All SANS webcast links

(updated 7:37 AM 7/14/2007)

All SANS webcast links

(updated 11:51 PM 6/21/2006)


ISC Threat Update: Internet Storm Center: Threat Update

GIAC Secure Software Programmer (GSSP) for Java/Java EE Review

Ask The Expert: The Importance of Web Application Security for PCI Compliance

WhatWorks in Log Management: Regulating Logs Globally

Ask The Expert: Securing the Castle: From Doors to Data

Ask The Expert: Reputation-Based Network Security

Late-Breaking Computer Attack Vectors

SANS White Paper Supporting WebcastCorrelating SIM information to Detect Insider Threats

SANS Analyst Paper Supporting Webcast"Using SIM in your PCI compliance program"

ISC Threat Update: Internet Storm Center: Threat Update

WhatWorks in Vulnerability Management and Penetration Testing: Securing Networks from Malicious Code and Attacks at the Commonwealth of Pennsylvania

Encryption Procurement: Setting a Standard

SANS Analyst Paper Supporting WebcastThe SANS 2007 Log Management Market Report

WhatWorks in Event and Log Management: Driving Compliance with Log Management at Tyson Foods

Ask The Expert: Maximizing the Value of Your Log Management Solution

Ask The Expert: PCI Compliance Made Easier: The Value of Security Information and Event Management

Getting Back to Basics: Principles of System Lockdown

Sourcefire WhatWorks Webcast with XanGo

ISC Threat Update: 0592007

Tool Talk: Making Effective Use of Vulnerability Scan Results and Fine-Tuning Security Infrastructure

Tool Talk: Protecting the Information You Did Not Know Needed Protection

Ask The Expert: Application Security: "FIX" the code or deploy a "WAF" - a debate to help you prioritize.

Ask The Expert: Protecting Sensitive Data from Commercialized Network Attacks

Penetration Testing with Confidence: 10 Keys to Success

Ask The Expert: The Truth About Log Management

ISC Threat Update: SQL Injection: The Hacker's Gold Mine

The New National Secure Programming Test and What's Happening with Application Testing Tools

Be a Life Saver (Not a Fear Monger): Making Penetration Testing Work for Your Organization

Sustainable Compliance through Host Access Management and Data Security Reviews

Ask The Expert: The State of Malware Today

Ask The Expert: Mobile Data Security and Accountability: It's About More than Encrypting Bits on Disks

ISC Threat Update: Internet Storm Center: Threat Update

Tool Talk: If I'd Only Known: Benefits of Advanced Correlation

Ensuring PCI Compliance and Protecting Customer Data at lastminute.com

Vista Security in a Nutshell: What You Need to Know Now

Worried about the data on your mobile devices? Best Practices in deploying Encryption.

ISC Threat Update: Internet Storm Center: Threat Update

Ask The Expert: Establishing Compliance & Maximizing Value

Ask The Expert: Malware Analysis Shortcuts

Tool Talk: Who Let the Hackers In? Preventing Social Engineers from Partying on Your Network.

WhatWorks in Log and Event Management: Maximizing the ROI of Logging Tools

Tool Talk: Protecting the Empire: The NOC and SOC Ultimate Superforce Team

Ask The Expert: Security Controls to Ensure Compliance - The Next Phase: Controls Automation & Monitoring

Ask The Expert: Today's Security Challenge: Protecting Privacy Data

Ask The Expert: Network/Perimeter Security is missing today's most dangerous threats: Challenges with securing Web applications

ISC Threat Update: Internet Storm Center Webcast: Security Assurance: Vulnerability Management With Automated Penetration Testing

WhatWorks in Intrusion Prevention and Detection: Drilling Down into Alert Data with FXall

Ask The Expert: The Audit "Big Data" Challenge: The real-world anatomy of a compliance data management solution analyzing 100 Billion security event records

Ask The Expert: Unify and Simplify Identity and Access Management (IAM) for Today and Tomorrow

WhatWorks in Log Management: Streamlining Log Management at a U.S. Government Agency

