SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
This talk will discuss the discovery, analysis, and resulting victim notifications related to the KurtLar_SCADA malware.
Explore the latest breakthroughs shaping the future of cybersecurity. The Emerging Technology track brings together though leaders and innovators to showcase advancements. Gain insights on how these developments will impact defense strategies in the coming years.
We’re opening up our Offensive Operations CTF to anyone who wants to join! This special virtual run of our CTF will be open for one day only, March 18th starting at 9:45am EST to 4:00pm EST.
The ability to swiftly detect, investigate, and respond to cyber threats is crucial for minimizing damage. The Detection & Response track focuses on best practices, tools, and techniques for building robust threat detection and incident response capabilities.
As cloud adoption accelerates, securing the cloud remains a critical challenge. The Cloud Security track offers deep dives into securing multi-cloud strategies and the latest solutions to safeguard cloud data. Learn from experts on how to tackle cloud-specific threats in a rapidly evolving environment.
In this session, we’ll explore how to craft a narrative that connects the dots between artifacts, attacker behavior, and business risk to help teams understand what happened, why it matters, and what to do next. You’ll learn simple ways to structure your findings, communicate with both technical and non-technical audiences, and make sure your hunts tell a story.
I've been a heavy user of Al since the beginning, but the way that I use Al has recently shifted. In this fast-paced, fun talk, we'll cover the top ways that I've improved my efficiency and productivity by changing the way I interact with Al so far in 2025.
The Attack Surface & Vulnerability track explores strategies for identifying, assessing, and mitigating vulnerabilities across diverse environments. Learn how to manage these risks with top experts in the industry.
This presentation will gather top experts and vendors to help you navigate the complexities of implementing Zero Trust strategies effectively
During this Webcast we will examines how AI models can be backdoored using vulnerabilities in serialization formats like Pickle.
The SANS ICS613 course will be designed to help students understand the tactics and techniques necessary to scope and conduct ICS penetration tests and security assessments. This presentation will review an outline of the content and provide insight into the equipment and labs that students will use to perform hands on learning. Don, one of the course authors, will be available to answer questions about the course, the challenges of testing operational environments, and to outline a path towards conducting safe and effective assessments and security research.
Empowering a modern SOC with AI: practical use cases with SANS Principal Instructor Maxim Deweerdt and Wiping Media in (Anti-)Forensics: Exploring Hard Drive Erasure Methods for DFIR with SANS Instructor Seth Enoka