Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric...

13
Program Guide @SANSInstitute #SANS2018 SANS 2018 Orlando, Florida | April 3-10

Transcript of Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric...

Page 1: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

Program Guide

@SANSInstitute #SANS2018

SANS 2018Orlando, Florida | April 3-10

Page 2: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

Add an OnDemand Bundle to your course to get an additional four months of intense training! OnDemand Bundles are just $729 when added to your live course, and include:

• Four months of OnDemand access to our custom e-learning platform

• Quizzes • MP3s and Videos of lectures

• Labs • Subject-matter-expert support

COURSES AVAILABLE:

SEC301SEC401SEC501SEC503SEC504SEC505SEC506SEC511SEC542SEC555

SEC560SEC566SEC573SEC575SEC642SEC660FOR500FOR508FOR518FOR526

FOR572FOR578FOR585FOR610MGT414MGT512MGT514DEV544AUD507LEG523

To receive the discounted rate, you must sign up before Wednesday, April 11th at 8:00pm EDT

Add to your order via your Portal Account: www.sans.org/account/login

Call or e-mail SANS Registration: 1-301-654-SANS (7267) | [email protected]

General Information . . . . . . . . . . . . . . 2-3

Course Schedule . . . . . . . . . . . . . . . . 4-6

GIAC Certifications . . . . . . . . . . . . . . . 7

Bonus Sessions . . . . . . . . . . . . . . . . 8-16

Vendor Events . . . . . . . . . . . . . . . . . 17-19

Hotel Floorplans . . . . . . . . . . . . . . . . 20-21

T A B L E O F C O N T E N T S

1

First Time at SANS?Please attend our Welcome to SANS talk designed to help you get the most from your SANS training experience.Tuesday, April 3 8:00-8:30 amLocation: Regency S (CONVENTION LEVEL)

Page 3: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

G E N E R A L I N F O R M A T I O N

Badge & Courseware Distribution

Location: Orlando Ballroom M/N (CONVENTION LEVEL)

Mon, Apr 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5:00pm - 7:00pmTue, Apr 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7:00am - 9:00am

Location: Registration Desk (CONVENTION LEVEL)

Tue, Apr 3 - Sat, Apr 7 . . . . . . . . . . . . . . . . . . . . . 9:00am - 5:00pmSun, Apr 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9:00am - 2:00pmMon, Apr 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8:00am - 12:00pm

Location: Rainbow Spring II (CONVENTION LEVEL)

Tue, Apr 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9:00am - 5:00pm

Internet Café

Location: Regency Rotunda (CONVENTION LEVEL)

Tue, Apr 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Opens at NoonWed, Apr 4 - Sat, Apr 7 . . . . . . . . . . . . . . . . . . . . . . Open 24 hoursSun, Apr 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Closes at 2:00pm

Course TimesAll full-day courses will run 9:00am - 5:00pm (unless noted)

Course BreaksMorning Coffee . . . . . . . . . . . . . . . . . . . . . . . . . . . 7:00am - 9:00am Morning Break . . . . . . . . . . . . . . . . . . . . . . . . . 10:30am - 10:50am Lunch (ON YOUR OWN) . . . . . . . . . . . . . . . . . . . . . . . . .12:15pm - 1:30pmAfternoon Break . . . . . . . . . . . . . . . . . . . . . . . . . . 3:00pm - 3:20pm

Photography NoticeSANS may take photos of classroom activities for marketing purposes. SANS 2018 attendees grant SANS all rights for such use without compensation, unless prohibited by law.

Feedback Forms and Course EvaluationsThe SANS planning committee wants to know what we should keep doing and what we need to improve – but we need your help! Please take a moment to fill out an evaluation form after each course day and bonus session and drop it in the evaluation box.

Wear Your BadgeTo confirm you are in the right place, SANS Work-Study participants will be checking your badge for each course and event you enter. For your convenience, please wear your badge at all times.

Bootcamp Sessions and Extended Hours The following classes have evening bootcamp sessions or extended hours. For specific times, please refer to pages 4-6.

