To access and download Summit Archive presentations, you must be a member of the SANS.org Community. If you have a SANS Account, please login - or join the SANS.org Community here.
SANS ICS Europe 2024 Munich (May 2024)
- Breaking The Loop of Uncertainty - Kai Thomson.pdf
- Business Continuity Plan? For ICS & OT? Systems? - Oleg Vusiker.pdf
- Panel Discussion - What You Need To Know About the NIS II Directive From an ICS Perspective.pdf
- SCADAsploit C2.OT_How to break an ICS system - Omar Morando.pdf
- Tactical Packet Analysis - Julian Gutmanis.pdf
- The Art of Deception - How to Use Modern Honeypots to Secure ICS Environments - Daniel Buhmann.pdf
- The Backup Alchemy Tool - Falk Lindner and Daniel Meister.pdf
- Threat Hunting Doesnt Have To Be Hard - Don C Weber.pdf
- Threat-Intelligence Based Defense-In-Depth Implementation in OT Environments - Matan Dobrushin.pdf
SANS CloudSecNext Summit & Training 2023 - Live Online (October 2023)
SANS Ransomware Summit 2023 (June 2023)
- Arun Warikoo - You Got a TOAD.pdf
- John Sturgis - Data Science for Ransomware Defense and Negotiation.pdf
- Jono Davis - A RaaS-ipe for Disaster .pdf
- Keynote - Allan Liska - A Post-Apocalyptic Hellscape- What Ransomware Looks Like After RaaS.pdf
- Noel Keijzer - Cracking Ransomware - Bypassing Anti-Analysis Techniques and Decrypting LockBit Black Ransomware.pdf
- Peter O & Alessandra Di Carlo - Lessons from the Frontlines- Ransomware attacks, New Techniques and Old Tricks.pdf
- Sean Jones and Bryce Webster Jackson - Beyond Encryption- Exploring the Tactics Ransomware Operators Use During Negotiation and their Impact.pdf
- Toru Yamashige & Keisuke Tanaka - Analysis on legit tools abused in human operated ransomware.pdf
SANS Blue Team Summit & Training 2023 (June 2023)
- BlueHound - Dekel Paz.pdf
- Blurple Teaming - Open Source Continuous Security Testing in the SOC, David Hunt.pdf
- Bridging the Gap - Improving Rules Effectiveness by Integrating Detection and Response, Paul Hutelmyer.pdf
- Cloudy with a chance of breaches - A cloud OSINT and forensics adventure - Matt Edmondson.pdf
- Defending Space Systems - Scott Lynch.pdf
- Drop It Like Its Qbot - Stef Rand.pdf
- Ecosystem of Insights - Building Operation Dashboards That Enable Teams, Ryan Thompson.pdf
- Hunting OneNote Malware - Hiren Sadhwani.pdf
- Keynote - How to Save Your SOC from Stagnation, Carson Zimmerman.pdf
- Keynote - Leave Only Footprints - When Prevention Fails, Eric Conrad.pdf
- The Cyber Pilfer Chain - Detecting and Disrupting Post-Exploitation Data Theft, Gerard Johansen.pdf
- Zero Trust Architecture - Ram Lakshminarayanan.pdf
SANS Cybersecurity Leadership Summit 2023 (May 2023)
- C is for CISO - and Also Charisma, Yael Nagler.pdf
- How AI Will Change Cybersecurity Leadership - Panel - Kim, Kim, McCaffery, Yu.pdf
- How CISOs Can Better Connect with Their Boards and Make the Case for Cybersecurity, Lucia Milica Stacy.pdf
- Keynote - Demonstrating CISO ROI with the C-Suite, Katie Arrington.pdf
- Leading High-Performing Teams During Lean Times, Ismail Cattaneo .pdf
- Risk Transfer Conundrum, Jess Walpole.pdf
SANS Small Business Cyber Summit 2023 (May 2023)
- Forrest Senti & Binil - Moving Small Businesses to the Cloud - What You Need to Know.pdf
- Joshua Franklin - How SMBs can Defend Against Top Threats Using the CIS Critical Security Controls.pdf
- Karen Evans - Creating a Culture of Cyber Readiness for Small Businesses.pdf
- Lisa Plaggemier - What are We Protecting.pdf
- Tasha Cornish - Locking It Down - Best Practices for Strong Passwords and Authentication Tools.pdf
SANS ICS Security Summit & Training 2023 - Live Online (April 2023)
- Blake Gilson - Combating Implicit Trust in West Texas Oil Field.pdf
- Bob Anderson - Orlando Utilities Commission Cyber Security and Efficient Management of Grid Edge Devices Project.pdf
- Christopher Lau - Building a Security Program for Operational Technology.pdf
- Danielle Jablanski - A Cross-Sector Methodology for Ranking OT Cyber Scenarios and Critical Entities.pdf
- Gabe Authier - Deeper Data Better Protection - Harnessing the Power of Vital OT Endpoint Information for Security Resilience and Performance.pdf
- Gus Serino - Secure Remote Access.pdf
- Ian Frist - Manufacturing Cybersecurity - Boots on the Ground and Back to the Basics.pdf
- Jason Christopher - The Future of OT Security.pdf
- Mark Gabriel - Keynote - Im all for progress its change I cant stand.pdf
- Michal Legin Establishing Your Baseline.pdf
- Mike Hoffman - Developing and Running ICS Tabletops.pdf
- Misha Belisle & Blaine Jeffries - Emulating Adversary Actions in the Operational Environment with Caldera OT.pdf
- Nikolas Upvanage - Do We Have Logs For That.pdf
- Paul Piotrowski - How to Perform Effective OT Cyber Security Risk Assessment.pdf
- Scott Lynch - The risk to Space as Satellite communications systems and ground networks are the new target for attackers.pdf
- Tim Schulz & Bryson Bort - Multiverse of Convergence - Charting IT OT Threat Overlap.pdf
- William Malik - Cyberphysical Threats to CNC Industrial Equipment.pdf
SANS Neurodiversity in Cybersecurity Summit (April 2023)
SANS New2Cyber Summit 2023: Reskilling Edition - Live Online (March 2023)
- Cybersecurity Role Finder - Navigating Your Personal Path into Cybersecurity Careers, Brian Correia, Jennifer Santiago.pdf
- From Nothing to Something - Getting Experience When You Have No Experience - Panel.pdf
- Going the Distance - Lessons from the Last Mile Education Fund, April Christina Curley.pdf
- New2Cyber - Everything You Need to Know to Start Your Cybersecurity Career, Naomi Buckwalter.pdf
- WiCyS Mentoring Program.pdf
SANS Cyber Threat Intelligence Summit & Training 2023 - Live Online (January 2023)
- Chris Sanders - Deconstructing the Analyst Mindset.pdf
- Drew Schmitt - Ransomware Rebranding So Hot Right Now.pdf
- Freddy M NFCERT - Measuring Success of your CTI program.pdf
- Gerard Johansen - The Cyber Vory.pdf
- Gert-Jan Bruggink - Reimagining the intelligence Deliverable Using Structured Threat Content.pdf
- Joe Slowik - Implementing Intelligence - Formulating Detections.pdf
- John Doyle - Developing The Analyst - Creating Career Roadmaps for Intelligently Progressing in CTI.pdf
- John Grim - The Report Writing Grimoire .pdf
- Jonathan Wrolstad - Starting an Intelligence Program Centered Around Open-Source Synapse.pdf
- Lina Lau - Unmasking the Iranian Apt Cobalt Mirage.pdf
- Matt Edmondson - Lessons Learned From Over a Decade in OSINT.pdf
- Nicklas Keijser - Breaking the Ransomware Tool Set.pdf
- Pedro Drimel, Jose Luis Sanchez Martinez - Practical CTI Analysis Over 2022 ITW Linux Implants.pdf
- Sherman Chu - Consume and Produce - The Economics of Cyber Treat Intelligence Operations.pdf
- Sierra Stanczyk - Cracking Intelligence Programs.pdf
- Sydney Jones - How to Use CTI No Matter the Size of Your Organization.pdf
- Tony Lambert - Malware Analysis - What is the Point.pdf
SANS CyberThreat Summit 2022 - Live Online (January 2023)
- 'A case for data-driven cybersecurity orchestration and automation- what it is, what challenges it addresses, and how it handles them' Leon Ward .pdf
- 'Abusing macOS shortcuts' Parthiban R & Siva P .pdf
- 'An overview of the current attacks on Ukrainian infrastructure in 2022 and incident responses carried out by CERT-UA' Yehven Bryksin.pdf
- 'Deriving Insight from Upstream Threat Actor Infrastructure and Victimology' Josh Hopkins.pdf
- 'Emerging threats against cloud application identities and what you should do about it' Yochana Henderson.pdf
- 'ENISA CYBERSECURITY Threat Landscape Methodology and Ransomware Threat Landscape' Ifigeneia Lella.pdf
- 'Enterprise IR- live free, live large' Erik Schamper, Lennart Haagsma .pdf
- 'Github & Security - our platform, products and support for open source' Paul Hodgkinson.pdf
- 'Information Operations. Dispatches from the frontlines' Martin Innes.pdf
- 'Intelligence Requirements on the Fly' Jamie Collier, Shanyn Ronis .pdf
- 'Kid Rock Meets the (Russian) IRA' Jack Stubbs.pdf
- 'Leveraging Campaigns to Untangle the Threat Group Ship of Theseus' Adam Pennington .pdf
- 'Love the way you Liderc. Analysis of an Iran-based threat actor' Curtis Hanson.pdf
- 'Navigating the Tradeoffs of Cyber Attribution' Jamie Collier, Shanyn Ronis.pdf
- 'Operation CuckooBees-Exploring Winnti's Adventures in Windows CLFS.pdf
- 'Overwhelmed By Malware and Phishing Alerts- Struggling to Identify Unknown Malware- Here is how to speed up investigation and response' Michael Bourton.pdf
- 'Rethinking the bad Narrative (419 Prevention) a Nigerian experience.pdf
- 'Tampering with airplane performance apps' Alex Lomas.pdf
- 'The Clustering Conundrum-A Behind-The-Scenes Look at Creating Threat Groups' Katie NIckels.pdf
- 'Think Like an Attacker' Nick Miles.pdf
- 'Two For One Firewall Zero Days' Tom Lancaster.pdf
- 'What's beyond a hash - Data Science Techniques for Analysing TLS Signatures' Josh Cowling.pdf
- 'Why wait for zero days - Vuln4Cast' Eireann Leverett.pdf
- EireannLeverett_Vuln4Cast_2.pdf
Pen Test HackFest Summit & Training 2022 (November 2022)
Pen Test HackFest Summit & Training 2022 - Live Online (November 2022)
- Alfie Champion - Maximizing the Value of Attack Detection Tooling with Atomic Purple Teaming.pdf
- Andrew Schwartz & Charlie Clark - Ive Got a Golden Twinkle in my Eye.pdf
- Antonio Piazza - Purple Team PIRs.pdf
- Bryson Bort - Advanced Purple Teaming.pdf
- Carrie Roberts - Getting Started with Atomic Red Team.pdf
- Christopher Peacock - In the Trenches - Purple Team Dos and Donts .pdf
- Daniel Feichter - Master of Puppets.pdf
- David Kennedy - Researched Adversaries.pdf
- Ed Skoudis - Reframing Hard Cyber Security Problems for Fun and Profit.pdf
- Elvin Gentiles - Developing High-Impact Malware with Minimal Effort.pdf
- James Shewmaker - Tactical MiTM for Attack and Defense.pdf
- Jason Ostrom - Purple Teaming Cloud Identity - Simulation Labs for Red and Blue teams.pdf
- Jayson Grace & Cedric Owens - Building A Purple Team At Meta.pdf
- Jean-Francois Maes - Fun with Shellcode (loaders).pdf
- Manish Tanwar - Flying under the Radar - Hiding web shells from Web application firewall.pdf
- Maril Vernon - Cyber Resilience - Purple Team Success in Practice.pdf
- Michael Long - Attack and Defend - Leveraging AWS Serverless Technology for End-to-End C2.pdf
- Mike Gualtieri - Crafting Adversarial Detections at Scale in Google Cloud Platform.pdf
- Milos Stojadinovic - Purple Teaming in an Enterprise.pdf
- Nick Frichette - What I Wish I Knew Before Pentesting AWS Environments.pdf
- Rob Lee - Offensive Forensics.pdf
- Sander Forrer - Kernel Karnage - Patching EDR in kernel space.pdf
- Savannah Lazzara & Ariyan Bakhti Suroosh - Santas Guide To Breaking Into Buildings.pdf
- Scott Taylor - MalDev and Syscalls and BOFs, Oh My!.pdf