ISC Threat Update: Internet Storm Center: Threat Update

Ask The Expert: Defending the Self-Defending Network with Virtualized Enterprise UTM

Tool Talk: Enterprise-Strength Log Management Solutions

Tool Talk: Communications in a Distributed World: Building VPNs with Security

Ask The Expert: The Convergence of Malware and the Future of Integrated Threat Management

Ask The Expert: Using Application Firewalls to Comply with the PCI 1.1 Data Security Standard

Ask The Expert: The Vulnerability Management Lifecycle

ISC Threat Update: Internet Storm Center: Threat Update - Five Code Red Threats to Windows Server

Ask The Expert: Network/Perimeter Security is missing today's most dangerous threats: Challenges with securing Web applications

Lessons Learned In Deploying Log Management as an Early Warning System at Manulife

Ask The Expert: Get Smart: The Key to Intelligent Event Correlation. It's the NetworkStupid

Tool Talk: Network Nightmares? Exorcise Hell-Bent Hackers with Penetration Testing

"Hacking the Sun Tzu Way: Applying the great master's ideas to penetration testing and defending your systems"

Ask The Expert: Building a Security Operations Center Untangling the Mess Created by Multiple Security Solutions

Staying Ahead of Evolving Threats w/ SANS & Leading Analyst Firm

Ask The Expert: Database Security: PreventionDetectionand Monitoring

ISC Threat Update: Internet Storm Center: Threat Update

WhatWorks in Patch and Configuration Management: Securing Systems and Saving Money with Multifunction Management Tools

Wednesday Webcast: Protecting Information & Managing Risk

Virtual Machine Detection: Keeping Attackers Inside The Matrixby Ed Skoudis

Ask The Expert: Using Web Application Firewalls to Protect Mission Critical Applications

Messaging Application Gateway Security with Baptist Health System

Trustworthy IPS Testing and Certification

What Works in Vulnerability Management and Pen Testing: Testing System Security with Virginia Tech

ISC Threat Update: Internet Storm Center: The Evolving Malware Landscape

Cyber Attacks Against SCADA and Control Systems - Real World Trends and Real World Solutions

Ask The Expert: Proactive Security - Eliminating Vulnerabilities Before Attackers Know They Exist

Wednesday Webcast: When Malware Meets Network Steganography

Ask The Expert: Defense in Depth: An answer to the disappearing patch

WhatWorks in Log Management: Critical Considerations in Building & Deploying Global Log Management

Tool Talk: "Gooey GUIs to Concrete Clients: Hardening Your Network from the Inside Out."

ISC Threat Update: Internet Storm Center: Threat Update

Wednesday Webcast: Log analysis using OSSEC and Logging in Depth

WhatWorks in Log Management: Meeting Compliance Needs with Tractor Supply Company

Part 3: Web Browser Attacks - What happens at the Endpoint?

Deep IMPACT: Justifying the Security Budget You Need Using Automated Penetration Testing

Ask The Expert: The Law of IT System Logs

ISC Threat Update: Internet Storm Center: Threat Update and What You Don't Know CAN Hurt You: Defending Against Hidden Email Threats

Ask The Expert: Comparing Apples and Oranges: Challenges of Event Log Management and Analysis in a Complex Enterprise

Tool Talk: How to Reach Compliance Nirvana if You are Subject To Payment Card Industry (PCI) & Government Regulatory Compliance

Essential Windows Command-Line Kung Fu for Info Sec Pros

Wednesday Webcast: SANS Analyst webcast: Best Practices in Vulnerability Management - Why penetration testing is a critical component

Tool Talk: Comprehensive Threat Management: Helping You Navigate The Data Security Quagmire

ISC Threat Update: Internet Storm Center: Threat Update

Tool Talk: Hacking the Hallways: The Convergence of Physical and Logical Security

