SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
What? A webcast in 2025 about phishing...haven’t we sorted that stuff yet? Almost! :)
This talk introduces two frameworks that transforms fragmented forensic evidence into clear, actionable intelligence: intel led investigation, and lead-based attacker activity investigations. Through these frameworks we'll demonstrate how these scenarios interweave and evolve. Attendees will learn how to identify critical pivot points where it's time to stop an intel-based investigation and start enumerating interactive activity, while gaining practical insights into selecting and adapting investigative approaches based on real-time findings.
Industrial Control Systems (ICS) and Operational Technology (OT) environments are what makes, moves, and powers our world. ICS/OT are the backbone of critical infrastructure, from energy and water systems to manufacturing and transportation. As cyber threats targeting our critical environments intensify, understanding ICS/OT-specific security controls and appropriate budgets has become a pressing challenge.
In this talk, I’ll describe several stories developed during my career at the National Security Agency – and how they brought people and ideas together into a single theme that helped change missions, organizations, and the industry.
As the world of information technology continues to change, so does the role of the security leader. Whether you're a CISO, Director of Security, or someone aspiring for such a position, you should consider how the current trends in IT and business affect your professional journey.
情報技術が変化し続ける中、セキュリティ・リーダーの役割も変化し続けています。CISOであれ、セキュリティ担当ディレクターであれ、あるいはそのような役職を目指している人であれ、ITとビジネスにおける現在のトレンドが、ご自身のキャリアにどのような影響を与えるかを考える必要があります。経験豊富なCISOがどのような取り組みをすることで、セキュリティリーダーとしてチームを成功に導くポイントを紹介します。
The 2024 Accelerate State of DevOps report shows that software delivery is faster than ever, with 41% of teams deploying systems more than once a week. As speed increases, the average change control lead time has dropped to less than a week.
Great security leaders do more than manage risks—they inspire teams, reduce turnover, and build a culture of trust and accountability. But in an industry where burnout is high and retaining top talent is a constant challenge, how can security leaders create an environment where their teams feel valued, motivated, and engaged? Whether you’re an aspiring CISO or a seasoned security leader, you’ll gain practical, actionable takeaways to elevate your leadership, inspire your team, and drive long-term success.
In today’s dynamic cybersecurity landscape, traditional vulnerability management often falls short due to the continual changes, modifications, and adoption of new technologies. Continuous Threat Exposure Management (CTEM) offers a transformative approach, enabling organizations to anticipate, prioritize, and address vulnerabilities more effectively.
Improving Windows Event Log Analysis With Yamato Security Tools and The Evolving Cyber Threat Landscape: A SANS Perspective.
In today's rapidly evolving digital landscape, effective vulnerability management is applicable for both Operational Technology (OT) and Information Technology (IT) systems.
On this webcast, SANS Principal Instructor Josh Lemon will delve into results from the SANS 2025 Threat Hunting Survey. The 2025 survey will analyze how businesses enhance their threat detection capabilities amid an evolving threat landscape, characterized by increasingly sophisticated and rapid adversary tactics.