- Tal Melamed - Hacking Serverless Applications - A Treasure Map for Uncharted Waters.pdf
- Waqar Ahmed - Smart contract hacking .pdf
SANS APAC ICS Summit Singapore 2022 - Live Online (November 2022)
- Andre Shori - The Myth of Compliance.pdf
- Bruce Large - Applying OT Cyber Security to Projects.pdf
- Dean Parsons - ICS Threat Landscape Update.pdf
- Dean Parsons ICS Threat Landscape Update.pdf
- Gerry Chng - Bridging the Talent Gap.pdf
- Jason Dely - Vulnerability Disparity of ICS and OT Devices.pdf
- Justin Searle - Scanning Highly Senstive Networks.pdf
- Peter Jackson - ITOTConvergence is dead.pdf
Blue Team Summit & Training 2022 - Live Online (October 2022)
- Baby Steps to the Future - Evolving into the Nex-Gen SOC, Craig Bowser.pdf
- Empirically Diagnose Privilege Escalation via Active Directory Account Sighting, John Jiang, Gary Sun.pdf
- Enabling Defenders to Conduct Incident Response Investigations with Open Source Tools, Logan Flook.pdf
- From IT to Blue Team - Your Time is Now, Fletus Poston III.pdf
- IR Prep and Detection Engineering When the Cloud is Your Data Center, Don Murdoch.pdf
- Keynote - 11 Strategies for World-Class Security Operations, Ingrid Parker, Carson Zimmerman.pdf
- Keynote - A Deep Dive into AWS IAM Privilege Escalation Attacks - Defenders Edition 2022, Ashwin Patil, Roberto Rodriguez.pdf
- Once Upon a Logon - How Logon Sessions Help Defenders See the Bigger Picture, Jonathan Johnson.pdf
- Prioritizing Defensive Capabilities, Ben Langrill.pdf
- Responding to Advanced Adversaries, Anurag Khanna.pdf
Cybersecurity Leadership Summit & Training 2022 - Live Online (September 2022)
- A Culture of Trust - Building and Retaining Cybersecurity Teams, Jason Loomis.pdf
- A Security Paradigm Shift - Stop Worrying, Love Metrics, Shirley Salzman.pdf
- Building a Cybersecurity Program from the Ground Up, Mark Dunkerley.pdf
- Faster, Smarter, and More Secure - The Power of Business Enablement, Barbee Mooneyhan.pdf
- How to Work with Jerks, Eric Williamson.pdf
- Small But Mighty - Building the Next Generation of Cybersecurity Professionals With Limited Resources, Naomi Buckwalter.pdf
SANS Blockchain Security Summit 2022 (August 2022)
- Christian Seifert - Detecting On Chain Attacks.pdf
- Gabi Urrutia - El Gran Reseteo de la Ciberseguridad.pdf
- Jesse Buonanno - The Uncensorable Stack Malicious Applications of Blockchain Technology.pdf
- Limaris Torres - How to Secure Self Hosted Blockchain infrastructure.pdf
- Matt MacDonald - Stoics on Crypto Security Awareness Control What You Can Control Understand What You Cannot.pdf
- Nick Nikiforakis - Too Good to Be True Exploring the Ecosystem of Cryptocurrency Giveaway Scams.pdf
- Shai Perednik - Securing your Keys to the Castle.pdf
- Steven Barra - CBDCs Stable Coins and the Future of Money.pdf
- Steven Walbroehl - Keynote - The Great Cyber Security Reset.pdf
- Tejaswa Rastogi- Detecting Price Manipulation Attacks.pdf
SANS DFIR Summit & Training 2022 - Live Online (August 2022)
- Abi Waddell - Hunting Threat Actors using OSINT Forensics .pdf
- AJ Van Beest - Text Editor Tricks for Blue Teamers.pdf
- Brian Maloney - Little Bit of This, Little Bit of dat.pdf
- Carlos R - Aventuras de un cazador de amenazas internas.pdf
- Fernando Tomlinson - Establishing Connection - Illuminating Remote Access Artifacts in Windows.pdf
- Gerry Johansen - Analysis Paralysis Setting the Right Goal for Your Incident Analysis.pdf
- Heather Mahalik & Jared Barnhart - Building a Pattern of Life - Leveraging Location and Health Data.pdf
- Jessica David, Derek Ditch - Cracking the Beacon - Automating the extraction of implant configurations.pdf
- Jessica Hyde & Cesar Quezada - Missing Pieces.pdf
- Joe Petroske - Hunting Powershell Obfuscation with a Support Vector Classifier.pdf
- Josh Hickman - Stepping Out of the Android Malware Sandbox - Running & Analyzing Malware on a Physical Honeyphone.pdf
- Josh Lemon, Megan Roddie - Keynote - DFIR Evidence Collection and Preservation for the Cloud.pdf
- Justin Tolman - Conducting Forensic Examinations in Zero Trust Environments.pdf
- Kevin Ripa - The Truth About USB Device Serial Numbers.pdf
- Keynote - Rob Lee - The Godfather of Forensics - How to Leverage Your Year One to Get an Offer You Cannot Refuse.pdf
- Korstiaan Stam - Detecting malicious actors in Google Workspace.pdf
- Leonard Savina - DFIR4vSphere - Investigating VMWare vSphere virtualization platforms.pdf
- Leonardo Armesto - Inteligencia de Amenazas mediante Notebooks.pdf
- Manuel del Angel Bernal Garcia - Ingenieria social, Malware y DFIR en el 2022.pdf
- Michael Haag - Hunting Windows U-boats with Cyber Depth Charges.pdf
- Sean OConnor - The Darknet of Things - Hunting Cybercriminals.pdf
- Shelly Giesbrecht - Doh Why Dont We Have That - Tailoring Evidence Preservation for Incident Objectives.pdf
- Solomon Sonya, Exploiting Advanced Volatile Memory Analysis Challenges for Fun and Profit.pdf
- Stacey Randolph & Christopher Vance - WhatsApp with your iMessage Dude.pdf
- Thiago Canozzo Lahr - Fast Unix-like Incident Response.pdf
- Thirumalai Natarajan & Anurag Khanna - Threat Hunting in M365 Environment.pdf
- Thomas Diot - Hunting for Active Directory persistence.pdf
- Towne Besel - Staying Ahead of The Game.pdf
- Veronica Schmitt - Do you see it coming Building for observability .pdf
- Vishal Thakur, John Lopes - Living With Ransomware.pdf
SANS Security Awareness Summit & Training 2022 - Live Online (August 2022)
- 05-SecurityAwareness-Metrics.pdf
- A Trip to the Metaverse, Dana Trudeau.pdf
- Adventures in Phishing, Cathy Click.pdf
- Alexander Kharlamov & Melanie Timbrell - Driving Behavioral Change Through Personalized Cybersecurity Interventions.pdf
- Are Your Users Getting Swindled, Tonia Dudley.pdf
- Betsy Balgoolyen Keller & Rachel Attewell - Aligning Your Awareness Efforts to Threat Intelligence.pdf
- Claire Hughes - Phish Training - Metrics Maturity and How to Continually Evolve Your Program.pdf
- Copy of 03-SecurityAwarenessMaturityModel-IndicatorsMatrix.pdf
- Creating Multidimensional Metrics, Mary Dziorny.pdf
- Daniel Elliott & Ava Woods-Fleegal - Leveraging Organizational Change Management for Successful Behavior Change .pdf
- Embracing a Behavior-First Mindset, Cassie Clark.pdf
- Its Easy to Stay Safe Online, Lisa Plaggemier.pdf
- Keynote Amanda Fennell.pdf
- Lessons Learned from Living in a Content Grinder, Perry Carpenter.pdf
- Metrics of Enteprise Security Culture Change, Shelly Epps, Gaylynn Fassler.pdf
- Monika Kullberg - Put your psychology glasses on and see metrics in a new way.pdf
- R;pple Suicide Prevention - Your Toolkit.pdf
- Ripple Suicide Prevention - The FAQ's.pdf
- SANS 2022 Security Awareness Report.pdf
- Security Awareness Maturity Model.pdf
- Security Awareness Report Success Kit - Read Me First.pdf
- Security Behaviors in the Context of Todays Risks, Oz Alashe.pdf
- Shall We Play a Game - Nandita Bery.pdf
- Sophia Adhami & Mads Howard - How to Make a Developer Love Security.pdf
- The Metrics - We Are the Champions, Sarah Janes.pdf
- What UI UX Taught Me About Improving Security Awareness, Jeremy Treadwell.pdf
- Workshop - Grow Your Security Awareness Career, Alex Panaretos.pdf
- Yinka Badmus & Ronny Mejia - The Equifax Journey - A Guide to Human Risk Management.pdf
SANS Ransomware Summit 2022 (June 2022)
- Can You Detect This - PeterO, Yatin Wadhwa.pdf
- Crime Time - Rethinking Ransomware - Diana Selck-Paulsson, Charl van der Walt.pdf
- Initial Access Merchant Offerings and Ransomware Victims - Beth Allen, Samantha Van de Ven.pdf
- Intel 471 - SANS Intelligence Brief.pdf
- Kaseya Ransomware Reaction Lessions Learned, Jeffry Lang.pdf
- Multifaceted Extortion, Kunal Shandil.pdf
- Ransomware Management and Recovery Tactics, Michael Rogers.pdf
- Sleeping With the Enemy - Nick Klein.pdf
- The Anatomy of a Targeted Industrial Ransomware Attack, Carl Eshelman.pdf
- The R Word - Jono Davis.pdf
- The Role of Cryptocurrency in Ransomware Negotiations - Samira Pakmehr, Bryce Webster-Jacobsen.pdf
SANS ICS Security Summit & Training 2022 - Live Online (June 2022)
- Arnaud Soullie - PLC Code Security - An Attackers Perspective.pdf
- Bryson Bort & Ian Anderson - How Low Can You Go.pdf
- CtF Walkthrough.pdf
- Daniel Noyes - Control Systems Under Pressure.pdf
- David Foose - We Need to Talk About the CERT-PSIRT Process.pdf
- Emily Crose - Livin La Vida Locomotive.pdf
- Eric Byres - Making Use of All Those SBOMs.pdf
- Gabriel Agboruche - The Underestimated ICS-OT Asset - Printers.pdf
- Gloria Cedillo & Mike Hoffman - Defining Security Functions to Gain Visibility from PLCs.pdf
- Ian Frist - Are You Prepared for CMMC.pdf
- Jason Christopher - Intelligent Board Room Decisions.pdf
- Nik Urlaub & Adam Hahn - Success Starts with Failure - Mitigating OT Security Risks Using Threat-Informed Failure Scenarios.pdf
- Paresh Kerai - Navigating Australias New Critical Infrastructure Threat Landscape - Challenges for Government and Industry.pdf
- Sharon Brizinov - Hunting EtherNet-IP Protocol Stacks.pdf
- Uduak Daniels - Life-Cycle Engineering .pdf
- Yohei Ishihara - Case Study - Risks and Mitigations of 5G in Your ICS Environment.pdf
SANS Neurodiversity in Cybersecurity Summit 2022 (May 2022)
SANS CloudSecNext Summit - Live Online (May 2022)
- Andy Huang - Enterprise Application Migration Efforts to Public Cloud.pdf
- Ava Wang - Reducing Cloud Attack Surface in AWS via Service Control Policies in a Multiaccount Environment.pdf
- Bailey Bercik and Etan Basseri - Emerging Threats Against Cloud Application Identities and What You Should Do About It.pdf
- Frank Kim & Eric Johnson & Kat Traxler - Keynote - Cloud Security Architecture, Automation and Identity.pdf
- Jay Beale - Kubernetes Attack and Defense-Break Out and Escalate.pdf
- Jon Zeolla - IaC Security at Scale.pdf
- Kaushik Devireddy - Low-hanging Logs - GCP and Azure Logs for Lazy People.pdf
- Kyler Middleton - Zero Trust - Building IAM with Terraform.pdf
- Lior Yaari.pdf
- Madhu Akula - Kubernetes Goat - Interactive Kubernetes Security Playground - 2022 Edition.pdf
- Magno Logan - GitHub Actions - Protecting your CI from Attackers.pdf
- Prashant Kulkarni - Secure Multi Cloud and Hybrid Cloud Integrations Without Secrets.pdf
- Rodrigo Montoro - Speeding Up AWS IAM least privileges with Cloudsplaining, Elastic stack and Access Analyzer.pdf
- Sai Gunaranjan - Using Devops and Infrastructure as Code to Secure Your MultiCloud Environments.pdf
- Sounil Yu - New Paradigms for Cloud Security.pdf
- Tal Melamed - Developing and Deploying Secure Code with AWS Lambda.pdf
- Yoni Shohet - Securing the Modern Mesh of Third Party API Integrations.pdf
SANS Open-Source Intelligence Summit 2022 (April 2022)
- Ad Analytics and Marketing SEO Tools as a Resource for OSINT Investigations, Sarah Womer.pdf
