SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsZero Trust Network Access has emerged from the rapidly evolving world of cybersecurity as a critical strategy for protecting networks.
Zero Trust Network Access (ZTNA) has emerged from the rapidly evolving world of cybersecurity as a critical strategy for protecting networks. In a recent webinar, Chris McCormack, Director of Product Marketing at Sophos, provided valuable insights into best practices for securing networks with ZTNA. Hosted by SANS Certified Instructor Matt Bromiley, the session covered how ZTNA can address modern cyber threats and why it is superior to traditional VPNs.
ZTNA is a security framework that fundamentally changes how organizations manage access to their networks. Unlike traditional security models that implicitly trust users once they are inside the network perimeter, ZTNA operates on the principle of “never trust, always verify.” This means that every access request, whether coming from inside or outside the network must be authenticated and authorized before access is granted.
Chris McCormack began by explaining how modern cyber-attacks typically exploit unknown vulnerabilities and compromised credentials. These attacks often target old VPN clients, remote desktop systems, and unpatched software. “Old VPN clients or servers that are managing incoming VPN connections are becoming priority targets,” he noted, highlighting the increased risk due to the widespread adoption of remote work.
Attackers also use compromised credentials to gain unauthorized access to networks. “Brute force hacking attempts are successful in penetrating systems with poor passwords and the complete lack of multi-factor authentication (MFA),” Chris explained. Once inside, attackers move laterally within the network, using legitimate tools like PowerShell to avoid detection.
To combat these threats, Chris outlined several strategies:
ZTNA has become a critical layer of protection against modern attacks, offering a superior alternative to traditional VPNs. Chris explained that ZTNA connects users only to specific applications or systems rather than providing broad network access. “ZTNA only connects a user to a very specific application or system, not the whole network,” he clarified.
Unlike VPNs, ZTNA assesses the health of the end user’s device before granting access. This ensures that compromised devices cannot connect to corporate networks, thereby reducing the risk of lateral movement by attackers. “ZTNA provides much better security than remote access VPN,” Chris asserted, pointing out that it removes vulnerable infrastructure and incorporates device health checks.
Chris outlined best practices for implementing ZTNA:
Chris highlighted how Sophos can help organizations implement these best practices. Sophos offers a comprehensive and integrated cybersecurity platform managed from a single cloud console, Sophos Central. This platform includes ZTNA for secure application access, network firewalls, wireless access points, and endpoint security products that work together seamlessly.
“Our network security platform includes ZTNA for secure application access,” Chris said, emphasizing the integration of ZTNA gateway functionality into Sophos firewalls. This eliminates the need for additional on-premises deployments and ensures secure access to apps and systems.
Sophos also offers managed detection and response (MDR) services, providing 24/7 monitoring and expert response to cyber-attacks. “If you don’t want to build a SOC team that does threat hunting, we offer this managed detection and response service,” Chris explained, making it clear that Sophos aims to simplify cybersecurity management for organizations.
Chris McCormack’s presentation underscored the importance of adopting ZTNA as a critical component of network security. By replacing traditional VPNs with ZTNA, organizations can significantly enhance their security posture, prevent unauthorized access, and protect against sophisticated cyber threats. With comprehensive solutions like those offered by Sophos, organizations can implement best practices, integrate security measures, and leverage advanced threat detection tools to safeguard their networks in today’s complex cybersecurity landscape.
IMPLEMENTING A ZERO TRUST ARCHITECTURE is not a one-size-fits-all solution; it requires careful planning, implementation, and ongoing management. For those interested in delving deeper into the subject, SANS has recently released a Zero Trust strategy guide. This document is an excellent resource for anyone looking to learn more about the principles, implementation strategies, and benefits of adopting a Zero Trust Architecture in their organization.
Launched in 1989 as a cooperative for information security thought leadership, it is SANS’ ongoing mission to empower cyber security professionals with the practical skills and knowledge they need to make our world a safer place.
Read more about SANS Institute