<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- paulirish.com/2008/conditional-stylesheets-vs-css-hacks-answer-neither/ -->
<!--[if lt IE 7]> <html class="no-js lt-ie9 lt-ie8 lt-ie7" lang="en" xmlns="http://www.w3.org/1999/xhtml"> <![endif]-->
<!--[if IE 7]> <html class="no-js lt-ie9 lt-ie8" lang="en" xmlns="http://www.w3.org/1999/xhtml"> <![endif]-->
<!--[if IE 8]> <html class="no-js lt-ie9" lang="en" xmlns="http://www.w3.org/1999/xhtml"> <![endif]-->
<!-- Consider adding a manifest.appcache: h5bp.com/d/Offline -->
<!--[if gt IE 8]><!--> <html class="no-js" lang="en" xmlns="http://www.w3.org/1999/xhtml"> <!--<![endif]-->
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />
<meta name="google-site-verification" content="JuXedZAY_Wdm1rNCHTZM6ZiwQs5qePlAHSAQEDfjeiQ" />
<meta name="msvalidate.01" content="4A0A2895C106F8337112421AFF33F698" />
<title>Cybersecurity Research | Master's Degree | SANS.edu</title>


<meta name="description" content="Cybersecurity Research | Master's Degree |SANS.edu Master's degree candidates at SANS.edu conduct cyber security research that is relevant, has real world impact, and provides cutting-edge advancements to the field of information security, all under the guidance and review of a world-class faculty. See highlights of their recent findings." />

<link rel="canonical" href="https://www.sans.edu/cyber-research" />

<link rel="stylesheet" href="/css2/common/styles.css" type="text/css" />
<link rel="stylesheet" href="/css2/common/site_selector.css" type="text/css" />
<link rel="stylesheet" href="/css2/common/slider_hack.css" type="text/css" />
<link rel="stylesheet" href="/css2/common/slider/styles_hack.css" type="text/css" />
<link rel="stylesheet" href="/css2/common/sites/sti.css" type="text/css" />
<link rel="stylesheet" href="/css2/common/bootstrap-modal.min.css" type="text/css" />
<link rel="stylesheet" href="/css2/common/gdpr-form-fields.css" type="text/css" />




<link rel="stylesheet" href="/css2/common/skins/red_css.css" type="text/css" media="screen, projection, print" />
<script type="text/javascript" src="/scripts/libs/jquery.min.js"></script>
<script type="text/javascript" src="/scripts/libs/jquery-ui.min.js"></script>


<script type="text/javascript">
var _gas = _gas || [];
_gas.push(['_setAccount', 'UA-25324117-2']);
_gas.push(['_setAllowLinker', true]);
_gas.push(['_setAllowAnchor', true]);
_gas.push(['_setDomainName', 'cyber-defense.sans.org']);
_gas.push(['_setDomainName', 'ics.sans.org']);
_gas.push(['_setDomainName', 'sic.sans.org']);
_gas.push(['_setDomainName', 'isc.sans.edu']);
_gas.push(['_setDomainName', 'digital-forensics.sans.org']);
_gas.push(['_setDomainName', 'it-audit.sans.org']);
_gas.push(['_setDomainName', 'pen-testing.sans.org']);
_gas.push(['_setDomainName', 'uk.sans.org']);
_gas.push(['_setDomainName', 'software-security.sans.org']);
_gas.push(['_setDomainName', 'exams.giac.org']);
_gas.push(['_setDomainName', 'www.giac.org']);
//_gas.push(['_setDomainName', 'giac.org']);
_gas.push(['_setDomainName', 'www.sans.edu']);
//_gas.push(['_setDomainName', 'sans.edu']);
//_gas.push(['_setDomainName', 'securingthehuman.sans.org']);
//_gas.push(['_setDomainName', 'securingthehuman.org']);
_gas.push(['_setDomainName', 'ondemand.sans.org']);
_gas.push(['_setDomainName', 'www.sans.org']);
_gas.push(['_setDomainName', 'pages.sans.org']);
_gas.push(['_setDomainName', 'idp.sans.org']);
_gas.push(['_setDomainName', 'preview-store.sans.systems']);
//_gas.push(['_setDomainName', 'sans.org']);
_gas.push(['_gasMultiDomain', 'mousedown']);
_gas.push(['_trackPageview']);
_gas.push(['_gasTrackOutboundLinks']);
_gas.push(['_gasTrackMaxScroll']);
_gas.push(['_gasTrackDownloads']);
_gas.push(['_gasTrackMailto']);
_gas.push(['_gasTrackYoutube', { category: "Videos", force: true }]);

(function() {
var ga = document.createElement('script');
ga.id = 'gas-script';
ga.setAttribute('data-use-dcjs', 'true');
ga.type = 'text/javascript';
ga.async = true;
ga.src = '/scripts/libs/GAS/gas.min.js';
var s = document.getElementsByTagName('script')[0];
s.parentNode.insertBefore(ga, s);
})();