- Blockchain Investigations 101, An Intro to Ethereum, Jeff Lomas.pdf
- Dark Web, The Other Side, Chris Poulter.pdf
- Exposing Fraudsters Behind Cloudflare, Steven Harris.pdf
- Glass Bottom OSINT, Haley Copeland, Alex Slotnick.pdf
- How to investigate phishing campaigns, Maciej Makowski .pdf
- I Know You-Contact Exploitation in SOCMINT Investigation, Christine Talley.pdf
- Lessons Learns from Ten Years of OSINT Austomation, Steve Micallef.pdf
- Once Upon a Crime, A Novel Approach to OSINT Through Storyteller, Rae Baker, Tracy Maleeff.pdf
- Open House, Real Property OSINT and Researching Public Records, Alethe Denis.pdf
- OSINT and AI - The Good, The Bad, and The Fake, Venessa Ninovic.pdf
- OSINT Around the Globe, Intelligence Collection Outside the US, Jessica Smith.pdf
- Protecting High-Value Individuals - An OSINT Workflow, Christina Lekati.pdf
- What Value Does OSINT Bring to the 3-0 Space, Michael James.pdf
SANS New2Cyber Summit 2022 (March 2022)
- 7 Tips for Working With a Recruiter, Jason Davis.pdf
- Analysis 101 for Incident Responders, Kristy Westphal.pdf
- Careers in Energy and Critical Infrastructure, Gabriel Agboruche.pdf
- Como los Efectos Visuales me Empujan a la Ciberseguridad, Alejandro Cabrera.pdf
- Fantastic AWS Hacks and Where to Find Them - Christophe Tafani-Dereeper.pdf
- Fast-Track Your Cybersecurity Career, Carolann Jacobs.pdf
- Finding Cybersecurity - A Practitioner Path to Success, Zinet Kemal.pdf
- From Rookie to Rockstar - Kickstart your Career as a SOC Analyst, Matt Coons.pdf
- Hackeando sua mente - Como comecar e continuar a evoluir, Jonathan Joshua.pdf
- Networking 101 - Introverts Only, Jessica McMeans.pdf
- New Shell in Town - Adventures in Using PowerShell on Linux, Fernando Tomlinson.pdf
- Outside of the Shell - Cybersecurity Careers and Paths for Non-Technical People, Wesley Lee.pdf
- Risky Business - Careers in GRC, Talya Parker.pdf
- Sitting at the Big Table - Experiences as a First-Time Information Security Officer, Greg Fellin.pdf
- Vulnerability Management, Don Murdoch.pdf
- Why I Am Encouraged to BARF at Work, Jesse Hutchinson.pdf
- Why SecDevOps is the New Way in Cybersecurity, Saman Fatima.pdf
Cyber Threat Intelligence Summit & Training 2022 - Live Online (January 2022)
- Applied Forecasting - Gert-Jan Bruggink.pdf
- Building Strategic Return on Investment Through Cyber Intelligence, Bethany May, Oralia Rodriguez.pdf
- Carlos Diaz - Technologia, Expresividad y Contexto en la Observacion de Amenazas.pdf
- Clip Addiction - A Threat Intelligence Approach to Video-Based Chinese InfoOps, Che Chang, Silvia Yeh.pdf
- DeadRinger - Three APTs Walk into a Bar, Assaf Dahan, Tom Fakterman, Daniel Frank.pdf
- Diego Espitia - TypoDetect - Detectando trampas para enganar tu cerebro.pdf
- Feedback in CTI, Garrett Guinivan.pdf
- Inside The Persistent Mind of Chinese Nation-State Actor, Lina Lau .pdf
- Integrated Intelligence, Samara Williams.pdf
- Is Sharing Caring - A Deeply Human Study on CTI Networking, Grace Chi.pdf
- Jorge Orchilles & Nathali Cano - Practico uso de Inteligencia de Amenazas para Operacionalizer Purple Training.pdf
- Jose Rodriguez - Data Sources 2.0 Opercionalizando los nuevos objetos del marco ATT&CK.pdf
- Keynote - Journey to the Center of CTI - Story, Systems, and Self, Rebekah Brown.pdf
- Keynote - Use Your Voice - Why Diversity and Inclusion Matter for Cyber Threat Intelligence, Lillian Teng.pdf
- Lone Wolf Actors - How Ransomware Evolved Into Freelance Work, Laurie Iacono, Tony Knutson.pdf
- Marc Rivero Lopez - Usando MITRE dentro del ciclo de inteligencia.pdf
- Mark Your Calendars - Why Dates Matter to Adversaries, Nate Beach-Westmoreland.pdf
- Mind Your Gaps - Leveraging Intelligence Gaps to Drive Your Intelligence Activities, Brian Mohr.pdf
- Nounou Mbeiri & Ivan Portillo - Tecnicas CTI para la caracterizacion de un ataque con ransomware.pdf
- Stefano De Blasi - La Evolucion del Ransomware- Prevision de Escenarios Posibles para 2022.pdf
- The First Purpose - Rediscovering Warning Analysis for CTI, JD Work.pdf
- Threat Actor of in-Tur-est - Unveiling Balkan Targeting, Jack Simpson, Louise Taggart.pdf
- We're in the Now, Now - The Tyranny of Current Intelligence and How to Manage It, Sherman Chu.pdf
- Workshop - Getting Started as a Threat Intelligence Analyst, Meghan Jacquot.pdf
- You Get What You Ask For - Building Intelligent Teams for CTI Success, Melanie Kruger, Katie Nickels.pdf
Pen Test HackFest Summit & Training 2021 (November 2021)
- A Seriously Righteous Hack, Ryan Adamson.pdf
- API Security 101 - Tools, Tips, and Tricks, Magno Logan.pdf
- Attacking Offensive Operations, Scott C Taylor.pdf
- Automating Adaptive Adversaries, Tim Schulz.pdf
- Building an ICS Firing Range in our Kitchen, Moritz Thomas, Jeroen Vandeleur.pdf
- Demystifying CTFs, Barrett Darnell.pdf
- Hacking JWT, Adrien de Beaupre.pdf
- Keynote - Get Offensive with Management, Bryson Bort.pdf
- Keynote - Hackers Guide to Mentorship, Tennisha Martin.pdf
- Level Up - SANS Graduate Certificate in Pen Testing and Ethical Hacking, Kim Kafka.pdf
- Offensive GoLang 2-0, Michael Long.pdf
- Penetration Testing Experience and How to Get It, Phillip Wylie.pdf
- SANS Offensive Operations New Course Preview, Stephen Sims.pdf
- So You Think You Can Secure Your Cloud - Red Team Engagements in GCP, Madhav Bhatt, Brad Richardson.pdf
- Writing Reports - The Overlooked Pen Testing Skill, Kim Crawley.pdf
Cybersecurity Leadership Summit 2021 (October 2021)
- Jimmy Sanders - Evolution Over Iteration.pdf
- Kurt John - Culture Collaboration and Empathy for Cyber Leaders.pdf
- Mary Chaney - Top Five Things CISOs Need to Know About Privacy.pdf
- Mike Wilkes - Building and Sustaining TPRM Programs for eCommerce Resilience.pdf
- Rock Lambros - Translating Cyber Risk into Business Risk.pdf
Threat Hunting Summit & Training 2021 (October 2021)
- Andrew Skatoff - Hunting and Scoping A Ransomware Attack.pdf
- Anton Ovrutsky - Hunting Malicious Office Macros.pdf
- Anurag Khanna & Thirumalai Natarajan Muthiah - Hunting Backdoors in Active Directory Environment.pdf
- Ashley Pearson - Threat Hunting - Lotta Ins, Lotta Outs, Lotta What Have Yous.pdf
- Carlos R. & Ben Bornholm - Open Threat Research - The Hunt for Red Apples - How to Threat Hunt and Emulate OceanLorus in MacOs.pdf
- Christopher van der Made - Stay ahead of the game - automate your threat hunting workflows.pdf
- Christopher Witter - Common Misconceptions and Mistakes Made in Threat Hunting.pdf
- Craig Chamberlain - Practical Threat Hunting with Machine Learning.pdf
- David Hoelzer - Old Data New Tricks - Threat Hunting with Data Science.pdf
- Joe Petroske - Hunting Beacon Activity With Fourier Transforms.pdf
- Jose Hernandez & Michael Haag - Mining The Shadows with ZoidbergStrike A Scanner for Cobalt Strike.pdf
- Jose Luis Sanchez y Alejandro Houspanossian - AC3 Threat Sightings - El Poder de la Observacion.pdf
- Josh Liburdi - Building Better Hunt Data.pdf
- Kirstie Failey - I Knew You Were Trouble.pdf
- Mathieu Saulnier - Full Circle Detection.pdf
- Roberto Rodriguez - Identifying Opportunities to Collaborate and Contribute Back.pdf
- Roberto y Jose Rodriguez - Fundamentos de Logicas de Deteccion Basadas en Data.pdf
- Xiaokui Shu & Jiyong Jang - Compose Your Hunts With Reusable Knowledge and Share Your Huntbook With the Community.pdf
Blue Team Summit & Training 2021 (September 2021)
- A River Runs Through IT - What Whitewater Rafting Taught Me About Incident Response - Stef Rand.pdf
- Adversary Simulation - Close the Gaps in Your Security Posture - Don Murdoch.pdf
- Blue-Team-as-Code - Oleg Kolesnikov, Den Iuzvyj.pdf
- Can You Really 10x the SOC - Anton Chuvakin.pdf
- Data Science for SOC - Igor Kozlov.pdf
- Detecting Kubernetes Attacks with Audit Logs - Magno Logan.pdf
- Knocking on Clouds Door - Threat Hunting Powered by Azure AD Reports and Azula - Tas Tondang.pdf
- Lighting Talk - Am I Phished - Richard Roy Mamaril.pdf
- Lightning Talk - Living off the SaaS - Jared Stroud.pdf
- Measuring Detection Engineering Teams - Kyle Bailey.pdf
- Moderrn Authentication for the Security Admin - Mark Morowczynski, Grace Picking.pdf
- Monitoring and Incident Response in Azure AD - Thomas Detzner, Yochana Henderson.pdf
- Ransomware Preparation Strategies - Anurag Khanna.pdf
- The Yellow Brick Road - Where Lions and Tigers and Bears Meet - Aaron Lancaster.pdf
- Threat Sightings - The Power of Observation for Driving Cyber Threat Detection Improvements - Alejandro Houspanossian, Agustin March.pdf
- Zero Trust Architecture - Justin Henderson, Ismael Valenzuela.pdf
Security Awareness Summit & Training 2021 (August 2021)
- Abigail Beehler - Building Partnerships Across the Company to Inform and Mature a Security Awareness Program.pdf
- Alex Pinto - Quantifying Human Risk with the 2021 DBIR.pdf
- Ben Edwards - Cyber Security is Human Security - What Does and Doesn't Work to Address Human Risk.pdf
- Building an Automated Tiered Phishing System, Geoffrey Parker.pdf
- Corwin Tobias - Knowing the Human - Using Emotional Intelligence to Manage Human Risk.pdf
- Crane Hassold - Business Email Compromise - The Silent Cyber Threat.pdf
- Data-Led Behavior Change, Tim Ward & Rebecca Schroder.pdf
- Don't Reward The Brilliant Jerk - Fix Toxic Security Culture, Jinan Budge.pdf
- Don-t Reward The Brilliant Jerk - Fix Toxic Security Culture, Jinan Budge.pdf
- Everyone Can Play, Building CTFs To Teach Non-Security Folks, Joe Kuemerle.pdf
- Frank Kim - Understanding Cybersecurity Risk Management.pdf
- Geoffrey Parker - Building an Automated Tiered Phishing System.pdf
- Heather Mahalik - Keynote - Incidents Breaches and Hacks Oh My Its all About the Human.pdf
- How to Choose Effective Interventions For Information Security Behavior,Martine van de Merwe & Lourens Dijkstra.pdf
- How to Tell Better Stories, More Often, To Boost Your Security Outcomes, Emily Edgeley.pdf
- It Takes A Village - Engaging Multi Disciplinary Teams to Inform Your Strategy, Melissa Misuraca & Daisy Wong.pdf
- Janet Roberts - Lightning Talk - How Aligned Are You With Your Leadership.pdf
- John Blythe - Lightning Talk - Carrots and sticks - Why you should think twice about punishing your staff.pdf
- Karen Wetzel & Marian Merritt - NIST, NICE, and YOU - The Cybersecurity Awareness and Training Professional.pdf
- Leti?cia Freitas - Every Attitude Matters - Good Safety Behaviors Generate Rewards.pdf
- Leticia Freitas - Every Attitude Matters - Good Safety Behaviors Generate Rewards.pdf
- Mary Dziorny - How Non-Educators Educate Effectively - The Secret Recipe to Building Impactful Training Programs.pdf
- Moussa Noun - Democratizing the Hacker Mindset - A Guide to Transitioning From Binary to Analogy.pdf
- Neaka Balloge - SANS Secure the Sauce Digital Scavenger Hunt.pdf
