SANS Cyber Defense

@SANSCyberDefense - 355 本の動画

チャンネル登録者数 2.33万人

The Cyber Defense curriculum, epitomizes security professionals on the front-line of defending, day-in and day-out. Heavy emphasis on facilitating the detect...

最近の動画

Pros of ADINT | SANS OSINT Summit 2025 1:25

Pros of ADINT | SANS OSINT Summit 2025

OSINT Resources — What Motivates You? | SANS OSINT Summit 2025 1:20

OSINT Resources — What Motivates You? | SANS OSINT Summit 2025

Why Are Security Certificates Useful? | SANS OSINT Summit 2025 0:53

Why Are Security Certificates Useful? | SANS OSINT Summit 2025

Next Era of OSINT | SANS OSINT Summit 2025 1:10

Next Era of OSINT | SANS OSINT Summit 2025

Hidden in Plain Site: Leverage Commented Code and Web Metadata for Website Research 32:24

Hidden in Plain Site: Leverage Commented Code and Web Metadata for Website Research

Tracing Code Lineage: Using OSINT to Illuminate the Origins of Open Source Software 34:13

Tracing Code Lineage: Using OSINT to Illuminate the Origins of Open Source Software

Investigating Fentanyl Supply Chains: An OSINT Analysis of Chinese Biotechnology Companies 29:47

Investigating Fentanyl Supply Chains: An OSINT Analysis of Chinese Biotechnology Companies

Chinese Social Media Intelligence 26:57

Chinese Social Media Intelligence

Mastering Email OSINT: Techniques for Uncovering Online Footprints 30:17

Mastering Email OSINT: Techniques for Uncovering Online Footprints

Matt Edmondson's Freestyle AI talk 31:41

Matt Edmondson's Freestyle AI talk

Beyond Google Lens: How Real Estate Sites Can Assist Geolocation Efforts 28:27

Beyond Google Lens: How Real Estate Sites Can Assist Geolocation Efforts

Creating Social Network Graphs Using GEPHI 34:47

Creating Social Network Graphs Using GEPHI

Social Media Discussion with the @OSINTMillennial 35:34

Social Media Discussion with the @OSINTMillennial

Fireside Chat with Jason Barrett 37:00

Fireside Chat with Jason Barrett

Navigating the Balance Between Public Information and Internal Threat Protection 15:09

Navigating the Balance Between Public Information and Internal Threat Protection

Hunt Them Where They Play 34:11

Hunt Them Where They Play

Ads as Intel: Exploring ADINT's Capability to Pinpoint Personal Locations 26:55

Ads as Intel: Exploring ADINT's Capability to Pinpoint Personal Locations

Crowdsourced Intelligence: The Role of the OSINT Community in Global Investigations 36:35

Crowdsourced Intelligence: The Role of the OSINT Community in Global Investigations

Shadow Hunting: Advanced OSINT Skills to Navigate the Breach Data Labyrinth 20:18

Shadow Hunting: Advanced OSINT Skills to Navigate the Breach Data Labyrinth

Finding Threat Actor Infrastructure With SSL Certificates 35:07

Finding Threat Actor Infrastructure With SSL Certificates

Data Processing Cheat Codes for OSINT at Scale 33:13

Data Processing Cheat Codes for OSINT at Scale

Back to Basics: Keywords and Listening in 30:24

Back to Basics: Keywords and Listening in

Keynote | The Power of OSINT: Navigating the New Hybrid Cold War 48:14

Keynote | The Power of OSINT: Navigating the New Hybrid Cold War

Unlock Advanced OSINT: Inside the Revamped SEC587 Course 30:35

Unlock Advanced OSINT: Inside the Revamped SEC587 Course

Supply Chain Security Incident Response: Strategies for Responding to Emerging Threats 1:01:08

Supply Chain Security Incident Response: Strategies for Responding to Emerging Threats

MAVIS: Machine Assisted Vulnerability Identification System 28:31

MAVIS: Machine Assisted Vulnerability Identification System

Mastering the Journal 27:25

Mastering the Journal

Hybrid Fortresses: How A Defensible Security Architecture Raises the Bar Against Modern Attacks 31:45