</script>    


<script type="text/javascript">
/**
 * Cleans utm tracking from the hashtag so anchor tags still function
 * Call on load of desired pages
 */
function cleanUtm() {
    var l = window.location;
    if( l.hash.indexOf( "utm" ) != -1 ){
        var anchor = l.hash.match(/#(?!utm)[^&]+/);
        anchor	=	anchor? anchor[0]: '';
        if(!anchor && window.history.replaceState){
            history.replaceState({},'', l.pathname + l.search);
        } else {
            l.hash = anchor;
        }
    };
}
</script>


<script src="/scripts/cookie-consent.js" type="text/javascript"></script>

<!-- lutkus css additions -->
<link rel="stylesheet" href="/css/fonts.css" type="text/css">
<link rel="stylesheet" href="/css/sti-skin/sti-skin.css" type="text/css">
<link rel="stylesheet" href="/css/new.css?v4" type="text/css">

<!-- lutkus js additions -->
<script type="text/javascript" src="https://code.jquery.com/jquery-migrate-1.4.1.js"></script>
<script type="text/javascript" src="/js/jquery.hashchange.min.js"></script>
<!-- <script type="text/javascript" src="/js/jquery.easytabs.js"></script> -->

  <script type="text/javascript">
    $(document).ready( function() {
      $breakEasyTabs1 = $('#break_easytabs_1');
      $breakEasyTabs2 = $('#break_easytabs_2');
      $breakEasyTabs3 = $('#break_easytabs_3');

      $breakEasyTabs1.bind('click', function() {
        window.location = '/academics/degrees/msise';
      });
      $breakEasyTabs2.bind('click', function() {
        window.location = '/academics/certificates';
      });
      $breakEasyTabs3.bind('click', function() {
        window.location = '/academics/undergraduate';
      });      
      // $('.add-tabs-home').easytabs({
      //     animate: true,
      //     animationSpeed: 'fast',
      //     panelActiveClass: 'current',
      //     tabActiveClass: 'current',
      //     defaultTab: "li:last-child",
      //     updateHash: false,
      // });

      var expandBtn = $('.expand-btn');
      if (expandBtn.length > 0) {
        expandBtn.each(function(index, el) {
          var expandSection = $(this).attr('data-expand-section-id');

          $('#' + expandSection).hide();

          $(this).bind('click',function(e){
            e.preventDefault();
            $('#' + expandSection).toggle('fast');
            $(this).remove();
          })
        });
      }
    });
  </script>
<!-- 
  <script type="text/javascript">
    $(document).ready( function() {
      $('.add-tabs-content').easytabs({
          animate: true,
          animationSpeed: 'fast',
          panelActiveClass: 'current',
          tabActiveClass: 'current',
          defaultTab: "li:first-child",
      updateHash: false,
    });
    });
  </script> -->
</head>

<body class="sti">
        
<div class="bodywrap ">
<div class="container default-navigation-all">

<!-- header -->
<div class="header">


<a href="/"><img src="/images/design-site/logo.png" alt="Cybersecurity Research | Master's Degree | SANS.edu" class="logo" /></a>

<ul class="site-selector ssno-js">
    <li class="site-switcher"><a href="#"><span class="hideme hidden">SANS Site Network</span><span class="fa fa-caret-square-o-down fa-lg hideme"></span></a>
        <ul class="sites">
            <li class="current-site">Current Site</li><li class="sti selector-active"><a href="https://www.sans.edu?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/sti.png" alt="sti" /></span><span class="selector-title">College Cybersecurity Programs</span></a></li>
<li class="selector-help">Choose a different site <a href="/help/site-network"><span class="hideme">Help</span></a></li><li class="sans"><a href="https://www.sans.org?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/sans.png" alt="sans" /></span><span class="selector-title">Security Training</span></a></li>
<li class="giac"><a href="https://www.giac.org?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/giac.png" alt="giac" /></span><span class="selector-title">Security Certification</span></a></li>
<li class="isc"><a href="https://isc.sans.edu?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/isc.png" alt="isc" /></span><span class="selector-title">Internet Storm Center</span></a></li>
<li class="awareness"><a href="https://www.sans.org/security-awareness-training?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/awareness.png" alt="awareness" /></span><span class="selector-title">Security Awareness Training</span></a></li>
<li class="cyber-defense"><a href="https://www.sans.org/blue-team/?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/cyber-defense.png" alt="cyber-defense" /></span><span class="selector-title">Blue Team Operations</span></a></li>
<li class="forensics"><a href="https://digital-forensics.sans.org?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/forensics.png" alt="forensics" /></span><span class="selector-title">Forensics & Incident Response</span></a></li>
<li class="pentest"><a href="https://www.sans.org/offensive-operations/?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/pentest.png" alt="pentest" /></span><span class="selector-title">Offensive Operations</span></a></li>
<li class="ics"><a href="https://ics.sans.org?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/ics.png" alt="ics" /></span><span class="selector-title">Industrial Control Systems</span></a></li>
<li class="ssi"><a href="https://www.sans.org/cloud-security/?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/ssi.png" alt="ssi" /></span><span class="selector-title">Cloud Security</span></a></li>
<li class="leadership"><a href="https://www.sans.org/cybersecurity-leadership/?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/leadership.png" alt="leadership" /></span><span class="selector-title">Cybersecurity Leadership</span></a></li>
<li class="sic"><a href="https://www.sans.org/sic?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/sic.png" alt="sic" /></span><span class="selector-title">Government Private Training</span></a></li>
        </ul>
    </li>
</ul>