- Open Sourced Cyber Scavenger Hunts, Victoria Schiffer & Daisy Wong.pdf
- People, People, People, Darren Kane.pdf
- Perry Carpenter - How to Roll Your Own Pro Level Content on the Cheap.pdf
- Priya Vennapusa - Virtually Training Your Workforce - How to Provide Awareness When Your Workforce is Remote.pdf
- Rob Oddi - Leveraging Behavioural Change.pdf
- Ryan Chapman - Ransonware, Security Awareness, and YOU!.pdf
- Shelby Flora & Masha Sedova - A CISOs Frenemy - The Human X Factor.pdf
- Stephanie Pratt & Candice Henderson - Metrics that Matter - Demonstrating Security Training's Impact to Your Business.pdf
- The day I wish I went to Oxford, Kieren Lovell.pdf
- The Power of the Collective, Lisa Plaggemier.pdf
- Translating Cyber - How to Shake Off the Curse of Knowledge, Kerry Tomlinson.pdf
- Utilizing Market Techniques to Manager Human Risk - A Marketeers Journey in InfoSec...So Far, James van den Bergh.pdf
- What Your Awareness Program Can't Fix - And How You Fix That, John Scott.pdf
DFIR Summit & Training 2021 (July 2021)
- A Holistic Approach to Defending Business Email Compromise Attacks, Korstiaan Stam.pdf
- Automating Google Workspace Incident Response, Megan Roddie.pdf
- Breaches Be Crazy, Eric Capuano, Whitney Champion.pdf
- Crossing the Threshold - Analysis of the Facebook Mini Portal, Jessica Hyde, Sarah Hayes, Nicole Odom.pdf
- DFIR 101 - Digital Forensics Essentials, Kathryn Hedley.pdf
- Exploring Windows Command-Line Obfuscation - Wietze Beukema.pdf
- EZ Tools, KAPE, and How to Contribute to and Benefit from Open Source Contributions, Andrew Rathbun.pdf
- Forensic Analysis of Xiaomi IoT Ecosystem - Evangelos Dragonas.pdf
- Greppin Logs - Noah Rubin, Jon Stewart.pdf
- Incident Response 9-Line - Gerard Johansen.pdf
- IR Playbooks - Mathieu Saulnier.pdf
- Keynote - Cobalt Strike Threat Hunting, Chad Tilbury.pdf
- OCRing the Bitmap Cache Puzzle, Drew Luckenbaugh.pdf
- Order of Volatiility in Modern Smartphone Forensics, Mattia Epifani.pdf
- Reporting for Digital Forensics, Jason Wilkins.pdf
- SANS 2021 DFIR Survey Results.pdf
- SANS Technology Institute Information Session.pdf
- Scoring and Judging Artifacts in Autopsy, Brian Carrier.pdf
- Stringlifier - An Open Source Tool for Random String Classification, Vivek Malik, Kumar Vikramjeet.pdf
- The Cyber Kill Chain Meets Blockchain, Jackie Burns Koven.pdf
- UFOs - Unidentified Forenic Objects, Ian Whiffin.pdf
- Validating Evidence for Courtroom Testimony - Panel.pdf
- Where Have UAL Been, Brian Moran, Kevin Stokes.pdf
CloudSecNext Summit & Training 2021 (June 2021)
- 10 Security Best Practices For Kubernetes - Tunde Olu-Isa .pdf
- Automate Your Security in GCP with Serverless Computing - Jason Dyke.pdf
- Doing Bag things for Good Reasons - Leveraging Free Tools for Security Testing - Ryan Nolette.pdf
- Dynamic Authorization and Policy Control for Microservice Environments - Ash Narkar.pdf
- Effective Monitoring of Cross Cloud Environments - Ashwin Patil & Peter Bryan.pdf
- Exfiltration Paths in Isolated Environments Using VPC Endpoints - Jonathan Adler.pdf
- Foundations of Incident Response on AWS - Anna McAbee.pdf
- Implement an Effective Cloud Resource Tagging Strategy - The DevSecOps Way - Barak Schoster.pdf
- Implementing an Effective Multi-Account Strategy on AWS - AJ Yawn.pdf
- Its like Chipotle - Demystifying GCP PaaS Services - Kat Traxler.pdf
- Keynote - Trends in Modern Cloud Security Operating Models - Tahla Tariq.pdf
- Keynote - Which Way is the Solarwind Blowing - Techniques are Changing - are you ready - Blake Strom & Jamie Williams.pdf
- Kubernetes Gotchas - Hacking and Defending K8s - Jay Beale.pdf
- Kubernetes Security - Attacking and Defending K8s Clusters - Magno Logan.pdf
- Navigating the Labyrinth of Azure AD Conditional Access - Larry Brandt.pdf
- Preventing Cyber Attacks Using Trusted Image Registries - Bryan Langston.pdf
- Remember When We Called It Information Security - Cloud Says Lets Go Back to That - John Pescatore.pdf
- Self-Healing Infrastructure, GitOps, and Terrascan - Om Moolchandani.pdf
- Structured Security Analytics for Cloud Workloads - Eric Kaiser.pdf
- The Wisdom of Clouds - A Cloud Sourced Guide to Data Security - Daniel Tobin.pdf
- Towards a Business Driven Hybrid Multi-Cloud Security - Atef Abdelkefi.pdf
- Using the Cloud to Improve AppSec - Phillip Marlow.pdf
Purple Team Summit & Training 2021 (May 2021)
- Designing Playbooks with Purple Team Approach - Semanur Guneysu - UPDATED.pdf
- Don't Fear the Zero- A Test-driven Approach to Analytic Development - Tim Nary & Fred Frey.pdf
- Gone in 66 Techniques - Emrah Alpa - UPDATED.pdf
- Gone in 66 Techniques - Emrah Alpa.pdf
- Gone in 66 Techniques - How MITRE ATT&CK Evaluations Round 3 United Us as a Purple Team - Emrah Alpa.pdf
- Look at me, I'm the Adversary now- Introduction to Adversary Emulation and its place in Security Operations - Samuel Kimmons.pdf
- Order Through Chaos- Data-Driven Hypothesis Creation Using Security Chaos Engineering - Cari Cistola & David Lavezzo.pdf
- Purple Chaos - The Do's and Dont's of the Game - Prithvi Bhat - 2.pdf
- Purple Maturity Model - Tim Schulz.pdf
- Purple Team Feedback Loop - Michael Rogers.pdf
- Purple Team War Stories - Pepijn Vissers.pdf
- Purple Vitamins to Grow Your Skills - Didier Stevens.pdf
- Purple Wars Episode 2 - Attack of the Emulators - Jonas Bauters.pdf
- Red Team Engagements - Training Your Blue Team to Hunt Adversaries, Madhav Bhatt, Brad Richardson.pdf
- Supply Chain Purple - Simulating Supply Chain Attacks with DLL Hijacking - Mike Gualtieri.pdf
- The Active Directory Purple Team Playbook - Mauricio Velazco - UPDATED.pdf
- Think Red, Act Blue - Evaluating The Security Cost of New Technology - Douglas McKee, Ismael Valenzuela.pdf
- Threat Focused Purple Team Exercises (non-AD Edition) - Cedric Owens.pdf
- Understanding the Effectiveness of Exploit Mitigations for Purple Teams - Steve Sims.pdf
- Which Came First - The Phish or the Opportunity to Defend Against It - Jamie Williams & Mike Hartley.pdf
New to Cyber Summit 2021 (April 2021)
- Cloud Security Begins with the Shared Responsibility Model, AJ Yawn.pdf
- Getting Started - Your First Two Years in Your Cybersecurity Career, Tameika Reed.pdf
- Heroes in a Bash Shell - The Linux Command Line, Timothy Brush.pdf
- How to Get Experience When You Have No Experience, Kevin Garvey, Frank Kim.pdf
- I Want to Work in Cybersecurity...Whatever That Means, Ryan Kovar.pdf
- Identifying and Countering Cognitive Bias, Rick Holland.pdf
- InfoSec Snake Wrangling - Intro to Python, Mark Baggett.pdf
- Intro to Social Engineering, Jen Fox.pdf
- Introduction To Security Architecture, Ronald Eddings.pdf
- Job Role Spotlight - Cyber Threat Intelligence, Amy Bejtlich.pdf
- Job Role Spotlight - Insert $2 for an Offensive Security Career, Ryan O'Horo.pdf
- Landing a Job - Resumes and the Application Process, Lesley Carhart.pdf
- SANS Degree Programs and Academies.pdf
- The Nuts & Bolts of Cryptography & Everyday Cybersecurity, Rajvi Khanjan Shroff.pdf
- Will You Mentor Me - How to Ask for Help, Mari Galloway.pdf
- Windows Command Line and Intro to PowerShell, Mick Douglas.pdf
- YOUR career in AppSec, Tanya Janca.pdf
ICS Security Summit & Training 2021 (March 2021)
- A CISO View on teh Journey of OT-ICS Cybersecurity - Falkovich, Kuczynski, McKenzie, Al-Shammari, Stockton - Graphic Recording.pdf
- A Tale of Two Wireless RTUs - Sinking Titanic and Ransoming It - Ron Brash - Graphic Recording.pdf
- A tale of two wireless RTUS - sinking titantic and ransoming it - Ron Brash.pdf
- Are You Under ATT&CK - How to Gain OT Visibility Necessary for MITRE ATT&CK for ICS Coverage - Micah Hoffman - Graphic Recording.pdf
- Are You Under ATT&CK - How to Gain OT Visibility Necessary for MITRE ATT&CK for ICS Coverage - Mike Hoffman - Graphic Recording.pdf
- Are You Under ATTACK - Mike Hoffman - Graphic Recording.pdf
- Are you under attack - Mike Hoffman.pdf
- ARMOR for OT Security Leaders - Jason Christopher - Graphic Recording.pdf
- ARMOR for OT Security Leaders - Jason Christopher.pdf
- BRIC-ing the Supply Chain - Managing ICS Product Security in a Fragmenting World - Maggie Morganti - Graphic Recording.pdf
- BRIC-ing the Supply Chain- Managing ICS Product Security in a Fragmenting World - Maggie Morganti.pdf
- Building Cyber Security in the Water and Wastewater Industry - Kenneth G. Crowther & Estelle Feider-Blazer.pdf
- Building Cybersecurity in the Water and Wastewater Industry - Kenneth Crowther, Estelle Feider-Blazer - Graphic Recording.pdf
- Correlating Alarm and System Events for Security Monitoring in ICS Environments - Uduak Daniels - Graphic Recording.pdf
- Correlating Alarm and System Events for Security Monitoring in ICS Environments - Uduak Daniels.pdf
- Cyber-Physical Safety Systems for Water Utilities - Andrew Hildick-Smith & Gus Serino.pdf
- Cyber-Physical Safety Systems for Water Utilities - Andrew Hildick-Smith, Gus Serino - Graphic Recording.pdf
- Cybersecurity FAT-SAT testing - Pitfalls and Wins - Dieter Sarrazyn.pdf
- DX Security of Factory Automation - Hiroshi Sasaki.pdf
- E-MIMICS - Extended Malware in Modern ICS - Seth Enoka.pdf
- Engineering for Resilience - Johannes Braams.pdf
- Exorcising the Ghost in the Machine - A Critical Evaluation of the ICS-Focused Supply Chain Attacks - Joe Slowik - Graphic Recording.pdf
- Exorcising the Ghost in the Machine- A Critical Evaluation of ICS-Focused Supply Chain Attacks - Joe Slowik.pdf
- Future Outlook is a Bit Cloudy - David Foose - Graphic Recording.pdf
- Future Outlook is a bit Cloudy - David Foose.pdf
- How to use security architecture to build a defensible ICS network - Bruce Large.pdf
- ICS Cybersecurity Year in Review 2020 - Robert M. Lee.pdf
- ICS Pentesting During COVID- Lessons Learned from Pentesting Operational Environments Halfway Around the World - Chris Robinson.pdf
- Keynote - 2020 Year in Review - Robert M. Lee - Graphic Recording.pdf
- Keynote - Anne Neuberger - Graphic Recording.pdf
- Killing Time - Tim Conway - Jeff Shearer - Graphic Recording.pdf
- Lessons from Two Years of ICS Security Assessments - Don Weber - Graphic Recording.pdf
- Lessons from Two Years of ICS Security Assessments - Don Weber.pdf
- Lurking Beneath the Surface... Uncovering Hidden Components in ICS Software - Eric Byres.pdf
- Lurking Beneath the Surface... Uncovering Hidden Components in ICS Software - Eric Byrese.pdf
- No One Likes To Face The Consequences But CCE is Here to Help - Andy Bochman and Jeff Gellner - Graphic Recording.pdf
- No One Likes to Face the Consequences, but CCE is Here to Help - Andy Bochman.pdf
- Re-evaluating ICS-OT Procurement Language - Sarah Freeman.pdf
- Secure System Engineering - Tales from Rail Industry - Saravanakumar G.pdf
