2025-06-06 | Securing the Supply Chain with Christine Gadsby | 0:00 | 52 | |
|
2025-06-04 | Shaking up the Ransomware Game: Introducing Scattered Spider | 0:00 | 302 | |
|
2025-06-03 | Smart Phone Forensics Circa 2028 | 0:00 | 149 | |
|
2025-06-03 | Sink or Swim: Riding the Rising Tide of AI | 0:00 | 140 | |
|
2025-06-03 | LLM SATs FTW | 0:00 | 73 | |
|
2025-06-03 | The Final Word: A Live Q&A – Artificial Intelligence Panel | 0:00 | 95 | |
|
2025-06-03 | The Final Word: A Live Q&A – ICS/OT | Telecommunications Security Panel | 0:00 | 49 | |
|
2025-06-03 | The Final Word: A Live Q&A - Cyber Defense Panel | 0:00 | 50 | |
|
2025-06-03 | Vulnerability Chaining in the Age of AI | 0:00 | 123 | |
|
2025-06-03 | Securing Communications in the Human Supply Chain | 0:00 | 65 | |
|
2025-06-03 | The Robs: Fireside Chat | 0:00 | 66 | |
|
2025-06-02 | AI Security Demystified | 0:00 | 307 | |
|
2025-06-02 | The Final Word: A Live Q&A – Quantum Computing Panel | 0:00 | 90 | |
|
2025-06-02 | From Assistant to Adversary: When Agentic AI Becomes an Insider Threat | 0:00 | 166 | |
|
2025-06-02 | A Field Guide to PQC Migration: Tactics, Techniques, and Procedures | 0:00 | 83 | |
|
2025-06-02 | Quantum Primer: Opportunities and Threats | 0:00 | 129 | |
|
2025-06-02 | Post-Quantum Cryptography: Why It’s Secure | 0:00 | 155 | |
|
2025-06-02 | Preparing for the Quantum Threat: Practical Steps for Cybersecurity Teams | 0:00 | 119 | |
|
2025-05-29 | Inside Pacific Rim with Ross McKerchar | 0:00 | 250 | | Pacific Rim
|
2025-05-27 | Navigating Regulatory Challenges: Understanding NIS2, DORA, and CRA | 0:00 | 120 | |
|
2025-05-27 | Keynote | How to Become a CISO | 0:00 | 216 | |
|
2025-05-27 | Believing in Yourself to Lead Your Team | 0:00 | 57 | |
|
2025-05-27 | CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center | 0:00 | 174 | |
|
2025-05-27 | Bridging The Gap: The Playbook Of A BISO | 0:00 | 127 | |
|
2025-05-27 | Who Dares Wins: Effective Crisis Management | 0:00 | 73 | |
|
2025-05-23 | Insider Threat with Lisa Forte | 0:00 | 317 | |
|
2025-05-23 | The Fifth Domain: NATO’s Cyber Frontline with Manfred Boudreaux-Dehmer | 0:00 | 220 | |
|
2025-05-16 | SANS Cyber Leaders Season 2 Trailer | 0:00 | 318 | |
|
2025-05-13 | The Five Must-Haves of an AI Governance Framework | 0:00 | 621 | |
|
2025-05-13 | AI Security Made Easy | 0:00 | 492 | |
|
2025-05-13 | Hacker’s Perspective: Realistic AI Attack Scenarios | 0:00 | 532 | |
|
2025-05-13 | Keynote | Threat Modeling Agentic AI Systems: Proactive Strategies for Security and Resilience | 0:00 | 622 | |
|
2025-05-13 | Fireside Chat with Kate Marshall and Helen Oakley | 0:00 | 57 | |
|
2025-05-13 | AI in the Crosshairs: Exploring Novel Attacks on AWS AI as a Service | 0:00 | 85 | |
|
2025-05-13 | The Dark Side of AI: Developing Unsecure Applications in Minutes! | 0:00 | 121 | |
|
2025-05-13 | Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems | 0:00 | 91 | | The Watchers
|
2025-05-13 | Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats | 0:00 | 106 | |
|
2025-05-13 | Unlocking Cyber Insights with AI: Using ML and LLMs for Next-Gen Analysis | 0:00 | 107 | |
|
2025-05-13 | Keynote | What to Expect When You’re Expecting Your GenAI Baby | 0:00 | 83 | |
|
2025-05-13 | Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems | 0:00 | 37 | |
|
2025-05-13 | Fireside Chat with Sounil Yu and Rob Lee | 0:00 | 50 | |
|
2025-05-13 | Building an AI Pen-Testing Assistant | 0:00 | 86 | |
|
2025-05-13 | AI Security Controls Guidelines Release | 0:00 | 107 | |
|
2025-05-13 | Using LLMs, Embeddings, and Similarity to Assist DFIR Analysis | 0:00 | 39 | |
|
2025-05-13 | SANS360 Talks | SCADE Detecting Hidden Threats in Data Centers | 0:00 | 23 | |
|
2025-05-13 | The Human Element in AI: Why People Still Matter in a Machine-Led Era | 0:00 | 18 | |
|
2025-05-13 | SANS360 Talks | AI-Driven Phishing Attacks | 0:00 | 56 | |
|
2025-05-13 | SANS360 Talks | Dancing with Al: Navigating the Cybersecurity Choreography | 0:00 | 98 | |
|
2025-05-13 | Data to Defense: Generative AI and RAG Powering Real-Time Threat Response | 0:00 | 26 | |
|
2025-05-13 | Influence Operations with AI and Cyber-Enabled Ops | 0:00 | 32 | |
|
2025-05-13 | SANS360 Talks | Breaking the Black Box- Why Testing generative Al is Full Spectrum | 0:00 | 39 | |
|
2025-05-13 | SANS360 Talks | The Next Plague-How Al is Revolutionizing Malware Development | 0:00 | 51 | |