<div class="top-menu">
<!-- Begin Site Search -->
   <div class="search-form">
        <script src="/scripts/addSearch.js"></script>
    </div>

    <div class="clear"></div>
  <div id="main_navigation">
      <ul class="dropdown">
          <!-- <li class="root-item active"><a href="#">Active</a> -->
          <li class="root-item "><a href="/" onClick="return false;">Academics</a>
              <ul>
                  <!--<li class="first"><a href="/academics/">Overview</a></li>-->

                  <li><a href="/academics/degrees/msise">Master's Degree</a>
                      <!--<ul>
                          <li class="first"><a href="/academics/degrees/msise">Overview</a></li>
                          <li class="no-top-radius"><a href="/academics/masters-programs/msise-goals">Goals</a></li>
                          <li class="no-top-radius last"><a href="/academics/masters-programs/msise#curriculum">Curriculum</a></li>
                      </ul>-->
                  </li>
                  <li><a href="/academics/certificates">Graduate Certificates &raquo;</a>
                      <ul>
                          <li class="first"><a href="/academics/certificates/cloud-security">Cloud Security</a></li>
                          <li class="no-top-radius"><a href="/academics/certificates/cybersecurity-engineering-core">Cybersecurity Engineering Core</a></li>
                          <li class="no-top-radius"><a href="/academics/certificates/cybersecurity-management">Cybersecurity Management</a></li>
                          <li class="no-top-radius"><a href="/academics/certificates/cyber-defense-operations">Cyber Defense Operations</a></li>
                          <li class="no-top-radius last"><a href="/academics/certificates/incident-response">Incident Response</a></li>
                          <li class="no-top-radius last"><a href="/academics/certificates/industrial-control-systems-security">Industrial Control Systems</a></li>
                          <li class="no-top-radius last"><a href="/academics/certificates/penetration-testing">Penetration Testing &amp; Ethical Hacking</a></li>
                          <li class="no-top-radius last"><a href="/academics/certificates/purple-team-operations">Purple Team Operations</a></li>
                      </ul>
                  </li>
                  <li><a href="/academics/applied-cybersecurity-bachelors-degree">Bachelor's Degree</a></li>
                  <li><a href="/academics/undergraduate">Undergraduate Certificate</a></li>
                  <li><a href="/academics/faculty">Faculty</a></li>
                  <li class="last"><a href="/academics/course-delivery">Course Delivery</a></li>
              </ul>
          </li>


          <li class="root-item "><a href="/admissions/">Admissions</a>
              <ul>
                  <li class="first"><a href="/admissions/masters-programs">Master's Degree</a></li>
                  <li><a href="/admissions/certificates">Graduate Certificates</a></li>
                  <li><a href="/admissions/bachelors-degree">Bachelor's Degree</a></li>
                  <li><a href="/admissions/undergrad">Undergraduate Certificate</a></li>
                  <li><a href="/admissions/transfer-of-credit">Course Waivers</a></li>
                  <li><a href="/admissions/tuition">Tuition and Funding</a></li>
                  <li><a href="/veterans">Student Veterans</a></li>
                  <li><a href="/admissions/international">International Students</a></li>
                  <li><a href="/admissions/single-course">Single Course Request</a></li>
                  <li class="last"><a href="/admissions/faq">Frequently Asked Questions</a></li>

              </ul>
          </li>
          <li class="root-item "><a href="/" onClick="return false;">Students</a>
              <ul>
                  <li class="first"><a href="/students/orientation">Orientation</a></li>
                  <li><a href="/students/registration">Course Registration</a></li>
                  <!--<li><a href="/students/presentations-and-projects">Presentations and Projects</a></li>-->
                  <li><a href="/students/services">Student Services</a></li>
                  <!--<li><a href="/students/portfolios">Portfolios</a></li>-->
                  <!--<li><a href="/students/capstoneexam">Capstone Exam</a></li>-->
                  <!--<li><a href="/students/complaints-and-appeals">Complaints and Appeals</a></li>-->
                  <!--<li><a href="/students/prior-curricula">Prior Curricula</a></li>-->
                  <!--<li><a href="/downloads/sti-credit-hour-policy.pdf">Credit Hour Policy</a></li>-->
                  <li><a href="/students/awards">Awards</a></li>
                  <li><a href="/graduation">Graduation</a></li>
                  <li><a href="/students/student-profiles">Student Profiles</a></li>

