SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
CCTV(Closed Circuit Television:監視カメラ)システムはユビキタスなIoTソリューションであり、犯罪の証拠として利用されることも多いです。
This presentation will provide an overview of Unified Logs, how to acquire artifacts, and tools to parse them. It will also explain the various methods of analyzing Unified Logs and touch on automating the analyzing process.
攻撃者による悪意のある行為の多くは、最新のセキュリティツールを用いることでセキュリティアナリストが検知することが可能です。こうした早期発見を避けるため、高度な攻撃者グループは常に独創的な方法を用いて、ツールやアナリストによる検知を回避、無効化、混乱させてきました。
Mark Goudieは、APAC諸国や日本における情報漏えいの調査を20年近く行っており、過去5年間はクラウドストライクのインシデントレスポンスとサービスチームを率いてきました。
In order for an organization's CSIRT to prevent or minimize damage caused by cyber attacks, it is essential to collect and analyze information on a daily basis and take appropriate actions based on impact assessment.
This session will first introduce basic information on MSIX file, such as the file format, basic behavior, and the creation method, followed by attack cases of MSIX file abuse. Specifically, we will detail attacks conducted by a financially motivated threat group called SteelClover.
In 20-years of cyber security career, I've been thinking it's very important to hands-on skills and try & error experience of security. I'd like to introduce some technical research topics from DFIR, RedTeam, vulnerability and malware analysis categories. Also, introduce a use case of used hands-on skills to identify the root cause of incident.
I will introduce the mutual use of msticpy and SIEM, and emphasize the unique features of msticpy. After this talk, you will surely want to do analysis freely using msticpy!
In this webcast, Tim will explain Kerberos, the authentication protocol used in the Windows Domain.
How often do you practice or exercise your major cyber incident plans? How often do involve your execs? Most people when asked said they'd love to cyber exercise more but don't know how.
Supply chain attacks go unnoticed on average for 235 days and do more damage as a result of us not having a deep understanding of the products being used on a network. Product security testing helps obtain a comprehensive understanding of how choosing to use a particular product in your organization can affect your threat model and risk posture.
“People have become the primary attack vector for cyber-attackers around the world,” said Lance Spitzner, SANS Security Awareness Director and co-author of the report, SANS 2022 Security Awareness Report. “Humans rather than technology represent the greatest risk to organizations, and the professionals who oversee security awareness programs are the key to effectively managing that risk.”