Hybrid Fortresses: How A Defensible Security Architecture Raises the Bar Against Modern Attacks

APT Takedown: The 2024 Blueprint for Cyber Victory 33:16

APT Takedown: The 2024 Blueprint for Cyber Victory

Encrypted DNS Developments 34:25

Encrypted DNS Developments

Edge Out Your Next BEC Adversary: Investigation and Prevention Strategies Using OSINT 31:55

Edge Out Your Next BEC Adversary: Investigation and Prevention Strategies Using OSINT

CYA by Using CIA...Correctly for a Change 23:48

CYA by Using CIA...Correctly for a Change

Stand out from the crowd! Using PowerShell to automate your daily tasks 31:30

Stand out from the crowd! Using PowerShell to automate your daily tasks

The SBOM Makeover 30:52

The SBOM Makeover

Guardrails for Innovation: Navigating Security Standards in Generative AI and LLMs 29:38

Guardrails for Innovation: Navigating Security Standards in Generative AI and LLMs

The Python Security Pickle 30:00

The Python Security Pickle

Next Gen SOC 29:13

Next Gen SOC

OSINT & Vicarious Trauma 23:03

OSINT & Vicarious Trauma

Automating Log Analysis 28:06

Automating Log Analysis

The Impact of AI with OSINT 35:29

The Impact of AI with OSINT

Unlock 2024’s Top Cyber Defense Talks | SANS Secure Your Fortress 0:46

Unlock 2024’s Top Cyber Defense Talks | SANS Secure Your Fortress

Building and Scaling SBOM Programs: Navigating the Challenges for Effective Risk Management 1:03:56

Building and Scaling SBOM Programs: Navigating the Challenges for Effective Risk Management

Enhanced Vendor Risk Assessments: Maximize Risk Reduction and Strengthening Vendor Relations 1:06:40

Enhanced Vendor Risk Assessments: Maximize Risk Reduction and Strengthening Vendor Relations

Get to Know Sean Thomas 3:38

Get to Know Sean Thomas

Who is SEC401 for?: Security Essentials for Everyone! 0:40

Who is SEC401 for?: Security Essentials for Everyone!

Why Take SEC401? 0:58

Why Take SEC401?

SEC401 Labs: Finding Vulnerabilities Caused by Rushed Production 0:50

SEC401 Labs: Finding Vulnerabilities Caused by Rushed Production

SEC401 Labs: Investigating Phishing Attacks 0:42

SEC401 Labs: Investigating Phishing Attacks

SEC401 Labs: Preventing Data Loss and Insider Threats 1:12

SEC401 Labs: Preventing Data Loss and Insider Threats

SEC401 Labs: Addressing AWS Compromise Issues 0:52

SEC401 Labs: Addressing AWS Compromise Issues

What is the Goal of SEC401? 0:27

What is the Goal of SEC401?

What Is a Next-Gen Lab? | SANS SEC401 0:42

What Is a Next-Gen Lab? | SANS SEC401

Meet Rich Greene: New SEC301 Instructor | Cybersecurity Expert Introduction 2:16

Meet Rich Greene: New SEC301 Instructor | Cybersecurity Expert Introduction

Detecting Command and Control Frameworks via Sysmon and Windows Event Logging 28:07

Detecting Command and Control Frameworks via Sysmon and Windows Event Logging

Simplifying SSH Key Management: Leveraging ssh config for Security and Efficiency 28:58

Simplifying SSH Key Management: Leveraging ssh config for Security and Efficiency

Cracking the Code: The Role of Programming in Information Security 30:00

Cracking the Code: The Role of Programming in Information Security

Relentless Defense - Rules for Security Operations That Keep Attackers Off Your Network 31:01

Relentless Defense - Rules for Security Operations That Keep Attackers Off Your Network

Unlocking Cybersecurity: From Zero to Hero in the Digital Age 31:21

Unlocking Cybersecurity: From Zero to Hero in the Digital Age

AI Powered BladeRunners: The Role of AI in Implementing Zero Trust 35:04

AI Powered BladeRunners: The Role of AI in Implementing Zero Trust

Breach Data Infrastructure 31:24

Breach Data Infrastructure

A View From the Trenches 27:01

A View From the Trenches

OSINT Psychology: Understanding the Human Element of Intelligence Gathering 26:57