              </ul>
          </li>
          <li class="root-item "><a href="/alumni/overview">Alumni</a></li>
          <!--DO NOT CHANGE THE NAVIGATION IN THE RESEARCH SECTION WITHOUT EXPLICIT APPROVAL FROM BILL LOCHART OTRS#2015030310001736-->
          <li class="root-item active"><a href="/cyber-research/"> Cyber Research</a>
              <ul>
                  <!--<li class="first"><a href="/research/leadership-laboratory">Leadership Laboratory </a></li>-->
                  <li class="first"><a href="/cyber-research">Overview </a></li>
                  <li><a href="/cyber-research/white-papers">White Papers</a></li>
                  <!--<li><a href="/cyber-research/leadership-essays">Leadership Essays</a></li>-->
                  <!--<li><a href="/cyber-research/group-projects">Group Projects</a></li>-->
                  <!--<li><a href="/cyber-research/presentations">Student Presentations</a></li>-->
                  <li><a href="/cyber-research/webcasts">Webcasts</a></li>
                  <!--<li><a href="/cyber-research/policy-papers">Policy Papers</a></li>-->
                  <!--<li><a href="/cyber-research/security-laboratory">Security Laboratory </a></li>-->
                  <!--<li><a href="/research/student-awareness">Student Security Awareness </a></li>-->
                  <!--<li class="last"><a href="/cyber-research/book-reviews">Book Reviews</a></li>-->
              </ul>
          </li>
          <li class="root-item "><a href="/about">About</a>
              <ul class="last-menu">
                  <li class="first"><a href="/about/mission">Mission Statement</a></li>
                  <li><a href="/about/governance">Governance &raquo;</a>
                      <ul>
                          <li class="first"><a href="/about/governance/board-of-directors">Directors</a></li>
                          <li><a href="/about/governance/administrators">Administrators</a></li>
                          <li><a href="/about/governance/committees">Committees</a></li>
                            <li><a href="/downloads/STI-Strategic-Plan-2013-2017.pdf">Strategic Plan</a></li>
                          <li class="last"><a href="/about/governance/conflict-of-interest-policy">Conflict of Interest Policy</a></li>

                      </ul>
                  </li>
                  <!--<li><a href="/about/faq">Frequently Asked Questions</a></li>-->
                  <!--<li><a href="/interest/security-career">Contact Us</a></li>-->
                  <li><a href="/about/authorization">Accreditation &amp; Authorization</a></li>
                  <li><a href="/about/partnerships">Partnerships</a></li>
                  <li><a href="/about/graduation-data">Retention &amp; Graduation Data</a></li>
                  <li><a href="/about/student-consumer-information">Student Consumer Information</a></li>
              </ul>
          </li>
          <li class="root-item "><a href="/interest/security-career">Request Info</a></li>
      </ul><!-- end .dropdown -->
</div><!-- end .top-menu -->
</div><!-- end #main_navigation -->
<div class="clear"></div><!-- end .clear -->
</div><!-- end .header-->
</div><!--  end .container -->
    <!-- Header -->
    <div id="ribbon" class="container-fluid">
        <div class="container">
                            <h1>Cyber Security Research</h1>                    
                    </div><!-- end .top-text -->
                                    <div  id="ribbon_icon" class="">
                    <span><span>Cyber Security Research</span></span>                </div>            
                            </div><!-- END RIBBON -->       
    <div class="container top-buffer bottom-buffer">
<!-- middle -->
    <div class="middle row">
      <!-- content -->
      <div class="wrapper col-md-9">
        <div id="" class="content">
            <h4>Highlights of Graduate Student Research</h4>
<div class="slat">
            <!--<div class="slat_image"><img src="/images/design/custom/icons/training/medium/group.png" alt="group"></a></div>-->
        <div class="slat_content">
	        <p>In addition to pursuing class and lab exercises, SANS master's program candidates conduct faculty-guided research, write and publish their work, and present their findings in webcasts. Here are some highlights of their recent findings. You can follow the links in each of the sections below to find a complete copy of their papers, and you can visit the SANS Reading room to view these and other students' research results.
</p> 
</div>
</div>

