Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Tech Refresh for the Forensic Analysis Toolkit

WhitepaperDigital Forensics and Incident Response
  • 16 Mar 2016

Constructing a Measurable Tabletop Exercise for a SCADA Environment

WhitepaperIndustrial Control Systems Security
  • 14 Mar 2016

Finding the Fine Line - Taking an Active Defense Posture in Cyberspace without Breaking the Law or Ruining an Enterprise's Reputation

WhitepaperCybersecurity Leadership
  • 10 Mar 2016

Leading Effective Cybersecurity with the Critical Security Controls

WhitepaperCybersecurity and IT Essentials
  • 8 Mar 2016

E-Discovery Operations: Tactical considerations for defensible eDiscovery

WhitepaperCybersecurity Leadership
  • 8 Mar 2016

Tracing the Lineage of DarkSeoul

WhitepaperCybersecurity and IT Essentials
  • 4 Mar 2016

Mimikatz Overview, Defenses and Detection

WhitepaperDigital Forensics and Incident Response
  • 29 Feb 2016

Secure Network Design: Micro Segmentation

WhitepaperCyber Defense
  • 29 Feb 2016

Breach Control: Best Practices in Health Care Application Security

Whitepaper
  • 25 Feb 2016

Password Management Applications and Practices

WhitepaperCybersecurity Leadership
  • 23 Feb 2016

Selling Your Information Security Strategy

WhitepaperCybersecurity Leadership
  • 18 Feb 2016

The Who, What, Where, When, Why and How of Effective Threat Hunting

Whitepaper
  • 16 Feb 2016