- The Collision of ICS Safety and Security in 2021, Peter Jackson.pdf
- The Solarwinds Hack Can Affect Control Systems - What Can Be Done - Joe Weiss - Graphic recording.pdf
- The SolarWinds Hack Can Affect Control Systems - what can be done - Joe Weiss.pdf
- TTPs from ICS cyber range - Salimah Liyakkathali.pdf
- Unit Operations for ICS security professionals (one big and expensive Lego) - Oscar J. Delgado.pdf
- Unit Operations for ICS security professionals (one big and expensive Lego) - Oscar J. Delgado.pdf
- Unit Operations for ICS Security Professionals - Oscar J. Delagado-Melo - Graphic Recording.pdf
Open-Source Intelligence Summit & Training 2021 (February 2021)
- Basis Persistent Threat Monitoring, Matt Edmondson.pdf
- Extracting and Analyzing Social Networks Data Efficiently, Azat Kashparov, Andrew Kulikov.pdf
- Hard and Soft OSINT Skills for Success, Jeff Lomas.pdf
- Hash Or It Didn't Happen, Steven Harris.pdf
- Haters Gonna Hate - Gathering and Analyzing Hate Using OSINT, Nico Dekens.pdf
- Is This Thing Even On - Leveraging Automation in OSINT Collection, Daniel Ben-Chitrit.pdf
- Keynote - Investigating Disinformation, Jane Lytvynenko.pdf
- Keynote - OSINT Efficiency - Extending & Building Tools, Chris Poulter.pdf
- Leveraging OSINT to Track Cyber Threat Actors, Curtis Hanson.pdf
- Leveraging VIPs Attack Surface Through OSINT, Ygor Maximo.pdf
- OSINT Google and Social Networks Hacks -Irina Shamaeva.pdf
- OSINT Tools for diving deep Dark Web - Apurv Singh Gautam.pdf
- Rx for Pinocchiotis & Chronic Echochamberosis - Keeping Bias, Manipulation, and Fake News Out of Your OSINT Analysis, Heather Honey.pdf
- Using Mobile Apps to Leverage OSINT Investigations, Matthias Wilson.pdf
Cyber Threat Intelligence Summit & Training 2021 (January 2021)
- A Product Approach to your Threat Intelligence Practice_ Increase Investment and Outcomes - Chris Jacob.pdf
- Agile Threat Intelligence for the Modern Threatscape - Smukh Tendulkar & Michael-Angelo Zummo.pdf
- Analyzing Chinese Information Operations with Threat Intelligence, Che Chang, Silvia Yeh - Graphic Recording.pdf
- Analyzing Chinese Information Operations with Threat Intelligence, Che Chang, Silvia Yeh.pdf
- Are you ready for Intelligent SOC_ - Brandon Hoffman.pdf
- Asleep at the Wheel - The Effects of Sleep on CTI Professionals, Lincoln Kaffenberger - Graphic Recording.pdf
- Asleep at the Wheel - The Effects of Sleep on CTI Professionals, Lincoln Kaffenberger.pdf
- Better Than Binary - Elevating State-Sponsored Attribution via Spectrum of State Responsibility, Joshua Miller.pdf
- Collections and Elections - How The New York Times Built an Intel Collections Program in 2020, Neena Kapur, Emily Wilson.pdf
- Correlating Threat Intelligence with CTIM - Daniel Bates.pdf
- Cyber-Espionage - Out of the Shadows. Into the Digital Crosshairs., John Grim.pdf
- Data Matters - More Effective Threat Hunting and Defense with Internet Scan Data, Derek Abdine - Graphic Recording.pdf
- Data Matters - More Effective Threat Hunting and Defense with Internet Scan Data, Derek Abdine.pdf
- From the Front Lines Incident Response at Scale - James Perry.pdf
- Full Cycle - Blending Intelligence Requirements & Custom Dissemination Tools to Drive Operations - Bob Mclean & Jon Jurado - Graphic Recording.pdf
- Full Cycle - Blending Intelligence Requirements & Custom Dissemination Tools to Drive Operations - Bob Mclean & Jon Jurado.pdf
- Get Your Bits Together (or Don't)_ Monolithic vs Federated Data Structures for Threat Intelligence - Ben Greenbaum.pdf
- Going from Open Source Intelligence to Threat Intelligence with DomainTools Iris - Taylor Wilkes-Pierce.pdf
- Hack Your Stakeholder-Eliciting Intelligence Requirements with Design Thinking, Brian Kime.pdf
- Jackpotting ESXi Servers for Maximum Encryption, Eric Loui, Sergei Frankoff.pdf
- Journal of Threat Intelligence and Incident Response, Rebekah Brown, Sergio Caltagirone.pdf
- Key Functionalities of a Modern Cyber Threat Intelligence Program - Jerry Caponera.pdf
- Keynote - Solar Winds of Change, Stephen Eckels, Isif Ibrahima, Jacqueline O'Leary - Graphic Recording.pdf
- Not That Kind of Vulnerability - Human Trafficking During Coronavirus, Sherrie Caltagirone.pdf
- Pivoting from Art ot Science, Joe Slowik - Graphic Recording.pdf
- Pivoting from Art ot Science, Joe Slowik.pdf
- Pivoting from Art ot Science, Jow Slowik.pdf
- Post Mortem_ The First 72 Hours of SUNBURST Threat Intelligence Research - Tanner Payne.pdf
- Quantifying Intelligence - Increasing Executives' IQ, Colin Connor - Graphic Recording.pdf
- Quantifying Intelligence - Increasing Executives' IQ, Colin Connor.pdf
- Riding the WAVE to Better Collaboration and Security, Kelsey Helms, Nathan Icart - Graphic Recording.pdf
- Riding the WAVE to Better Collaboration and Security, Kelsey Helms, Nathan Icart.pdf
- Six CTI Challenges and Their Solutions, Dr. Christian Doerr, Kris Oosthoek - Graphic Recording.pdf
- Six CTI Challenges and Their Solutions, Dr. Christian Doerr, Kris Oosthoek.pdf
- Spooky RYUKy Part 2, Van Ta, Aaron Stephens.pdf
- Still Thinking About Your Ex(cel) - Here are Some TIPs, Andreas Sfakianakis - Graphic Recording.pdf
- Still Thinking About Your Ex(cel) - Here are Some TIPs, Andreas Sfakianakis.pdf
- SUNBURST_ DGA or DNS Tunneling_ - Peter Rydzynski.pdf
- The Cognitive Stairway of Analysis, Nicole Hoffman - Graphic Recording.pdf
- The Cognitive Stairway of Analysis, Nicole Hoffman.pdf
- The CTI Shadow Army - Tales from the Trenches, Xena Olsen.pdf
- The Joy of Threat Landscaping, Gert-Jan Bruggink - Graphic Recording.pdf
- The Joy of Threat Landscaping, Gert-Jan Bruggink.pdf
- Threat Intel for Everyone - Writing Like a Journalist to Produce Clear, Concise Reports, Selena Larson - Graphic Recording.pdf
- Threat Intel for Everyone - Writing Like a Journalist to Produce Clear, Concise Reports, Selena Larson.pdf
- Turning Data into Actionable Threat Intelligence - Dragos Gavrilut & Fayyaz Rajpari.pdf
- VERISize Your Way into CTI, David Thejl-Clayton - Graphic Recording.pdf
- VERISize Your Way into CTI, David Thejl-Clayton.pdf
- Will They Read My Reports - Creating Value-Driven Reports, Christopher Lopez - Graphic Recording.pdf
- Will They Read My Reports - Creating Value-Driven Reports, Christopher Lopez.pdf
- Workshop - Threat Intelligence the EASY Way, Chris Cochran.pdf
- Wrap-Up Panel, Day 1 - Graphic Recording.pdf
- xStart When You're Ready, John Southworth - Graphic Recording.pdf
- xStart When You're Ready, John Southworth.pdf
Security Awareness Summit & Training 2020 (December 2020)
- Automating Your Awareness Program, Blair Adamson.pdf
- Behavior and Risk Selection, Oz Alashe, Dr. John Blythe.pdf
- Comparing Apples and Oranges - Reporting Click Rates When All Phishes Are Different, John Scott.pdf
- Creating and Maintaining a Virtual Security Ambassador Program, Nandita Bery.pdf
- Culture Eats Strategy for Breakfast - Building Effective and Positive Behavioral Change, Dean Champan, Tom Finan.pdf
- Cybercrime Insights and Mitigating Strategies from Sub-Saharan Africa, Mark Mondoka, Freda Mwamba-Brazle.pdf
- Empower Employees - Nudging by Numbers, Pooja Srivastava.pdf
- How Non-Educators Educate Effectively - The Secret Recipe to Building Impactful Training Programs, Dr. Mary Dziorny.pdf
- Inspiring the Next Generation (Lightning Talk), Madeline Howard.pdf
- Keynote - What 2020 Teaches Us About Cybersecurity Awareness, Jessica Barker.pdf
- Making Security Personal with Personas, George Finney.pdf
- May the Horse Be With You, Perry Carpenter, Lisa Plaggemier.pdf
- Meet a Culture - Security Awareness in Latin America, Mora Durante Astrada.pdf
- Pivoting to Online Engagement During the Pandemic (Lightning Talk), Melissa Misuraca.pdf
- The Art of Ethical Influence - Shaping the Decisions of Leaders to Support Security Awareness, Luke Barnes.pdf
- The Human Firewall - A Multifacted Approach to Combating Social Engineering, Janet Maranga.pdf
- The Pen is the Mightiest Weapon of All, Steffanie AK Schilling.pdf
- The Pen is the Mightiest Weapon, Steffanie AK Schilling.pdf
- Using Security Operations Center Metrics to Develop Awareness Programs, Chris Crowley.pdf
- What's In It For Me (Lightning Talk), Jonelle Burns.pdf
- Workshop - Facilitated Social Engineering Sessions DIY, Jen Fox.pdf
- Workshop - Your Program is Awesome; Now Prove It, Masha Sedova.pdf
APAC ICS Summit & Training 2020 - Live Online (November 2020)
- Automating the compliance process for Industrial Automation and Control Systems, Uduak Daniels.pdf
- Bounding Cyber in Design Basis Threat, Jacob Benjamin.pdf
- Building an OT Security Community, Peter Jackson.pdf
- Good Practices for ICS Supply Chain Risk Management, Hiroshi Sasaki.pdf
- ICS Asia Pacific Summit Agenda Final.pdf
- ICS Attack Concepts and Demonstrations, Tim Conway, Jeff Shearer.pdf
- ICS Cyber Threats and a Hunting We Shall Go, Robert M Lee.pdf
- Is Zero Trust Possible in OT Environments, Dr Ong Chen Hui.pdf
- Protect Power Plant and Industrial Infrastructure from Cyber Attack! ICS Security case study in Japan, Takashi Amano.pdf
- Real ICS Security Incidents and Findings from Live ICS Assessments, Moath Sakaji.pdf
- Strategies for Defending the Cyber-Physical Battlefield, Huang Shao Fei.pdf
- The Tools Dogma, Dieter Sarrazyn.pdf
- Tips and trick from the ICS assessment and pen-testers, Soren Knudsen, Mikael Vingaard.pdf
SANS Cyber Defense Forum & Training (October 2020)
- Analysis 101 for Incident Responders, Kristy Westphal.pdf
- And Then There Were None (More False Positives) - Writing Better EDR Detections, Dan Banker.pdf
- Asking Questions and Writing Effectively, Christopher Lopez .pdf
- Automating Threat Hunting on the Dark Web, Apurv Singh Gautam .pdf
- Building the Better Playbook - Techniques to Improve Repeatability, Don Murdoch.pdf
- Hiding in the Clouds - How Attackers Can Use Applications for Sustained Persistence, Yochana Henderson, Mark Morowczynski.pdf
- Metrics on Steroid - Improving SOC Maturing Using the SOC-CMM, Rob van Os.pdf
- New Tools for Your Threat Hunting Toolbox, Mark Baggett.pdf
- Ransomware Defense and Response - Minimizing Risk of an Increasing Threat, Gabriel Curry, Will Oram.pdf
- Resolve Security Alerts with Adaptive Intelligence and Guided Response, Peter Luo.pdf
- Resource Smart Detection with YARA and osquery, Saurabh Wadhwa.pdf
- Taking Your Detection Program to the Next Level (Keynote), Carson Zimmerman.pdf
- XDR - The Hidden Pitfalls of Evaluation and Deployment, Steve Turner, Ben Tyminski.pdf
- XDR The Hidden Pitfalls of Evaluation and Deployment, Steve Turner, Ben Tyminski.pdf
Oil & Gas Cybersecurity Summit & Training 2020 (October 2020)
- A Game-Theory Approach for Defending the ICS-SCADA Environment, Rashed Rabie.pdf
