2025-04-02 | The State of Ransomware Payments | 0:00 | 288 | |
|
2025-04-01 | Account Takeovers and Emotional Predators | Ouch! Podcast | April 2025 | 0:00 | 223 | |
|
2025-03-21 | Understanding Continuous Threat Exposure Management (CTEM) | Jonathan Risto | 0:00 | 658 | |
|
2025-03-20 | SANS Threat Analysis Rundown with Katie Nickels | March 2025 | 0:00 | 390 | |
|
2025-03-13 | Achieve Strategic Security Leadership | Frank Kim on LDR514 | 0:00 | 286 | |
|
2025-03-11 | SANS Cyber Compliance Countdown: Guidance to Meet Global Directives | 0:00 | 0 | |
|
2025-03-07 | Ask the Authors: The Foundations and Future of ICS/OT Security | 0:00 | 335 | |
|
2025-02-28 | From Tactician to Leader: LDR512 Security Leadership Essentials for Managers | 0:00 | 323 | |
|
2025-02-28 | SANS 2025 Healthcare Forum: Tackling Challenges, Building Cyber Resilience | 0:00 | 0 | |
|
2025-02-28 | SANS Threat Analysis Rundown with Katie Nickels | February 2025 | 0:00 | 635 | |
|
2025-02-26 | Sponsorship Opportunities at SANS Cyber Fest | 0:00 | 369 | |
|
2025-02-26 | SANS Research Surveys Sponsorship | 0:00 | 86 | |
|
2025-02-26 | Sponsorship Opportunities at SANS Summits | 0:00 | 125 | |
|
2025-02-26 | SANS Research Custom Content Sponsorship | 0:00 | 190 | |
|
2025-02-18 | SOC Dashboards Done Right with Ryan Thompson | 0:00 | 677 | |
|
2025-02-12 | Inside the World of Cyber Threat Intelligence with Ondra Rojcik | 0:00 | 496 | |
|
2025-02-11 | Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez | 0:00 | 472 | |
|
2025-02-10 | Empowering the Future of Cybersecurity: Women Leading the Way | 0:00 | 248 | |
|
2025-02-10 | How to Manage Cybersecurity Information Overload | Kirk Carter | 0:00 | 138 | |
|
2025-02-07 | The Anatomy of a Cyber Attack | Jonathan Mann | 0:00 | 533 | |
|
2025-02-06 | Navigating AI in Cybersecurity: Skills, Ethics, and Opportunities | Diana Vicezar | 0:00 | 214 | |
|
2025-02-05 | A Day in the Life of a Network Security Engineer | Sanjay Poddar | 0:00 | 536 | |
|
2025-02-04 | Level Up Your Cyber Skills with the KC7 Threat Hunter CTF | New2Cyber Summit 2025 | 0:00 | 462 | |
|
2025-02-03 | From Journalist to Cyber Threat Analyst: Audra Streetman’s Journey | 0:00 | 78 | |
|
2025-01-31 | From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey | 0:00 | 202 | |
|
2025-01-31 | Series One Roundup | 0:00 | 214 | |
|
2025-01-30 | Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti | 0:00 | 457 | |
|
2025-01-29 | Break Into Cybersecurity Through Cyber-Adjacent Roles | Aaron Yerian | 0:00 | 534 | |
|
2025-01-28 | SANS New2Cyber Summit 2025 | 0:00 | 192 | |
|
2025-01-28 | Break Into Cybersecurity with the New2Cyber Summit 2025! | 0:00 | 326 | |
|
2025-01-27 | Kickstart Your Cyber Journey with the 2025 New2Cyber Summit! 🚀 | 0:00 | 219 | |
|
2025-01-24 | Community-Powered Risk Management: Tools for Small Businesses | 0:00 | 272 | |
|
2025-01-24 | Cybersecurity Standards Scorecard (2024 Edition) | 0:00 | 438 | |
|
2025-01-23 | SANS AI Cybersecurity Summit | 0:00 | 557 | |
|
2025-01-17 | FUD Special | 0:00 | 305 | |
|
2025-01-16 | SANS AI Cybersecurity Summit | Highlight | Jess Garcia | 0:00 | 372 | |
|
2025-01-10 | The Booming Business of Cyber Crime with Geoff White | 0:00 | 309 | |
|
2025-01-03 | Breaking Barriers with Helen Rabe | 0:00 | 285 | |
|
2025-01-01 | Success Simplified - The 3 Step Process for Hitting Your Career Goals in 2025 with John Hubbard | 0:00 | 367 | |
|
2024-12-27 | Bridging the gap with Frank Kim | 0:00 | 275 | |
|
2024-12-20 | SANS Threat Analysis Rundown with Katie Nickels | December 2024 | 0:00 | 623 | |
|
2024-12-20 | Countering Ransomware with Jen Ellis | 0:00 | 258 | |
|
2024-12-17 | CyberThreat 2024 Recap: Highlights, CTF Competition, and Key Insights | 0:00 | 327 | |
|
2024-12-16 | 2024 SANS Difference Makers Awards Ceremony | 0:00 | 1,507 | |
|
2024-12-13 | Leading Global Cybersecurity with Christine Bejerasco | 0:00 | 273 | |
|
2024-12-13 | Understanding the Geopolitical Landscape of Cyber Security with Shashank Joshi | 0:00 | 320 | |
|
2024-12-11 | Three Keys To Becoming a Cyber Risk Officer | 0:00 | 1,122 | |
|
2024-12-07 | SANS Cyber Leaders Podcast Trailer | 0:00 | 362 | |
|
2024-12-04 | Understanding the 2024 Updates to the NIST Cybersecurity Framework | 0:00 | 920 | |
|
2024-12-04 | Understanding the Risk Management Mandates in 2024 Cybersecurity Regulations | 0:00 | 437 | |
|
2024-12-02 | How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud | 0:00 | 413 | |
|
