Channel Avatar

SANS Institute @UC2uPNhGken-ogEpJDi4ly6w@youtube.com

None subscribers - no pronouns set

As the leading organization in computer security training, t


32:10
2024 Cyber Defense Trends and Predictions
01:30
CyberThreat 2023
01:40
Introducing SANS Executive Cybersecurity Exercises
01:36
A Day in the Life: A Sneak Peek into SANS Live Cybersecurity Training Events
50:39
Nate Lee: Building a GenAI Security App for Fun (and No Profit)
58:56
Fred Bret-Mounet: Eating Pasta and Not Building Fort Knox
40:24
Empowering Tomorrow’s Security Leaders with the SANS Transformational Triad
02:25
LDR551: Building and Leading Security Operations Centers | GSOM
30:37
Cyber Warfare Frontlines: Unveiling the Digital Battlefield with Rob Lee and Jake Williams
50:21
Steve Tran: Hacker, Magician, Police Officer, and CISO
41:17
Deneen DeFiore: Being a Business Focused CISO, CIO, and Board Member
34:12
Thinking Outside the Firewall: Unconventional Cybersecurity Journeys
01:22
SANS Network Security 2023 Recap: Cybersecurity, Night Talks, & Puppies!
52:14
Kapil Assudani: Cloud, AI, and Reducing the Attack Surface
01:03:11
Managing Information Security Risk with CIS Controls
36:41
Weird Security Voyeurs Unite
01:00:31
Three Cloud Security Differentiators for Leaders
46:22
Mike Melo: The Case for DSPM vs. CSPM
49:23
Applying the Science of Human Behavior to Cybersecurity
04:54
SANS Institute's Lance Spitzner Breaks Down the New White House AI Executive Order
50:39
Jadee Hanson: Balancing CISO, CIO, and Product Leadership
44:06
Navigating the Serverless, Containerized, and IaC Vulnerability Management Revolution
48:07
Let's Settle This in the Cyber Range
47:06
Brett Cumming: Saying Yes Led to a Career in Cybersecurity
43:01
Building the Security Culture Dream Team
47:02
Bernard Brantley: Cutting Edge Cloud Thinking and Team Building
41:21
Rinki Sethi: From Analyst to CISO and Board Member
32:35
Healthcare Ransomware Discussion | Ryan Chapman
24:11
Artificial Intelligence Panel Discussion | David Hoelzer, Robert Wood, and Lee Kim
23:55
Meta Security Review of a Patient Controlled Device | Monta Elkins
32:08
Web App Security | Chris Edmundson
26:07
Securing The Patient | Heather Mahalik
24:00
The Secret to Vulnerability Management in Healthcare | David Hazar
20:49
Artificial Intelligence in Healthcare and How to Use it to Defend | David Hoelzer
41:54
Defending Your Business Against Ransomware & Cyber Extortion
44:18
To Click or Not to Click?
01:04:00
Guidance on Leading the Cloud Security Journey
04:51
What's new with SANS SEC301 Introduction to Cyber Security?
36:53
Threat Actor Tool Analysis at Enterprise Scale
01:00:56
Cybersecurity Standards Scorecard | 2023 Edition
59:03
You came with *that* plan? You're braver than I thought!
38:35
FEATURE SEGMENT: Detection Engineering: The Blue Team Cheat Code
39:24
Detection Engineering: The Blue Team Cheat Code
52:09
FEATURE SEGMENT: Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis
48:45
Inside SANS Holiday Hack Challenge 2023
45:36
In Hot Pursuit: Tracking Ransomware Actors
34:38
Analysis on legit tools abused in human-operated ransomware
29:21
Lessons from the Frontlines: Ransomware Attacks, New Techniques, and Old Tricks
49:41
Panel | Going Dark: DOS’ing Yourself for the Better
27:35
Cracking Ransomware: Bypassing Anti-Analysis Techniques and Decrypting LockBit Black Ransomware
34:24
Data Science for Ransomware Defense and Negotiation
35:25
A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
25:56
Beyond Encryption: Exploring the Tactics Ransomware Operators Use During Negotiation & their Impact
27:12
You Got a TOAD: A Novel Technique for Dropping Ransomware
24:45
Keynote | A Post-Apocalyptic Hellscape: What Ransomware Looks Like After RaaS
29:06
Your Cloud Security Journey: Key Trends, Capabilities, & Skills
27:38
FEATURE SEGMENT: Your Cloud Security Journey: Key Trends, Capabilities, & Skills
48:59
NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
01:01:00
No Experience Required – Gaining Clarity for a Career in Cybersecurity
01:32:25
Bonus Episode: What does it take to author a cybersecurity book?