Bootcamps (Attendance Mandatory)

SEC401: Security Essentials Bootcamp Style

SEC503: Intrusion Detection In-Depth

SEC511: Continuous Monitoring and Security Operations

SEC555: SIEM with Tactical Analytics

SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking

SEC760: Advanced Exploit Development for Penetration Testers

MGT414: SANS Training Program for CISSP® Certification

Extended Hours:

SEC501: Advanced Security Essentials - Enterprise Defender

SEC504: Hacker Tools, Techniques, Exploits & Incident Handling

SEC560: Network Penetration Testing and Ethical Hacking

MGT512: SANS Security Leadership Essentials for Managers with Knowledge Compression™

2 SANS 2018 | Orlando, FL | April 3-10, 2018 SANS 2018 | Orlando, FL | April 3-10, 2018 3

Page 4: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

SEC599: Defeating Advanced Adversaries – Implementing Kill Chain Defenses Erik Van Buggenhout . . . . Location: Coral Spring I/II (LOBBY LEVEL)

SEC617: Wireless Penetration Testing and Ethical Hacking Larry Pesce . . . . . . . . . . . Location: Manatee Spring I (LOBBY LEVEL)

SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques Adrien de Beaupre . . . Location: Celebration 11 (CONVENTION LEVEL)

SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking Stephen Sims, James Lyne . . . . . . . . . . . . . . . . . . . . . .Location:

Manatee Spring II (LOBBY LEVEL)Bootcamp Hours: 5:15pm - 7:00pm (Course days 1-5)

SEC760: Advanced Exploit Development for Penetration Testers Jake Williams . . . . . . . . . . . . . Location: Rock Spring (LOBBY LEVEL) Bootcamp Hours: 5:15pm - 7:00pm (Course days 1-5)

FOR500: Windows Forensic Analysis Chad Tilbury . . . . Location: Regency Ballroom T (CONVENTION LEVEL)

FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting Rob Lee . . . . . . . .Location: Regency Ballroom U (CONVENTION LEVEL)

FOR518: Mac and iOS Forensic Analysis and Incident Response Sarah Edwards . . . . . . . Location: Celebration 16 (CONVENTION LEVEL)

FOR526: Memory Forensics In-Depth Alissa Torres . . . . . . . . . . . Location: Peacock Spring (LOBBY LEVEL)

FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response Philip Hagen . . . . . . . . . .Location: Celebration 4 (CONVENTION LEVEL)

FOR578: Cyber Threat Intelligence Peter Szczepankiewicz Location: Windermere Y (CONVENTION LEVEL)

FOR585: Advanced Smartphone Forensics Heather Mahalik . . . . . . . . .Location: Regency S (CONVENTION LEVEL)

FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques Lenny Zeltser . . . . . . . . . Location: Celebration 5 (CONVENTION LEVEL)

MGT414: SANS Training Program for CISSP® Certification Eric Conrad . . . . . . . . . . . . . . . . . .Location: Bayhill 21 (LOBBY LEVEL) Bootcamp Hours: 8:00am - 9:00am (Course days 2-6) & 5:00pm - 7:00pm (Course days 1-5)

MGT512: SANS Security Leadership Essentials for Managers with Knowledge Compression™ Ted Demopoulos . . . . . . . . . Location: Bayhill 29/30 (LOBBY LEVEL) Extended Hours: 5:00pm - 6:00pm (Course days 1-4)

MGT514: IT Security Strategic Planning, Policy, and Leadership Frank Kim . . . . . . . . . . . . . . . .Location: Bayhill 31/32 (LOBBY LEVEL)

START DATE: Tuesday, April 3, 2018 Time: 9:00am - 5:00pm (Unless otherwise noted)

SEC301: Introduction to Cyber Security Keith Palmgren . . . . . . . Location: Windermere Z (CONVENTION LEVEL)

SEC401: Security Essentials Bootcamp Style Bryce Galbraith . Location: Regency Ballroom V (CONVENTION LEVEL) Bootcamp Hours: 5:00pm - 7:00pm (Course days 1-5)

SEC501: Advanced Security Essentials - Enterprise Defender Paul A. Henry . . . . . . . . . Location: Celebration 1 (CONVENTION LEVEL) Extended Hours: 5:00pm - 7:00pm (Course day 1)

SEC503: Intrusion Detection In-Depth David Hoelzer . . . . . . Location: Celebration 9/10 (CONVENTION LEVEL) Bootcamp Hours: 5:00pm - 7:00pm (Course days 1-5)

SEC504: Hacker Tools, Techniques, Exploits & Incident Handling John Strand . . . . . . . . . .Location: Windermere W (CONVENTION LEVEL) Extended Hours: 5:00pm - 7:15pm (Course day 1)

SEC505: Securing Windows and PowerShell Automation Jason Fossen . . . . . . . . . .Location: Celebration 6 (CONVENTION LEVEL)

