Community: Webcasts


IR Event Log Analysis

Hal Pomeranz

How to Run Linux Malware Analysis Apps as Docker Containers

Lenny Zeltser

Hands on USN Journal Analysis

David Cowen

Closing the Door on Web Shells

Anuj Soni

DFIR Advanced Smartphone Forensics

Cindy Murphy

When Macs get Hacked

Sarah Edwards

IT'S ALIVE!!! Investigating with Network-based Evidence

Phil Hagen

FOR585 Advanced Smartphone and Mobile Device Forensics Preview: Android vs. iOS - Battle of the Smartphones: Data Retention

Heather Mahalik

10 Ways To Rock Your SOC

Shelly Giesbrecht

Detecting Evil on Windows Systems - An In-Depth Look at the DFIR Poster

Mike Pilkington and Rob Lee

Practical Threat Management and Incident Response for the Small- to Medium-Sized Enterprise

Jake Williams and Patrick Bedwell

Logs, Logs, Every Where / Nor Any Byte to Grok

Phil Hagen

Bypassing Locked Smartphones - Are you really locked out?

Heather Mahalik

Malware Analysis Essentials Using REMnux

Lenny Zeltser

Dumping in the Dark: Gaining Insight into your Memory Acquisition Tools and Techniques

Alissa Torres

Finding Unknown Malware

Hal Pomeranz

How Defense-In-Depth Helps Protect You From Unexpected Vulnerabilities Like Heartbleed

Jake Williams, SANS & Adam Goodman

Geolocation Forensics

Chad Tilbury

Mobile Malware and Spyware - Working Through the Bugs

Cindy Murphy