SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
There are many ways to create a security perimeter around your IT infrastructure. This presentation will compare and contrast various strategies companies take when building these perimeters and discuss the benefits and disadvantages of each.
Webcast 4 of 5 in our Special Series—Explore the full lineup here. In today’s complex threat landscape, no single security solution is enough. A modern cybersecurity strategy requires layered, overlapping defenses to detect, prevent, and respond to both external threats and insider risks.
This talk will look at how attackers are actually making use of artificial intelligence to attack organizations through social engineering attacks, and what organizations can do to try and actually address these threats.
In this upbeat, interactive session, we’ll dive into why the tried-and-true fundamentals (think password hygiene, patch management, and access controls) are the secret sauce to surviving and thriving in the age of ever-evolving cyber threats. Prepare for real-life “oops” moments, plenty of laughs, and hands-on tips you can actually use.
In this demo of hardware hacking, we'll introduce PulseView - the 'Wireshark of hardware hacking' - and demonstrate a technique to unlock a keypad safe. Our method? A Side-Channel Timing Attack, which relies on the timing discrepancies in the user interface.
Join us at the 2025 Government Security Forum on July 22nd at 10:00 AM ET to gain intelligence, tools, and real-world strategies needed to defend your agency against next-generation cyber threats. Register for free today!
Not all vulnerabilities are created equal—and fixing everything just isn’t realistic. This session shows how to align vulnerability prioritization with real-world risk.
We continue to see the effects of living in an interconnected, digital world, which results in a rise in the number of cyber-attacks with each new year. Malware/Ransomware, Email Compromise, Distributed Denial of Service attacks, and Data Breaches continue to plague some of the largest industries and small businesses alike, and the cost of these damages is on pace to exceed 10 trillion dollars by 2025. As managers, consultants, and examiners, we know there is no silver bullet to thwart all attacks, and we realize that we must continue to improve our tools and practices to keep attackers at bay. Weeding through the various tools and free solutions and then implementing best practices for your workplace is often just as challenging as defending your resources in this constantly evolving landscape. Join us for this year’s DFIR Summit Solutions Track 2025 as invited speakers and subject matter experts walk through lessons learned and best practices on uncovering threats, identifying attacker activity, confirming data loss and what was compromised, and discuss ways to better secure your organizational assets moving forward.
Join us for a research-driven webcast that unveils and explores the key findings of the 2025 Cybersecurity Workforce Research Report by SANS | GIAC. This comprehensive, global study delivers unparalleled insights into the cybersecurity talent landscape, highlighting the essential strategies for building and maintaining high-performing teams.
Webcast 3 of 5 in our Special Series—Explore the full lineup here. With 78% of organizations now operating in hybrid or multi-cloud setups, traditional security approaches are falling short. When systems span cloud, on-prem, and endpoints, it becomes harder to maintain visibility, enforce consistent policies, and ensure resilience under pressure.
I've been a heavy user of AI since the beginning, but the way that I use AI has recently shifted. In this fast-paced, fun talk, we'll cover the top ways that I've improved my efficiency and productivity by changing the way I interact with AI so far in 2025.
You’ve patched systems and prioritized risk—but if your stakeholders don’t understand what you’re doing or why it matters, progress stalls.