2025-02-06 | Navigating AI in Cybersecurity: Skills, Ethics, and Opportunities | Diana Vicezar | 0:00 | 214 | |
|
2025-02-05 | A Day in the Life of a Network Security Engineer | Sanjay Poddar | 0:00 | 536 | |
|
2025-02-04 | Level Up Your Cyber Skills with the KC7 Threat Hunter CTF | New2Cyber Summit 2025 | 0:00 | 462 | |
|
2025-02-03 | From Journalist to Cyber Threat Analyst: Audra Streetman’s Journey | 0:00 | 78 | |
|
2025-01-31 | From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey | 0:00 | 202 | |
|
2025-01-31 | Series One Roundup | 0:00 | 214 | |
|
2025-01-30 | Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti | 0:00 | 457 | |
|
2025-01-29 | Break Into Cybersecurity Through Cyber-Adjacent Roles | Aaron Yerian | 0:00 | 534 | |
|
2025-01-28 | SANS New2Cyber Summit 2025 | 0:00 | 192 | |
|
2025-01-28 | Break Into Cybersecurity with the New2Cyber Summit 2025! | 0:00 | 326 | |
|
2025-01-27 | Kickstart Your Cyber Journey with the 2025 New2Cyber Summit! 🚀 | 0:00 | 219 | |
|
2025-01-24 | Community-Powered Risk Management: Tools for Small Businesses | 0:00 | 272 | |
|
2025-01-24 | Cybersecurity Standards Scorecard (2024 Edition) | 0:00 | 438 | |
|
2025-01-23 | SANS AI Cybersecurity Summit | 0:00 | 557 | |
|
2025-01-17 | FUD Special | 0:00 | 305 | |
|
2025-01-16 | SANS AI Cybersecurity Summit | Highlight | Jess Garcia | 0:00 | 372 | |
|
2025-01-10 | The Booming Business of Cyber Crime with Geoff White | 0:00 | 309 | |
|
2025-01-03 | Breaking Barriers with Helen Rabe | 0:00 | 285 | |
|
2025-01-01 | Success Simplified - The 3 Step Process for Hitting Your Career Goals in 2025 with John Hubbard | 0:00 | 367 | |
|
2024-12-27 | Bridging the gap with Frank Kim | 0:00 | 275 | |
|
2024-12-20 | SANS Threat Analysis Rundown with Katie Nickels | December 2024 | 0:00 | 623 | |
|
2024-12-20 | Countering Ransomware with Jen Ellis | 0:00 | 258 | |
|
2024-12-17 | CyberThreat 2024 Recap: Highlights, CTF Competition, and Key Insights | 0:00 | 327 | |
|
2024-12-16 | 2024 SANS Difference Makers Awards Ceremony | 0:00 | 1,507 | |
|
2024-12-13 | Leading Global Cybersecurity with Christine Bejerasco | 0:00 | 273 | |
|
2024-12-13 | Understanding the Geopolitical Landscape of Cyber Security with Shashank Joshi | 0:00 | 320 | |
|
2024-12-11 | Three Keys To Becoming a Cyber Risk Officer | 0:00 | 1,122 | |
|
2024-12-07 | SANS Cyber Leaders Podcast Trailer | 0:00 | 362 | |
|
2024-12-04 | Understanding the 2024 Updates to the NIST Cybersecurity Framework | 0:00 | 920 | |
|
2024-12-04 | Understanding the Risk Management Mandates in 2024 Cybersecurity Regulations | 0:00 | 437 | |
|
2024-12-02 | How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud | 0:00 | 413 | |
|
2024-11-22 | SANS Threat Analysis Rundown with Katie Nickels | November 2024 | 0:00 | 661 | |
|
2024-11-18 | Top Three CISO Strategic Issues | 0:00 | 521 | |
|
2024-11-11 | Using LLMs to Build Cyber Exercises | Ep. 5 The Incident Commander Series | 0:00 | 797 | | The Incident
|
2024-11-08 | SANS Live Training: Network Security 2024 Recap | 0:00 | 375 | |
|
2024-11-08 | SANS Live Training: SANSFIRE 2024 Recap | 0:00 | 125 | |
|
2024-10-24 | SANS Cloud Security Exchange 2024: AWS Session | 0:00 | 417 | |
|
2024-10-24 | SANS Cloud Security Exchange 2024: Microsoft Session | 0:00 | 357 | |
|
2024-10-24 | SANS Cloud Security Exchange 2024: Google Session | 0:00 | 229 | |
|
2024-10-16 | “Secure AI” is 20 Years Old | 0:00 | 633 | |
|
2024-10-14 | Supply Chain Attacks: Why Security Leaders Must Act Now | 0:00 | 377 | |
|
2024-10-14 | Navigating the Al Frontier: The Next Wild Innovation | 0:00 | 220 | |
|
2024-10-14 | From Compliance to Leadership: What Every CISO Needs to Know | 0:00 | 364 | |
|
2024-10-14 | Why Should You Attend SANS Cyber Defense Initiative 2024? | 0:00 | 150 | |
|
2024-10-09 | Lightning Talk: AI for SOC Teams - Enhancing Incident Response and Vulnerability Management | 0:00 | 476 | |
|
2024-10-09 | How GenAI is Changing Your SOC for the Better with Seth Misenar | 0:00 | 503 | |
|
2024-10-09 | From Clues to Containment - Unraveling A Gift Card Fraud Scheme with Mark Jeanmougin | 0:00 | 216 | |
|
2024-10-04 | Making Secure AI Real: Real Threats, Lessons Learned, and Future of the Secure AI Technology Stack | 0:00 | 319 | |
|
2024-10-04 | AI’s Achilles’ Heel: Navigating the OWASP Top 10 for LLMs | 0:00 | 244 | |
|
2024-10-04 | Lightning Talk: Markov Chains - potentially faster log analysis | 0:00 | 212 | |
|
2024-10-04 | Lightning Talk: Enhance Investigations Using LLM, Embeddings, and Clustering | 0:00 | 192 | |
|