SEC506: Securing Linux/Unix Hal Pomeranz . . . . . . . . . Location: Blue Spring I (CONVENTION LEVEL)

SEC511: Continuous Monitoring and Security Operations Bryan Simon . . . . . . Location: Celebration 14/15 (CONVENTION LEVEL)Bootcamp Hours: 5:15pm - 7:00pm (Course days 1-5)

SEC542: Web App Penetration Testing and Ethical Hacking Seth Misenar . . . . . . . . . . . . Location: Bayhill 23/24 (LOBBY LEVEL)

SEC545: Cloud Security Architecture and Operations Dave Shackleford . . . . . . . . . . Location: Bayhill 17/18 (LOBBY LEVEL)

SEC555: SIEM with Tactical Analytics Justin Henderson . . . . . . . . . . . . Location: Bayhill 22 (LOBBY LEVEL)Bootcamp Hours: 5:15pm - 7:00pm (Course days 1-5)

SEC560: Network Penetration Testing and Ethical Hacking Ed Skoudis . . . . . . . . . . Location: Windermere X (CONVENTION LEVEL) Extended Hours: 5:00pm - 7:15pm (Course day 1) Extended hours will be led by Michael Murr in the SEC504 classroom located in River

SEC561: Immersive Hands-on Hacking Techniquesh Tim Medin . . . . . . . . . . . . . . . . . . Location: Bayhill 33 (LOBBY LEVEL)

SEC566: Implementing and Auditing the Critical Security Controls – In-Depth James Tarala . . . . . . Location: Celebration 12/13 (CONVENTION LEVEL)

SEC573: Automating Information Security with Python Mark Baggett . . . . . . . . . . . . Location: Bayhill 25/26 (LOBBY LEVEL)

SEC575: Mobile Device Security and Ethical Hacking Joshua Wright . . . . . . . . . . . . . . . .Location: Bayhill 27 (LOBBY LEVEL)

4 SANS 2018 | Orlando, FL | April 3-10, 2018 SANS 2018 | Orlando, FL | April 3-10, 2018 5

C O U R S E S C H E D U L E

Page 5: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

MGT517: Managing Security Operations: Detection, Response, and Intelligence Christopher Crowley . . . . . . . . . Location: Bayhill 28 (LOBBY LEVEL)

MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep Jeff Frisk . . . . . . . . . . . . . . . . . .Location: Bayhill 19/20 (LOBBY LEVEL)

DEV540: Secure DevOps and Cloud Application Security Eric Johnson . . . . . . . . . . . . Location: Barrel Spring I (LOBBY LEVEL)

DEV544: Secure Coding in .NET: Developing Defensible Applications Aaron Cure . . . . . . . . . . . Location: Celebration 3 (CONVENTION LEVEL)

AUD507: Auditing & Monitoring Networks, Perimeters, and Systems Clay Risenhoover . . . . . . Location: Celebration 2 (CONVENTION LEVEL)

LEG523: Law of Data Security and Investigations Benjamin Wright . . . . . . . .Location: Barrel Spring II (LOBBY LEVEL)

HOSTED: Physical Security Specialist – Full Comprehensive Edition The CORE Group . . . . . . .Location: Blue Spring II (CONVENTION LEVEL)

START DATE: Monday, April 9, 2018 Time: 9:00am - 5:00pm (Unless otherwise noted)

SEC440: Critical Security Controls: Planning, Implementing, and Auditing Russell Eubanks . . . . . . Location: Celebration 11 (CONVENTION LEVEL)

SEC455: SIEM Design & Implementation Justin Henderson . . . . . Location: Celebration 16 (CONVENTION LEVEL)

SEC524: Cloud Security Fundamentals Dave Shackleford . . . . . . . . . Location: Bayhill 29/30 (LOBBY LEVEL)

SEC564: Red Team Operations and Threat Emulation Joe Vest . . . . . . . . . . . . . . . . . . . . .Location: Bayhill 27 (LOBBY LEVEL)

SEC567: Social Engineering for Penetration Testers Micah Hoffman . . . . . . . . . . . . . . Location: Bayhill 28 (LOBBY LEVEL)

SEC580: Metasploit Kung Fu for Enterprise Pen Testing Bryce Galbraith . . . . . . Location: Manatee Spring II (LOBBY LEVEL)

MGT415: A Practical Introduction to Cyber Security Risk Management James Tarala . . . . . . . . . . . . . Location: Bayhill 29/30 (LOBBY LEVEL)

