SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Organizations are migrating and building mission-critical workloads in the cloud to accelerate the pace of innovation, improve resilience and scalability and reduce data center costs. DevOps and SRE teams are leading the way in this new environment, using their Infrastructure-as-Code and CI/CD knowledge to leverage the benefits of cloud. To keep up with this dynamic cloud environment where resources can be deployed across the globe in minutes, Cybersecurity teams must use the same automation tools and processes to maintain comprehensive visibility and protection. Adding to the challenge, a new wave of sophisticated, cloud-savvy adversaries are targeting cloud vulnerabilities and misconfigurations to meet their objectives.
Join us for a panel discussion presented by Emerson and Dragos, as they share their insights around OT cybersecurity as partners - while also depicting the unique expertise, experience, and responsibilities that they bring to the table to defend customer installations and environments together. Although the core focus of the conversation will be on DeltaV systems, a high-level overview of OT cybersecurity and the Industrial Control Systems (ICS) landscape will be covered and relevant to multiple industry segments, including Oil & Gas, Chemicals, Life Sciences, and Metals & Mining.
Detecting attacks in their earliest stages — before they impact your business — is a key element of an effective threat detection and incident response (TDIR) strategy. But according to Mandiant’s 2022 M-Trends Special Report, it still takes an average of 21 days to detect a successful cyberattack — and only an average of 92 minutes for threat actors to move laterally across a compromised network.
世の中には様々なセキュリティソリューションがあります。あなたは適切な選択とその利用をしているでしょうか?PCのEDRの盲点、マリシャスアプリ対策だけでは不十分なスマホセキュリティ、クラウドセキュリティ機能のよくある誤解、isolation技術の情報漏洩対策への転用など、企業のセキュリティ担当者が一度は考えたことがあるこれらのトピックを皆さんと一緒に考えていきましょう。
There are various security solutions out there but are you making the right choice by selecting the right one? Blind spots in EDR for PCs, smartphone security where MALICIOUS app countermeasures are not enough, common misunderstandings of cloud security features, and the conversion of ISOLATION technology to information leak prevention - these are some of the topics that corporate security personnel have thought about at least once, and we will consider these topics with you.
Enterprises are increasingly implementing DevOps and CI/CD pipelines to dramatically accelerate the software development life cycle (SDLC), bringing new products online more rapidly, more efficiently and with less expense.
Have you ever stumbled across a file that you wanted to access but couldn’t due to the fact that it was password protected? Password cracking is a topic covered in depth in penetration testing courses but rarely in digital forensics or OSINT, even though it’s extremely applicable.
Security teams need to build consistent, reusable design patterns for cloud security controls that can be automated and maintained readily over time. Within cloud infrastructure, many controls can be provisioned and enabled ahead of time and operate autonomously in any deployment scenario. Commonly termed “guardrails,” these controls ensure that security capabilities are always enabled and operate within the context of deployments without any required interaction from security operations or cloud engineering teams.
Securing data in the cloud is so much more than blocking public buckets. Even private data can be exfiltrated, unencrypted, and inappropriately stored. Misconfigurations and mitigations are often highly cloud-specific. In this workshop hosted by Brandon Evans, SANS Certified Instructor and the Lead Author of SEC510: Public Cloud Security: AWS, Azure, and GCP, you will identify and address these concerns using cloud native services in the Big 3 cloud providers.
Operational technology (OT) cyber threats have evolved over the past decade. Combined with increased connectivity from digital transformation projects, it is more critical than ever to implement industrial control system (ICS)-specific visibility capabilities to quickly detect, respond, and recover from potential cyber incidents.To explore this topic, SANS conducted a survey to collect information around industry practices.
As cloud migration and modernization gain momentum in 2023, organizations are increasingly leveraging cloud technologies to enhance operational efficiency and improve application performance. However, many encounter a discrepancy between their anticipated cloud outcomes and the reality they face. A significant barrier preventing organizations from realizing the full benefits of the cloud is the absence of DevSecOps practices.
Join SANS experts for an informative webcast where we delve into Verizon’s recently released annual Data Breach Investigations Report (DBIR) a leading source of insights into the primary causes of the most significant data breaches around the world. This publication presents a unique opportunity for both awareness and technical teams to better understand recent attack methodologies and their effect on their operations.