Wednesday Webcast: Hacker Techniques: Windows Malware and Blind SQL Injection


updated
http://rmccurdy.com ( MORE RSS FEEDS )
free anti spyware malware virus and security scripts
Internet Storm Center: Threat Update - June 2006
The Mobile User - Secure Access from Anywhere (even the Home PC!) Part 1
Internet Storm Center: Threat Update - June 2006
Hacking the Hallways: The Convergence of Physical and Logical Security
Hacker Techniques: Windows Malware and Blind SQL Injection
Deep IMPACT: Justifying the Security Budget You Need Using Automated Penetration Testing
The SCADA and Process Control Security Procurement Project Update
Part 2: The Branch Office: Remote Gateways and Security Considerations for WAN Optimization Project
WhatWorks in Log Management: "Judging Log Management with San Bernardino County Superior Court"
Internet Storm Center: Threat Update + Defending against DoS attacks
Ask The Expert: Who's Guarding the Guards? Employing a Privileged User Monitoring Strategy.
Web Application Security
Tool Talk: From Logs to Logic: Turning Log Piles into Log Intelligence
WhatWorks in Intrusion Prevention Systems: "Low-Maintenance Security"
WhatWorks in Vulnerability Management: "Expediting Patching with Nuclear Fuels"
Tool Talk: Go Hack Yourself! See how automated penetration testing with CORE IMPACT can make your network more secure.
Internet Storm Center Threat Update: What you need to know about 5 new Microsoft Patches
How Leveraging Security Standards Can Help with Compliance
WhatWorks in Log Management: Meeting Regulatory Compliance Requirements at Northwestern Memorial Hospital
Further Evolution of the Sploit: Exploitation Frameworks and the Emergence of Advanced Payloads
Tool Talk: True Intrusion Prevention - Protecting Against Threats From All Vectors, At All Times
Internet Storm Center: Threat Update - March 2006
What Works in Intrusion Prevention: Sheltering Networks with The Red Cross
VoIP Security
Anatomy of an Attack
Tool Talk: How to Create and Audit Defensible Security Compliance Controls
What is The Real Threat to SCADA Systems?
WhatWorks in Intrusion Detection Systems: Monitoring Unique Traffic with Retail Decisions
WhatWorks in Web Application Security: "Educating Code Developers with the University of Missouri"
Internet Storm Center: Threat Update - February 2006
WhatWorks in Intrusion Prevention Systems: Guarding Sensitive Data with Financial Profiles Inc.
The Spyware Threat Today
What Works in Intrusion Prevention: "Eliminating Virus Outbreaks with Sara Lee"
WhatWorks in Penetration Testing: Improving System Health with Care New England
WhatWorks in Secure Email/Anti-spam : Home Sweet Home at The Villages
WhatWorks in Intrusion Prevention Systems: "Defending Government Security with Unisys"
Internet Storm Center: Threat Update - January 2006
Update on the Law of IT Security Policies: New Guidance under GLBA
Migrating from WEP to WPA2
WhatWorks in Intrusion Prevention and Detection: Law Firm Lays Down the Law on VoIP Security
Internet Storm Center: Threat Update - December 2005
WhatWorks in Intrusion Prevention: Discovering Threats With Discovery Communications
Regulatory Compliance and the Impact of the Payment Card Industry (PCI) Specifications
Spam, Email Security, and Compliance Initiatives
Tool Talk: The Security Pager is Sounding - Can You Respond?
WhatWorks in Intrusion Prevention and Detection: Real-time Network Awareness Creates a Greater State of Confidence
WhatWorks in Patch and Configuration Management - TRW Reduces the Time to Patch
Internet Storm Center: Threat Update - November, 2005
Security on Demand: Best Practices for Information Protection
Enterprise Approaches to Fighting Spyware
The Payment Card Industry (PCI) Data Security Standard
Tool Talk: Automated Penetration Testing with CORE IMPACT
Tool Talk: Log Management for Large Enterprises - New Tool
WhatWorks in Intrusion Detection to Meet PCI/VISA and Other Security Standards