<hr>

<h4>SANS Technology Institute Research Review Journal</h4>
<div class="slat">
    <div class="slat_content">
        <div style="text-align: center"><a href="/docs/Research-Review-Journal-Issue-1.pdf" target="_blank" rel="noopener"> <img src="/new_images/Research-Review-Journal-Cover.png" alt="Research Review Journal Cover"></a></div>
        <p>Explore published research from 2020 by SANS.edu master&rsquo;s degree students in the inaugural issue of the SANS Technology Institute Research Review Journal.</p>
        <p>Research topics include:</p>
        <ul>
            <li>Cyber Defense Operations</li>
            <li>Leadership</li>
            <li>Digital Forensics</li>
            <li>Cloud Security</li>
            <li>Industrial Control Systems Security</li>
        </ul>
        <p>Download the journal <a href="/docs/Research-Review-Journal-Issue-1.pdf" target="_blank" rel="noopener">here</a>.</p>
    </div>
</div>

<hr>

<h3><a name='impact'>See How Our Students Made an Impact in 2020</a></h3>
<h5>A Year in Review: Distinguished Student Publications of 2020</h5>

<p>Throughout 2020, research by SANS Technology Institute master's degree students was accepted and published in some of the leading cybersecurity academic journals. Notable accomplishments include:</p>

<ul>
    <li><strong>Sean McElroy</strong> "Detecting Server-Side Request Forgery Attacks on Amazon Web Services" was published in The ISSA Journal&rsquo;s Feb. 2020 issue, "Offensive Cyber Operations Abroad Influence US Congressional Legislation."&nbsp;<a href="https://www.bluetoad.com/publication/?i=649364&amp;pn=Page+34#{%22page%22:34,%22issue_id%22:649364,%22publication_id%22:%221336%22" target="_blank" rel="noopener">Read it here</a>.</li>
</ul>
<p>The following 3 students were published in the same edition of the Journal of Cyber Security and Information Systems, &ldquo;Data-Centric Environment Rise of Internet-Based Modern Warfare &lsquo;iWar&rsquo; &ndash; Survivability, Availability and Accessibility without Geographic Borders&rdquo; Volume: 7, Number: 4. Posted: 04/09/2020. <a href="https://www.csiac.org/journal-issue/data-centric-environment/" target="_blank" rel="noopener">Read it here</a>.</p>
<ul>
    <li><strong>Ryan J O&rsquo;Grady<a href="https://www.csiac.org/journal-article/times-change-and-your-training-data-should-too-the-effect-of-training-data-recency-on-twitter-classifiers/" target="_blank" rel="noopener">&nbsp;&ldquo;Times Change and Your Training Data Should Too: The Effect of Training Data Recency on Twitter Classifiers</a>&rdquo;</strong></li>
</ul>
<ul>
    <li><strong>Kenneth W. Strayer &ldquo;<a href="https://www.csiac.org/journal-article/security-of-googles-iot-protocol/" target="_blank" rel="noopener">Can the &ldquo;Gorilla&rdquo; Deliver? Assessing the Security of Google&rsquo;s New &ldquo;Thread&rdquo; Internet of Things (IoT) Protocol</a>&rdquo;</strong></li>
</ul>
<ul>
    <li><strong>Steven M. Launius &ldquo;<a href="https://www.csiac.org/journal-article/evaluation-of-comprehensive-taxonomies-for-information-technology-threats/" target="_blank" rel="noopener">Evaluation of Comprehensive Taxonomies for Information Technology Threats</a>&rdquo;</strong></li>
</ul>
<p>You can also find these, and other student white papers in the&nbsp;<a href="https://www.sans.org/reading-room/" target="_blank" rel="noopener">SANS Reading Room</a>, indicated in red with the "SANS.edu Graduate Student Research" tag. Papers published here have earned the distinction of an "A" grade in the graduate-level Technical Research &amp; Communication Practicum, a course required in the M.S. in Information Security Engineering (MSISE) curriculum.</p>

<hr>

<h3><a name='white-papers'>Cybersecurity Research Papers</a></h3>
<div class="slat">
            <!--<div class="slat_image"><img src="/images/design/custom/icons/training/medium/group.png" alt="group"></a></div>-->
        <div class="slat_content">

            <p>Master's degree candidates at SANS.edu conduct research that is relevant, has real world impact, and often provides cutting-edge advancements to the field of cybersecurity, all under the guidance and review of our world-class instructors. Here are some highlights of their recent findings.</p>

