SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Multi-Factor Authentication (MFA) is often hailed as the gold standard for securing online accounts – but is it truly unbreakable?
OT ransomware is a growing threat to any organization that relies on ICS/OT to power its operations. Whether securing critical infrastructure or ensuring the continuity of manufacturing, pharmaceuticals, food and beverage production, or other industrial processes, protecting these environments is essential.
To achieve their objectives in our environment, attackers must move beyond their initial compromise and interact with our environment. Which means that we have the home field advantage - *if* we enable appropriate auditing and monitoring. This session will dig into some specific tactics that leverage that home field advantage and make it easier for us to effectively detect and respond.
From an open-source project used by millions through proprietary Java code to a Fortune 500 developer company's software product, we will look at the mistakes made by programmers to demonstrate the truth in the common (although not very elaborate) saying in the industry; "cryptography is hard!" We will try to understand why these issues were still a thing in 2024 (and most likely, they will still exist in 2025) and what we can do about them.
Traditional compliance and risk management techniques don’t scale in cloud-native environments—manual processes are now an anti-pattern for good security.
Mobile app security is more critical—and more complex—than ever. With growing pressure to release quickly, mobile security teams often face tough trade-offs: limited access to devices, remote team coordination challenges, and slow, unreliable emulators that fail to mirror real-world behavior.
As the cyber threat landscape continues to evolve, the past year has presented unique challenges and opportunities for cyber threat intelligence professionals. For 2025, availability has become a critical focus within the CIA triad, with ransomware and service outages high on the agenda, and network defenders and CTI analysts acutely aware of the impact of large-scale network disruptions. Additionally, AI remains a double-edged sword, with both adversarial and beneficial applications advancing rapidly.
Are you struggling to get both executives and your workforce to buy into cybersecurity? Do you feel overwhelmed and need to scale the impact of your security team? Learn how to engage and transform your organization into the biggest believers and supporters of cybersecurity by institutionalizing a strong security culture.• What is security culture and how it enables you and your team.• Indicators of both a weak and strong security culture.• Top three drivers of a strong security culture.• Proven framework on how to build the culture you want.• The most common mistakes security teams and leaders make.• How to quantify and action your security culture.
Outages happen—even in the cloud. As more organizations move critical operations to cloud platforms, the risks of downtime, identity service disruption, and security gaps are rising fast. The question isn’t if your cloud provider might fail you—it’s whether your continuity strategy is ready when it does.
teaser
大規模言語モデル (LLM)に基づくGPT(Generative Pretrained Transformers)は、多くの課題に対して優れた性能を発揮します。しかし、ログデータ内の異常値を見つけるためのトレーニングはされていません。
In this brief, informative, and useful session, Christopher Crowley will discuss the concept of a variational autoencoder, then show how you could implement this to train an autoencoder based on your logs.