MGT433: SANS Security Awareness: How to Build, Maintain, and Measure a Mature Awareness Program Lance Spitzner . . . . . . . . . Location: Coral Spring I/II (LOBBY LEVEL)

DEV531: Defending Mobile Applications Security Essentials Gregory Leonard . . . . . . Location: Blue Spring I (CONVENTION LEVEL)

6 SANS 2018 | Orlando, FL | April 3-10, 2018

C O U R S E S C H E D U L E

Add a GIAC Certification with your SANS training at

SANS 2018 and

SAVE $370!In the information security industry, certification

matters. GIAC Certifications offer skills-based certifications that go beyond high-level theory and test true hands-on and pragmatic skill sets that are highly regarded in the InfoSec industry.

Pay just $729 when you bundle your certification attempt with your SANS training

course during SANS 2018 for a savings of $370! After this event is over, the alumni bundle price

goes to $1,099.

Stop by the Registration Support Desk or via your Portal Account

www.sans.org/account/login?url=history to add your GIAC certification attempt

before the last day of class for the discount.

Find out more about GIAC at www.giac.org or call 301-654-7267. 7

Page 6: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

SANS 2018 | Orlando, FL | April 3-10, 2018 98 SANS 2018 | Orlando, FL | April 3-10, 2018

B O N U S S E S S I O N S

Enrich your SANS experience!Morning and evening talks given by our faculty and selected subject matter experts help you broaden your knowledge, get

the most for your training dollar, and hear from the voices that matter in network and computer security.

M O N D A Y , A P R I L 2

S P E C I A L E V E N T

SANS 2018 Welcome ReceptionMon, April 2 | 5:00pm - 7:00pm

Location: Orlando Ballroom Foyer (CONVENTION LEVEL)Kick off your SANS 2018 experience at the SANS 2018 Welcome Reception taking place in the Orlando Ballroom Foyer. Be part of this premier event and join the industry’s most powerful gathering of cybersecurity professionals. Share stories, make connections and learn how to make the most of your week in Orlando. Come join your colleagues for a fun, relaxing evening.

T U E S D A Y , A P R I L 3

S P E C I A L E V E N T

General Session – Welcome to SANSSpeaker: Bryan Simon

Tue, April 3 | 8:00am - 8:30am | Location: Regency S (CONVENTION LEVEL)

Join us for a 30-minute overview to help you get the most out of your SANS training experience. You will receive event information and learn about programs and resources offered by SANS. This brief session will answer many questions and get your training experience off to a great start. This session will be valuable to all attendees but is highly recommended for first time attendees.

K E Y N O T E

Threat Hunting via Windows Event LogsSpeaker: Eric Conrad

Tue, April 3 | 7:15pm - 9:15pm | Location: Regency S (CONVENTION LEVEL)Windows event logs continue to be the best source to centrally hunt malice in a Windows environment. Virtually all malware may be detected via event logs after making small tweaks to the logging configuration. Recent malware attacks leverage “fileless malware,” typically using PowerShell for post exploitation. Why? No EXE for antivirus or HIPS to squash, nothing saved to the filesystem, sites that use application whitelisting allow PowerShell, and little to no default logging. We will discuss DeepBlueCLI, an open-source Powershell

framework for threat hunting via Windows Event Logs (including the latest PowerShell-fueled post exploitation). DeepBlueCLI will go toe-to-toe with the latest attacks; this talk will explore the evidence malware leaves behind, leveraging Windows command line auditing (now natively available in Windows 7+) and PowerShell logging. We will also discuss DeepWhite, an open-source detective application whitelisting framework that relies on Microsoft Sysinternal’s Sysmon and supports auto-submission of EXE, DLL and driver hashes via a free Virustotal Community API key.

W E D N E S D A Y , A P R I L 4

L U N C H & L E A R N

How to Become a SANS InstructorSpeaker: Eric Conrad

Wed, April 4 | 12:30pm - 1:15pm | Location: Bayhill 23/24 (CONVENTION LEVEL) Have you ever wondered what it takes to become a SANS instructor? How does your SANS instructor rise to the top and demonstrate the talents to become part of the SANS faculty? Attend this session and learn how to become part of the faculty and learn the steps to make that goal a reality. A certified SANS instructor will share their experiences and show you how to become part of the SANS top-rated instructor team.This presentation is free of charge, but space is limited to the first 40 registrations. Please register by clicking on the link below. There will also be a bulletin board on site for lunch and learn sign ups.

