SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
One of the first objectives in a cyber attack is to successfully infiltrate into the target environment. The initial attack payload needs to penetrate through perimeter defenses and be easy for the target users to infect themselves. Techniques that attackers use to achieve this change over time, and there have been noticeable trends in this area. This presentation reviews some of the techniques from the recent years.
This is a 2 hour hands-on workshop. Is your company adopting containers but you haven’t had a chance to figure out the best way to secure them yet?
The focus of this two day event is to illustrate the challenges, risks, impacts of incidents in control systems, as well as actionable achievable methods we can meet these challenges head-on, and show ICS-specific trained defenders can step up to protect and defense the critical infrastructure we all rely on in our daily lives.Presentations will be a combination of thought leadership and technical use-case examples with actionable takeaways facilities can start considering to immediately deploy where it suits their safety and industrial security defense goals.
Content delivery networks provide a valuable service and make the Internet a better place. Without them, streaming services would overwhelm entire networks. Mobile and single-paged web applications would take forever to load. But, what about sensitive data? Do we have to avoid caching sensitive data at all costs or are there ways we can secure it? Join me to learn more about origin protection and signature enforcement with custom policy in Amazon CloudFront. Get a behind-the-scenes peak at one of the labs from SEC540: Cloud Security & DevSecOps Automation.
Not sure how to make the leap from engineer to manager? Questioning whether or not you really want a leadership position? Unclear if you really have what it takes to be a CISO? Come hear real world case studies and learn tips and tools to help you on your path and take the next step in your career.
Selection of an effective Attack Surface Management (ASM) solution can help you identify and mitigate potential threats.
Over the last five years, most organizations have seen their exploitable attack surface grow dramatically as new processes — such as cloud-native software development — become mainstream. These changes have led to an explosion of new systems used to build applications and new security tools needed to scan them for vulnerabilities. Outdated approaches to vulnerability management simply can’t keep up.
Cybersecurity remains a critical aspect of every organization's operations. In many companies, cybersecurity is their top risk. As cyberattacks become more sophisticated and frequent, organizations need to develop a culture of cybersecurity to protect their assets and reputation. In this webinar, we will explore how to build a culture of cybersecurity within your organization in 4 discrete steps.
InfoSec program management is too inefficient to support the real-time needs of CISOs as they address the growing complexity of internal and external risks. The status quo - which often relies on antiquated tools, siloed processes, and over-investment in third parties - must yield to a more flexible, scalable, cost-effective approach.In this session, we'll introduce a new approach to enterprise-wide program development and automation that can meet the modern complexity of businesses today.•Understand the limitations of InfoSec practices in today’s risk landscape.•Identify five key areas of automation prime for organizations across the maturity spectrum.•Translate program efficiencies into measurable benefits and results for the business.
Running a SOC is a complex combination of data sources, processes, and teamwork, and it's easy to get lost in the details. In this keynote we'll step back to think big picture about what a SOC truly needs to deliver and present some simple mental models that cyber security analysts and managers can use to abstract away complexity and gain clarity on their true priorities. We'll discuss SOC goals, workflow, how to gather those important but "hard to measure" metrics and use a top-down approach to help focus you on your path to cyber defense success.
This is a 2 hour hands-on workshop. As with any enterprise environment, we can (and should) focus on hardening our defenses to keep the adversaries out, but these defenses may some day be evaded via a variety of methods.
Organizations and security leaders are beginning to understand that cybersecurity is no longer just a technical challenge but also a human challenge. In fact, people are now the biggest driver of breaches, with employees involved in over 80% 1 of breaches globally. In many ways this is the result of organizations becoming so effective at using technology to secure technology that in many ways we have left the human vulnerable and are in fact driving threat actors to target people.