SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Modern organizations are often complex ecosystems of multiple systems. With increased usage of cloud-based Applications as a Service, more and more organizations are making use of third-party services to provide specific functionality to support their overall information systems architecture. In this SANS First Look webcast, we examine Vorlon, a platform that enables proactive security of your third-party application ecosystem; the ability to detect and respond to third-party application security incidents; and to ensure compliance with laws, regulations, and rules when it comes to third-party API risks.
デジタルフォレンジック&インシデントレスポンス(DFIR)の素晴らしい新世界へようこそ! 人工知能(AI)は私たちの町に新しく配属された保安官であり、ハッカソン中のカフェイン中毒のプログラマーのようにいろいろなことをスピードアップさせることができます。
Welcome to the brave new world of Digital Forensics and Incident Response (DFIR), where Artificial Intelligence (AI) is the new sheriff in town, ready to speed things up like a caffeine-addicted programmer during a hackathon.
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critical infrastructure. In doing so, they knowingly put human life and physical devices at risk.
In many ways, AI seems to be a solution in search of a problem. Every executive knows they need it, but what do they expect it to do? In this talk and demonstration David Hoelzer, author of SEC595 (Applied AI and Machine Learning for Cybersecurity Professionals) will discuss the realities of AI, explain how it really works, and implement code (live!) to leverage a large language model (LLM) like ChatGPT to solve useful problems in an enterprise.
This hands-on series cracks the code on digital evidence. Designed for beginners, you'll unlock the secrets hidden within devices, from understanding data storage to interpreting timestamps. Learn to extract critical evidence, navigate forensic images, and convert between data formats.
Wondering in the middle of a major incident how you engage with your local Law Enforcement or even your DR/Insurance provided external Counsel is not a good position to be in.
Get ready for an exclusive event where we dive into the latest insights from our survey followed by an exclusive hands-on experience with Palo Alto’s Cortex XSOAR platform. This two-part forum will uncover what drives automation in security teams and how advanced SOAR tools can revolutionize SOC operations.
Security teams today are dealing with endless lists of security issues, but lacking the necessary tools to effectively detect and mitigate the highest risks in their multi-cloud environment. In this session, we will unveil the latest security posture innovations in Microsoft Defender for Cloud, that empower security teams to identify security vulnerabilities spanning from code to cloud, to effectively prioritize the most business-critical risks by leveraging attack path analysis and integrated insights, and to drive large-scale remediation efforts across the entire organization.
The modern enterprise, characterized by hybrid and mobile workforces supported by a hybrid cloud IT environment, brings many security challenges to the federal government, its agencies, entities, and sites. They face multi-faceted cybersecurity concerns due to the sensitive nature of their data, the critical infrastructure, and regulatory mandates involved. The distributed nature of operations, with numerous contractors and providers, introduces further complexities in securing endpoints, networks, and data, further amplifying the risks of nation-state cyber-attacks, phishing, malware, and data breaches. Secure Access Service Edge (SASE)/Security Services Edge (SSE) solutions, like Cisco Umbrella, offer comprehensive protection that meets the unique needs and compliance requirements of government organizations and others that depend upon FedRAMP.
Cracking the Code: The Role of Programming in Information Security by SANS Fellow Instructor Mark Baggett and Why Do We Do What We Do? A Motivational Talk by Certified Instructor Candidate Justin Parker
Don't be fooled by file extensions! This workshop delves deeper, equipping you to identify a file's true type using file signatures.