One More Day to get a GIAC Cert Attempt Included or $350 Off with Online Training!

Webcasts: Upcoming


Upcoming Webcasts
Date (in UTC) Title Sponsor Speaker
Feb 19, 2019Modern AppSec Tools for Modern AppSec Problems: A Practical Introduction to the Next-Gen WAFThreatXKelly Brazil
Feb 20, 2019Identifying Emerging Threats with Security AnalyticsAlphaSOC, Inc.Chris McNab
Feb 20, 2019It's All About Scale! Succeeding in Enterprise DefenseAlissa Torres, Jeff McJunkin
Feb 21, 2019Prioritizing Security Operations in the Cloud through the Lens of the NIST FrameworkAWS MarketplaceJohn Pescatore, David Aiken
Feb 21, 2019Leveraging MITRE ATT&CK and ATT&CK NavigatorErik Van Buggenhout
Feb 22, 2019Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid ThemLenny Zeltser
Feb 26, 201972-Hours-to-Disclose Survival Guide: Accurate Scoping and Impact Assessment of BreachesExtraHopJohn Matthews, John Pescatore
Feb 27, 2019Improving Detection and Understanding the Adversary with Deception TechnologyTrapX SecurityMatt Bromiley, Ori Bach
Feb 28, 2019NIST Recommendations for ICS & IIoT Security CyberXPhil Neray, Michael Powell, Jim McCarthy, Tim Zimmerman
Mar 1, 2019Taking SIEM to the Cloud: A SANS Review of Securonix Next-Gen SIEMSecuronixNitin Agale, Dave Shackleford
Mar 5, 2019SOF-ELK(R): A Free, Scalable Analysis Platform for Forensic, incident Response, and Security OperationsPhilip Hagen
Mar 6, 2019The State of Kubernetes SecurityAqua Security Inc. Liz Rice, Michael Hausenblas
Mar 7, 2019Investigating WMI AttacksChad Tilbury
Mar 11, 2019 Purple Kerberos: Current attack strategies & defensesErik Van Buggenhout
Mar 12, 2019Maximizing SOC Effectiveness and Efficiency with Integrated Operations and DefenseNETSCOUT Systems, Inc.John Pescatore, Arabella Hallawell
Mar 13, 2019Software Defined Perimeter: Panacea for Multi-Cloud AccessPulse SecureRajoo Nagar
Mar 13, 2019Sharing Alerts and Threat Intelligence with MISPJustin Henderson, John Hubbard
Mar 14, 2019USBs Behaving Badly - How to Control USB Usage in Operational NetworksHoneywell International Sam Wilson, Matt Wiseman
Mar 15, 2019How to Automate Compliance and Risk Management for Cloud WorkloadsAWS MarketplaceMatt Bromiley, David Aiken
Mar 18, 2019Securing Your Endpoints with Carbon Black: A SANS Review of the CB Predictive Security Cloud PlatformCarbon BlackDave Shackleford, Tristan Morris
Mar 19, 2019The State of Automation/Integration Practice: Part 1 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Rapid7 Inc.

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Dan Cole, Stan Engelbrecht, Darren Thomas
Mar 21, 2019What's Next in Automation Support: Part 2 of the SANS Automation and Integration SurveyD3 Security

LogRhythm

Mcafee LLC

Rapid7 Inc.

Swimlane

ThreatConnect
Barbara Filkins, Matt Bromiley, Emily Laufer, Jadon Montero
Mar 26, 2019Security Gets Smart with AI: A SANS SurveyCylanceG.W. Ray Davidson, PhD, Stephen Salinas
Mar 27, 2019Taming the Endpoint Chaos Within: A Review of Panda Security Adaptive Defense 360Panda SecurityJustin Henderson, Rui Lopes
Mar 27, 2019Empowering Incident Response via AutomationCisco Systems Inc. Matt Bromiley
Mar 28, 2019Best Practices for Network Security ResilienceIxiaJon Oltsik, Keith Bromley
Mar 28, 2019Why Traditional EDR Is Not Working--and What to Do About ItMcafee LLCJake Williams, Ismael Valenzuela
Apr 3, 2019The Foundation of Continuous Host MonitoringOpenText Inc.Matt Bromiley
Apr 9, 2019Current State of Vulnerability Management: Part 1 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable Network Security

Veracode
Andrew Laman, David Hoelzer, Nate Dyer, RJ Gazarek
Apr 10, 2019Purple PowerShell: Current attack strategies & defensesErik Van Buggenhout
Apr 10, 2019Vulnerability Practices of Tomorrow: Part 2 of the SANS Vulnerability Management Survey ResultsBalbix

Bromium

Tenable Network Security

Veracode
Andrew Laman, David Hoelzer, Gaurav Banga
Apr 10, 2019Alert Investigations in the SOC - Building Your WorkflowJustin Henderson, John Hubbard
Apr 11, 2019How to Build a Security Visibility Strategy in the CloudAWS MarketplaceDave Shackleford, David Aiken
Apr 24, 2019Increasing Visibility with Ixias Vision ONE™IxiaSerge Borso, Taran Singh
May 1, 2019The State of Cloud Security: Results of the SANS 2019 Cloud Security SurveyExtraHop

Sysdig
Dave Shackleford, Jim Reavis
Jun 12, 2019SANS 2019 State of OT/ICS Cybersecurity SurveyRadiflow

Yokogawa Corporation of America
Barbara Filkins, Doug Wylie
Jul 10, 2019Common and Best Practices for Security Operations Centers: Results of the 2019 SOC SurveyAnomali

ExtraHop

ThreatConnect
Christopher Crowley, John Pescatore

Note to Vendors:If you are interested in sponsoring a future SANS Webcast, contact our vendor team today.