SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
産業用制御システム(ICS)や運用技術(OT)に関するセキュリティにおいては、改善すべきセキュリティ上の課題が無限に存在します。多くの産業系の組織やIT/OTに携わる方は、こうした課題に対してどこから手を付ければいいのか迷ってしまいがちです。
Are you grappling with the fear of data exposure, conflicting process control and IT/security teams, and limited problem-solving for individual plants? These challenges can lead to considerable security risks and impede your digital transformation journey. In this session, dive into the negative consequences of neglecting these challenges, and learn from Armis Field CTO, Steve Gyurindak, how your organization can overcome these hurdles without compromising critical infrastructure or existing security solutions.
Windows puts a lot into logs, but it puts even more into forensic artefacts you may not be aware of. This talk will explore some of the artefacts that, without the knowledge of the user, records more than just metadata. I think it's pretty cool, maybe after this talk you will do....or disable it all...or both?
Cloud environments are attractive targets for hackers due to their complexity, which can make them difficult to defend. This presentation will cover three crucial details of cloud setup that can greatly impact your cloud's security posture. We'll kick off by exposing common vulnerabilities that hackers exploit to compromise cloud environments. Then, we'll dive into effective mitigation strategies in three areas and show you how to implement them in a practical and hands-on manner. Our insights on mitigations will apply to typical enterprise cloud setups.
As federal agencies and private organizations continue the push to Zero Trust deadlines, we’ve all got some some Trust issues to work on. The best thing to do is get it all out in the open and don’t let your relationship with your networks get toxic. Moving to Zero Trust requires a good foundation that your organization can build trust on. In this Webinar, experts from Corelight’s Public Sector team will discuss how security teams can use network visibility to resolve trust issues in Zero Trust deployment and lay the groundwork for the future.
With the rapid development of large language models (LLM) and generative AI, the landscape of cybersecurity has experienced a paradigm shift. In this one-hour webcast, we will delve into the emerging information security risks and opportunities associated with LLM and cyber deception operations. As these technologies become increasingly sophisticated, it is imperative for organizations to stay informed about potential threats and best practices in order to maintain a strong security posture.
大規模言語モデル(LLM)と生成AIの急速な発展に伴い、サイバーセキュリティの世界はパラダイムシフトを経験しています。これらの技術がますます高度化する中、組織は強固なセキュリティ体制を維持するためには、潜在的な脅威とベストプラクティスについて常に情報を得ることが不可欠となります。
Managing security and digital operations has become far more challenging due to increasing threats and increasing infrastructure complexity. How can enterprises effectively manage security for their large and dynamic infrastructures? Despite a plethora of security products, most enterprises struggle to minimize breaches, control costs, and avoid analyst burnout.
OSINTという言葉をご存知でしょうか? OSINTとは「Open Source Intelligence」を略した用語で、主に情報セキュリティの世界で使われています。インターネットをはじめとする多くの情報源からデータを収集し、分析・精査・取捨選択を行い、特定の個人やシステム、組織などについての調査を行う手法です。
Do you know what OSINT is? OSINT is an abbreviation for "Open Source Intelligence" and is mainly used in the information security world.
Functionality is mission-critical to all organizations. It is also the critical element to anyone seeking to do harm to that mission. For an organization and its partners to make use of functionality, it must be visible to both. Organizations face uncertainty, because with increasing visibility comes an increased attack surface, and therefore increased risk. Or does it? This webcast looks at the correlation between the two, and how we can use factors of each to impact the other. This research will attempt to define best practices as well as understanding how organizations understand the two issues to be linked, and how that may inform their response.
Call for Presentations Now Open | Deadline: Monday, May 1Learn More and Submit Your Proposal“Can we use AI in our workplace?” — This question is being asked of every CISO and technical leader worldwide. The answers are not easy.