SEC504: Hacker Tools, Techniques, and Incident Handling

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.
Artificial Intelligence is no longer just a futuristic concept—it's a powerful driver of innovation across industries. In this webcast, we explore the latest breakthroughs in AI, including advancements in machine learning, generative models, and intelligent automation. Join leading experts as they discuss how AI is transforming business operations, enhancing decision-making, and creating new opportunities for growth.Attendees will gain insights into:Emerging trends and technologies shaping the AI landscapeReal-world applications and case studies from diverse sectorsBest practices for integrating AI into existing systemsEthical considerations and responsible AI developmentWhether you're a business leader, developer, or researcher, this session offers practical knowledge and strategic perspectives to help you navigate the rapidly evolving world of AI.
Moving from clicking alerts to actively hunting threats takes planning, the right data, and the right tools. In 2025, with AI and automation everywhere, it’s more important than ever to stay ahead of attackers, arming yourself with clear intelligence, full visibility, and smart processes to catch problems before they become crises.Attackers are now making effective use of AI too, creating fake identities, automated phishing, and constantly changing malware. Still, behind every tool is still a real person (or group) with goals. Organizations need to have a balance of automated analysis with human judgment so you can spot true threats in the noise.There’s no shortage of threat intelligence sources either: open source, commercial, vendor, and community. Yet many teams struggle to turn intelligence into real defense. In this track, you’ll learn to plug intelligence directly into your security tools, while equipping humans to do better analysis: enriching alerts instantly, mapping threats to the MITRE ATT&CK framework, and sharpening your hunting approach based on what adversaries actually do.Key Takeaways for 2025:Plan regular, data-driven hunt campaigns instead of one-off investigationsEmbed threat intelligence into SIEM, SOAR, XDR, and NDR workflowsUse AI to speed up indicator triage and add context fastCombine automated analytics with focused human-led huntsFocus on high-quality intelligence that fits your environmentWhat to Expect:Smart Alert Enrichment: Automatically add useful context to indicators without flooding your team.Next-Gen XDR & MDR: Learn how managed services and orchestration speed up hunts.Live CTI Demos: See real examples of turning raw threat feeds into detection rules.Automated Hunting Playbooks: Create repeatable tasks across XDR, NDR, and cloud logs.Actionable Intelligence Guides: Pick the best data sources and turn them into playbooks your team will use.Join Ismael Valenzuela, author and SANS senior instructor, as we explore the most successful strategies and opportunities for implementing these tactics in your organization.Full Fall Cyber Solutions Fest Track List:Emerging Technologies Track | Nov 4Cloud Identity and Access Management Track | Nov 5SOC Track | Nov 5Threat Track | Nov 6AI Track | Nov 6
Since 2017, the SANS ICS/OT Cybersecurity Survey has been a foundational benchmark for critical infrastructure asset owners and operators. Each year, SANS explores the growing trends in cyber threats, vulnerabilities, and risks across industrial environments, including actionable recommendations for how organizations can improve their security posture.
As cyber threats grow in complexity and frequency, organizations' strategies for detection and response must continuously evolve. The SANS 2025 Detection and Response Survey webcast will delve into the current state of cybersecurity operations, questioning whether the heavy emphasis on endpoint detection is creating new blind spots. By concentrating primarily on endpoints, organizations may narrow their scope and overlook threats emerging from other areas.
Identity Governance and Administration Powered by Risk Context – A Crucial Next Step in Enterprise Security
Test