SANS Institute

SANS Institute

Views:
2,688,311
Subscribers:
63,600
Videos:
1,140
Duration:
21:00:55:13
United States
United States

SANS Institute is an American YouTube content creator with at least 63.6 thousand subscribers. He published around 1.14 thousand videos which altogether total at least 2.69 million views.

Created on ● Channel Link: https://www.youtube.com/channel/UC2uPNhGken-ogEpJDi4ly6w





All Videos by SANS Institute



PublishedVideo TitleDurationViewsCategoryGame
2025-02-06Navigating AI in Cybersecurity: Skills, Ethics, and Opportunities | Diana Vicezar0:00214
2025-02-05A Day in the Life of a Network Security Engineer | Sanjay Poddar0:00536
2025-02-04Level Up Your Cyber Skills with the KC7 Threat Hunter CTF | New2Cyber Summit 20250:00462
2025-02-03From Journalist to Cyber Threat Analyst: Audra Streetman’s Journey0:0078
2025-01-31From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey0:00202
2025-01-31Series One Roundup0:00214
2025-01-30Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti0:00457
2025-01-29Break Into Cybersecurity Through Cyber-Adjacent Roles | Aaron Yerian0:00534
2025-01-28SANS New2Cyber Summit 20250:00192
2025-01-28Break Into Cybersecurity with the New2Cyber Summit 2025!0:00326
2025-01-27Kickstart Your Cyber Journey with the 2025 New2Cyber Summit! 🚀0:00219
2025-01-24Community-Powered Risk Management: Tools for Small Businesses0:00272
2025-01-24Cybersecurity Standards Scorecard (2024 Edition)0:00438
2025-01-23SANS AI Cybersecurity Summit0:00557
2025-01-17FUD Special0:00305
2025-01-16SANS AI Cybersecurity Summit | Highlight | Jess Garcia0:00372
2025-01-10The Booming Business of Cyber Crime with Geoff White0:00309
2025-01-03Breaking Barriers with Helen Rabe0:00285
2025-01-01Success Simplified - The 3 Step Process for Hitting Your Career Goals in 2025 with John Hubbard0:00367
2024-12-27Bridging the gap with Frank Kim0:00275
2024-12-20SANS Threat Analysis Rundown with Katie Nickels | December 20240:00623
2024-12-20Countering Ransomware with Jen Ellis0:00258
2024-12-17CyberThreat 2024 Recap: Highlights, CTF Competition, and Key Insights0:00327
2024-12-162024 SANS Difference Makers Awards Ceremony0:001,507
2024-12-13Leading Global Cybersecurity with Christine Bejerasco0:00273
2024-12-13Understanding the Geopolitical Landscape of Cyber Security with Shashank Joshi0:00320
2024-12-11Three Keys To Becoming a Cyber Risk Officer0:001,122
2024-12-07SANS Cyber Leaders Podcast Trailer0:00362
2024-12-04Understanding the 2024 Updates to the NIST Cybersecurity Framework0:00920
2024-12-04Understanding the Risk Management Mandates in 2024 Cybersecurity Regulations0:00437
2024-12-02How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud0:00413
2024-11-22SANS Threat Analysis Rundown with Katie Nickels | November 20240:00661
2024-11-18Top Three CISO Strategic Issues0:00521
2024-11-11Using LLMs to Build Cyber Exercises | Ep. 5 The Incident Commander Series0:00797The Incident
2024-11-08SANS Live Training: Network Security 2024 Recap0:00375
2024-11-08SANS Live Training: SANSFIRE 2024 Recap0:00125
2024-10-24SANS Cloud Security Exchange 2024: AWS Session0:00417
2024-10-24SANS Cloud Security Exchange 2024: Microsoft Session0:00357
2024-10-24SANS Cloud Security Exchange 2024: Google Session0:00229
2024-10-16“Secure AI” is 20 Years Old0:00633
2024-10-14Supply Chain Attacks: Why Security Leaders Must Act Now0:00377
2024-10-14Navigating the Al Frontier: The Next Wild Innovation0:00220
2024-10-14From Compliance to Leadership: What Every CISO Needs to Know0:00364
2024-10-14Why Should You Attend SANS Cyber Defense Initiative 2024?0:00150
2024-10-09Lightning Talk: AI for SOC Teams - Enhancing Incident Response and Vulnerability Management0:00476
2024-10-09How GenAI is Changing Your SOC for the Better with Seth Misenar0:00503
2024-10-09From Clues to Containment - Unraveling A Gift Card Fraud Scheme with Mark Jeanmougin0:00216
2024-10-04Making Secure AI Real: Real Threats, Lessons Learned, and Future of the Secure AI Technology Stack0:00319
