SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
It seems that every day cyber attackers come up with a new technique or tactic to breach victim organizations. It can seem daunting for security teams to keep up with the constant barrage of the latest threats and capabilities. Despite the best-laid plans, adversaries can still find a way in if security teams don’t prioritize their investments against the tech that protects against the threats targeting them.
This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS / CIS partnership program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
Identities are the foundational cornerstone of many environments. Identity is typically the front door for web, infrastructure portals, and VPN services. Most organizations should implement additional countermeasures to prevent attackers from breaking into an organization. The perimeter of many environments is de-facto users’ identities. How you protect those identities is critical. Understanding how to attack identities is crucial for those who emulate attack groups.
As data volume increases and cyberattacks target smaller and smaller organizations, your company needs to determine what content requires the highest level of protection. Unfortunately, unstructured content such as product plans, customer data, and other intellectual property (IP) is extremely enticing to cyberattackers—and the most challenging to protect.
“IT heroism” can be defined as relying on “individuals taking upon themselves to make up for a systemic problem.” As those who have seen the inside of a SOC can attest, this is not entirely uncommon in many Security Operations Centers!
According to market data, more businesses than ever before are utilizing several cloud service providers. The first SANS Multicloud Survey, performed in 2022, indicated that the forces behind the tendency to adopt multiple cloud solutions was driven by a variety of factors, including mergers and acquisitions and concerns around ensuring business continuity. It is also clear that the major cloud service providers continue to innovate and differentiate their services in the face of intense competition.
PowerShellは、WindowsのCLIシェルとして標準の座を占めるばかりでなく、LinuxやmacOSにも移植され、クロスプラットフォームなシェルに成長しました。
Businesses large and small are operating at unprecedented speeds thanks to digital transformation and the ubiquitous adoption of cloud computing. But guess what? So are cybercriminals. Detecting threats and attacks on your organization’s cloud infrastructure is undoubtedly a chief concern among security leaders and practitioners alike. Providing security personnel with the appropriate breadth of data collection and analysis across the entire cloud infrastructure is essential to maintaining security visibility into their environment and managing their risk and attack surface.
Detecting, investigating, and stopping advanced cyberattacks at speed and scale is becoming increasingly unsustainable, thanks to the complex technology SOC teams must rely on. In the face of an ever-expanding attack surface, highly evasive and emerging attacker methods, and an increasing SOC analyst workload, SOC teams are struggling—and threat detection is suffering.
Data resiliency is a critical but often challenging aspect for organizations. One of the most significant pain points is ensuring that data remains intact, accessible, and recoverable during a cyber-attack, natural disaster, or another system failure. The complexity of managing large volumes of data across multiple systems can also lead to issues with fragmentation and data silos.In this SANS First Look webcast, Certified Instructor Matt Bromiley reviews Crashplan’s solution, and how the platform leverages a strong end-user focus while maintaining powerful administrative capabilities.Register for this webcast now and be among the first to receive this white paper.
Artificial Intelligence, Large Language Models (LLMs), Generative AI (GenAI), and transformers have made headlines since ChatGPT was released at the end of 2022. Now every security organization is considering how GenAI will impact their customers and business. As a result, security professionals have to understand how these technologies work and, importantly, how to use them securely. Come learn what is being done to secure the 1) usage of GenAI 2) development of AI models and 3) integration of GenAI functionality into business applications.
ChatGPT, GPT-4, Llama 2, Bard, Minerva, Megatron, Claude, Chinchilla... What exactly are these "Large Language Models" that are in the news? What are they really good for? How do they work? What are the risks when we incorporate these into our business process? This 90 minute presentation and tutorial will explain how these models work, what transformers are, how embeddings work, and how to build a question answering AI... the easy way and the hard way.. in addition to discussing the very real risks that come into play when we try to integrate these systems into a business process!