2024-11-22 | SANS Threat Analysis Rundown with Katie Nickels | November 2024 | 0:00 | 661 | |
|
2024-11-18 | Top Three CISO Strategic Issues | 0:00 | 521 | |
|
2024-11-11 | Using LLMs to Build Cyber Exercises | Ep. 5 The Incident Commander Series | 0:00 | 797 | | The Incident
|
2024-11-08 | SANS Live Training: Network Security 2024 Recap | 0:00 | 375 | |
|
2024-11-08 | SANS Live Training: SANSFIRE 2024 Recap | 0:00 | 125 | |
|
2024-10-24 | SANS Cloud Security Exchange 2024: AWS Session | 0:00 | 417 | |
|
2024-10-24 | SANS Cloud Security Exchange 2024: Microsoft Session | 0:00 | 357 | |
|
2024-10-24 | SANS Cloud Security Exchange 2024: Google Session | 0:00 | 229 | |
|
2024-10-16 | “Secure AI” is 20 Years Old | 0:00 | 633 | |
|
2024-10-14 | Supply Chain Attacks: Why Security Leaders Must Act Now | 0:00 | 377 | |
|
2024-10-14 | Navigating the Al Frontier: The Next Wild Innovation | 0:00 | 220 | |
|
2024-10-14 | From Compliance to Leadership: What Every CISO Needs to Know | 0:00 | 364 | |
|
2024-10-14 | Why Should You Attend SANS Cyber Defense Initiative 2024? | 0:00 | 150 | |
|
2024-10-09 | Lightning Talk: AI for SOC Teams - Enhancing Incident Response and Vulnerability Management | 0:00 | 476 | |
|
2024-10-09 | How GenAI is Changing Your SOC for the Better with Seth Misenar | 0:00 | 503 | |
|
2024-10-09 | From Clues to Containment - Unraveling A Gift Card Fraud Scheme with Mark Jeanmougin | 0:00 | 216 | |
|
2024-10-04 | Making Secure AI Real: Real Threats, Lessons Learned, and Future of the Secure AI Technology Stack | 0:00 | 319 | |
|
2024-10-04 | AI’s Achilles’ Heel: Navigating the OWASP Top 10 for LLMs | 0:00 | 244 | |
|
2024-10-04 | Lightning Talk: Markov Chains - potentially faster log analysis | 0:00 | 212 | |
|
2024-10-04 | Lightning Talk: Enhance Investigations Using LLM, Embeddings, and Clustering | 0:00 | 192 | |
|
2024-10-04 | Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations | 0:00 | 94 | |
|
2024-10-04 | “Secure AI” is 20 Years Old | 0:00 | 98 | |
|
2024-10-04 | Gen-AI for DFIR in the Real World: Practical Use Cases | 0:00 | 274 | |
|
2024-10-04 | The Frontier of Cybersecurity: Defending Against AI-Based Threats | 0:00 | 297 | |
|
2024-09-27 | SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition | 0:00 | 603 | |
|
2024-09-23 | Into the Looking Glass, Medical Device Cybersecurity | Veronica Schmitt | 0:00 | 254 | |
|
2024-09-23 | Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons | 0:00 | 116 | |
|
2024-09-23 | Welcome to the SANS Healthcare Forum 2024 | Rich Greene and Stacy D | 0:00 | 59 | |
|
2024-09-23 | Healthcare Threat Landscape and Risk Mitigation | Nitin Natarajan, CISA | 0:00 | 93 | |
|
2024-09-23 | AI in Medical Diagnostics | Rob T. Lee and James Lyne | 0:00 | 70 | |
|
2024-09-23 | Crisis Management in Healthcare | Steve Armstrong-Godwin | 0:00 | 110 | |
|
2024-09-23 | Enhanced Vendor Risk Assessment | Tony Turner | 0:00 | 81 | |
|
2024-09-23 | Tools for Simplifying Regulatory Requirements for Risk Assessment | James Tarala | 0:00 | 113 | |
|
2024-09-19 | Why Zero Trust is the Key to Cybersecurity in 2024 and Beyond | 0:00 | 602 | |
|
2024-09-12 | SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers | 0:00 | 522 | |
|
2024-09-12 | SANS Compliance Countdown 2024 | 0:00 | 972 | Guide |
|
2024-08-29 | Elevating Your Audit Strategy: Insights from the CRF Audit Framework | 0:00 | 282 | |
|
2024-08-26 | SANS Live Training: Security West 2024 Recap | 0:00 | 312 | |
|
2024-08-16 | Navigating the Path to Zero Trust in 2024 | 0:00 | 496 | |
|
2024-08-06 | A Winning Partnership in Cybersecurity Talent Development | 0:00 | 202 | |
|
2024-08-02 | SANS | GIAC Workforce Report Outcomes Panel Conversation | 46:12 | 411 | |
|
2024-08-02 | Breaking Barriers: Christine Morency’s Inspirational Cybersecurity Journey | 33:42 | 293 | |
|
2024-08-01 | Breaking Barriers: Christine Morency's Inspirational Cybersecurity Journey | 32:44 | 123 | |
|
2024-07-29 | Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4 | 12:18 | 307 | |
|
2024-07-24 | Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace | 51:52 | 172 | |
|
2024-07-24 | How to Attract, Hire and Retain Mid-Level Cybersecurity Roles | 47:07 | 460 | Guide |
|
2024-07-20 | Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 8 | 3:44 | 163 | Guide |
|
2024-07-18 | Understanding the New NIS2 Directive: Compliance for EU Businesses | 42:37 | 320 | Guide |
|
2024-07-10 | Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 7 | 5:36 | 294 | Guide |
|