S P E C I A L E V E N T

GIAC Information ReceptionSpeaker: Je� Frisk

Wed, April 4 | 6:30pm - 7:30pm | Location: Windermere X (CONVENTION LEVEL) As the leading provider and developer of Information Security Certifications, GIAC tests and validates the ability of practitioners in cyber defense, pen testing, forensics, software security, management, and ICS. GIAC certification holders are recognized as experts in the IT industry and are sought after globally by government, military, and industry to protect the cyber environment. Join us for an informational presentation along with a Q&A session. We’ll cover everything from why you should get certified, what testing looks like, how to keep certifications current and more. GIAC Certifications staff will be present to answer your questions before and after the presentation.

S P E C I A L E V E N T

APAC Student Reception at SANS 2018Wed, April 4 | 7:15pm - 8:15pm | Location: Windermere W (CONVENTION LEVEL)

The SANS APAC Student Reception is an informal event to give APAC students the opportunity to meet up with some of your SANS APAC team, SANS instructors, and other students from the APAC region.

Page 7: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

B O N U S S E S S I O N S

10 SANS 2018 | Orlando, FL | April 3-10, 2018 SANS 2018 | Orlando, FL | April 3-10, 2018 11

S A N S @ N I G H T

Stuck in the Box, a SIEM’s TaleSpeaker: Justin Henderson

Wed, April 4 | 7:15pm - 8:15pm | Location: Regency S (CONVENTION LEVEL)Organizations often spend excessive amounts of money on SIEM products only to end up with a log collection box when they thought they purchased a tactical detection system. Most organizations find themselves with a SIEM but unsure how to use its capabilities. Point solutions are quick to defend deficiencies by stating that each environment is different, so you, the customer, must tell them what you want the SIEM to do, then they’ll help with professional services or replace your current SIEM with something “better and more advanced.” This is complete hogwash. Organizations tend to have a lot of overlap in the use of Windows systems or network protocols such as DNS. As such there are high-fidelity detects that can be implemented in every organization. Enough is enough. If you are looking for techniques and methods to get value out of your current SIEM or are interested in seeing how a new, open-source big data solution, such as the Elastic Stack (formerly ELK), can most likely beat what you have today, then this talk is for you. It is time to think outside the box. Come find out how one organization spent 14 months deploying a top Magic Quadrant SIEM solution to have it beaten by ELK in two weeks.

S A N S @ N I G H T

Infosec Rock Star: Geek Will Only Get You So FarSpeaker: Ted Demopoulos

Wed, April 4 | 7:15pm - 8:15pm | Location: Regency T (CONVENTION LEVEL) Some of us are so effective and well known that the term “Rock Star” is entirely accurate. What kind of skills do Rock Stars have and wannabe Rock Stars need to develop? Although we personally may never be swamped by groupies, we can learn the skills to be more effective, well respected, and well paid. Obviously it’s not just about technology; in fact most of us are very good at the technology part. The fact is that increasing our skills on the social and business side will make most of us more effective at what we do, rather than learning how to read hex better while standing on our heads, becoming “One with Metasploit,” or understanding the latest hot technologies.

S A N S @ N I G H T

Hacking Dumberly, Just Like the Bad GuysSpeakers: Tim Medin and Derek Banks

Wed, April 4 | 7:15pm - 8:15pm | Location: Regency V (CONVENTION LEVEL) Tim Medin and Derek Banks will discuss the dumbest red team tricks and hacks we’ve encoutered over the years. We are going to take the A out of APT, because so few attackers really need to use advanced techniques. We’ll also discuss the simiple defenses that make an attacker’s life much more difficult.

S A N S @ N I G H T

Malware Vaccination: Its Potential and LimitationsSpeaker: Lenny Zeltser

Wed, April 4 | 7:15pm - 8:15pm | Location: Regency U (CONVENTION LEVEL) Some malicious software is designed to avoid infecting the system more than once by looking for predefined infection markers. Incident responders can vaccinate endpoints against such malware families by distributing the corresponding markers. The vaccines can take the form of specific registry keys, file names, mutex objects, and so on. Enterprises already know to treat such artifacts as indicators of compromise (IOCs). Vaccination entails using some IOCs to not only detect, but also prevent infections. This session will examine the potential for and limitations of malware vaccination and will explore several malware samples that could be controlled using this technique.