- Black Gold- Battle to Defend the Most Treasured Assets in the World, Anas Faruqui.pdf
- Detecting Encrypted Radio Communications Using Universal Hacker Radio, Don C. Weber.pdf
- Developing Effective Detection and Defense Strategies Against Activity Groups in Oil & Gas OT Using Models, Sergio Caltagirone.pdf
- OT IR - Are You Prepared to Respond, Gabiriel Agboruche.pdf
- Preparing for M&A and Onboarding Newly Acquired Immature Organizations, Brent Foster.pdf
- Process Vulnerabilities for Refineries, Can Demirel, Yusuf Yilmaz Akdemir.pdf
- Raiders of the Lost RTUs, Meters, and Valves, Ron Brash.pdf
- Secure and Safe Operations in the Remote Work Era - COVID-19 and Beyond, Mark Carrigan.pdf
- What's Cooking - Starting Your Own DIY Automation and ICS Security Projects, Mike Hoffman.pdf
Threat Hunting & Incident Response Summit & Training 2020 (September 2020)
- A Tale of Two Hunters - Practical Approaches for Building a Threat Hunting Program, Peter Ortiz.pdf
- Applying Fraud Detection Techniques to Hunt Adversaries, Nicole Hoffman.pdf
- Big Game Hunting - Major threat group joins the targeted ransomware-as-a-Service (RaaS) scene via a Valak partnership, John Dwyer, Christopher Kiefer.pdf
- Building a Hunting Program at a Global Scale, Pete Bryan.pdf
- Cybersecurity and the Platypus - Why Information Modeling is Essential, Yet Challenging, Jason Keirstead.pdf
- External Threat Hunters are Red Teamers, David Maynor, Jorge Orchilles.pdf
- From One Sec Guy to the Team That Saved the CISO's Day, Diego Mariano.pdf
- Hunting Human-Operated Ransomware Operators, Ryan Chapman.pdf
- Hunting Immaturity Model, Mangatas Tondang.pdf
- Hunting Powershell Obfuscation with Linear Regression, Joe Petroske.pdf
- Leveraging Beacon Detection Techniques to Identify Anomalous Logons, Fred Nolte, Nikita Jain, Dante Razo, Jacob Alongi.pdf
- Machine Learning Meets Regex Rule Engine, David Rodriguez.pdf
- New Tools for Your Threat Huntung Toolbox, Mark Baggett.pdf
- Open NDR and the Great Pendulum (Keynote), Greg Bell.pdf
- Raising the Tide - Driving Improvement in Security by Being a Good Human- Keynote, David J Bianco.pdf
- SaaS Hunting, Ben Johnson.pdf
- Started from the Bottom - Exploiting Data Sources to Uncover ATTCK Behaviors, Jose Rodriguez, Jamie Williams.pdf
- The SOC Puzzle - Where Does Threat Hunting Fit, Ashley Pearson.pdf
- WinSCP - Yeah You Know Me, Mari DeGrazia.pdf
Security Awareness Forum & Training (August 2020)
- 28 Common Attitudes and Behaviors - Racial Literacy Resource, Joey Oteng.pdf
- A Step-by-Step Guide to Engaging a Global Workforce with Podcasts, Paige Ishii.pdf
- Create Your Own Awareness Videos at Home, Kerry Tomlinson.pdf
- Diversity, Equity, Inclusion, & Justice in Cyber - Action Items and Resources.pdf
- Diversity, Equity, Inclusion, & Justice in Cyber- Schilling, Otengo, Selemani, Stewart.pdf
- General Info and Reference Slides.pdf
- How to Build a Global Digital Security Awareness Scavenger Hunt, Neaka Lynn Balloge.pdf
- How to Engage Globally with Podcasts, Paige Ishii.pdf
- Keynote - The Human Side of Threats, Katie Nickels.pdf
- SANS Scavenger Hunt Clues and Answers.pdf
- Social Justice 101 - Joey Oteng.pdf
- stop action video tipsheet - Kerry Tomlinson.pdf
DFIR Summit & Training 2020 (July 2020)
- Accelerate Your Threat Hunting and IR with Next-Gen NDR+EDR, Balaji Prasad, Arun Raman, Heike Ritter.pdf
- capa - Automatically Identify Malware Capabilities, Willi Ballenthin, Moritz Raabe.pdf
- Captain's Log - Take Your Application Log Analysis from Starfleet to Star Fleek, David Pany, Ryan Tomcik.pdf
- Completing the Triad - The Case for Leading with NDR, John Smith.pdf
- CyberSleuth - Education and Immersion for the Next Generation, Daryl Pfief.pdf
- Data Science for DFIR - The Force Awakens, Jess Garcia.pdf
- Did I Do That- Understanding Action and Artifacts in Real Time, David Cowen, Matthew Seyer.pdf
- Dig Deeper - Acquisition and Analysis of AWS Cloud Data, Trey Amick, Curtis Mutter.pdf
- Empowering DFIR Through Automation and Orchestration - Enhancing Your Artifacts with Threat Intelligence, Iain Davison.pdf
- Forensic Analysis of the Apple HomePod and the Apple HomeKit Environment, Mattia Epifani.pdf
- Forensic Marriage - The Love-Hate Relationship Between eDiscovery and DFIR, Andrew + Sarah Konunchuk.pdf
- From Threat Detection to Organizational Threat Detection, O'Shea Bowens, Nico Smith.pdf
- Healthy Android Exams - Timelining Digitial Wellbeeing Data, Alexis Brignoni, Joshua Hickman.pdf
- Help, We Need an Adult, Liz Waddell.pdf
- How Not to Ruin Your Day - Avoiding Common Threat Huntung Mistakes, Menachem Perlman.pdf
- Hunting Bad Guys That Use TOR in Real-Time, Milind Bhargava.pdf
- If At First You Don't Succeed, Try Something Else, Jim Clausing.pdf
- Just Forensics - Mercifully, Lee Whitfield.pdf
- Kansa for Enterprise Scale Threat Hunting, Jonathan Ketchum.pdf
- Keynote - Strengthening Trust in DFIR, Eoghan Casey, Daryl Pfeif.pdf
- Long Live Linux Forensics, Ali Hadi, Brendan Brown, Victor Griswold.pdf
- Lucky (iOS) #13 - Time to Press Your Bets, Jared Barnhart.pdf
- Making Memories - Using Memory Analysis for Faster Response to User Investigations, Jessica Hyde, Aaron Sparling.pdf
- Man in The Mirror - Upping Your Threat Hunting Game by Seeing Yourself as an Attacker, Eric McIntyre, Randori.pdf
- Profiling Threat Actors in DNS, Taylor Wilkes-Pierce.pdf
- Putting Big Data to Work in DFIR, Jason Mical.pdf
- Think Like a Threat Actor to Handle Remote Work Risks, Brandon Hoffman, NetEnrich Lunch.pdf
- Using Big DFIR Data in Autopsy and Other Tools, Brian Carrier.pdf
- Using Storytelling to Be Heard and Remembered, Frank McClain.pdf
- What the DLL is Happening - A Practical Approach to Identifying SOH, Frank McClain.pdf
- You Need a PROcess to Check Your Running Processes and Modules, Michael Gough.pdf
Pen Test HackFest & Cyber Ranges Summit (June 2020)
- Anatomy of a Gopher - Binary Analysis of Go Binaries, Alex Useche.pdf
- Assumed Breach - The Better Pen Test, Tim Medin.pdf
- Automated Detection of Software Vulnerabilities Using Deep Learning, Nidhi Rastogi.pdf
- Building Compelling Cyber Challenges and Range Scenarios, Chris Elgee, Simon McNamee.pdf
- Creating Simulations for Historical Data Collection I, Tim Conway.pdf
- Creating Simulations for Historical Data Collection II, Phil Hagen.pdf
- Emulating the Adversary in Post-Exploitation, Jake Williams.pdf
- Fully Functional Cloud C2, Chris Truncer.pdf
- Getting tthe Most Out of Free CtFs, Derek Rook.pdf
- Handling Advanced Threats - De-Obfuscation, Emulation, and Anti-Forensics, Alexandre Borges.pdf
- Handling Advanced Threats - Extended Version, Alexandre Borges.pdf
- Hardware Hacking - Intro to Programming Micro Controllers, Mick Douglas.pdf
- How You Can Use Your Offensive Skills to Help the Air Force, Capt. Lillian Warner.pdf
- Identifying Novel Malware at Scale, Pedram Amini.pdf
- Keynote - Opportunity Amidst Uncertainty - Spinning Up Virtual Cons on a Shoestring, Lesley Carhart.pdf
- Keynote - Using CTF Challenges to Massively Level-Up Your Cybersecurity Career, Ed Skoudis.pdf
- Let the Games Begin- Overview of Summit Challenges and Jupiter Rockets, Steve Sims, Ed Skoudis, Simon Vernon.pdf
- Maldocs - Tips for Red Teamers, Didier Stevens.pdf
- Open Source Election Security - End-to-End Verifiable Voting with Microsoft ElectionGuard, Ethan Chumley, Matthew Wilhelm.pdf
- Quickstart Guide to MITRE ATT&CK, Adam Mashinchi .pdf
- Some of Them Want to Use You; Some of Them Want to Get Used By You, Chris Wysopal.pdf
- Supercharge Your Red Team with RedELK, Marc Smeets.pdf
- Where the ---- Is My Identity, Chris Edmundson.pdf
- Windows 10 Kernel Mitigations and Exploitation, Jaime Geiger, Stephen Sims.pdf
Cloud Security Summit & Training 2020 (May 2020)
- Building a Pipeline for Secure Virtual Machines in AWS, Shaun McCullough.pdf
- Cloud Breaches - Case Studies, Best Practices, and Pitfalls - Dylan Marcoux, Christopher Romano.pdf
- Cloud Security Posture Management from Security Hygiene to Incident Response, Yuri Diogenes, Jess Huber, Ricardo Bruno.pdf
- Cloud Security to Go, Ken Hartman.pdf
- Cover Your SaaS - Practical SaaS Security Tips, Ben Johnson.pdf
- Doing Cloud in China, Kenneth G. Hartman.pdf
- Don't Just Lift and Shift - Why Traditional Controls Don't Always Apply to the Cloud and What You Can Do About It, Steve Turner.pdf
- Keynote - Lessons Learned from Cloud Security Incidents Past and Present, Dave Shackleford.pdf
- Keynote - Securing Cloud Deployments - A Red Team Perspective, Matt Burrough.pdf
- Leveling Up Your Workforce for Cloud Enablement - Pathways to Total Pwnage, Aaron Lancaster.pdf
- Modern Identity Strategies to Securely Manage Your Cloud Infrastructure, Michael Soule.pdf
- Multi-Cloud Visibility for Large Organizations, Chris Farris.pdf
- Put a Lid on Those AWS S3 Buckets, Lily Lee & Melisa Napoles.pdf
- Reimagining Vulnerability Management in the Cloud, Eric Zielinski.pdf
- Static Analysis of Infrastructure as Code, Barak Schoster Goihman.pdf
- Threat Hunting in the Microsoft Cloud - The Times They Are a-Changin', John Stoner.pdf
ICS Security Summit & Training 2020 (March 2020)
- 2020 ICS Cyber Attack Trends.pdf
- At Least We Can Agree on This Working with Legal to Improve Cybersecurity in Standard Agreements.pdf
- Clean Up Your MES The Bridge Between IT and OT.pdf
- Cyber Guardian Exercise A Case Study in Brazil to Address Challenges in Cybersecurity and Protect Critical Infrastructure.pdf
- Five Blind Men and an Elephant Called ICS Supply Chain Security.pdf
- Go-To Analysis for ICS Network Packet Captures.pdf
- ICS Threats and Mapping to ICS ATT&CK.pdf
- Keynote Keeping the Lights on in a Dangerous World.pdf
- Mission Kill Process Targeting in Industrial Control System Attacks.pdf
- Nation-State Supply Chain Attacks for Dummies and You Too -or- Chipping Cisco Firewalls.pdf
- Project Runaway How the Worlds Largest Manufacturers are Unknowingly Leaking Their Secrets Online.pdf
- RADICS The DARPA Project to Restart the Power Grid After a Significant Cyber Attack.pdf
- Save the Day Build an Incident Response Program Now.pdf
- Security Worst Practices.pdf
- Summit Agenda.pdf
- The Current Status of Industrial Control Systems in Developing Countries A Case Study of Argentina and Latin America.pdf
- Vulnerabilities on the Wire Mitigations for Insecure ICS Protocols.pdf
Blue Team Summit & Training 2020 (March 2020)
- Cobot Uprising Smart Automation for Blue Teams.pdf
- Computer Love Love Letters and Log Analysis.pdf
- Cops and Robbers Simulating Adversary Techniques for Detection Validation.pdf
- Creativity Convergence and Choices Security Analyst Thinking Modes.pdf
- Cybercrime Markets and Their Effects on Threat Intelligence and Detection.pdf
- DevBlue Applying Software Engineering Practices to Blue Teaming for the Win.pdf
