April 14, 2020Consulting on The Side: Top Ten Questions Answered!SANS
April 15, 2020Outside-In Scanning Is Not Cyber Risk ManagementSANS
April 15, 2020Purple Team Tactics: A Technical Look at Windows 10 Exploit MitigationsSANS
April 15, 2020Digital Investigations for Mac & Windows: A Forensic WorkshopBlackBagTech
April 16, 2020Using Detection Technologies to Defend Against Active Directory and Ransomware AttacksSANS
April 16, 20203 ways to advance your vulnerability management program TODAY!SANS
April 16, 2020Hacking in the Public InterestBlackHat
April 16, 2020Digital Investigations for Private InvestigatorsParaben Corporation
April 20, 2020Hacking JenkinsSANS
April 21, 2020Zero Trust: What You Need to Know to Secure Your Data and NetworksSANS
April 21, 2020Securing Your Future in DFIRSANS
April 23, 2020How to Better Understand HR to Accomplish our Cybersecurity GoalsSANS
April 28, 2020Adversary emulation using CALDERA Building custom plugins Part #3SANS
April 28, 2020SANS Top New Attacks and Threat ReportSANS
April 29, 2020How to Design a Least Privilege Architecture in AWSSANS
May 6, 2020Transforming Detection and Response: A SANS Review of Cortex XDRSANS
May 19, 2020SANS 2020 Automation and Integration Survey ResultsSANS
May 27, 2020Is Your Threat Hunting Effective? A New SANS SurveySANS
May 29, 2020SANS 2020 Automation and Integration Survey Panel DiscussionSANS
June 18, 20202020 Asset Management Trends: As IT Complexity Increases, Visibility PlummetsSANS
June 23, 2020Consulting: What Makes a Good Consultant, from the Hiring One and Being One perspectivesSANS
July 20, 2020SANS Oil & Gas Solutions Forum: Objective-based Security Drives Effective SolutionsSANS
July 22, 2020Cyber Security 101 for Human Resource ProfessionalsSANS
July 29, 2020Closing the Critical Skills Gap for Modern and Effective Security Operations Centers (SOCs): Survey ResultsSANS
July 30, 2020Closing the Critical Skills Gap for Modern and Effective Security Operations Centers (SOCs): Panel DiscussionSANS