S A N S @ N I G H T

SIEM Field GuideSpeaker: Peter Szczepankiewicz

Wed, April 4 | 7:15pm - 8:15pm | Location: Windermere Z (CONVENTION LEVEL) Come join our lively discussion on real life incidents that I have detected through the use of several Security Information and Event Managers (SIEMs) over the past 15 years. Generally, Chief Information Security Officers (CISO’s) use a SIEM as an instrument in the Security Operations Center (SOC). The main purpose is to find a live incident and pass it on to the Incident Handlers. We’ll discuss some of the technical use cases that have born fruit. Lately, the SIEM has been used for more than discovery, but also for detective work. Cyber Threat Intelligence analysts are able to glean a lot of information from the Incident Response (IR) team as well as the SOC. We’ll discuss the use of several different models, such as instrumentation into the SIEM, to the Pyramid of Pain, to the Kill Chain and Diamond Model. The focus of this talk is on security operations, but we’ll discuss some architectural strategies that always place you squarely in control over your SIEM.

S A N S @ N I G H T

So, You Wanna be a Pentester?Speaker: Adrien de Beaupre

Wed, April 4 | 8:15pm - 9:15pm | Location: Regency S (CONVENTION LEVEL) This presentation will discuss the things that you will actually need to become a penetration tester. Be prepared for a no-fluff honest discussion. You will need attitude, aptitude, initiative, desire, dedication, discipline, integrity, ethics, experience, knowledge, and tools.

S A N S @ N I G H T

Let’s Go Hunting Bad GuysSpeaker: John Strand

Wed, April 4 | 8:15pm - 9:15pm | Location: Regency T (CONVENTION LEVEL) In this presentation, John will share custom free tools with you to hunt bad guys inside and outside of your network – with awesomeness and math. But mostly math.

Page 8: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

12 SANS 2018 | Orlando, FL | April 3-10, 2018 SANS 2018 | Orlando, FL | April 3-10, 2018 13

B O N U S S E S S I O N S

S A N S @ N I G H T

Secure DevOps: A Puma’s TailSpeaker: Aaron Cure

Wed, April 4 | 8:15pm - 9:15pm | Location: Regency U (CONVENTION LEVEL) DevOps is changing the way that organizations design, build, deploy, and operate online systems. Engineering teams are making hundreds or even thousands of changes per day, and traditional approaches to security are struggling to keep up. Security must be reinvented in a DevOps world to take advantage of the opportunities provided by continuous integration and delivery pipelines. In this talk, we start with a case study of an organization trying to leverage the power of Continuous Integration (CI) and Continuous Delivery (CD) to improve its security posture. After identifying the key security checkpoints in the pre-commit, commit, acceptance, and deployment lifecycle phases, we will explore how unit testing and static analysis fit into SecDevOps. Live demonstrations will show how to identify vulnerabilities inside the Visual Studio development environment before they are committed to source control, and how to enforce security unit tests and static analysis in a Jenkins CI build pipeline. Attendees will walk away with a better understanding of how security fits into DevOps and an open-source .NET static analysis engine to help secure their organization’s applications.

S T I M A S T E R ’ S P R E S E N T A T I O N

Container Centric Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for

Container Based EnvironmentsSpeaker: Alfredo Hickman

Wed, April 4 | 8:15pm - 8:55pm | Location: Regency V (CONVENTION LEVEL) This presentation is on practical research that empirically and comparatively assesses the efficacy of typical types of intrusion detection and analysis methods applicable to Linux application-container environments. This presentation will look at Cyber Kill Chain®-based attack-and-analysis experiments that were conducted to provide realistic scenarios that can assist security professionals in conceptualizing, developing, and operating more effective intrusion detection and analysis methods in Linux application container environments.

T H U R S D A Y , A P R I L 5

S P E C I A L E V E N T

Coffee and Donuts with the Graduate StudentsThu, April 5 | 7:30am - 9:00am | Location: Regency Rotunda (CONVENTION LEVEL)

Get the inside scoop on what it’s like to pursue a graduate degree in cybersecurity from SANS from like-minded information security professionals currently enrolled in the SANS graduate programs. SANS’ regionally accredited graduate program, the SANS Technology Institute, combines SANS technical training and certifications, with

leadership and management curriculum specifically designed for the unique needs of aspiring leaders. Find out how the class you’re taking this week may be applied towards a master’s degree or graduate certificate program. Visit www.sans.edu for complete information on curriculum, admissions, and funding options.