<h5>Featured Papers</h5>

<ul>
    <li><span class="label">September 2021:</span> <a href="https://www.sans.org/white-papers/40525/" target="_blank" rel="noopener">Cloud Multi-Account Policy Enforcement<span class="icon-file-alt"></span></a></br><em>Andy Huang</em></li>
    <li><span class="label">September 2021:</span> <a href="https://www.sans.org/white-papers/40510" target="_blank" rel="noopener">Deconstructing Information Security Analysis<span class="icon-file-alt"></span></a></br><em>Daniel Severance</em></li>
    <li><span class="label">September 2021:</span> <a href="https://www.sans.org/white-papers/40505" target="_blank" rel="noopener">Expired Domain Dumpster Diving<span class="icon-file-alt"></span></a></br><em>Christopher DeWeese</em></li>
    <li><span class="label">September 2021:</span> <a href="https://www.sans.org/white-papers/40455/" target="_blank" rel="noopener">Increasing Visibility by Cracking Password-Protected Malware at Scale<span class="icon-file-alt"></span></a></br><em>Derek Thomas</em></li>
    <li><span class="label">August 2021:</span> <a href="https://www.sans.org/white-papers/40485/" target="_blank" rel="noopener">Unaccepted Third-Party Cookies as the/a Leading Indicator of CNAME Trackers<span class="icon-file-alt"></span></a></br><em>Dan Welygan</em></li>
    <li><span class="label">August 2021:</span> <a href="https://www.sans.org/white-papers/40480/" target="_blank" rel="noopener">ICS within the NIS Directive should be ATT&CK&#174;ed<span class="icon-file-alt"></span></a></br><em>Kory Koziar</em></li>
    </ul>
    <p><a href="/cyber-research/white-papers" target="_blank" rel="noopener">View More Cybersecurity Research Papers<span class="icon-arrow-right"></span></a></p>

    </div>
</div>


<hr>
<h3><a name='webcasts'>Webcasts</a></h3>
<div class="slat">
            <!--<div class="slat_image"><img src="/images/design/custom/icons/training/medium/group.png" alt="group"></a></div>-->
        <div class="slat_content">

           <p>Experts who struggle to communicate well are often unable to optimize their impact upon their organization. Our master's program candidates not only learn advanced technical skills, but they also experience and learn how to communicate their insights and realizations to both technical and non-technical audiences.</p>

<p>Students present their published work to faculty members via webcast and recordings are made available afterwards to the public. A selection of these presentations is available here.</p>


<h5>Featured Webcasts</h5>
<ul>

    <li><a href="https://www.sans.org/webcasts/verifying-sketchy-windows-apps-sansatmic-117955" target="_blank" rel="noopener">Verifying Sketchy Windows Apps</a><br />
        <strong>Speaker:</strong> Joal Mendonsa, MSISE Candidate, IT Specialist, Federal Government</li>

    <li><a href="https://www.sans.org/webcasts/cloud-security-survey-customer-cloud-security-116215" target="_blank" rel="noopener">Cloud Security: A SANS Survey on Customer Cloud Security<br />
        </a><strong>Speaker:</strong> TJ Banasik, MSISE Candidate, Senior Program Manager - Cloud &amp; Enterprise Security, Microsoft</li>

    <li><a href="https://www.sans.org/webcasts/serious-insecure-object-deserialization-demystified-117100" target="_blank" rel="noopener">Why So Serious? Insecure Object Deserialization Demystified<br />
        </a><strong>Speaker:</strong> Karim Lalji, MSISE, Managing Security Consultant, TELUS</li>

    <li><a href="https://www.sans.org/webcasts/105600" target="_blank" rel="noopener">Using COIN doctrine to improve Cyber Defense</a></br>
<strong>Speaker: </strong>Sebastien Godin, MSISE Candidate, Telecommunications Officer at DND</li>

<li><a href="https://www.sans.org/webcasts/105295" target="_blank" rel="noopener">Continuous Security: Implementing the Critical Controls in a DevOps Environment</a></br>
<strong>Speaker:</strong> Alyssa Robinson, MSISM Candidate, Software Development Manager, Cisco Systems, Inc.</li>

<li><a href="https://www.sans.org/webcasts/105400" target="_blank" rel="noopener">Risk-based privilege management</a></br>
<strong>Speaker:</strong> Christoph Eckstein, MSISE Candidate, Information Security Specialist, Deutsche Bank</li>

<li><a href="https://www.sans.org/webcasts/105405" target="_blank" rel="noopener">Cloud Security Monitoring</a></br>
<strong>Speaker:</strong> Balaji Balakrishnan, MSISE Candidate, Senior Information Security Officer, The World Bank</li>

     	             </ul>
          <p><a href="/cyber-research/webcasts" target="_blank" rel="noopener">View More Webcasts<span class="icon-arrow-right"></span></a></p>
</div>
</div>

<hr>

<h3><a name='impact'>See How Our Students Made an Impact in 2019</a></h3>
<h5>A Year in Review: Distinguished Student Publications of 2019</h5>

<p>Throughout 2019, research by SANS Technology Institute master's degree students was accepted and published in some of the leading cybersecurity academic journals. Notable accomplishments include:</p>

