SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Nearly 40% of ICS environment compromises come from the IT business network that allows a threat into the ICS environment. So, it’s more important to focus on the ICS perimeter defenses first, followed closely by the additional required segmentation within the ICS network itself. This control involves ICS-aware network architectures that support effective segmentation, visibility of control system traffic for analysis, log collection, asset identification, industrial DMZs, and enforcement for process communication integrity and reliability.
Module 3 of the training relates to continuous network security monitoringof the ICS networked environment, with protocol-aware tool sets andsystem-to system interaction analysis capabilities used to informengineering of potential risks to the control, view, and safety of operations.
Becoming a successful consultant seems like a dream: high pay, freedom, and fascinating work. These can all be true yet there is more to the reality: as a consultant you are running a business, and you need clients!
Today’s cyber threats move fast—and the only way to stay ahead is to think like an attacker. A reactive approach is no longer enough. Organizations need to adopt a proactive, offensive security posture to uncover vulnerabilities before adversaries do.
As large language models (LLMs) like Microsoft Copilot become embedded in enterprise workflows—from search and summarization to project tracking—they introduce a new frontier of risk: the inadvertent oversharing of sensitive information. Traditional data governance approaches, built around static controls and classification, are no longer sufficient when AI can infer sensitive insights from benign data. .Join this webcast to explore how Knostic is redefining access and identity management for the AI era with a knowledge-centric approach that emphasizes not just who has access, but who needs access. Discover how their innovative methodology—grounded in need-to-know principles, role-based knowledge segmentation, and intent-aware access policies—creates an intelligent, scalable framework for controlling AI-generated knowledge sharing.
As organizations move to the cloud, understanding the division of security responsibilities between cloud service providers (CSPs) and customers is critical. In this talk, we will dive deep into the Shared Responsibility Model, exploring how cloud security is a collaborative effort.
Data loss prevention (DLP) is a cornerstone of modern cybersecurity—but building a program that delivers fast, visible impact and scales for the future can feel overwhelming. Between evolving data threats, mounting pressure from leadership, and the complexity of tools like AI, it’s tough to know where to begin.
Picture this: you approach a machine where you know an incident has occurred, but all traditional logs are missing or wiped leaving you with no clear starting point.
Learn the core concepts of GRC Engineering and explore how Policy as Code can bridge the gap between regulatory demands and the flexibility required in cloud-native environments
Vulnerability management is no longer just about finding CVEs and deploying patches—it's about closing the gap between what you know and what you don’t see coming.
Attackers are increasingly targeting critical infrastructure — including power grids, water systems, heavy manufacturing, and oil and gas — with a deep and sophisticated knowledge of ICS components, industrial protocols, and engineering processes. Employing advanced techniques like Living Off The Land (LOTL) strategies, they repurpose legitimate ICS software for malicious purposes. These tactics, when combined with ransomware and ICS-specific attacks, significantly escalate the risks to both human lives and essential infrastructure, especially in times of warfare.To counter these threats, ICS/OT environments need specialized technology solutions and highly trained ICS defenders. The ICS Active Cyber Defense model emphasizes “skilled human analysts capable of monitoring and responding to adversaries within the ICS/OT network.” Defending against LOTL and similar threats demands cybersecurity teams with a blend of specific expertise in control systems, IT security knowledge and a prioritization of safety.Is your ICS/OT cybersecurity program equipped with the appropriate technology and expertise? The ICS Summit Solutions Track 2025 will present cutting-edge solutions, live demonstrations, and strategies for tackling today’s ICS security challenges. Presentations and panels will align with industry frameworks, such as the SANS ICS Cybersecurity Critical Controls, demonstrating how expertly trained ICS defenders, armed with ICS-specific solutions, can safeguard the vital infrastructure we all depend on.
Graphical interfaces are great for quick tasks, but real cloud power users know that mastery of command-line interfaces (CLIs) unlock unparalleled efficiency, automation, and precision.