SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
In this series, Dean Parsons will review observed ICS attacks in the Oil & Gas, Electric and Water sectors and map them to the MITRE ATT&CK ICS framework.
Attend the Cyber Solutions Fest to explore implementations via the lens of people, process, and technology. There will also be highlights on managed service offerings and cloud deployments, as our IT deployment and the security applied to them becomes more distributed within our supply chain and vendor partnerships.There will be examples of lessons learned from customer deployments, as well as insights from their tool developers and designers about how they see the tools being deployed. The people building the next generation of tools will identify where they project the market to go. Attend this event to get all of this and much, much more!
They promised it would be a breeze! Serverless functions, containers, and infrastructure as code were supposed to simplify vulnerability management. But hold onto your seats, because we'll dive into why these technologies demanding a whole new set of skills, tools, and a mindset shift for anyone in the game. Are you ready to shake up your vulnerability management game? Join us as we discover the must-have skills and attitude adjustments for staying on top.
There is likely no cyber threat that can cause as much panic, chaos, and concern amongst cybersecurity professionals as ransomware. Causing widespread damage and disruption to organizations of all sizes, ransomware is here to stay. It remains a profitable business for even the most inexperienced adversaries and has created a multi-billion dollar industry that continues growing. In this forum, we bring together experts and industry leaders to discuss the latest developments and best practices in ransomware solutions and security.Topics for this forum include:* The impact of ransomware on organizations* The importance of backup and recovery strategies as it pertains to a ransomware intrusion* The role of advanced security technologies in mitigating the risk of a ransomware attack.* Steps that organizations can take to prevent or minimize the impact of ransomware.Please join us for 2023 SANS Cyber Solutions Fest, on October 26th, for an action-packed, can't-miss session on all things ransomware. We hope to see you there!
Today, most security professionals are actively architecting and implementing cloud security controls across SaaS, PaaS, and IaaS environments. We’ve learned that what once worked on-premises may not work quite the same in the cloud, and a wide range of new and innovative security platforms and services have emerged and evolved in recent years to address critical cloud security use cases and categories, including:Cloud security monitoring and incident managementCloud workload protectionCloud security posture management (CSPM) and SaaS security posture management (SSPM)Cloud identity and access managementCloud data protectionCloud Native Application Protection Platforms (CNAPP)Zero trust network access (ZTNA) and SASE/SSECloud security automationIn the Cloud track at Cyber Solutions Fest 2023, leading solution providers and practitioners will highlight the newest techniques and technologies that organizations of all types and sizes are leveraging to better secure and manage their cloud services and environments. Talks and panels will cover all of the topics mentioned, and more!
What should organizations do in 2023 to take a more proactive stance, operationalize threat intelligence and focus on maturing their threat hunting program?Join Ismael Valenzuela, SANS author and Senior instructor for the 2023 Cyber Solutions Fest - Threat Hunting and Intelligence Track, and hear talks on:Enriching alerts with threat intelligenceUtilizing XDR and MDR services to help accelerate your threat-hunting programOperationalizing threat intelligenceAutomating threat hunting tasks with XDR, NDR, and threat intelligence solutionsIdentifying the most actionable intelligence for the organization
We are lucky in Infosec. It may not be an easy field to get into, but once in infosec there is plenty of work available and many work models. Most start out as a full time employee. You have a job and work for one organization. You can also be a contractor. Most contractors have one contract with one client at a time, and the terms of remuneration are different than a full time employee and generally one has more freedom. You can also be an independent consultant, which is very different from a contractor although there is overlap. Consultants generally have multiple clients, the ability to earn more money, and far more freedom but not the alleged stability of a longer term contract or full time job. And of course there are also hybrid models as well. In this talk we discuss these work models and their strengths and weaknesses. Which is ideal for you? You may have a different opinion afterwards!
The Information Security industry has a large variety of solutions to stop attackers in their tracks! They claim to have tools to address every type of attack, and solutions that are silver bullets against all attackers. The current trends say machine learning and AI will solve our latest problems.
The Cloud is enabling businesses to quickly adopt and use technology in ways that we've never imagined before. Security teams need to find ways to keep up; automation is the solution.By using Policy as Code tools we can define and enforce security guardrails. This allows developers and cloud engineers to continue shipping features while bringing the confidence to everybody that security requirements are being met.
Mobile devices are regularly used for personal and professional reasons, and people rarely put a company’s cybersecurity ahead of their personal needs. This dual-usage introduces organizations to a wide range of threats, many of which originate from mobile apps on personal devices. And if sideloaded apps continue to grow in popularity as expected, the number of mobile risks and threats will accelerate.
Join us as we discuss how organizations can gain back some of the visibility and control in their cloud environments by implementing repeatable architectural patterns.
As we head into the last quarter of 2023, three major mandate changes are occurring, each positioned to make a large impact on how businesses, governmental bodies, and critical sector organizations operate. The goal of the SANS Cyber Compliance Countdown is to focus on what you need to know in these complicated and broad requirements and to offer solutions on how to meet these directives.