SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
This talk delves into the pervasive integration of Artificial Intelligence (AI), specifically Language Models (LMs), within the current OSINT landscape. Jeff will discuss the art of uncovering the deployment of Large Language Models (LLMs) across social media posts, product reviews, and academic settings by examining linguistic patterns and using multiple tools to uncover TTP's used by threat actors.
Today’s cyberattacks use any means necessary to gain access. As enterprises continue to shift to hybrid and multi-cloud environments, embrace digital identities, digital supply chains, and ecosystems — SOC teams are continuously faced with more. More attack surface for attackers to exploit and infiltrate. More methods for attackers to evade defenses and progress laterally. More noise, complexity and hybrid cloud attacks and incidents.
SANS Foundations is the most comprehensive, certified cybersecurity course, for beginners, on the market. Created as a solution for entry-level cybersecurity students, professionals, or graduates, who reported hitting “the wall” in their first technical cybersecurity role, due to only receiving theoretical education in Academia, or from having no background in IT/computers.
Businesses and organizations have been playing a game of cat and mouse with hackers for close to 50 years. The score depends on how you decide to keep it.
Attackers have been breaching the cloud for years by stealing long-lived credentials. To combat these attacks, cloud providers have been building improved authentication workflows for external identity providers. This workshop explores Workload Identity Federation and how you can replace long-lived cloud credentials with short-lived tokens signed by an OpenID Connect identity provider.
It seems like a new IT or cybersecurity acronym is born every two days, but no one wakes up saying, “I need to solve my XMPFSCLR problem.” Instead, IT and security teams have to translate acute, urgent challenges into industry category-speak just to understand what tools can solve their problems.
Whether it's for the world, your company, or yourself, creating engaging cyber challenges is an artform. Consistency, learning objective, resilience, storyline, and difficulty are just a few things to consider.
Cyber security is challenging, but there's no need to make it more difficult than it already is! Attendees of this talk will learn ways to make their orgs more secure while actually lowering their workload. Mick will share tips and tricks that lowers the effort required for major initiatives so you can get back to what matters most.
Cloud environments are attractive targets for hackers due to their complexity, which can make them difficult to defend. This presentation will cover three crucial strategy cloud security that can greatly impact your cloud's security posture.
Asset and inventory control solutions are difficult to build and maintain. Many organizations spend lots of time, effort, and resources to get ahold of their inventory of assets, but few are able to effectively leverage their asset inventory data to enrich security operations.Snowflake’s IT and Security teams leverage ServiceNow asset data to create data models and join them to other sources of truth within Snowflake itself. In this webinar, we will demonstrate:How to bring asset inventory data into the Data Cloud with a connectorHow we leverage asset data for security enrichmentHow to use Snowflake as a security data lake
What are we doing wrong and how can we fix it? What happens when badness happens before we could fix things? Where is my data? What is important from a DFIR perspective?
Take part in the UK Government CTF Tournament on the 17th – 19th October 2023.