2024-10-04AI’s Achilles’ Heel: Navigating the OWASP Top 10 for LLMs0:00244
2024-10-04Lightning Talk: Markov Chains - potentially faster log analysis0:00212
2024-10-04Lightning Talk: Enhance Investigations Using LLM, Embeddings, and Clustering0:00192
2024-10-04Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations0:0094
2024-10-04“Secure AI” is 20 Years Old0:0098
2024-10-04Gen-AI for DFIR in the Real World: Practical Use Cases0:00274
2024-10-04The Frontier of Cybersecurity: Defending Against AI-Based Threats0:00297
2024-09-27SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition0:00603
2024-09-23Into the Looking Glass, Medical Device Cybersecurity | Veronica Schmitt0:00254
2024-09-23Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons0:00116
2024-09-23Welcome to the SANS Healthcare Forum 2024 | Rich Greene and Stacy D0:0059
2024-09-23Healthcare Threat Landscape and Risk Mitigation | Nitin Natarajan, CISA0:0093
2024-09-23AI in Medical Diagnostics | Rob T. Lee and James Lyne0:0070
2024-09-23Crisis Management in Healthcare | Steve Armstrong-Godwin0:00110
2024-09-23Enhanced Vendor Risk Assessment | Tony Turner0:0081
2024-09-23Tools for Simplifying Regulatory Requirements for Risk Assessment | James Tarala0:00113
2024-09-19Why Zero Trust is the Key to Cybersecurity in 2024 and Beyond0:00602
2024-09-12SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers0:00522
2024-09-12SANS Compliance Countdown 20240:00972Guide
2024-08-29Elevating Your Audit Strategy: Insights from the CRF Audit Framework0:00282
2024-08-26SANS Live Training: Security West 2024 Recap0:00312
2024-08-16Navigating the Path to Zero Trust in 20240:00496
2024-08-06A Winning Partnership in Cybersecurity Talent Development0:00202
2024-08-02SANS | GIAC Workforce Report Outcomes Panel Conversation46:12411
2024-08-02Breaking Barriers: Christine Morency’s Inspirational Cybersecurity Journey33:42293
2024-08-01Breaking Barriers: Christine Morency's Inspirational Cybersecurity Journey32:44123
2024-07-29Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 412:18307
2024-07-24Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace51:52172
2024-07-24How to Attract, Hire and Retain Mid-Level Cybersecurity Roles47:07460Guide
2024-07-20Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 83:44163Guide
2024-07-18Understanding the New NIS2 Directive: Compliance for EU Businesses42:37320Guide
2024-07-10Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 75:36294Guide
2024-07-10Understanding Ransomware Threats to ESXi: Essential Insights53:391,385
2024-07-01Cyber Wars: The Legal Force Awakens56:35610Guide
2024-06-30Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 65:22375Guide
2024-06-26Understanding the New NIS2 Directive: Compliance for EU Businesses43:31482Guide
2024-06-26Understanding the New NIS2 Directive: Compliance for EU Businesses50:27862
2024-06-20Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 54:31201Guide
2024-06-12Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights27:14703
2024-06-10Part 2 - The Achilles Systems Hack Assessment Series: Revisiting Enterprise Controls58:15343
2024-06-10Part 1 - The Achilles Systems Hack Assessment Series: Breach or Blueprint?52:34450
2024-06-10Security Assurance | The 8 Domains of the Cloud Security Maturity Model | Part 44:53269Guide
2024-06-06For the Win: Aligning Security Initiatives with the Business33:40371
2024-06-06Managing Risk in an AI-powered Future26:01309
2024-06-06Keynote | Challenges and Opportunities for Modern CISOs44:16214
2024-06-06Fireside Chat | Leading Cybersecurity: Risks, Relationships, and Resilience36:00228
2024-06-06Leading Without Authority: Leadership Beyond Titles20:50207
2024-06-06Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience33:50189Guide
2024-06-04Supply Chain Compromises Pt. 1 | The Incident Commander Series Ep. 312:19374
2024-06-03Top Five Trends in CISO Leadership1:01:50820
2024-05-29Security Governance | The 8 Domains of the Cloud Security Maturity Model4:13408
2024-05-29From Compliance to Leadership: What Every CISO Needs to Know35:08672