OSINT Psychology: Understanding the Human Element of Intelligence Gathering

Uncover the Invisible Gold Mines: How to Dump Raw Data From TikTok 34:15

Uncover the Invisible Gold Mines: How to Dump Raw Data From TikTok

Trailblazer: Piercing the Veil of VehicleSecrets with OSINT Alchemy 32:04

Trailblazer: Piercing the Veil of VehicleSecrets with OSINT Alchemy

A Practical Guide To OSINT On the Russian Internet 37:21

A Practical Guide To OSINT On the Russian Internet

Stunt OSINT: AI and Content Networking Display 34:45

Stunt OSINT: AI and Content Networking Display

From the Public Archive to the Wayback Machine: Thinking Like a Historian for OSINT Practitioners 35:04

From the Public Archive to the Wayback Machine: Thinking Like a Historian for OSINT Practitioners

Every Contact Leaves a Trace 27:31

Every Contact Leaves a Trace

Oh My Stars! Using Astronavigation Techniques to Do Image Geo-Positioning 24:09

Oh My Stars! Using Astronavigation Techniques to Do Image Geo-Positioning

Telegram 101 to 401 35:07

Telegram 101 to 401

Maximizing Social Media Data Extraction  Dumping and Preserving Content for OSINT 31:52

Maximizing Social Media Data Extraction Dumping and Preserving Content for OSINT

toADS  Hunting Online Advertisements 36:37

toADS Hunting Online Advertisements

Identifying the Secret Military Helicopters of Washington, D C 30:04

Identifying the Secret Military Helicopters of Washington, D C

Keynote | Humans Are More Important Than Hardware 47:16

Keynote | Humans Are More Important Than Hardware

Defining and Defending the GenAI Supply Chain 34:36

Defining and Defending the GenAI Supply Chain

AI and Machine Learning For the Win! 29:07

AI and Machine Learning For the Win!

Common Security Pitfalls: Don't Worry You're Not Alone 31:01

Common Security Pitfalls: Don't Worry You're Not Alone

Using OSINT and AI to Tackle Disinformation and Analyze Information 51:24

Using OSINT and AI to Tackle Disinformation and Analyze Information

Who Knew Grandpa was a Supply Chain Security Expert? 29:13

Who Knew Grandpa was a Supply Chain Security Expert?

From Cyber Lemons to Lemonade: A Refreshing Take on Exposed Data 31:33

From Cyber Lemons to Lemonade: A Refreshing Take on Exposed Data

Python Applications are a Pain 25:40

Python Applications are a Pain

A QUICk decode 28:30

A QUICk decode

🔐 Top Defense Strategies 2024: Inside SANS Secure Your Fortress Event! 🛡️ 0:52

🔐 Top Defense Strategies 2024: Inside SANS Secure Your Fortress Event! 🛡️

2024 Cyber Defense Trends and Predictions 1:00:11

2024 Cyber Defense Trends and Predictions

Threat Detection Trends 2023 1:11:07

Threat Detection Trends 2023

Open Source Tools and Techniques for AML and Sanctions Compliance 1:02:44

Open Source Tools and Techniques for AML and Sanctions Compliance

Decoding Russian Propaganda, Disinformation & Military Strategy: The Role of Open-Source Intel 32:03

Decoding Russian Propaganda, Disinformation & Military Strategy: The Role of Open-Source Intel

Demystifying Data Dumps 37:55

Demystifying Data Dumps

The Importance of Reproducable Methodologies in OSINT Investigations 33:56

The Importance of Reproducable Methodologies in OSINT Investigations

Lessons Learned From Using OSINT to Track Cybercrime in LATAM 25:59

Lessons Learned From Using OSINT to Track Cybercrime in LATAM

OSINT Uncovered: Enhancing Investigations with the ObSINT Guidelines 26:15

OSINT Uncovered: Enhancing Investigations with the ObSINT Guidelines

The Puzzle Palace Model in OSINT Analytic Mindset 27:28

The Puzzle Palace Model in OSINT Analytic Mindset

Uncovering Law Enforcement Activities: Darknet Vendor OSINT Perspectives 44:47

Uncovering Law Enforcement Activities: Darknet Vendor OSINT Perspectives

Tips & Tricks For Digital Dumpster Diving 38:12

Tips & Tricks For Digital Dumpster Diving

Unlocking the Digital Landscape: Exploring the Power of OSINT for a Connected World 28:38