2024-10-04 | Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations | 0:00 | 94 | |
|
2024-10-04 | “Secure AI” is 20 Years Old | 0:00 | 98 | |
|
2024-10-04 | Gen-AI for DFIR in the Real World: Practical Use Cases | 0:00 | 274 | |
|
2024-10-04 | The Frontier of Cybersecurity: Defending Against AI-Based Threats | 0:00 | 297 | |
|
2024-09-27 | SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition | 0:00 | 603 | |
|
2024-09-23 | Into the Looking Glass, Medical Device Cybersecurity | Veronica Schmitt | 0:00 | 254 | |
|
2024-09-23 | Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons | 0:00 | 116 | |
|
2024-09-23 | Welcome to the SANS Healthcare Forum 2024 | Rich Greene and Stacy D | 0:00 | 59 | |
|
2024-09-23 | Healthcare Threat Landscape and Risk Mitigation | Nitin Natarajan, CISA | 0:00 | 93 | |
|
2024-09-23 | AI in Medical Diagnostics | Rob T. Lee and James Lyne | 0:00 | 70 | |
|
2024-09-23 | Crisis Management in Healthcare | Steve Armstrong-Godwin | 0:00 | 110 | |
|
2024-09-23 | Enhanced Vendor Risk Assessment | Tony Turner | 0:00 | 81 | |
|
2024-09-23 | Tools for Simplifying Regulatory Requirements for Risk Assessment | James Tarala | 0:00 | 113 | |
|
2024-09-19 | Why Zero Trust is the Key to Cybersecurity in 2024 and Beyond | 0:00 | 602 | |
|
2024-09-12 | SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers | 0:00 | 522 | |
|
2024-09-12 | SANS Compliance Countdown 2024 | 0:00 | 972 | Guide |
|
2024-08-29 | Elevating Your Audit Strategy: Insights from the CRF Audit Framework | 0:00 | 282 | |
|
2024-08-26 | SANS Live Training: Security West 2024 Recap | 0:00 | 312 | |
|
2024-08-16 | Navigating the Path to Zero Trust in 2024 | 0:00 | 496 | |
|
2024-08-06 | A Winning Partnership in Cybersecurity Talent Development | 0:00 | 202 | |
|
2024-08-02 | SANS | GIAC Workforce Report Outcomes Panel Conversation | 46:12 | 411 | |
|
2024-08-02 | Breaking Barriers: Christine Morency’s Inspirational Cybersecurity Journey | 33:42 | 293 | |
|
2024-08-01 | Breaking Barriers: Christine Morency's Inspirational Cybersecurity Journey | 32:44 | 123 | |
|
2024-07-29 | Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4 | 12:18 | 307 | |
|
2024-07-24 | Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace | 51:52 | 172 | |
|
2024-07-24 | How to Attract, Hire and Retain Mid-Level Cybersecurity Roles | 47:07 | 460 | Guide |
|
2024-07-20 | Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 8 | 3:44 | 163 | Guide |
|
2024-07-18 | Understanding the New NIS2 Directive: Compliance for EU Businesses | 42:37 | 320 | Guide |
|
2024-07-10 | Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 7 | 5:36 | 294 | Guide |
|
2024-07-10 | Understanding Ransomware Threats to ESXi: Essential Insights | 53:39 | 1,385 | |
|
2024-07-01 | Cyber Wars: The Legal Force Awakens | 56:35 | 610 | Guide |
|
2024-06-30 | Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 6 | 5:22 | 375 | Guide |
|
2024-06-26 | Understanding the New NIS2 Directive: Compliance for EU Businesses | 43:31 | 482 | Guide |
|
2024-06-26 | Understanding the New NIS2 Directive: Compliance for EU Businesses | 50:27 | 862 | |
|
2024-06-20 | Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 5 | 4:31 | 201 | Guide |
|
2024-06-12 | Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights | 27:14 | 703 | |
|
2024-06-10 | Part 2 - The Achilles Systems Hack Assessment Series: Revisiting Enterprise Controls | 58:15 | 343 | |
|
2024-06-10 | Part 1 - The Achilles Systems Hack Assessment Series: Breach or Blueprint? | 52:34 | 450 | |
|
2024-06-10 | Security Assurance | The 8 Domains of the Cloud Security Maturity Model | Part 4 | 4:53 | 269 | Guide |
|
2024-06-06 | For the Win: Aligning Security Initiatives with the Business | 33:40 | 371 | |
|
2024-06-06 | Managing Risk in an AI-powered Future | 26:01 | 309 | |
|
2024-06-06 | Keynote | Challenges and Opportunities for Modern CISOs | 44:16 | 214 | |
|
2024-06-06 | Fireside Chat | Leading Cybersecurity: Risks, Relationships, and Resilience | 36:00 | 228 | |
|
2024-06-06 | Leading Without Authority: Leadership Beyond Titles | 20:50 | 207 | |
|
2024-06-06 | Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience | 33:50 | 189 | Guide |
|
2024-06-04 | Supply Chain Compromises Pt. 1 | The Incident Commander Series Ep. 3 | 12:19 | 374 | |
|
2024-06-03 | Top Five Trends in CISO Leadership | 1:01:50 | 820 | |
|
2024-05-29 | Security Governance | The 8 Domains of the Cloud Security Maturity Model | 4:13 | 408 | |
|
2024-05-29 | From Compliance to Leadership: What Every CISO Needs to Know | 35:08 | 672 | |
|