Tool Talk: Security & Regulatory Issues Facing IT Security Professionals
Internet Storm Center: Threat Update
Tool Talk: The Anatomy of a Phishing Email
What Works in Intrusion Prevention
Four Ways To Monitor Your Wireless Network
WhatWorks in Intrusion Prevention -- And Stops Internal Attacks As Well!
What Works in Security Information Management
Securing MS Exchange Messaging
Secure Software Webcast Series - September 2005
What Works in Intrusion Detection and Prevention
Internet Storm Center: Threat Update - September 2005
Tool Talk: Enterprise Security Management for your Security Operations Center (SOC)
What Works in Log Management
Secure Software Series: Effective Encryption
What Works in Stopping Spyware
What Works in Stopping Spear Phishing
Internet Storm Center: Threat Update - August 2005
Network Security for Small-Midsized Companies
Secure Software Webcast Series - July 2005
What Works in Strong Authentication
Tool Talk: Email Security Essentials - How to make email good again!
Stabilizing Information Protection with Regulatory Compliance & Managing Online Compliance Risks
Tool Talk: Taming the Compliance Beast: Making Sure E-Mail Does Not Violate Regulatory Compliance Rules
What Works in Intrusion Detection and Prevention
Secure Software Webcast Series
What Works in Business Transaction Integrity Monitoring
Internet Storm Center: Threat Update
What Works in Intrusion Prevention Using Multi-function Appliances to Secure the Remote Office and Protect the Enterprise
Tool Talk: Desktop Security - A Multi-Layered Approach to Protecting Your Investment
Web Services Security: The good, the bad, and the ugly
Secure Software Webcast Series
What Works In Firewalls And Anti-Virus Gateways
Harnessing the Power of Snort
Internet Storm Center: Threat Update - May 2005
Cutting Edge Hacker Techniques
Secure Software Webcast Series - April 2005
Approaches, Trends and the Real Market Definition for Log Management
What Works in Vulnerability Management
What Works for Vulnerability Management & Penetration Testing
Internet Storm Center: Threat Update
Best Practices for Winning the War Against Viruses and Spam
Secure Software Webcast Series - March 2005
What Works To Reduce Security Vulnerabilities
Internet Storm Center: Threat Update - March 2005
Control Security Risks in Software Design and Development
Internet Storm Center: Threat Update - February 2005
Spam Prevention: Past, Present and Future
What Works in HIPAA Compliance Using Intrusion Prevention
What Works in Intrusion Prevention
Internet Storm Center: Threat Update - January 2005
Home Network Security
Internet Storm Center: Threat Update -December 2004
What Works in Web Filtering and Web Security
What Works in Intrusion Prevention Appliances
What Works For Enterprise Spam Management
What Works in Stopping Spam and Email Viruses
Honeypots
Hacking Evolution: New Trends in Exploits and Vulnerabilities
What Works in Vulnerability Management and Remediation
How to Starve Internet Worms and Viruses
What Works in Making Sure Remote Computers Are Safe?
Tool Talk: Eliminate the SSL Blind Spot in Your IDS!
SANS Internet Storm Center October 2004
What's NOT Working in Security in 2004
PGP Education Series: Top 10 Things You Need to Know to Choose an Encryption Solution
Internet Storm Center: Threat Update - Sept. 2004
Trends in Malware Evolution
ecuring Instant Messaging In The Enterprise:
Internet Storm Center: Threat Update - August 2004
How to Write a Security Book
What Works in Intrusion Prevention: A Case Study of TippingPoint at Los Alamos
Internet Storm Center: Threat Update
Tool Talk: Segmenting Networks: ACLs
The Spam Problem Solved: Bechtel Corporation Case Study
Protecting Critical Government Infrastructure - VeriSign's Managed Security Services
Internet Storm Center: Threat Update - June 2004
Patch Management
What Works in Vulnerability Management: A Case Study of Qualys at ICI Chemicals