<ul>
    <li>Balaji Balakrishnan's research, "<em>Cloud Security Monitoring with AI-ML Infused Technologies,</em>" was accepted in CSIAC's <em>Journal of Cyber Security and Information Systems</em> and published in the April 2019 issue, Artificial Intelligence the Next "Nuclear Arms Race" - "Space Race To The Edge" <a href="https://www.csiac.org/wp-content/uploads/2019/04/CSIAC_Journal_V7N1_WEB.pdf">Read it here</a></li>
    <li>Sean Goodwin's white paper, "<em>Attackers Inside the Walls: Detecting Malicious Activity,</em>" was featured in The ISSA Journal's August 2019 Issue, The ToolBox: Tools of the Infosec Pro <a href="https://www.members.issa.org/page/ISSAJournal">Read it here </a>[Note: ISSA membership is required for access to the full journal issue]</li>
    <li>Michael Hoffman's work, "<em>Gaining Endpoint Log Visibility in ICS Environments,</em>" was published in CSIAC's <em>Journal of Cyber Security and Information Systems</em> issue, Resilient Industrial Control Systems (ICS) & Cyber Physical Systems (CPS): The Growing Cyber-Kinetic Threats in August 2019 <a href="https://www.csiac.org/wp-content/uploads/2019/09/CSIAC_Journal_V7N2_web.pdf">Read it here</a></li>
    <li>Jon-Michael Lacek's white paper, "<em>Changing the DevOps Culture One Security Scan at a Time</em>" was published in the November 2019 issue of <em>The ISSA Journal</em>, on DevOps Security <a href="https://www.members.issa.org/page/ISSAJournal">Read it here</a> [Note: ISSA membership is required for access to the full journal issue]</li>
</ul>

<p>You can also find these, and other student white papers in the <a href="https://www.sans.org/reading-room/">SANS Reading Room</a>, indicated in red with the "SANS.edu Graduate Student Research" tag. Papers published here have earned the distinction of an "A" grade in the graduate-level Technical Research & Communication Practicum, a course required in the M.S. in Information Security Engineering (MSISE) curriculum.</p>
          <div class="clear"></div>
        </div>
      </div>
      <!--/ content -->

      <!-- right navi -->
      <div class="navigation col-md-3">
<div class="clear"></div>

        <div class="widget widget_pages">
          <div class="sidebarBlurb ">
          <a class="request_info_button align-left margin-bottom" href="/interest" onClick="_gaq.push(['_trackEvent', 'RequestInfoSideBar', 'Clicked', 'Sidebar']);"><span>&nbsp;</span></a>
          </div>


<div class="clear"></div>
<h5>Cyber Research</h5><ul class="list-unstyled"><li class="active"><a href="/cyber-research">Overview</a></li><li><a href="/cyber-research/white-papers">Research Papers</a></li><li><a href="/cyber-research/webcasts">Webcasts</a></li></ul><br>


            <h5>Quick Links</h5>
      <ul class="list-unstyled">
        <li><a href="/admissions">Admissions</a></li>
        <li><a href="/admissions/tuition">Tuition</a></li>
        <li><a href="/admissions/faq">Frequently Asked Questions</a></li>
        <li><a href="/interest/security-career">Request Info</a></li>
      </ul>

          </div>

          <!-- widget: random blurb -->
          <!-- /widget: random blurb -->

          <!-- widget: ad -->
          <!-- /widget: ad -->



      </div>
      <!--/ right navi -->
      <div class="clear"></div>
      <div class="middle-bot">
            </div>
      <div class="clear"></div>
    </div>
    <!--/ middle -->
    </div>













</div><!-- end .body -->
<!-- Bottom Content -->
<div id="pre_footer" class="bottom-content">
<div class="container">

<div class="col">
    <div class="col3">
        <h5>Featured Research</h5>
        <p><a href="/cyber-research#ransomware">Gaining Endpoint Log Visibility in ICS Environments</a><br/>
        Michael Hoffman | March 2019
        </p>
        <p>
            <a href="https://www.sans.org/reading-room/whitepapers/awareness/expired-domain-dumpster-diving-40505">Expired Domain Dumpster Diving</a><br />
            By Christopher Weese | Sep 2021        </p>
            <p>
            <a href="https://www.sans.org/reading-room/whitepapers/bestprac/deconstructing-information-security-analysis-40510">Deconstructing Information Security Analysis</a><br />
            By Daniel Severance | Sep 2021        </p>
            <p>
            <a href="https://www.sans.org/reading-room/whitepapers/cloud/cloud-multi-account-policy-enforcement-40525">Cloud Multi-Account Policy Enforcement</a><br />
            By Andy Huang | Sep 2021        </p>
        </div>
    <div class="col3">
        <p><small><q>Nothing pays dividends like practical experience. Many programs attempt it, but the SANS Technology Institute helps students use the latest cyber techniques to pursue objectives commonly encountered on the operations floor.</q> - Matthew Toussain, MSISE '17</small>
        </p>
        <p><small><q>Every class I've taken from SANS has given me something I can directly use to improve IT security at my workplace. STI courses don't just cover concept and theory; they provide hands-on experience with leading technology.</q> - Susan Ramsey, MSISE candidate</small>
        </p>
    </div>
    <div class="col3 add-pre-footer-learn-more">
        <h5>Contact Us</h5>
        <p><a href="mailto:info@sans.edu">info@sans.edu</a></p>
        <p><span>(301) 241-7665</span></p>
        <!-- social media icons added at the request of Alex Wang June, 24 2019 ServiceNow TIC0535695 -->
        <a href="https://twitter.com/SANS_EDU" target="_blank" rel="noopener"><img src="/images/design/custom/icons/twitter-icon.png" alt="Twitter" /></a>
        <a href="https://www.linkedin.com/school/sans-technology-institute/" target="_blank" rel="noopener"><img src="/images/design/custom/icons/linkedin-icon.png" alt="LinkedIn"/></a>
        <a href="https://www.facebook.com/SANS.EDU/" target="_blank" rel="noopener"><img src="/images/design/custom/icons/facebook-icon.png" alt="Facebook" /></a>
    </div>
</div>