S A N S @ N I G H T

An Evening of Hacking the Internet of Things (IoT)Speakers: James Lyne, Stephen Sims, Jim Shewmaker, and Guests

Thu, April 5 | 7:15pm - 10:00pm | Location: Windermere X (CONVENTION LEVEL) Join James, Jim, and Steve in this “limited-seating” SANS special event. Somewhere along the line product developers thought it would be a good idea to connect things like pet food dispensers, BBQ grills, refrigerators, and many other “ items” to the Internet. What could possibly go wrong? We will have a collection of “things” for you to try and find vulnerabilities in. If you find something interesting you may even be able to take the item home! We’ll walk through an introduction of how to extract and analyze firmware, and the types of bugs that are most commonly found, along with some examples.So how do you gain entry? We will have a limited number of passes available. There will be a few instructors from whom you can get a pass. The list of these instructors and locations will be announced at the event. What do you need to bring? A laptop with VMware Player, Workstation, or Fusion. We will provide you with a Linux virtual machine to use for analysis.

S A N S @ N I G H T

Defeating Advanced Adversaries: Dismantling their Attacks One Step at a Time

Speaker: Erik Van Buggenhout Thu, April 5 | 7:15pm - 8:15pm | Location: Regency T (CONVENTION LEVEL)

Cyber threats are on the rise: ransomware is affecting small, medium and large enterprises alike, while state-sponsored adversaries are attempting to obtain access to your most precious crown jewels. Is it all doom and gloom? No! Defense is doable (though not always easy)! During this hands-on talk, we will run through a typical “advanced attack” using a kill chain approach. We will highlight, implement and demonstrate security controls that can help you detect, fool and ultimately defeat advanced adversaries.

S A N S @ N I G H T

The 14 Absolute Truths of SecuritySpeaker: Keith Palmgren

Thu, April 5 | 7:15pm - 8:15pm | Location: Regency S (CONVENTION LEVEL) Keith Palmgren has identified 14 absolute truths of security—things that remain true regardless of circumstance, network topology, organizational type, or any other variable. Recognizing these 14 absolute truths and how they affect a security program can lead to the success of that program. Failing to recognize these truths will spell almost certain doom. Here we will take a non-technical look at each of the 14 absolute truths in turn, examine what they mean to the security manager, what they mean to the security posture, and how understanding them will lead to a successful security program.

Page 9: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

All students who register for a 4-, 5-, or 6-day course will be eligible to play NetWars for FREE. Space is limited. Please visit the Registration Support desk to register today.

Hosted by Jeff McJunkin Fri, Apr 6 & Sat, Apr 7 6:30pm - 9:30pm Location: Windermere X (CONVENTION LEVEL)

Hosted by Eric Conrad & Seth Misenar Fri, Apr 6 & Sat, Apr 7 7:15pm - 10:15pm Location: Windermere Z (CONVENTION LEVEL)

Hosted by Rob Lee & Chad Tilbury Fri, Apr 6 & Sat, Apr 7 6:30pm - 9:30pm Location: Windermere Y (CONVENTION LEVEL)

14 SANS 2018 | Orlando, FL | April 3-10, 2018 SANS 2018 | Orlando, FL | April 3-10, 2018 15

B O N U S S E S S I O N S

S A N S @ N I G H T

Responding to the European Union’s New General Data Protection Regulation

Speaker: Ben Wright Thu, April 5 | 7:15pm - 8:15pm | Location: Regency U (CONVENTION LEVEL)

The European Union has long been a leader in privacy law. It now advances the law with a sweeping new regulation, which applies to a broad range of companies around the world, even those that do not have a physical presence in Europe. We will discuss how to manage risk under this regulation.

S T I M A S T E R ’ S P R E S E N T A T I O N

The State of Honeypots: Understanding the Use of Honey Technologies Today

Speaker: Andrea Dominguez Thu, April 5 | 7:15pm - 7:55pm | Location: Regency V (CONVENTION LEVEL)

In this presentation, Andrea will be presenting the results of his research on the use of honeypots and other deception technologies with the “honey” prefix. The aim of this study was to fill in the gaps in data on the real-world use of these technologies. The goal was also to better understand information security professionals’ views and attitudes towards them. While there is a wealth of academic research in cutting-edge honey technologies, there is a dearth of data related to the practical use of these technologies outside of research laboratories. The data for this research was collected via a survey which was distributed to information security professionals. He will share details about the design of the survey, its distribution, analysis of the results, insights, lessons learned, and finally end with future research that should follow.

