SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
With the breadth of technologies in use across many enterprise organizations today, security analysts need more visibility than ever.
This webcast is built on insights from one of our most anticipated cybersecurity surveys of the year—offering an in-depth look at how the community is adopting, adapting to, and defending against artificial intelligence in all its forms. From broad AI applications to generative models like LLMs, the 2025 SANS AI Survey uncovers how security professionals are integrating AI into their workflows—and what risks and opportunities are emerging as a result.
Security teams often find themselves reacting to cloud misconfigurations and policy violations after they occur—playing an endless game of security Whack-a-Mole.
As digital transformation accelerates, Zero Trust has become crucial for defending against an increasingly complex threat landscape. The rise in ransomware, credential stealers, supply chain attacks, and disruptive incidents impacting availability in 2024 has underscored the need for resilient cybersecurity strategies that can withstand and adapt to evolving threats.
The integration of AI in penetration testing promises to revolutionize cybersecurity assessments. Machine learning algorithms will automate vulnerability discovery, enabling real-time identification and exploitation of security weaknesses.
Securing the cloud isn’t easy. Thales Group reported that the percentage of corporate data stored in the cloud has doubled from 2015 (30%) to 2022 (60%). Meanwhile, the 2023 Unit 42 Attack Surface Threat Report, published by a threat research branch of Palo Alto Networks, reported that “80% of security exposures were observed in cloud environments.” Because this percentage is significantly larger than the percentage of data in the cloud, this implies that the cloud is somehow uniquely vulnerable, or that the cloud is uniquely challenging for security teams.Enter the SANS CloudSecNext Summit Solutions Track 2025. This event will provide you with practical solutions to these challenges from some of the world’s leading experts. We will deliver the latest tools, techniques, and procedures for cloud, multicloud, and hybrid environments. We hope you will be able to take what you learn in this event to make your cloud environments as secure, if not more secure, than your infrastructure on-premises.
In an era where digital footprints expand faster than security teams can track, managing the attack surface is no longer a reactive task, it’s a continuous battle. Organizations face an evolving threat landscape driven by shadow IT, cloud sprawl, third-party risks, and zero-day vulnerabilities. Yet, many security teams struggle to gain full visibility into their external exposure, let alone remediate risks before adversaries exploit them.
Join top SANS instructors as they share their personal journeys into cybersecurity—how they got started, what shaped their careers, and the lessons they’ve learned along the way. From first steps into the industry to becoming recognized experts, their stories offer inspiration and practical guidance for anyone looking to launch or grow a career in cyber. Moderated by Karen Wetzel from NICE, this session will also connect their experiences to roles within the NICE Workforce Framework, spotlighting some of the most dynamic opportunities across both public and private sectors. Whether you're just beginning your career or planning your next move, you'll walk away with actionable tips and a clearer picture of how to navigate your own path in the cybersecurity field.
Moving red and blue teams out of their silos means building a continuous feedback loop that translates adversarial knowledge into actionable defensive countermeasures and real fixes. At the Solutions Summit for Hack & Defend 2025, we’ll present state of the art solutions that can help you to achieve this. Furthermore, with AI and automation everywhere, it’s easy to get buried in data. In this forum, we will show you solutions that can. help you speed up triage and investigations, while keeping human judgment in the loop.Key Points for 2025:Fast Turnaround: Move test findings into rules and controls without delayPurple-Team Drills: Run joint red/blue exercises to spot and close gapsAutomated Validation: Replay attacks and check defenses at scaleRisk-First Focus: Use simple threat models to target your highest-impact pathsAI with Purpose: Enrich alerts automatically, but keep analysts in controlJoin me, Ismael Valenzuela, author of SEC530, Defensible Security Architecture and Engineering and co-author of SEC568: Product Security Penetration Testing, and SANS senior instructor, as we turn offensive insights into stronger defenses at Hack & Defend 2025.
Join us for the Emerging Technologies Track at SANS Fall Cyber Solutions Fest 2025! If you’re interested in learning about the latest advancements in cybersecurity, this is the perfect opportunity for you.Engage with industry leaders as they present innovative tools and solutions designed to enhance your organization’s security posture. This one-day track will feature a diverse array of use cases, demonstrations, and insights aimed at empowering cybersecurity professionals to elevate their skills and strategies.
This focused track explores the ever-evolving world of Cloud IAM, diving into modern strategies, common missteps, and emerging tools designed to help organizations reclaim control over sprawling identities and creeping permissions.
When performing effectively, security operations is ongoing visibility into information assets and threats to them. Poise with a nuanced understanding of risk and capacity to act.Explore the balance of people, process, and technology in the always insightful SOC Track. We'll surely address what AI is and isn't doing to enhance operations; cover threat intelligence; staffing; capabilities of the SOC; and discuss the ongoing challenge of scarce resources.Join us to hear how others are succeeding and failing to maintain an operational balance between competing internal priorities and threats which seem to relentlessly improve.