Gain Top-Notch InfoSec Skills at SANS Las Vegas 2018. Save $400 thru 12/6.

Webcasts: Upcoming


Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Nov 29, 2017Use Code Reuse to your Advantage: The Forgotten Component of your Incident Response PlanIntezerItai Tevet, Jake Williams
Nov 30, 2017The ROI of AppSec: Getting your Money's Worth from Your AppSec ProgramVeracodeJim Bird, Maria Loughlin, Ellen Nussbaum
Dec 4, 2017Secure DevOps Monitoring in the CloudBen Allen
Dec 5, 2017Bring the Fight to Them: Hunting down adversaries using OSQueryErik Van Buggenhout, Stephen Sims
Dec 5, 2017Next-Generation Antivirus (NGAV) Buyer's Guide: Successful Strategies for Choosing and Implementing NGAVCarbon BlackBarbara Filkins, Brian Gladstein
Dec 5, 2017Top Network Security Products Revealed in Latest TestsForcepoint LLCThomas Skybakmoen
Dec 6, 2017Business-Driven Network Security Policy ManagementAlgoSecEdy Almer
Dec 6, 2017Security and Ops HacksRapid7 Inc.Sonny Sarai
Dec 7, 2017Continuous Security Validation: How effective is your security?Forcepoint LLCAnil Nandigam
Dec 7, 2017Using Anti-Evasion to Block Stealth Attacks with Minerva LabsMinerva LabsLenny Zeltser, Eric Cole, PhD
Dec 8, 2017OWASP Top 10 2017: What You Need to KnowVeracodeDr. Johannes Ullrich, Chris Eng
Dec 8, 2017Driving Better Cybersecurity for Industrial Networks and Critical InfrastructureClarotyDan Desruisseaux, Patrick McBride
Dec 8, 2017Java on the server? What could possibly go wrong?Adrien de Beaupre, Jason Blanchard
Dec 12, 2017Pinpoint and Remediate Unknown Threats: SANS Review of EnCase Endpoint Security 6OpenText CorporationCharles Choe, Eric Cole
Dec 13, 2017Global Response and Industrial Defense (GRID) Certification - What ICS Defenders Need to KnowRobert M. Lee
Dec 13, 2017Stop All Imposter Threats Coming Into and Going Out of your OrganizationProofPointRyan Terry
Dec 13, 20172017 Trends and Strategies for Protecting Endpoints in Healthcare BarklyJustin Armstrong, Jack Danahy
Dec 14, 2017Who Owns ICS Security? Fusing IT, OT, & IIoT Security in the Corporate SOC. CyberXPhil Neray, Doug Wylie
Dec 15, 2017The Convergence of EPP and EDR: Tomorrows Solution TodayFireEyeDan Reis, John Pescatore
Jan 9, 2018Improving Your Defenses - CredentialGuard in Windows 10Erik Van Buggenhout, Stephen Sims
Jan 9, 2018Introducing the *NEW* SANS Pen Test Poster - Building A Better Pen Tester - BlueprintEd Skoudis, Jason Blanchard
Jan 18, 2018Use Case Development for Security OperationsChristopher Crowley
Jan 24, 2018In a Perfect WorldBuilding the Network Security Architecture for the FutureNETSCOUT Systems, Inc.Sonny Sarai, John Pescatore, Ann Sun
Jan 24, 2018Multi-path TCP: Practical Approaches for Securing your Enterprise NetworkJosh Lewis
Feb 6, 2018Cyber Threat Intelligence Today: SANS CTI Survey Results, Part 1Anomali

DomainTools

Intsights

Rapid7 Inc.

ThreatConnect
Dave Shackleford
Feb 7, 2018Cyber Threat Intelligence Skills and Usefulness: SANS CTI Survey Results, Part 2Anomali

DomainTools

Intsights

Rapid7 Inc.

ThreatConnect
Dave Shackleford
Feb 12, 2018Secure DevOps: Microservices and API SecurityGregory Leonard
Feb 13, 2018Improving Your Defenses - EMET & Window Defender Exploit GuardErik Van Buggenhout, Stephen Sims
Mar 12, 2018Secure DevOps: Encryption in the Cloud with KMSMark Geeslin

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.