Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Incident Tracking In The Enterprise

WhitepaperDigital Forensics and Incident Response
  • 20 Jul 2015

Two-Factor Authentication (2FA) using OpenOTP

WhitepaperCyber Defense
  • 17 Jul 2015

Leveraging the Federal Public Trust Clearance Model in State Government Personnel Security Programs

WhitepaperCybersecurity Leadership
  • 17 Jul 2015

Psychology and the hacker - Psychological Incident Handling

WhitepaperDigital Forensics and Incident Response
  • 9 Jul 2015

A Concise Guide to Various Australian Laws Related to Privacy and Cybersecurity Domains

WhitepaperCybersecurity Leadership
  • 6 Jul 2015

A Framework for Assessing 20 Critical Controls Using ISO 15504 and COBIT 5 Process Assessment Model (PAM)

WhitepaperCybersecurity Leadership
  • 6 Jul 2015

Securing Single Points of Compromise (SPoC)

WhitepaperCybersecurity Leadership
  • 30 Jun 2015

Tactical Data Diodes in Industrial Automation and Control Systems

WhitepaperIndustrial Control Systems Security
  • 30 Jun 2015

BYOD: Do You Know Where Your Backups Are Stored?

Whitepaper
  • 30 Jun 2015

Accessing the inaccessible: Incident investigation in a world of embedded devices

Whitepaper
  • 24 Jun 2015

Case Study: Critical Controls that Sony Should Have Implemented

WhitepaperCybersecurity and IT Essentials
  • 22 Jun 2015

eAUDIT: Designing a generic tool to review entitlements

WhitepaperCybersecurity Leadership
  • 22 Jun 2015