- How to Build a Threat Hunting Team and Manage Rabbit Holes.pdf
- Keynote Threat Hunting via DNS.pdf
- Keynote Untapped Potential.pdf
- Orchestrating Detection within Security Onion.pdf
- Passwordless Can It Be Done .pdf
- Pushing the SOC Left to Achieve Nash Equilibrium.pdf
- Put Some Power in Your Shell POSH for Incident Response at Scale.pdf
- Seeing Red Top Five Things You Can Do to Catch a Physical Pen Tester.pdf
- Summit Agenda.pdf
- Threat Intelligence How to Focus Fire on the Bad Guys Coming for Your Network.pdf
Open-Source Intelligence Summit & Training 2020 (February 2020)
- Connecting the Dots Using Engagement Metrics on Social Media to Identify Associates.pdf
- Judging by the Cover Profiling Through Social Media.pdf
- Keynote The News is OSINT.pdf
- Opening Remarks.pdf
- OSINT for Counter Diversion and Brand Protection Investigations.pdf
- Summit Agenda.pdf
- Think Outside the App An Investigators Guide to Mobile App OSINT.pdf
- Weaponizing the Deep Web.pdf
Cyber Threat Intelligence Summit & Training 2020 (January 2020)
- Automation The Wonderful Wizard of CTI Or Is IT .pdf
- Collection Overload Understanding and Managing Collection to Support Threat Intelligence Analysis.pdf
- CTI to Go Your Takeaways and To Do List.pdf
- Every Breath You Take A CTI Review of Stalkerware.pdf
- Hack the Reader Writing Effective Threat Reports.pdf
- Keynote Secret Squirrels and Flashlights Legal Risks and Threat Intelligence.pdf
- Stop Tilting at Windmills Three Key Lessons that CTI Teams Should Learn from the Past.pdf
- Strategic Takeaways Forging Compelling Narratives with Cyber Threat Intelligence.pdf
- Summit Agenda.pdf
- The Importance of Cultural and Social Intelligence.pdf
- The Threat Intelligence EASY Button.pdf
- Threat Intelligence and the Limits of Malware Analysis.pdf
- Threat Summary Report - Stalkerware.pdf
SANS Threat Hunting & IR Europe Summit & Training 2020 (January 2020)
- Enhancing the Cyclic Threat Hunting process using Attacker Methodologies and Automation.pdf
- Evolving the Hunt.pdf
- How do you do Incident Response for your Azure Active Directory.pdf
- How to automate response with M365.pdf
- How to detect that your domains are being abused for phishing by using DNS.pdf
- Mandiant IR Grab Bag of Attacker Activity.pdf
SANS Cyber Threat Summit 2019 (November 2019)
- Adventures in Threat Tracking.pdf
- BRONZE UNION An Unexpected Journey into the DNA of a Targeted Threat Group.pdf
- Cutting the Phishing Line Using Certificate Transparency Logs and Open Source Search Tools to Detect Phishing Attempts Against your Organisation.pdf
- Cutting the Phishing Line.pdf
- How do you do Incident Response for your Azure Active Directory.pdf
- Incident Response Practitioners Guide.pdf
- Mandiant IR Grab Bag of Attackers Activity.pdf
- Need for PLEAD.pdf
- Tactics, Techniques, and Procedures of the Worlds Most Dangerous Attackers.pdf
- Tracking Actors Through Their Webinjects.pdf
- Using Threat Models for Incidents; Introducing the Possible and Impossible Attack Trees..pdf
- What do you Get when you Add Military Power with a Sprinkling of Cat Burglar and a Pinch of Teenage Temper Tantrum.pdf
- Why Attackers Should Avoid C Sharp.pdf
Pen Test HackFest Summit & Training 2019 (November 2019)
- Covert Channels & Command and Control Innovation.pdf
- Crazy Windows Privilege Escalation Tricks That Your Blue Team Hates.pdf
- How to Train Your Dragon Ghidra Basics.pdf
- Introduction to Modern Heap Exploitation for Penetration Testers.pdf
- Keynote - Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD).pdf
- Maniacal Keyboards.pdf
- Pen Testing ICS and Other Highly Restricted Environments.pdf
- Sneaky Tip and Tricks with Alternate Data Streams.pdf
- Summit Agenda.pdf
- TheC2Matrix Comparing C2 Frameworks.pdf
- Trials and Tribulations of Modern Malware Control.pdf
- Using Mobile Malware Tactics During Penetration Tests.pdf
- What Every Pen Test Needs to Know About ICS.pdf
European Security Awareness Summit 2019 (November 2019)
- A New Awareness Approach.pdf
- Awareness Training Secrets Gleaned from the Security Podcast World.pdf
- Changing Security Culture, One Small Step at a Time.pdf
- Demystifying Cyber Security Cultural Strategy.pdf
- Dont Fly too Close to the Sun Carefully Building Leadership Support for Your Program.pdf
- Hacking Your Awareness.pdf
- Identifying the Introvert.pdf
- Less Filling.pdf
- Not on my Watch.pdf
- Phish apples and oranges assessing the sophistication of your phishing simulations.pdf
- So Now What Using Risk Assessments to Prioritise Security Behaviours.pdf
- The Many Faces of Culture in Security Awareness.pdf
- Using Appreciative Inquiry to Start a Network of Champions.pdf
Cloud & DevOps Security Summit & Training 2019 (November 2019)
- A DevOps Approach to Security Controls.pdf
- Add Continuous Compliance to Your Continuous IntegrationContinuous Deployment Pipelines.pdf
- CloudSec Rules Everything Around Me.pdf
- Continuous Security Buddy OpenShift KubernetesOpenStack Platform.pdf
- DevSecOps and the Cloud An Organizational Primer.pdf
- DevSecOps To Go Your Takeaways and To Do List.pdf
- Embedding Security and Privacy in the World of DevOps RealWorld Case Studies.pdf
- Get Off Your Buts and Move Your Apps Creating an App Modernization Strategy.pdf
- Infrastructure as Code is Real Using the Cloud to Provision Infrastructure with Software.pdf
- Keynote Building Zero Trust A CloudNative Perspective.pdf
- Keynote Shift RIGHT to Fix Bugs Earlier Security in a DevOps World.pdf
- Keynote Security for the Masses.pdf
- Lessons from Developing Microsegmentation for Container Environment Networks.pdf
- Loose Keys Bring These Attackers Me Incident Responders.pdf
- Managing Security Vulnerabilities in the Cloud.pdf
- Serverless DevSecOps Owning Security.pdf
- Summit Agenda.pdf
- The Art of Automation Creating a Serverless Threat Intel Bot.pdf
Purple Team Summit & Training 2019 (October 2019)
- Adaptive Adversary Emulation with MITRE ATT&CK.pdf
- Air Forces Purple Teams Lessons Learned from a Red Team Inside of a Blue Team.pdf
- Detecting and Mitigating FLAM1 Banking APT.pdf
- Emulating the Adversary While Training the Defenders Purple Teaming with MITRE ATTCK.pdf
- Evolving Your Adversary Playbooks Incorporating Red Team Findings and Benchmarking.pdf
- Its Hackers All the Way Down Experiences in Improving Security by Transferring Adversarial Skills to Product Teams.pdf
- Keynote Enter Mordor Prerecorded Security Events from Simulated Adversarial Techniques.pdf
- Keynote Purple Yourself.pdf
- Lessons in Purple Team Testing with MITRE ATT&CKs from Priceline and Praetorian.pdf
- One Hundred Red Team Operations a Year.pdf
- Optimizing Caldera for Automated Adversary Emulation.pdf
- Red Purple Blue Collaboration for Optimum Results.pdf
- Summit Agenda.pdf
- When Being Wrong is Right The Role of False Positives in Building a Detection Pipeline.pdf
- Work it Out Organizing Effective Adversary Emulation Exercises.pdf
SIEM Summit & Training 2019 (October 2019)
- Company Phishing Trip Analysis of Brand Phishing Kits and Campaigns.pdf
- Custom Application Behavioral Security Monitoring Using SIEM.pdf
- Did You Do Your Homework Use CaseDriven SIEM Deployments.pdf
- Get the Basics Right!.pdf
- Hunting with Sysmon to Unveil the Evil.pdf
- Keynote Untapped Potential Getting the Most our of Your SIEM.pdf
- Keynote - How I Learned to Stop Worrying and Love TLS.pdf
- Rapid Recognition and Response to Rogues.pdf
- Summit Agenda.pdf
- Techniques to Reduce Alert Fatigue in Security Analysts.pdf
- That SIEM Will Hunt.pdf
- The Right Data at the Right Time.pdf
- We Need to Talk about the Elephant in the SOC.pdf
SANS DFIR Europe Summit & Training 2019 - Prague Edition (September 2019)
- a) When Data Talks b) The Beautiful Mind of a Timeline.pdf
- Apple Watch Forensics (Live Demo) .pdf
- Handling BECs in an Office 365 environment.pdf
- Incident Response in the cloud foggy with a ray of sunshine.pdf
- Managing Major incidents.pdf
- Memory Smearing Myth or Reality.pdf
- Performing Linux Investigations at Scale.pdf
- Slacking Off Slack Artefacts on Windows.pdf
- smbtimeline - An automated timeline for SMB Traffic.pdf
- The Unified Logging Confession.pdf
- Tsurugi Linux project, the right DFIR tools in the wrong time .pdf
- TuxResponse A collection of scripts tools and commands to ease and automate incident response activities on Linux systems.pdf
Threat Hunting & Incident Response Summit & Training 2019 (September 2019)
- BZAR - Hunting Adversary Behaviors with Zeek and ATT&CK.pdf
- Dont Miss the Forest for the Trees How to Translate Too Much Data from Too Many Intrusions into Strategic Hunting Value.pdf
- Evolving the Hunt A Case Study in Improving a Mature Hunt Program.pdf
- Hunting is Sacred, but We Never Do It for Sport! .pdf
- Jupyter Notebooks and Pre-Recorded Datasets for Threat Hunting.pdf
- Keynote Classifying Evil Lessons from Hunting Human Traffickers.pdf
- Keynote Play Like a Kid Protect Like a Champion A Reservist Model.pdf
- My AHa Moment.pdf
- Once Upon a Time in the West A Story on DNS Attacks.pdf
- Open the Pod Bay Doors Please, HAL.pdf
- Remote Access Tools The Hidden Threats Inside Your Network.pdf
- Summit Agenda.pdf
- Threat Hunting in the Enterprise with Winlogbeat, Sysmon, and ELK.pdf
- Well, What Had Happened Was....pdf
- Whos That CARBANAKing at My Door Hunting for Malicious Application Compatibility Shims.pdf
- Worm Charming Harvesting Malware Lures for Fun and Profit.pdf
Oil & Gas Cybersecurity Summit & Training 2019 (September 2019)
- A Process-Based Approach to ICS Security.pdf
- A Roadmap to Help Enterprise Security Operations Centers Expand Duties to OT Environments.pdf
- Assessments in Active ICS Environments.pdf
- Breaching the ITOT Boundary Wedge Points and How to Secure Them.pdf
- Fueling the Exchange of Cyber Intelligence Why ONGISAC Matters.pdf
- ICS SCADA and MITRE ATTCK How It Helps and Where It Hurts.pdf
- If It Isnt Secure It Isnt Safe Incorporating Cybersecurity into Process Safety.pdf
- SCADA Cybersecurity for Pipelines API 1164 and Updates from the Trenches.pdf
- Securing the Technology Supply Chain.pdf
- Summit Agenda.pdf
Supply Chain Cybersecurity Summit & Training 2019 (August 2019)
- AF Cyber Defense Risk Management.pdf
- Andrew Martin.pdf
- Bring Your Own Threat Supply Chain Attacks Using Personal IoT Devices in Companies.pdf
- Day 2 Wrap Up Closing Comments.pdf
- Hacking the Motherboard Exploting Implicit Trust in All of the Forgotten Places.pdf
- Keynote When Your OT Supports the APT.pdf
- Neuralizing Risk from Customer Engagements.pdf
- Own Your Supply Chain System - Or It Will Own You.pdf
- Selecting for Security Searching for Risks from the Supply Chain in IoT Devices at Scale.pdf