Unlocking the Digital Landscape: Exploring the Power of OSINT for a Connected World

The Growth of Global Election Disinformation: The Role & Methodology of Govt-linked Cyber Actors 33:57

The Growth of Global Election Disinformation: The Role & Methodology of Govt-linked Cyber Actors

Detection Engineering: The Blue Team Cheat Code | Host: Mark Orlando | September 12, 2023 52:42

Detection Engineering: The Blue Team Cheat Code | Host: Mark Orlando | September 12, 2023

Hunting for Suspicious HTTPS and TLS Connections 1:02:50

Hunting for Suspicious HTTPS and TLS Connections

What does it take to author a cybersecurity book? 1:20:50

What does it take to author a cybersecurity book?

Join us for the SANS Open-Source Intelligence (OSINT) Summit 2023 - September 22! 0:31

Join us for the SANS Open-Source Intelligence (OSINT) Summit 2023 - September 22!

Blueprint Podcast

Fundamentals: 11 Strategies of a World-Class SOC | SANS Blueprint Podcast Season 4 Intro 55:02

Fundamentals: 11 Strategies of a World-Class SOC | SANS Blueprint Podcast Season 4 Intro

9285 回視聴 - 2 年前

Strategy 1: Know What You Are Protecting and Why | SANS Blueprint Podcast 1:01:55

Strategy 1: Know What You Are Protecting and Why | SANS Blueprint Podcast

4338 回視聴 - 2 年前

Strategy 2: Give the SOC the Authority to Do Its Job | SANS Blueprint Podcast 36:43

Strategy 2: Give the SOC the Authority to Do Its Job | SANS Blueprint Podcast

1772 回視聴 - 2 年前

Strategy 3: Build a SOC Structure to Match Your Organizational Needs | SANS Blueprint Podcast 1:11:52

Strategy 3: Build a SOC Structure to Match Your Organizational Needs | SANS Blueprint Podcast

2225 回視聴 - 1 年前

Strategy 4: Hire AND Grow Quality Staff | SANS Blueprint Podcast 1:13:16

Strategy 4: Hire AND Grow Quality Staff | SANS Blueprint Podcast

1017 回視聴 - 1 年前

Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence | SANS Blueprint Podcast 57:27

Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence | SANS Blueprint Podcast

2303 回視聴 - 1 年前

Blueprint Live at the SANS Blue Team Summit 2023 [SPECIAL EPISODE] 1:04:40

Blueprint Live at the SANS Blue Team Summit 2023 [SPECIAL EPISODE]

1006 回視聴 - 1 年前

Strategy 7: Select and Collect the Right Data | SANS Blueprint Podcast 1:03:07

Strategy 7: Select and Collect the Right Data | SANS Blueprint Podcast

1140 回視聴 - 1 年前

Strategy 8: Leverage Tools and Support Analyst Workflow | SANS Blueprint Podcast 1:25:28

Strategy 8: Leverage Tools and Support Analyst Workflow | SANS Blueprint Podcast

813 回視聴 - 1 年前

Strategy 9: Communicate Clearly, Collaborate Often, Share Generously | SANS Blueprint Podcast 1:03:44

Strategy 9: Communicate Clearly, Collaborate Often, Share Generously | SANS Blueprint Podcast

594 回視聴 - 1 年前

Strategy 10: Measure Performance to Improve Performance | SANS Blueprint Podcast 52:33

Strategy 10: Measure Performance to Improve Performance | SANS Blueprint Podcast

671 回視聴 - 1 年前

Strategy 11: Turn up the Volume by Expanding SOC Functionality 1:26:23

Strategy 11: Turn up the Volume by Expanding SOC Functionality

750 回視聴 - 1 年前