<!-- <div class="clear"></div>
<hr />
<div> -->
<!-- </div> -->

</div>
</div><!-- end .bottom-content -->
<!-- Footer -->
<div id="footer">
<div class="container">
<img src="/images/design-site/logo-footer.png" alt="Cybersecurity Research | Master's Degree | SANS.edu" class="logo-footer" />

<ul class="site-selector ssno-js">
    <li class="site-switcher"><a href="#"><span class="hideme hidden">SANS Site Network</span><span class="fa fa-caret-square-o-down fa-lg hideme"></span></a>
        <ul class="sites">
            <li class="current-site">Current Site</li><li class="sti selector-active"><a href="https://www.sans.edu?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/sti.png" alt="sti" /></span><span class="selector-title">College Cybersecurity Programs</span></a></li>
<li class="selector-help">Choose a different site <a href="/help/site-network"><span class="hideme">Help</span></a></li><li class="sans"><a href="https://www.sans.org?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/sans.png" alt="sans" /></span><span class="selector-title">Security Training</span></a></li>
<li class="giac"><a href="https://www.giac.org?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/giac.png" alt="giac" /></span><span class="selector-title">Security Certification</span></a></li>
<li class="isc"><a href="https://isc.sans.edu?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/isc.png" alt="isc" /></span><span class="selector-title">Internet Storm Center</span></a></li>
<li class="awareness"><a href="https://www.sans.org/security-awareness-training?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/awareness.png" alt="awareness" /></span><span class="selector-title">Security Awareness Training</span></a></li>
<li class="cyber-defense"><a href="https://www.sans.org/blue-team/?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/cyber-defense.png" alt="cyber-defense" /></span><span class="selector-title">Blue Team Operations</span></a></li>
<li class="forensics"><a href="https://digital-forensics.sans.org?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/forensics.png" alt="forensics" /></span><span class="selector-title">Forensics & Incident Response</span></a></li>
<li class="pentest"><a href="https://www.sans.org/offensive-operations/?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/pentest.png" alt="pentest" /></span><span class="selector-title">Offensive Operations</span></a></li>
<li class="ics"><a href="https://ics.sans.org?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/ics.png" alt="ics" /></span><span class="selector-title">Industrial Control Systems</span></a></li>
<li class="ssi"><a href="https://www.sans.org/cloud-security/?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/ssi.png" alt="ssi" /></span><span class="selector-title">Cloud Security</span></a></li>
<li class="leadership"><a href="https://www.sans.org/cybersecurity-leadership/?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/leadership.png" alt="leadership" /></span><span class="selector-title">Cybersecurity Leadership</span></a></li>
<li class="sic"><a href="https://www.sans.org/sic?msc=logo-drop-down"><span class="selector-image"><img src="/images/design/custom/site-selector/site-icons/sic.png" alt="sic" /></span><span class="selector-title">Government Private Training</span></a></li>
        </ul>
    </li>
</ul>

<div class="latest-icons">
</div><!-- end .latest-icons -->

<div class="bottom-nav align-right">
<ul>
 <li><a href="/admissions">Admissions</a></li>
 <li><a href="/academics">Academics</a></li>
 <li><a href="/students">Students</a></li>
 <li><a href="/alumni">Alumni</a></li>
 <li><a href="/research">Research</a></li>
 <li class="last"><a href="/about">About</a></li>
</ul>
<p class="align-right"><span class="copyright">&copy; 2005 - 2021 SANS&trade; Technology Institute | </span><a href="/about/privacy-policy">Privacy Policy</a></p>
</div><!-- end .bottom-nav align-right-->
</div><!-- end .container-->
</div><!-- end .footer-->
<script async type="text/javascript" src="/_Incapsula_Resource?SWJIYLWA=719d34d31c8e3a6e6fffd425f7e032f3&ns=2&cb=2114238172"></script>
</body>
</html>
