Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Lateral Leadership and Information Security

WhitepaperCybersecurity Leadership
  • 19 Jul 2017

Forensicating Docker with ELK

WhitepaperDigital Forensics and Incident Response
  • 17 Jul 2017

Loki-Bot: Information Stealer, Keylogger, and More!

WhitepaperCyber Defense
  • 28 Jun 2017

Incentivizing Cyber Security: A Case for Cyber Insurance

WhitepaperIndustrial Control Systems Security
  • 27 Jun 2017

Next Generation Endpoint Protection - CIS Control 8, Malware Defense Effectiveness, Performance Metrics and False Positive Rates

WhitepaperCybersecurity and IT Essentials
  • 20 Jun 2017

Hacking the CAN Bus: Basic Manipulation of a Modern Automobile Through CAN Bus Reverse Engineering

WhitepaperSecurity Awareness
  • 20 Jun 2017

Intrusion detection through traffic analysis from the endpoint using Splunk Stream

WhitepaperCloud Security
  • 24 May 2017

Beats and Bytes: Striking the Right Chord in Digital Forensics (OR: Fiddling with Your Evidence)

WhitepaperDigital Forensics and Incident Response
  • 22 May 2017

Future SOC: SANS 2017 Security Operations Center Survey

WhitepaperCyber Defense
  • 1 May 2017
  • Christopher Crowley

Hunting through Log Data with Excel

WhitepaperDigital Forensics and Incident Response
  • 24 Apr 2017

Show Me the Money! From Finding to Fixed to Funded

WhitepaperCybersecurity and IT Essentials
  • 24 Apr 2017

No Safe Harbor: Collecting and Storing European Personal Information in the U.S.

WhitepaperCybersecurity Leadership
  • 24 Apr 2017