101. | #ShareTheMicInCyber and SANS: From Speaking Opportunities to Faculty Positions | 1:00:21 | |
|
102. | Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk | 1:00:19 | |
|
103. | Behind The Scenes Of Law Enforcement And Private Industry Cooperation | STAR Webcawst | 1:00:18 | |
|
104. | CISSP Cram Session | 1:00:17 | |
|
105. | What Your Privacy Officer Is Trying To Tell You...If only you would listen. | 1:00:14 | |
|
106. | To Click or Not to Click? | Host: Lodrina Cherne | October 3, 2023 | 1:00:11 | |
|
107. | Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk | 1:00:10 | |
|
108. | 2024 Cyber Defense Trends and Predictions | 1:00:10 | |
|
109. | The 20 Critical Security Controls: From Framework to Operational to Implementation | 1:00:09 | Guide |
|
110. | Waiting for a cyber range exercise is not enough | SANS@MIC Talk | 1:00:09 | |
|
111. | Shellcode Analysis 101 | SANS@MIC Talk | 1:00:09 | |
|
112. | The Value of Commercial Threat Intelligence Sources | STAR Webcast | 1:00:03 | Show |
|
113. | Rekt Casino Hack Assessment Operational Series – Putting It All Together Part 4 of 4 | 1:00:02 | |
|
114. | Cybersecurity Catalysts: The Difference Makers | Host: Rob T. Lee | 59:59 | |
|
115. | How to Present Cyber Security Risk to Senior Leadership | SANS Webcast | 59:58 | Guide |
|
116. | Strategies of a World-Class SOC | Host: John Hubbard | July 18, 2023 | 59:55 | |
|
117. | Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat Hunting | 59:54 | Guide |
|
118. | Introduction to Programming Workshop - SANS Cyber Camp | 59:54 | Guide |
|
119. | Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them | 59:53 | |
|
120. | Ransomware and Healthcare: A Deadly Combination | 59:53 | |
|
121. | Introducing the Newly Updated SANS Training ICS515: ICS Visibility, Detection, and Response | 59:51 | Vlog |
|
122. | Securing Your Kids Online | 59:51 | |
|
123. | Cybersecurity Standards Scorecard: 2022 Edition | 59:51 | |
|
124. | Forward Together: Women in Cyber Leading Change | 59:38 | |
|
125. | Learning to Combat Ransomware | 59:37 | |
|
126. | Should Countries Ban Ransomware Payments? | Host: Ryan Chapman | July 25, 2023 | 59:36 | |
|
127. | SANS Webcast – Continuous Opportunity: DevOps & Security | 59:35 | |
|
128. | Ed’s Whacky Winter Wonder Holiday Bonanza | Host: Ed Skoudis | December 12, 2023 | 59:34 | |
|
129. | 2024 Ransomware Trends and Predictions | 59:30 | |
|
130. | 2024 Industrial Control Systems Trends and Predictions | 59:25 | |
|
131. | The New ICS418: Training OT Security Managers | REBROADCAST | 59:15 | |
|
132. | CryptOSINT | Host: Sadie Gauthier | September 5, 2023 | 59:09 | |
|
133. | Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis | August 29, 2023 | 59:09 | |
|
134. | Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene | 59:08 | |
|
135. | CVE-2022-26809 MS-RPC Vulnerability Analysis - SANS Institute | 59:05 | |
|
136. | Vulnerability Prioritization: Peeling Back the Layers | 59:03 | |
|
137. | You came with *that* plan? You're braver than I thought! | 59:02 | Guide |
|
138. | Application Security: Web Apps, APIs & Microservices | #Replay | 59:01 | |
|
139. | Part 2: Rekt Casino Hack - What?! There are Critical Security Controls We Should Follow? | 58:55 | |
|
140. | Introduction to AI and Leveraging it in Cybersecurity | 58:49 | |
|
141. | Promoting Your Path: From Engineer to CISO | 58:45 | Guide |
|
142. | What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 2023 | 58:43 | |
|
143. | What Keeps You Up At Night? | 58:42 | |
|
144. | Building Your Foundation: Getting Started in Digital Forensics | SANS@MIC Talk | 58:41 | |
|
145. | Technology is the Reasonable Accommodation | SANS Cyber Solutions Fest 2022 | 58:39 | Vlog |
|
146. | Identifying & Countering Cognitive Bias | 58:33 | Guide |
|
147. | Introduction to Security Architecture | 58:33 | |
|
148. | Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023 | 58:28 | |
|
149. | Becoming the Adversary: Creating a Defensive Lab to Understand the Offense | 58:27 | |
