SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
In the rapidly evolving world of healthcare technology, medical devices play a critical role in patient care. However, as these devices become increasingly interconnected, the risks associated with cybersecurity breaches have escalated. This talk delves into the multifaceted perspectives surrounding medical device cybersecurity, focusing on the unique challenges and needs of three key stakeholders: Healthcare Delivery Organizations (HDOs), Medical Device Manufacturers, and Patients.
Every organization should be performing risk assessments as a part of their cybersecurity program. Regular risk assessments allow organizations to create practical strategies for defense and evaluate where there are weaknesses in their cybersecurity program that could keep them from achieving their goals. Listen to this session for key insights into foundational knowledge and tools to consider in planning a risk assessment for your organization.
What are the things that security leaders in healthcare organizations or security practitioners in the medical domain should think about from the perspective of AI in medical diagnostics?
Join our workshop to learn how to configure, scale, and secure your logging setup for processing data either in the cloud or On-Premises utilizing new features supported in Azure for event hubs and Azure storage.
We invite you to join the House and Senate Cybersecurity Caucus, NICE, and SANS | GIAC on Thursday, September 19th, from 4:00 - 6:30 PM, to discuss solutions for building a skilled cybersecurity workforce, as we gear up for Cybersecurity Career Week on October 14-18, 2024. The event will feature top government, corporate, and association speakers, and special commissioning of the first US Women's Cyber Team will close out this memorable event with introductions and a celebration.Intended Audience: Congressional StaffGovernment OfficialsCorporate LeadersNon-Profit Organizations and Civil SocietyEducationMedia
During this presentation, Andreas Sfakianakis will explore 2024 and past CTI Survey results to present on:How the CTI discipline has evolved over the past yearsHow CTI analysts kept up with the ever-changing threat landscapeHow CTI analysts view emerging threatsHow technology enablement improves the efficiency of CTI teams
En los últimos años, las amenazas cibernéticas vuelven a ser prioridad para todo tipo de organizaciones. La situación geopolítica mundial es cada día más inestable, provocando un aumento de los conflictos y las amenazas. Como resultado, los profesionales de la inteligencia sobre amenazas cibernéticas (CTI, por sus siglas en inglés) enfrentan grandes retos para proporcionar inteligencia práctica a las partes interesadas en el manejo de un mundo cada vez más dinámico.
This presentation will cover the following topics related to both artificial intelligence (AI) and generative artificial intelligence (GenAI): Evolution of AI to GenAI, Implications and concerns of GenAI, Mitigation and security approaches to GenAI implications
Module 3 of the training focuses on network visibility and monitoring. The training module provides your operational and IT team with a foundational knowledge of techniques and benefits for this critical control.
Every infrastructure operator must understand defensible control system network architecture. Module 2 of the ICS critical controls series for water focuses on how the right architecture can provide a high return on investment.
The first training module for water operators provides an overview of the elements of an ICS Specific Incident Response Plan, how it differs from a standard IT Incident Response Plan, and how to prepare your team to respond.
The 5th and final Module of the cybersecurity series on ICS Critical Controls for the Water Sector focuses on understanding and managing risk. A successful ICS cybersecurity strategy balances defense and offense.