SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
The new NIS2 (Network and Information Systems) Directive, which took effect in January 2023, aims to enhance the security of network and information systems across the European Union (EU). NIS2 broadens the range of sectors and types of organizations that must comply beyond the original NIS Directive. The new NIS2 Directive has expanded its regulatory scope to include public administration entities, digital service providers, and critical infrastructure operators.
Two years ago, artificial intelligence (AI) was primarily a buzzword, but the times have changed quickly! The rapid integration of artificial intelligence in multiple sectors has revolutionized operational efficiency, data analytics, and automation.Join us for our AI-focused solutions track and explore how leading cybersecurity companies are implementing AI into their offerings, along with discussions on a variety of topics, including successes, challenges, and strategies to utilize these emerging technologies to help us secure our organizations and accomplish tasks that weren’t feasible until now.
In AWS, the Lambda function represents a new approach to crafting and deploying compute workflows. While they free us from the burdens of patching VMs, lurking in the dark are countless ways deployment and operations can go horribly wrong.
What can the underlying platform providers (CSPs) do to help transition services to cloud-based operations while maintaining CIP compliance? The various CSPs have been working with existing customer groups and industry to educate, collaborate, and contribute to a wide variety of activities involving NERC CIP and cloud.
This presentation will draw on open source information warfare reporting on the Russia-Ukraine conflict to highlight important lessons for system resilience, continuity, and recovery.
In this session, we will discuss how you can leverage the SOAR, the SIEM (or any other security tool), Threat Intelligence and case management platforms, to build a machine learning model to aid with reducing the alert fatigue.
In this talk we will look at the six levers of culture, and how they can be used to encourage your organisation to be more rather than less secure.
Join us for the inaugural year of SANS Emerging Technologies Track! Are you interested in learning more about new cutting-edge technology in the cybersecurity industry? This is the place for you!Learn from the best and brightest in the industry as selected organizations review their latest tools and solutions that will better equip you for your battle with the bad guys and assist you as your team works hard to keep networks safe from intrusions. This one day track will feature a comprehensive collection of use cases, demos, and solutions for everyday cyber professionals looking to take their arsenal of tools and solutions to the next level. Don't miss this track on November 6, register now!
This talk provides insights into designing and executing Tabletop Exercises (TTX) for Incident Response in Industrial Control Systems (ICS) and Operational Technology (OT) environments.
For people who don't work in a SOC, or in cybersecurity at all, the image of a cybersecurity operations center is that of an all-seeing, all-knowing marvel of technology. For those of us who work in a SOC, we know the technology requires constant care and maintenance to preserve visibility into the systems we're protecting. If we can preserve that visibility, we then strive to deploy appropriate and effective detections. Once we've tuned those detections due to excessive false positives, we flexibly adjust them based on changing data. We also tune them to attempt to keep up with adaptive threats. If we can manage to preserve visibility, and implement good detections, we can start to hunt in the various troves of data for undetected threats. As we're hunting in the disparate data sources, we pursue the objective of fusion of information into that all-seeing, all-knowing marvel.Wherever you are on this journey from wizard behind the curtain to fully-integrated multi-cloud, machine learning, optimized security operations; you can learn something from your vendors and peers in this SANS Cyber Solutions Fest SOC & SOAR Track.
In today's rapidly evolving cyber landscape, attacks are becoming more sophisticated and frequent, making robust detection and response capabilities critical for every organization. Join us for the Detection & Response Track at the Fall Cyber Solutions Fest, where you'll discover the strategies, tools, and insights that will empower your organization to stay ahead.Whether you're looking to fine-tune your current operations or completely overhaul your approach, this session will equip you with actionable insights from top top industry experts. What to Expect:Building Detection Engineering Into Security OperationsReducing Detection and Response TimesHow EDR and XDR Solutions Can Help Organizations with Detection and ResponseAutomating Incident Response Leveraging Lessons from Response to Inform Detection
Prepare for the Future of Cybersecurity with Zero Trust. In an era where cyber threats constantly evolve and the boundaries of organizations become increasingly porous, the principle of "Never Trust, Always Verify" has become more relevant than ever. The Fall Cyber Solutions Fest Zero Trust Track aims to bring together top industry vendors to shed light on the newest developments, technologies, and best practices.What to Expect:Emerging Technologies: Discover the latest tools and solutions that fortify security postures, enhancing the ability to identify, authenticate, and authorize access dynamically.Integration Strategies: Learn how modern Zero Trust platforms can be seamlessly integrated with existing infrastructures, ensuring that security doesn’t impede functionality.Case Studies: Leading vendors will present real-world scenarios where Zero Trust architectures have made a difference, providing a practical perspective on its benefits and challenges.Anticipating the next move: Delve into the future of Zero Trust, understanding where the industry is headed and how to prepare for the security challenges of tomorrow.Networking Opportunities: Engage in rich dialogues with peers, thought leaders, and vendors, creating an ecosystem for shared learning and collaboration.Whether you are an IT professional, cybersecurity enthusiast, or a decision-maker looking to fortify your organization’s security posture, the Zero Trust Solutions Forum 2024 will equip you with the knowledge and tools to navigate the dynamic landscape of cybersecurity. Join Ismael Valenzuela, author and lead instructor of SANS Security 530, as we explore what are the most successful strategies and opportunities for implementing Zero Trust in 2024.