Save $400 on InfoSec Training at SANS New York City Summer 2018. Ends Tomorrow!

Webcasts: Upcoming


Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Jun 20, 2018What is Purple Team? Updates to SEC599Chris Gates, Erik Van Buggenhout, Stephen Sims
Jun 20, 2018LabMD: The Phony Data BreachMichael J. Daugherty, Benjamin Wright
Jun 20, 2018Sharpen Your Threat Hunting Capabilities with YARAVirusTotal Matt Bromiley, Evan Derheim, Victor Manuel Alvarez
Jun 21, 2018Three free Python apps to improve your defenses and response capabilitiesMark Baggett
Jun 21, 201810 Tips for Effective Modern Day Endpoint Protection SymantecJacob Williams, Adam Licata
Jun 26, 2018PCAP Command-Line MadnessHal Pomeranz
Jun 26, 20182018's Biggest Bugs and How to Beat ThemBugcrowdJohn Pescatore, Jason Haddix, Michael Blache
Jun 26, 2018Threat Intelligence Naming Conventions: Threat Actors, Activity Groups, and Other Ways of Tracking ThreatsRobert M. Lee
Jun 27, 2018High Fidelity Alerts: Context for your contextJustin Henderson
Jun 27, 2018EnCase Forensic 8: A SANS Analyst Program Review OpenText CorporationJake Williams, Harp Thukral
Jun 28, 2018Diffuse Cryptojacking & Ransomware Attacks with a SandboxFortinet, Inc.Damien Lim, Dave Shackleford
Jul 3, 2018Enterprise Discovery: I Still Havent Found What Im Looking ForTim Medin
Jul 10, 2018Best practices for Forensics and Incident Response in ContainersSysdig Knox Anderson, Jake Williams
Jul 10, 2018No tool fits all Why Building a solid Toolbox MattersHeather Mahalik
Jul 12, 2018Fundamentals of Security Operations Chris Crowley
Jul 17, 2018PowerShell for PenTestingMick Douglas
Jul 18, 2018Collecting OSINT: Grabbing Your Data Now to Use LaterMicah Hoffman, Josh Huff
Jul 18, 2018Managing vulnerabilities with the PIACT processJonathan Risto
Jul 18, 2018Enterprise Security with a Fluid PerimeterAruba NetworksMatt Bromiley
Jul 19, 2018The State of Industrial IoTAccenture

ForeScout Technologies

Indegy
Barbara Filkins, Doug Wylie, Bradford Hegrat, Michael Rothschild, Wayne Dixon
Jul 24, 2018High Fidelity Alerts: Alert vs Anomaly A sibling rivalryJustin Henderson, Tim Garcia
Jul 24, 2018Single-Agent Cyber Security Analytics: A SANS Review of the Cybereason PlatformCybereasonDave Shackleford, Israel Barak
Jul 25, 2018I Before R Except After IOCAndrew Hay
Jul 25, 2018All Your Network Traffic Are Belong to Us VPNFilter Malware and Implications for ICSCyberXPhil Neray, Doug Wylie, Tim Conway
Jul 26, 2018The Perimeter is Dead: Introducing SEC530: Defensible Security ArchitectureJustin Henderson, Eric Conrad
Jul 26, 2018Managing Cloud SecurityTenableDave Shackleford, Greg Mayfield
Jul 26, 2018Understanding the True Cost of Endpoint ManagementIBMTeresa Worth, Matt Bromiley
Jul 31, 2018How Visibility of the Attack Surface Minimizes RiskSkybox Security, Inc.Sean Keef, Dave Shackleford
Aug 13, 2018Continuous Security: Monitoring & Active Defense in the CloudEric Johnson
Aug 14, 2018World-Class Cyber Security OperationsCarson Zimmerman
Aug 14, 2018No Single Definition of a SOC: Part I of the SANS 2018 SOC Survey Results WebcastAuthentic8

Awake Security

CYBERBIT Commercial Solutions

DFLabs

ExtraHop

LogRhythm
Chris Brazdziunas, Christopher Crowley, Barbara G. Kay, John Pescatore, Richard Steinhart
Aug 16, 2018SOC Capabilities and Usefulness: Part II of the SANS SOC Survey Results WebcastAuthentic8

Awake Security

CYBERBIT Commercial Solutions

DFLabs

ExtraHop

LogRhythm
Edy Almer, Christopher Crowley, Gary Golomb, John Moran, John Pescatore
Aug 21, 2018Youre Probably Not Red Teaming (And Usually Im Not, Either)Deviant Ollam
Aug 22, 2018It's All About Your Assets: Inline Vulnerability and Event ManagementDavid Hazar
Aug 30, 2018Stronger Security with Inventory ManagementQualysMatt Bromiley, Pablo Quiroga
Sep 10, 2018What the CISO REALLY wants out of your SOCRussell Eubanks
Sep 12, 2018The Need for Speed: Integrated Threat ResponseLookingglass Cyber Solutions, Inc.Matt Bromiley, Allan Thomson
Sep 19, 2018Threat Hunting Is a Process, Not a Thing: SANS 2018 Survey Results, Part IAnomali

DomainTools

IBM

Malwarebytes

Qualys

RiskIQ
Rob Lee, Robert M. Lee, Dana Torgersen, Taylor Wilkes-Pierce
Sep 19, 2018Cloud Services - Look before you LeapDavid R. Miller
Sep 20, 2018Threat Hunting in Action: SANS 2018 Survey Results, Part IIAnomali

DomainTools

IBM

Malwarebytes

Qualys

RiskIQ
Rob Lee, Robert M. Lee, Sid Pearl, Benjamin Powell, Justin Swisher
Oct 31, 2018How Are You Responding to Threats? SANS 2018 Incident Response Survey Results Part ICoalfire Systems

Fidelis Cybersecurity

ForeScout Technologies

1E

OpenText Corporation

ThreatQuotient
Matt Bromiley, Jim Jaeger, Shelly Muse
Nov 1, 2018Improving the Incident Response Function: SANS 2018 Incident Response Survey Results Part IICoalfire Systems

Fidelis Cybersecurity

ForeScout Technologies

1E

OpenText Corporation

ThreatQuotient
Matt Bromiley
Nov 8, 2018Secure DevOps: Fact or Fiction? SANS Survey Looks at Reality, Part IAqua Security

Qualys

WhiteHat Security
Jim Bird, Barbara Filkins
Nov 9, 2018Secure DevOps: Fact or Fiction? SANS Survey Looks at Reality, Part IIAqua Security

Qualys

WhiteHat Security
Jim Bird, Barbara Filkins

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.