Tool Talk: Who's reading your email?
Internet Storm Center: Threat Update
Bluetooth Wireless
Internet Storm Center: Threat Update
Steganography: Creating and Detecting Hidden Messages
Tool Talk: PGP Education Series: Sensitive but Unclassified
Combining IDS/IPS and Vulnerability Management - Improved protection, reduced administration
SANS Strategic Briefing: Auditing a Network Perimete
How To Successfully Complete The GSNA Practical Assignment
Internet Storm Center: Threat Update - March 2004
Integrating Change Management with Security Controls
Thin Client Strategies: Reducing Risk Through Centralized Computing
HIPAA Security Step-by-Step Guide - Part 2
SANS Special Webcast: HIPAA Security Step-by-Step Guide - Part 1
Internet Storm Center: Threat Update
SPAM
PGP Education Series: Seamless Encryption in Government
Internet Storm Center: Threat Update - January 2004
Seven Steps to Effective Vulnerability Assessments and Remediation
Tool Talk: Untangling the Vulnerability Management Landscape
Tool Talk: The Spam Problem
Internet Storm Center: Threat Update - December 2003
Ten Ways To Hack Proof Your Identity
Internet Storm Center: Threat Update - November 2003
Tool Talk: Putting Security Policies to Work Through Automated Auditing
Improving Router Security with RAT: The Top 10 List
Tool Talk: Pen Testing and Securing Wireless Communications
Tool Talk: Protecting the Enterprise with Scalable Security Event Management , Part III - Rapid Incident Response
Tool Talk: Protecting the Enterprise with Scalable Security Event Management , Part II - Intelligent Event Correlation
Top 5 Ways to Make Your IDS Better
How To Successfully Complete GCFA The Practical Assignment
Tool Talk: Security Strategies for Day-Zero Defense
Is Your Web App Secure? How Do You Know?
Six Advanced SSH Techniques
How To Successfully Complete GSEC The Practical Assignment
Tool Talk: Protecting the Enterprise with Scalable Security Event Management , Part I - Accurate Detection/Consolidation
GIAC Presents: How To Successfully Complete GCIH The Practical Assignment
Tool Talk: Managing and Enforcing Host-Based Security
How To Successfully Complete GCUX The Practical Assignment
How To Successfully Complete GCIA The Practical Assignment
How To Successfully Complete GCFW The Practical Assignment
Tools and Tips for Analyzing Malware
Thursday Tool Talk: Wireless - The Ever Changing Landscape of Network Security
How To Successfully Complete The GSNA Practical Assignment
Wednesday Webcast: Top Three Advances in Honeynet Technology
The Coming Super Worms
5 Ways to FIRE up Your Incident Response and Forensic Environment
Legal Liability For Information Security: Ask the Experts
Wednesday Webcast: Intellectual Property: Protection, Detection, Remediation
WebDAV Buffer Overflow Exploit Against IIS 5.0
Top 3 Attack Tools Threatening Wireless LAN'S
Understanding the New Sendmail Vulnerability and How To Protect Your Systems
Wednesday Webcast: Legal Liability for Security Breaches - and Minimum Standards of Due Care
Wednesday Webcast: The Top 10 Unix Vulnerabilities
SANS Wednesday webcast
SANS Special Webcast: The SQL Slammer Worm: Ask The Experts
Wednesday Webcast: Top 10 Syslog-based Signs You've Been Hacked
Wednesday Webcast: Intrusion Prevention Essentials
Wednesday, November 06 at 1:00 PM EST (18 UTC/GMT)
Wednesday Webcast: Using Windows Event Logs for Incident Response
Wednesday Webcast: Statistics and Computer Security
Wednesday Webcast: Legal Issues in Monitoring Network Use
Wednesday Webcast: 10 Steps Toward Solaris Security
Wednesday Webcast: Internet in Crisis - Lessons Learned from Internet Attacks
Wednesday Webcast: What Security People Get Paid, and Why
Wednesday Webcast: Collecting of Business Continuity/Disaster Recovery Plans
Wednesday Webcast: Honeynet Technology
Wednesday Webcast: Router Audit Tool and Benchmark
Wednesday Webcast: Social Engineering