|
2025-05-13 | The AI Security Gap: Addressing the Unique Vulnerabilities of GenAI-Based Applications | 0:00 | 43 | |
|
2025-05-13 | SANS360 Talks | GenAl risks to your business and strategies to avoid common pitfalls | 0:00 | 67 | |
|
2025-05-13 | SANS360 Talks | 5 Tips for Using GenAl in DFIR | 0:00 | 32 | |
|
2025-05-13 | SANS360 Talks | Are you a J.E.D.I? Advancing Responsible Use of Al in the Universe | 0:00 | 18 | |
|
2025-05-13 | SANS360 Talks | Change the Game: Build an Al Powered SOC | 0:00 | 64 | |
|
2025-05-13 | SANS360 Talks | Evolving Zero Trust: Harnessing the Power of Al | 0:00 | 17 | |
|
2025-05-06 | Staying Ahead of Ransomware: Communication During a Ransomware Engagement | 0:00 | 355 | |
|
2025-04-25 | SANS Threat Analysis Rundown with Katie Nickels | April 2025 | 0:00 | 283 | |
|
2025-04-25 | Giving Back to the Cybersecurity Community Through Teaching | 0:00 | 220 | |
|
2025-04-24 | Level Up Your Security Team Through Automation | 0:00 | 329 | |
|
2025-04-24 | SANS Cyber Compliance Countdown: Guidance to Meet Global Directives | 0:00 | 0 | |
|
2025-04-22 | The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity | 0:00 | 1,204 | |
|
2025-04-22 | The Myth: Cybersecurity Is Only For People in IT | 0:00 | 1,133 | |
|
2025-04-22 | The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware | 0:00 | 1,173 | |
|
2025-04-15 | Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together | 0:00 | 141 | |
|
2025-04-15 | A Day in the Life of a Network Security Engineer | 0:00 | 236 | |
|
2025-04-15 | Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you! | 0:00 | 160 | |
|
2025-04-15 | Keynote | Keys to Charting Your Own Course: Thriving Beyond Traditional Paths | 0:00 | 133 | |
|
2025-04-15 | A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity | 0:00 | 93 | |
|
2025-04-15 | Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity | 0:00 | 83 | |
|
2025-04-15 | Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager | 0:00 | 48 | |
|
2025-04-15 | Lightning Talk | Anatomy of a Cyber Attack | 0:00 | 47 | |
|
2025-04-15 | Lightning Talk | Navigating AI in Cybersecurity: Essential Skills | 0:00 | 143 | |
|
2025-04-15 | From TV news to cybersecurity: the 5 steps I took to completely change careers | 0:00 | 101 | |
|
2025-04-15 | Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware | 0:00 | 78 | |
|
2025-04-09 | From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec | 0:00 | 286 | |
|
2025-04-04 | Turn Your Hard-Earned Experience into Impact | 0:00 | 169 | |
|
2025-04-04 | Giving Back to the Cybersecurity Community Through Teaching | 0:00 | 130 | |
|
2025-04-02 | The State of Ransomware Payments | 0:00 | 288 | |
|
2025-04-01 | Account Takeovers and Emotional Predators | Ouch! Podcast | April 2025 | 0:00 | 223 | |
|
2025-03-21 | Understanding Continuous Threat Exposure Management (CTEM) | Jonathan Risto | 0:00 | 658 | |
|
2025-03-20 | SANS Threat Analysis Rundown with Katie Nickels | March 2025 | 0:00 | 390 | |
|
2025-03-13 | Achieve Strategic Security Leadership | Frank Kim on LDR514 | 0:00 | 286 | |
|
2025-03-11 | SANS Cyber Compliance Countdown: Guidance to Meet Global Directives | 0:00 | 0 | |
|
2025-03-07 | Ask the Authors: The Foundations and Future of ICS/OT Security | 0:00 | 335 | |
|
2025-02-28 | From Tactician to Leader: LDR512 Security Leadership Essentials for Managers | 0:00 | 323 | |
|
2025-02-28 | SANS 2025 Healthcare Forum: Tackling Challenges, Building Cyber Resilience | 0:00 | 0 | |
|
2025-02-28 | SANS Threat Analysis Rundown with Katie Nickels | February 2025 | 0:00 | 635 | |
|
2025-02-26 | Sponsorship Opportunities at SANS Cyber Fest | 0:00 | 369 | |
|
2025-02-26 | SANS Research Surveys Sponsorship | 0:00 | 86 | |
|
2025-02-26 | Sponsorship Opportunities at SANS Summits | 0:00 | 125 | |
|
2025-02-26 | SANS Research Custom Content Sponsorship | 0:00 | 190 | |
|
2025-02-18 | SOC Dashboards Done Right with Ryan Thompson | 0:00 | 677 | |
|
2025-02-12 | Inside the World of Cyber Threat Intelligence with Ondra Rojcik | 0:00 | 496 | |
|
2025-02-11 | Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez | 0:00 | 472 | |
|
2025-02-10 | Empowering the Future of Cybersecurity: Women Leading the Way | 0:00 | 248 | |
|
2025-02-10 | How to Manage Cybersecurity Information Overload | Kirk Carter | 0:00 | 138 | |
|
2025-02-07 | The Anatomy of a Cyber Attack | Jonathan Mann | 0:00 | 533 | |
|