2025-07-24 | Critical SharePoint Zero-Day Exploited: What You Need to Know About CVE-2025-53770 | 0:00 | 673 | |
|
2025-07-23 | Supply Chain Forum 2025: Advancing Transparency with the BOM Maturity Model | 0:00 | 98 | |
|
2025-07-23 | Supply Chain Forum 2025: Firmware Attacks Expanding the Enterprise Attack Surface | 0:00 | 122 | |
|
2025-07-23 | Supply Chain Forum 2025: Scanning the Hidden Layers of AI Open Source Models | 0:00 | 200 | |
|
2025-07-23 | Supply Chain Forum 2025: Adversary Components in Critical Infrastructure | 0:00 | 234 | |
|
2025-07-21 | SANS Cyber Compliance Countdown: Guidance to Meet Global Directives | 0:00 | 0 | |
|
2025-07-18 | Series Two Round-Up | 0:00 | 147 | |
|
2025-07-11 | Life, Limb, and Infrastructure with Tim Conway | 0:00 | 174 | |
|
2025-07-02 | The Myth: Traditional Security Processes and Tools are Sufficient in the Cloud | 0:00 | 514 | |
|
2025-07-02 | The Myth: The Cloud is Less Secure Than Traditional On-Premises Environments | 0:00 | 1,196 | |
|
2025-07-02 | The Myth: If Nothing Bad has Happened, We’re Secure | 0:00 | 974 | |
|
2025-07-02 | The Myth: AI Is Coming for Your Job | 0:00 | 557 | |
|
2025-07-02 | Stay Ahead of Ransomware: How Threat Actor Profiling Can Help Prevent Ransomware Attacks | 0:00 | 289 | |
|
2025-07-01 | Beyond the Patch: Measuring the Unknown in Vulnerability Management | 0:00 | 535 | |
|
2025-06-27 | From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard | 0:00 | 262 | |
|
2025-06-27 | Cyber Warfare, Disinformation, and Geopolitical Risks with Dr. Bilyana Lilly | 0:00 | 356 | |
|
2025-06-27 | Fighting Back with John Hubbard | 0:00 | 134 | |
|
2025-06-20 | Translating Cyber Risk for a Chaotic World with Tarah Wheeler | 0:00 | 339 | |
|
2025-06-13 | The Cyber Battlefield with Max Smeets | 0:00 | 295 | |
|
2025-06-12 | Redefining Security Operations: Lessons in AI Integration with James Spiteri | 0:00 | 393 | |
|
2025-06-06 | Securing the Supply Chain with Christine Gadsby | 0:00 | 262 | |
|
2025-06-04 | Shaking up the Ransomware Game: Introducing Scattered Spider | 0:00 | 512 | |
|
2025-06-03 | Smart Phone Forensics Circa 2028 | 0:00 | 313 | |
|
2025-06-03 | Sink or Swim: Riding the Rising Tide of AI | 0:00 | 240 | |
|
2025-06-03 | LLM SATs FTW | 0:00 | 138 | |
|
2025-06-03 | The Final Word: A Live Q&A – Artificial Intelligence Panel | 0:00 | 151 | |
|
2025-06-03 | The Final Word: A Live Q&A – ICS/OT | Telecommunications Security Panel | 0:00 | 91 | |
|
2025-06-03 | The Final Word: A Live Q&A - Cyber Defense Panel | 0:00 | 77 | |
|
2025-06-03 | Vulnerability Chaining in the Age of AI | 0:00 | 168 | |
|
2025-06-03 | Securing Communications in the Human Supply Chain | 0:00 | 100 | |
|
2025-06-03 | The Robs: Fireside Chat | 0:00 | 79 | |
|
2025-06-02 | AI Security Demystified | 0:00 | 341 | |
|
2025-06-02 | The Final Word: A Live Q&A – Quantum Computing Panel | 0:00 | 90 | |
|
2025-06-02 | From Assistant to Adversary: When Agentic AI Becomes an Insider Threat | 0:00 | 166 | |
|
2025-06-02 | A Field Guide to PQC Migration: Tactics, Techniques, and Procedures | 0:00 | 83 | |
|
2025-06-02 | Quantum Primer: Opportunities and Threats | 0:00 | 129 | |
|
2025-06-02 | Post-Quantum Cryptography: Why It’s Secure | 0:00 | 155 | |
|
2025-06-02 | Preparing for the Quantum Threat: Practical Steps for Cybersecurity Teams | 0:00 | 119 | |
|
2025-05-29 | Inside Pacific Rim with Ross McKerchar | 0:00 | 250 | | Pacific Rim
|
2025-05-27 | Navigating Regulatory Challenges: Understanding NIS2, DORA, and CRA | 0:00 | 120 | |
|
2025-05-27 | Keynote | How to Become a CISO | 0:00 | 216 | |
|
2025-05-27 | Believing in Yourself to Lead Your Team | 0:00 | 57 | |
|
2025-05-27 | CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center | 0:00 | 174 | |
|
2025-05-27 | Bridging The Gap: The Playbook Of A BISO | 0:00 | 127 | |
|
2025-05-27 | Who Dares Wins: Effective Crisis Management | 0:00 | 73 | |
|
2025-05-23 | Insider Threat with Lisa Forte | 0:00 | 317 | |
|
2025-05-23 | The Fifth Domain: NATO’s Cyber Frontline with Manfred Boudreaux-Dehmer | 0:00 | 220 | |
|
2025-05-16 | SANS Cyber Leaders Season 2 Trailer | 0:00 | 318 | |
|
2025-05-13 | The Five Must-Haves of an AI Governance Framework | 0:00 | 621 | |
|
2025-05-13 | AI Security Made Easy | 0:00 | 492 | |
|
2025-05-13 | Hacker’s Perspective: Realistic AI Attack Scenarios | 0:00 | 532 | |
|
2025-05-13 | Keynote | Threat Modeling Agentic AI Systems: Proactive Strategies for Security and Resilience | 0:00 | 622 | |