|
150. | C2 Matrix | SANS@MIC Talk | 58:27 | Guide |
|
151. | Cyber Security Expertise - Where Should You Begin? | 58:26 | |
|
152. | Making Order out of Chaos: How to Deal with Threat Group Names | STAR Webcast | 58:23 | Guide |
|
153. | The Secret to Vulnerability Management | 58:18 | Guide |
|
154. | Spooky RYUKy: The Return of UNC1878 | SANS STAR Webcast | 58:17 | Show |
|
155. | Part 2 - The Achilles Systems Hack Assessment Series: Revisiting Enterprise Controls | 58:15 | |
|
156. | Vulnerabilities and reports and metrics, oh my! | 58:15 | |
|
157. | SANS Threat Analysis Rundown (STAR) | Live Stream | 58:08 | |
|
158. | Your Cloud Security Journey: Key Trends, Capabilities, & Skills | 58:07 | |
|
159. | smbtimeline - An automated timeline for SMB Traffic | SANS@MIC Talk | 58:05 | |
|
160. | SANS Emergency Webcast: What you need to know about the SolarWinds Supply-Chain Attack | 58:01 | |
|
161. | Part 3: Rekt Casino Hack - Security Operations Center Ill-equipped and Unprepared | 57:56 | |
|
162. | Top 5 Most Common Security Culture Myths and Mistakes | Host: Lance Spitzner | June 27, 2023 | 57:52 | |
|
163. | Phase 2: Accelerate and Glide | 57:51 | |
|
164. | Applying the Science of Human Behavior to Cybersecurity | 57:50 | |
|
165. | Cleaning Up Our Cyber Hygiene | 57:45 | Guide |
|
166. | Understand Vulnerability Management Maturity with a Self-Assessment Tool | 57:39 | Guide |
|
167. | Incident Response in ICS in times of Lockdown | SANS@MIC Talk | 57:38 | |
|
168. | Cyber Security 101 for Human Resource Professionals | 57:38 | |
|
169. | The 14 Absolute Truths of Security | 57:30 | |
|
170. | The 14 Absolute Truths of Security | SANS@MIC Talk | 57:30 | |
|
171. | Panel: Hack Your Growth - #LevelUP | 57:24 | |
|
172. | SANS Threat Analysis Rundown | 57:21 | |
|
173. | SANS Institute | 57:14 | |
|
174. | Landing a Job: Resumes and the Application Process | 57:08 | |
|
175. | Self-Compiling Malware | SANS@MIC Talk | 57:04 | |
|
176. | SANS Webcast - Perimeter Security and Why it is Obsolete | 57:01 | Show |
|
177. | Information Security Misconceptions 2020 | SANS@MIC Talk | 56:58 | Guide |
|
178. | SANS Institute | 56:56 | |
|
179. | Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk | 56:56 | |
|
180. | Vulnerability Management: Is the Program Effective: Part 3 of 3 | 56:46 | Guide |
|
181. | Infosec Snake Wrangling: Intro to Python | 56:44 | Guide |
|
182. | Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk | 56:44 | |
|
183. | Introduction to Malware Analysis | 56:44 | |
|
184. | Cyber Wars: The Legal Force Awakens | 56:35 | Guide |
|
185. | Skill vs. Background: The Great Cyber Hiring Debate | July 11, 2023 | 56:31 | Discussion |
|
186. | Rule-Breakers Unite: Reimagining SANS HackFest | 56:28 | |
|
187. | In Hot Pursuit: Tracking Ransomware Actors | Ryan Chapman | Aug 22, 2023 | 56:24 | |
|
188. | SANS Threat Analysis Rundown (STAR) with Katie Nickels | August 2023 | 56:20 | |
|
189. | Panel | Your First Cyber Role: Aspiring Cybersecurity Professional to Employed | 56:11 | |
|
190. | Threat Hunting via DNS | SANS@MIC Talk | 56:04 | |
|
191. | Defending Lift and Shift Cloud Applications | SANS@MIC Talk | 56:03 | Guide |
|
192. | Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them | 56:02 | Guide |
|
193. | 10 Visibility Gaps Every CISO Must Fill | SANS@MIC Talk | 56:01 | |
|
194. | SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture | 55:49 | Show |
|
195. | How to Become a Cybersecurity Expert: Stories and Lessons from SANS’ Nik Alleyne | 55:43 | Guide |
|
196. | Using the Cloud to Provision Infrastructure with Software | SANS@MIC Talk | 55:33 | |
|
197. | How to work in ways that will make your boss take notice! | SANS Webcast | 55:27 | Guide |
|
198. | No SQL Injection in MongoDB Applications | SANS@MIC Talk | 55:25 | |
|
199. | ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation | 55:18 | |
|
200. | Cyber Leadership Analogies and Metaphors | 55:17 | Vlog |
|