SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
The ICS Cybersecurity Control Secure Remote Access does more than just enableproper remote authentication and access into a properly architected anddefensible ICS network. There may be several instances of remote access alreadydeployed for remote substations, generating facilities, and other remote sites vialegacy, vendor, integrator, or project access. Implementing this ICS cybersecuritycritical control must start with conducting an access assessment to identify anddocument all remote access points within all local and remote sites.The module will review general access credentials at levels 3 and 3.5, and potential risks deeper inside the ICS network. Setting up your remote access system properly can help utilities retain the benefits of modern control systems while reducing the risk of potentially devastating breaches.
Manual processes in security operations are no longer sufficient to keep pace with emerging threats and increasing workloads. This talk explores the journey of fostering a culture of automation within a security operations team to enhance efficiency, accuracy, and improve analyst job satisfaction. Attendees will learn practical strategies to identify high-impact automation opportunities, overcome resistance to change, and empower team members with the tools and skills to adopt an automation-first mindset. By integrating automation into the fabric of daily workflows, teams can not only improve operational performance but also focus on more strategic, value-driven security initiatives. Whether you're starting your automation journey or looking to scale existing efforts, this session will provide actionable insights to build a resilient, adaptive, and forward-looking security operations culture.
On this webcast, SANS Certified Instructor Josh Lemon will provide insights into the prevalence of organisations maintaining separate detection and response teams, shedding light on the reasons behind such decisions and their implications for overall security posture.
Many cybersecurity researchers and ethical hackers are becoming the target of criminal prosecutions and litigation, essentially for trying to do the right thing, and acting in an ethical manner. The reality is that cybersecurity researchers, practitioners and ethical hackers do run the risk of running afoul of both criminal and civil law. This talk will explore the various typs of laws and legal actions that could impact on them, and how to work within the framework of applicable laws, and essentially keep them safe from legal harm.
SANS is excited to launch the SANS ICS/OT Practice Area under the leadership of SANS Fellow Robert M. Lee. Building on the vision of the late Michael Assante, this initiative is designed to enhance engagement with the cybersecurity community by tailoring course accessibility, content development, and strategic outreach to better serve the ICS/OT community.
In this talk, we will discuss the importance of the Industrial Control Systems and Operational Technology that is used to support the critical environments found throughout the world’s critical infrastructure. Whether you are new to the ICS/OT community, working in it for a long career, or you are just looking to understand the “OTher side of business”, join us and get involved in the conversation. The talk will highlight some of the key drivers and constraints across IT and OT, introduce key concepts, workforce needs, and have an open discussion on some common questions in the ICS community, including:• Attacker Objectives in ICS Environments• IT / OT – it’s all just “T” right?• Insecure by Design vs Secure by Design vs Cyber Informed Engineering• Engineers or Cyber pros, Degrees or Certs, and Career Lifecycle• Regulations and 5 Critical Controls for ICS
Historically, analysts have relied on experts with specialized training to acquire and analyze forensic data. With the power of automated investigation, Binalyze’s AIR platform reduces the overhead of forensic investigations by automating the process of collecting artifacts, triaging the data, and identifying next steps. In this webinar, we will demonstrate how with the right tooling, analysts of all backgrounds can effectively handle incidents, reducing the response time by removing the need for frequent escalation.
Join us for the Black History Month Bootup CTF Orientation — a must-attend session to prepare for this exciting event! This interactive session will guide you through everything you need to know to hit the ground running.
The integration of Artificial Intelligence (AI) with Open Source Intelligence (OSINT) has transformed traditional intelligence gathering processes, enabling organizations to streamline data collection, processing, and analysis.
Decisive action requires more than data – it demands insights. Babel Street delivers the intelligence organizations need to make confident decisions with clarity. This presentation will showcase how Babel Street empowers commercial enterprises, defense, intelligence, and law enforcement to harness the full potential of multilingual data from public, commercial, and deep/dark web sources, including ultra rare, hard-to-reach sources. Attendees will get to see Babel Street’s advanced AI capabilities, including identity resolution and intuitive search tools that streamline investigations and enhance operational effectiveness. Join us to see how Babel Street is redefining the future of information intelligence and operations with simplicity, power, and precision.
Have you ever wanted to debug Windows binaries with WinDbg, but just not sure where to start? Well, this brand new series of workshops is for you! This series of workshops will start with the absolute basics of WinDbg and debugging in general. By the end of the entire series, you will be much more comfortable with WinDbg and will understand what's happening under the hood a bit more.
The landscape of Detection Engineering is rapidly evolving, and staying ahead of the curve is crucial for cybersecurity professionals. To dive deep into understanding the current state and future trends of this critical field, SANS has partnered with Anvilogic to conduct a comprehensive survey of Detection Engineering professionals across various industries.