|
2025-05-13 | Fireside Chat with Kate Marshall and Helen Oakley | 0:00 | 57 | |
|
2025-05-13 | AI in the Crosshairs: Exploring Novel Attacks on AWS AI as a Service | 0:00 | 85 | |
|
2025-05-13 | The Dark Side of AI: Developing Unsecure Applications in Minutes! | 0:00 | 121 | |
|
2025-05-13 | Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems | 0:00 | 91 | | The Watchers
|
2025-05-13 | Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats | 0:00 | 106 | |
|
2025-05-13 | Unlocking Cyber Insights with AI: Using ML and LLMs for Next-Gen Analysis | 0:00 | 107 | |
|
2025-05-13 | Keynote | What to Expect When You’re Expecting Your GenAI Baby | 0:00 | 83 | |
|
2025-05-13 | Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems | 0:00 | 37 | |
|
2025-05-13 | Fireside Chat with Sounil Yu and Rob Lee | 0:00 | 50 | |
|
2025-05-13 | Building an AI Pen-Testing Assistant | 0:00 | 86 | |
|
2025-05-13 | AI Security Controls Guidelines Release | 0:00 | 107 | |
|
2025-05-13 | SANS360 Talks | Dancing with Al: Navigating the Cybersecurity Choreography | 0:00 | 98 | |
|
2025-05-13 | Using LLMs, Embeddings, and Similarity to Assist DFIR Analysis | 0:00 | 39 | |
|
2025-05-13 | Data to Defense: Generative AI and RAG Powering Real-Time Threat Response | 0:00 | 26 | |
|
2025-05-13 | SANS360 Talks | GenAl risks to your business and strategies to avoid common pitfalls | 0:00 | 67 | |
|
2025-05-13 | SANS360 Talks | The Next Plague-How Al is Revolutionizing Malware Development | 0:00 | 51 | |
|
2025-05-13 | SANS360 Talks | AI-Driven Phishing Attacks | 0:00 | 56 | |
|
2025-05-13 | The Human Element in AI: Why People Still Matter in a Machine-Led Era | 0:00 | 18 | |
|
2025-05-13 | SANS360 Talks | 5 Tips for Using GenAl in DFIR | 0:00 | 32 | |
|
2025-05-13 | SANS360 Talks | Change the Game: Build an Al Powered SOC | 0:00 | 64 | |
|
2025-05-13 | SANS360 Talks | Breaking the Black Box- Why Testing generative Al is Full Spectrum | 0:00 | 39 | |
|
2025-05-13 | The AI Security Gap: Addressing the Unique Vulnerabilities of GenAI-Based Applications | 0:00 | 43 | |
|
2025-05-13 | Influence Operations with AI and Cyber-Enabled Ops | 0:00 | 32 | |
|
2025-05-13 | SANS360 Talks | SCADE Detecting Hidden Threats in Data Centers | 0:00 | 23 | |
|
2025-05-13 | SANS360 Talks | Are you a J.E.D.I? Advancing Responsible Use of Al in the Universe | 0:00 | 18 | |
|
2025-05-13 | SANS360 Talks | Evolving Zero Trust: Harnessing the Power of Al | 0:00 | 17 | |
|
2025-05-06 | Staying Ahead of Ransomware: Communication During a Ransomware Engagement | 0:00 | 355 | |
|
2025-04-25 | SANS Threat Analysis Rundown with Katie Nickels | April 2025 | 0:00 | 283 | |
|
2025-04-25 | Giving Back to the Cybersecurity Community Through Teaching | 0:00 | 220 | |
|
2025-04-24 | Level Up Your Security Team Through Automation | 0:00 | 329 | |
|
2025-04-24 | SANS Cyber Compliance Countdown: Guidance to Meet Global Directives | 0:00 | 0 | |
|
2025-04-22 | The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity | 0:00 | 1,204 | |
|
2025-04-22 | The Myth: Cybersecurity Is Only For People in IT | 0:00 | 1,133 | |
|
2025-04-22 | The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware | 0:00 | 1,173 | |
|
2025-04-15 | Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together | 0:00 | 141 | |
|
2025-04-15 | A Day in the Life of a Network Security Engineer | 0:00 | 236 | |
|
2025-04-15 | Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you! | 0:00 | 160 | |
|
2025-04-15 | Keynote | Keys to Charting Your Own Course: Thriving Beyond Traditional Paths | 0:00 | 133 | |
|
2025-04-15 | A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity | 0:00 | 93 | |
|
2025-04-15 | Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity | 0:00 | 83 | |
|
2025-04-15 | Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager | 0:00 | 48 | |
|
2025-04-15 | Lightning Talk | Anatomy of a Cyber Attack | 0:00 | 47 | |
|
2025-04-15 | Lightning Talk | Navigating AI in Cybersecurity: Essential Skills | 0:00 | 143 | |
|
2025-04-15 | From TV news to cybersecurity: the 5 steps I took to completely change careers | 0:00 | 101 | |
|
2025-04-15 | Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware | 0:00 | 78 | |
|
2025-04-09 | From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec | 0:00 | 286 | |
|
2025-04-04 | Turn Your Hard-Earned Experience into Impact | 0:00 | 169 | |
|
2025-04-04 | Giving Back to the Cybersecurity Community Through Teaching | 0:00 | 130 | |
|