SANS Institute

SANS Institute

Views:
2,688,311
Subscribers:
63,600
Videos:
1,140
Duration:
21:00:55:13
United States
United States

SANS Institute is an American YouTube content creator with at least 63.6 thousand subscribers. He published around 1.14 thousand videos which altogether total at least 2.69 million views.

Created on ● Channel Link: https://www.youtube.com/channel/UC2uPNhGken-ogEpJDi4ly6w





All Videos by SANS Institute



PublishedVideo TitleDurationViewsCategoryGame
2025-06-06Securing the Supply Chain with Christine Gadsby0:0052
2025-06-04Shaking up the Ransomware Game: Introducing Scattered Spider0:00302
2025-06-03Smart Phone Forensics Circa 20280:00149
2025-06-03Sink or Swim: Riding the Rising Tide of AI0:00140
2025-06-03LLM SATs FTW0:0073
2025-06-03The Final Word: A Live Q&A – Artificial Intelligence Panel0:0095
2025-06-03The Final Word: A Live Q&A – ICS/OT | Telecommunications Security Panel0:0049
2025-06-03The Final Word: A Live Q&A - Cyber Defense Panel0:0050
2025-06-03Vulnerability Chaining in the Age of AI0:00123
2025-06-03Securing Communications in the Human Supply Chain0:0065
2025-06-03The Robs: Fireside Chat0:0066
2025-06-02AI Security Demystified0:00307
2025-06-02The Final Word: A Live Q&A – Quantum Computing Panel0:0090
2025-06-02From Assistant to Adversary: When Agentic AI Becomes an Insider Threat0:00166
2025-06-02A Field Guide to PQC Migration: Tactics, Techniques, and Procedures0:0083
2025-06-02Quantum Primer: Opportunities and Threats0:00129
2025-06-02Post-Quantum Cryptography: Why It’s Secure0:00155
2025-06-02Preparing for the Quantum Threat: Practical Steps for Cybersecurity Teams0:00119
2025-05-29Inside Pacific Rim with Ross McKerchar0:00250Pacific Rim
2025-05-27Navigating Regulatory Challenges: Understanding NIS2, DORA, and CRA0:00120
2025-05-27Keynote | How to Become a CISO0:00216
2025-05-27Believing in Yourself to Lead Your Team0:0057
2025-05-27CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center0:00174
2025-05-27Bridging The Gap: The Playbook Of A BISO0:00127
2025-05-27Who Dares Wins: Effective Crisis Management0:0073
2025-05-23Insider Threat with Lisa Forte0:00317
2025-05-23The Fifth Domain: NATO’s Cyber Frontline with Manfred Boudreaux-Dehmer0:00220
2025-05-16SANS Cyber Leaders Season 2 Trailer0:00318
2025-05-13The Five Must-Haves of an AI Governance Framework0:00621
2025-05-13AI Security Made Easy0:00492
2025-05-13Hacker’s Perspective: Realistic AI Attack Scenarios0:00532
2025-05-13Keynote | Threat Modeling Agentic AI Systems: Proactive Strategies for Security and Resilience0:00622
2025-05-13Fireside Chat with Kate Marshall and Helen Oakley0:0057
2025-05-13AI in the Crosshairs: Exploring Novel Attacks on AWS AI as a Service0:0085
2025-05-13The Dark Side of AI: Developing Unsecure Applications in Minutes!0:00121
2025-05-13Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems0:0091The Watchers
2025-05-13Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats0:00106
2025-05-13Unlocking Cyber Insights with AI: Using ML and LLMs for Next-Gen Analysis0:00107
2025-05-13Keynote | What to Expect When You’re Expecting Your GenAI Baby0:0083
2025-05-13Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems0:0037
2025-05-13Fireside Chat with Sounil Yu and Rob Lee0:0050
2025-05-13Building an AI Pen-Testing Assistant0:0086
2025-05-13AI Security Controls Guidelines Release0:00107
2025-05-13Using LLMs, Embeddings, and Similarity to Assist DFIR Analysis0:0039
2025-05-13SANS360 Talks | SCADE Detecting Hidden Threats in Data Centers0:0023
2025-05-13The Human Element in AI: Why People Still Matter in a Machine-Led Era0:0018
2025-05-13SANS360 Talks | AI-Driven Phishing Attacks0:0056
2025-05-13SANS360 Talks | Dancing with Al: Navigating the Cybersecurity Choreography0:0098
2025-05-13Data to Defense: Generative AI and RAG Powering Real-Time Threat Response0:0026
2025-05-13Influence Operations with AI and Cyber-Enabled Ops0:0032