- Supply Chain Integrity Through Hardware Material Analysis.pdf
- Supply Chain Summit Day 1 Opening Remarks.pdf
- Third-Party Software Assessments for Modern Development.pdf
- Trust But Verify An Argument for Security Testing Vefndors.pdf
- When Security Best Practices Meet Your Supply Chain.pdf
Security Awareness Summit & Training 2019 (August 2019)
- Beginners Track How to Use the Fogg Behavior Model Nudge Theory and More to Design Secure Behaviors.pdf
- Beginners Track Securing Leadership Support.pdf
- Beginners Track Security Awareness Recognition Program.pdf
- Changing Culture Lessons from Teaching Music.pdf
- Communications Engagement Track Cyber Agents for Change Leveraging Untapped Opportunities for Cybersecurity Awareness.pdf
- Communications Engagement Track Dashboard Confessions Security Awareness Communication in Silicon Valley.pdf
- Communications Engagement Track Shifting from FUD to Fun How to Overcome Internal Obstacles for Program Success.pdf
- Communications & Engagement Track - Cyber Agents for Change (HANDOUT - Cypher Practice Cards ).pdf
- Communications & Engagement Track - Cyber Agents for Change (HANDOUT - Cypher Wheel).pdf
- How Data-Driven Personalized Journeyys are the Future of Security Training.pdf
- Keynote A Lesson in Survival Transforming Culture by Preparing for a Crisis.pdf
- Keynote Latest Techniques in Hacking the Human.pdf
- Metrics CyberScore Workshop (Advanced).pdf
- Online Training Structure for Multi-Generations.pdf
- OSINT Workshop - Handout.pdf
- OSINT Workshop.pdf
- Partnerships & Collaboration.pdf
- Special Events - How to Build Your Own Escape Room (HANDOUT).pdf
- Special Events - How to Build Your Own Escape Room.pdf
- Special Events - Online Digital Scavenger Hunt Engaging Security Awareness with Global Impact.pdf
- SSAP, 2019 Awareness Report, and New Courses.pdf
- Summit Agenda.pdf
- The Creative Process Behind Fun, Low-Budget Videos.pdf
- Using Appreciative Inquiry to Create a Network of Security Champions that Went Viral.pdf
- vLearning TheoryInstructional Design.pdf
DFIR Summit & Training 2019 (July 2019)
- AmCache Investigation.pdf
- Distributed Evidence Collection and Analysis with Velociraptor Fast Surgical at Scale and Free.pdf
- Finding Badness Using Moloch for DFIR.pdf
- Finding Evil in Windows 10 Compressed Memory.pdf
- Forensic Investigation of Emails Altered on the Server.pdf
- Keynote Troying to Make Forensics EZer.pdf
- Live Response with Ansible.pdf
- MacOS DSStores Like Shellbags but for Macs.pdf
- Pipeline Incident Response.pdf
- Shedding Light on the macOS Spotlight Desktop Search Service.pdf
- Summit Agenda.pdf
- They See Us Rollin They Hatin Forensics of iOS CarPlay and Android Auto.pdf
- Tracking Traces of Deleted Applications.pdf
SANS Pen Test Hackfest Europe Summit & Training 2019 (July 2019)
- A Journey Through Adversary Emulation.pdf
- Automated adversary emulation using Caldera.pdf
- Blame Wars - How to Attribute Responsibility.pdf
- Pentesting Cars.pdf
- Well, that escalated quickly! - A Local Privilege Escalation Approach.pdf
- With Just a Search Engine Cup of Coffee Hunting Vulnerabilities on the Web.pdf
SANS ICS Europe 2019 (June 2019)
- Assessing [Industrial Cybersecurity] Assessments.pdf
- Building a National Cyber Security Strategy.pdf
- CYBERSECURITY FOR THE INDUSTRY 4.0 from the perspective of the energy CERT.pdf
- Engineers worst day - How Murphy could keep his production running.pdf
- Extending an IT SOC to include critical OTICS systems.pdf
- Five Ways to Ensure the Integrity of Your Industrial Operations.pdf
- ICS Down! Its Go Time..pdf
- Key Takeaways from the New SANS 2019 State of OTICS Cybersecurity Market Survey.pdf
- OT Security Requirements vs. Real Life stories.pdf
- Securing Large-Scale Industrial Networks.pdf
- Using ICSSCADA Honeypots the right way.pdf
Security Operations Summit & Training 2019 (June 2019)
- 2019 SANS SOC Survey Preview Live Simulcast.pdf
- A SOC TechnologyTools Taxonomy And Some Uses for It.pdf
- Arming SecOps with a Special Forces Targeting Process.pdf
- Breach ATTCK Osquery Learning from Breach Reports to Improve Endpoint Monitoring.pdf
- How to Literally Think Like an Attacker to Become a Better Defender.pdf
- Keynote How to Disrupt an Advanced Cyber Adversary.pdf
- Keynote Lessons Learned Applying ATTCKBased SOC Assessments.pdf
- Managing Security Operations int he Cloud.pdf
- Mental Models for Effective Searching.pdf
- Rapid Recognition and Response to Rogues.pdf
- Shared Security Services How to Adjust to an Evergrowing Landscape of Security Operations Center Responsibilities.pdf
- summit_archive_1561488873.pdf
- The Case for Building Your Own SOC Automations.pdf
- This Will Never Work Tales from Disappointingly Successful Pen Tests.pdf
- Use Case Development as a Driver for SOC Maturation.pdf
- Use Case Development Utilizing an ARECI Chart.pdf
- Virtuous Cycles Rethinking the SOC for LongTerm Success.pdf
Enterprise Defense Summit & Training 2019 (June 2019)
- Analyst Unknown Cyber Range AUCR A Standardized Open Source Web Framework.pdf
- Assumed Breach A Better Model for Penetration Testing.pdf
- Creating Incident Response Playbooks.pdf
- Do-It-Yourself ATT&CK Evaluations to Improve Your Security Posture.pdf
- Finding Evil with Skadi.pdf
- Five Mistakes We Wish Users Would Stop Making.pdf
- Hide Seek Where Your Business Does Business.pdf
- Keynote Practical Detection Engineering at Scale.pdf
- Legacy Authentication and Password Spray Understanding and Stopping Attackers Favorite TTPs in Azure AD.pdf
- LOLBin Detection Methods Seven Common Attacks Revealed.pdf
- Rapid Recognition and Response to Rogues.pdf
- Realigning from Chaotic Evil.pdf
- Sky-High Incident Response at Cloud Scale.pdf
- Summit Agenda.pdf
- The Best of Both Worlds Blending Tactics from the Public and Private Sectors.pdf
- The Offensive Defender Cyberspace Trapping.pdf
Cloud Security Summit & Training 2019 (April 2019)
- Automating Cloud Security Monitoring at Scale.pdf
- Automating the Creation of Network Firewall Rules Using PowerShell and CICD.pdf
- Cloud DFIR Why So Cirrus .pdf
- Cloud Security at its Finest.pdf
- Cloud Security Automation From Infrastructure to App.pdf
- Cloud, the Hard Way.pdf
- Demonstration of Typical Forensic Techniques for AWS EC2 Instances.pdf
- Keep it Flexible How Cloud Makes it Easier and Harder to Detect Bad Stuff.pdf
- Locking Them Out of Their Own House Access Control to Cloud at Startups.pdf
- Secrets for All the Things The Injection of Secrets for Every Application in Your CloudAgnostic Environment.pdf
- Secure by Default Enabling Developers to Focus on Their Mission by Providing Cloud Security for Free.pdf
- Securing Your Application Identities.pdf
- Serverless Security Attackers and Defenders.pdf
- Summit Agenda.pdf
- The State of Cloud Security How Does Your Organization Compare .pdf
- Who Done It Gaining Visibility and Accountability in the Cloud.pdf
Blue Team Summit & Training 2019 (April 2019)
- Azure AD Security Recommendations and the Customer Stories That Prove It.pdf
- Forgotten But Not Gone Gathering NTFS Artifacts of Deletion.pdf
- Mental Models for Effective Searching.pdf
- Network Flow Data A Cornucopia of Value.pdf
- One Phish, Two Phish, Red Phish, Green Phish.pdf
- OSINT Not Just Offensive.pdf
- Relentless Team Building.pdf
- Seriously, I Can See You.pdf
- Skill Sharpening at the Cyber Range Developing the NextGeneration Blue Team .pdf
- Statically Analyzing Infrastructure as Code.pdf
- Summit Agenda.pdf
- Suspiciously Inconspicuous.pdf
- Threat Hunting via Sysmon.pdf
- To Blue with ATT&CK-Flavored Love.pdf
- Using Statistical Analysis to Reduce Noise and Improve Efficacy.pdf
- ZeroTrust Networks The Future Is Here.pdf
SANS Cyber Security Middle East Summit (April 2019)
- A Knack for NAC Locking Down Network Access Across a Global Enterprise.pdf
- Actionable CTI Not a Pipedream.pdf
- Attacking & Defending AWS S3 Bucket.pdf
- Emerging threats by SANS Internet Storm Centre.pdf
- Exploiting relationship between Active Directory Objects.pdf
- In the trails of Windshift APT.pdf
- Raising the Bar for the Attacker.pdf
- The Case for Building Your Own SOC Automations.pdf
ICS Security Summit & Training 2019 (March 2019)
- A Vital New Concept for ICS Cybersecurity Programs ForeScout Lunch Learn .pdf
- Assumed Breach Assessments Using You Against You.pdf
- CES21 Technology Achievements Grid Security and Cyber Automation.pdf
- Creating a Security Metrics Program How to Measure Programmatic Success.pdf
- Evolution of ICS Attacks From BlackEnergy 3 to TRISIS.pdf
- Gaining Buy-In and Resources to Manage Cybersecurity Risk in OT Environments.pdf
- Gaining Endpoint Log Visibility in ICS Environments.pdf
- How Common Network Misconfigurations Impact ICS Reliability and Security.pdf
- ICS Risk Management Approaches Vulnerability vs Threat vs Engineering.pdf
- Intersection of Data Breach Notification and Critical Infrastructure Protection.pdf
- Practical Solutions to Supply Chain Attacks.pdf
- Preventing Your Physical Access Control System from Being Used Against You.pdf
- Scanners, Tunnels, and Sims, Oh My! .pdf
- Securing the Distribution Grid The State Regulatory Perspective.pdf
- Still Bailing Water Out of the OT Boat Two Years Later.pdf
- Summit Agenda.pdf
Open-Source Intelligence Summit & Training 2019 (February 2019)
- Backdoors to the Kingdom... Changing The Way You Think About Organizational Reconnaissance.pdf
- Beginners Business and Legal Research.pdf
- Hunting Down Malicious Sites Using Certstream Data and Available Web Services.pdf
- OSINT Data Breach Ethics and OpSec Oh My.pdf
- So You Want to OSINT Full-Time.pdf
- Summit Agenda.pdf
- Using OSINT to Improve Critical Business Decision-Making .pdf
- Weaponizing OSINT.pdf
Cyber Threat Intelligence Summit & Training 2019 (January 2019)
- A Brief History of Attribution Mistakes.pdf
- Analytic Tradecraft in the Real World.pdf
- ATTCK Your CTI Lessons Learned from Four Years in the Trenches.pdf
- Cloudy with Low Confidence of Threat Intel How to Use and Create Threat Intelligence in an Office 365 World.pdf
- CTI 101 Effectively Communicating Threat Intel and Its Value.pdf
- CTI 101 Frameworks and Why We Use Them.pdf
- CTI 101 Network Defense Integrating Threat Intel IR and Hunting.pdf
- How to Get Promoted Developing Metrics to Show How Threat Intel Works.pdf
- Keynote Applyiing WWIIEra Analytic Techniques to CTI.pdf
- Language and Culture in Threat Intelligence.pdf
- Meet Me In the Middle Threat Indications and Warning in Principle and Practice .pdf
- Quality Over Quantity Determining Your CTI Detection Efficiency .pdf
- Schroedingers Backslash Tracking the Chinese APT Goblin Panda with RTF Metadata .pdf
- Summit Agenda.pdf
- Untying the Anchor Countering Unconscious Bias in Threat Intelligence Analysis.pdf