019 SANS Cyber Threat Intelligence SurveyAnomali

IntSights

RecordedFuture
Rebekah Brown
Mar 19, 2019The State of Automation/Integration Practice: Part 1 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

McAfee
Matt Bromiley, Barbara Filkins
Mar 21, 2019Whats Next in Automation Support: Part 2 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

McAfee
Barbara Filkins, Matt Bromiley

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.