2025-05-13SANS360 Talks | Breaking the Black Box- Why Testing generative Al is Full Spectrum0:0039
2025-05-13SANS360 Talks | The Next Plague-How Al is Revolutionizing Malware Development0:0051
2025-05-13The AI Security Gap: Addressing the Unique Vulnerabilities of GenAI-Based Applications0:0043
2025-05-13SANS360 Talks | GenAl risks to your business and strategies to avoid common pitfalls0:0067
2025-05-13SANS360 Talks | 5 Tips for Using GenAl in DFIR0:0032
2025-05-13SANS360 Talks | Are you a J.E.D.I? Advancing Responsible Use of Al in the Universe0:0018
2025-05-13SANS360 Talks | Change the Game: Build an Al Powered SOC0:0064
2025-05-13SANS360 Talks | Evolving Zero Trust: Harnessing the Power of Al0:0017
2025-05-06Staying Ahead of Ransomware: Communication During a Ransomware Engagement0:00355
2025-04-25SANS Threat Analysis Rundown with Katie Nickels | April 20250:00283
2025-04-25Giving Back to the Cybersecurity Community Through Teaching0:00220
2025-04-24Level Up Your Security Team Through Automation0:00329
2025-04-24SANS Cyber Compliance Countdown: Guidance to Meet Global Directives0:000
2025-04-22The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity0:001,204
2025-04-22The Myth: Cybersecurity Is Only For People in IT0:001,133
2025-04-22The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware0:001,173
2025-04-15Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together0:00141
2025-04-15A Day in the Life of a Network Security Engineer0:00236
2025-04-15Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!0:00160
2025-04-15Keynote | Keys to Charting Your Own Course: Thriving Beyond Traditional Paths0:00133
2025-04-15A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity0:0093
2025-04-15Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity0:0083
2025-04-15Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager0:0048
2025-04-15Lightning Talk | Anatomy of a Cyber Attack0:0047
2025-04-15Lightning Talk | Navigating AI in Cybersecurity: Essential Skills0:00143
2025-04-15From TV news to cybersecurity: the 5 steps I took to completely change careers0:00101
2025-04-15Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware0:0078
2025-04-09From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec0:00286
2025-04-04Turn Your Hard-Earned Experience into Impact0:00169
2025-04-04Giving Back to the Cybersecurity Community Through Teaching0:00130
2025-04-02The State of Ransomware Payments0:00288
2025-04-01Account Takeovers and Emotional Predators | Ouch! Podcast | April 20250:00223
2025-03-21Understanding Continuous Threat Exposure Management (CTEM) | Jonathan Risto0:00658
2025-03-20SANS Threat Analysis Rundown with Katie Nickels | March 20250:00390
2025-03-13Achieve Strategic Security Leadership | Frank Kim on LDR5140:00286
2025-03-11SANS Cyber Compliance Countdown: Guidance to Meet Global Directives0:000
2025-03-07Ask the Authors: The Foundations and Future of ICS/OT Security0:00335
2025-02-28From Tactician to Leader: LDR512 Security Leadership Essentials for Managers0:00323
2025-02-28SANS 2025 Healthcare Forum: Tackling Challenges, Building Cyber Resilience0:000
2025-02-28SANS Threat Analysis Rundown with Katie Nickels | February 20250:00635
2025-02-26Sponsorship Opportunities at SANS Cyber Fest0:00369
2025-02-26SANS Research Surveys Sponsorship0:0086
2025-02-26Sponsorship Opportunities at SANS Summits0:00125
2025-02-26SANS Research Custom Content Sponsorship0:00190
2025-02-18SOC Dashboards Done Right with Ryan Thompson0:00677
2025-02-12Inside the World of Cyber Threat Intelligence with Ondra Rojcik0:00496
2025-02-11Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez0:00472
2025-02-10Empowering the Future of Cybersecurity: Women Leading the Way0:00248
2025-02-10How to Manage Cybersecurity Information Overload | Kirk Carter0:00138
2025-02-07The Anatomy of a Cyber Attack | Jonathan Mann0:00533