S A N S @ N I G H T

Cyber-Bullying and Sexting Protocols in our Schools with Appropriate Consequences

Speaker: Detective Richard Wistocki (Ret.) Thu, April 5 | 8:15pm - 9:15pm | Location: Regency V (CONVENTION LEVEL)

This will be an hour overview of the eight-hour class for school administrators, SRO’s, and law enforcement. This is a MUST for IT and cybersecurity school personnel to bring back to their school districts. We will show you the benefits of why it is important for schools to learn how to prepare a case and capture important digital evidence when a student discloses cyber bullying and/or sexting. The school’s partnership with law enforcement will then lead to a simple three-step process in investigating Internet crime. We teach faculty and law enforcement how to empower students as a team and not dismiss them and what they are reporting. We will then learn what the appropriate consequences should be and institute such consequences in a Restorative Justice/Diversion Program known as JuvenileJusticeOnline.org. We cannot arrest our way out of this epidemic.

S A N S @ N I G H T

The Seven Deadly Sins of Incident ResponseSpeaker: Jake Williams

Thu, April 5 | 8:15pm - 9:15pm | Location: Regency S (CONVENTION LEVEL) In this session, Jake will walk you through the seven deadly sins of incident response. Incident response is not for the faint of heart and it’s far easier to get wrong than it is to get right. Jake’s been in the trenches working incident response with a huge number of clients on cases ranging in size from a few credit card records to one case where hundreds of millions of dollars were at stake. You’ll take away some valuable lessons to help prevent an incident response catastrophe that you can’t walk back.

S T I M A S T E R ’ S P R E S E N T A T I O N

Leverage Risk-Focused Teams to Strengthen Resilience Against Cyber Risk

Speaker: David Bishop Thu, April 5 | 8:15pm - 8:55pm | Location: Regency U (CONVENTION LEVEL)

Information security, risk management, audit and business continuity teams must continue to evolve to combat the growing cyber risks impacting business operations. Each team has standards and frameworks, but they often donât speak the same language or understand how each group intersects in protecting the organization. This research identifies opportunities to reduce resource duplication and integrate information security and risk-focused teams to strengthen the organizationâs resilience against cyber risks.

Page 10: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

16 SANS 2018 | Orlando, FL | April 3-10, 2018 SANS 2018 | Orlando, FL | April 3-10, 2018 17

B O N U S S E S S I O N S V E N D O R E V E N T S

S A N S @ N I G H T

Three Keys for SecDevOps SuccessSpeaker: Frank Kim

Thu, April 5 | 8:15pm - 9:15pm | Location: Regency T (CONVENTION LEVEL) Learn three things that security teams can do to get to “yes” with DevOps teams that are striving to move at an even more rapid pace. Traditional application security practices can’t keep up with the speed of modern development organizations. Hear how you can start to make a difference for your organization.

S A T U R D A Y , A P R I L 7

S A N S @ N I G H T

Speaking to the Board on CybersecuritySpeaker: Lance Spitzner

Sat, April 7 | 7:15pm - 8:15pm | Location: Regency S (CONVENTION LEVEL) Time and time again we understand the need for leadership support on cybersecurity. However it can be challenging communicating to senior leaders, especially Board members, in their terms. How do you translate the technical world of cyber into concise business terms? Who is a Board member, how do they think and what do they want to know? Learn how senior leaders think and operate, what their priorities are, and how you can effectively engage them. Make your security program a success by gaining the support you need.

S A N S @ N I G H T

Securing Your KidsSpeaker: Lance Spitzner

Sat, April 7 | 8:15pm - 9:15pm | Location: Regency S (CONVENTION LEVEL) Technology is an amazing tool. It allows our kids to access a tremendous amount of information, meet new people, and communicate with friends around the world. In addition, for them to be successful in the 21st century they have to know and understand how to leverage these new tools. However, with all these capabilities come a variety of new risks, risks that as parents you may not understand or even be aware of. In this one-hour presentation we cover the top three risks to kids online and the top steps you can take to protect them.

Vendor Solutions ExpoThu, April 5 | 12:00pm - 1:30pm | 5:30pm - 7:30pm

Location: Regency Rotunda (CONVENTION LEVEL)All attendees are invited to meet with established and emerging solution providers as they reveal the latest tools and technologies critical to information security. The SANS Vendor Expo showcases product offerings from key technology providers in the commercial tools and services market. Vendors arrive prepared to interact with a technically savvy audience. You’ll find demonstrations and product showcases that feature all the best that the security industry has to offer!

Vendor-Sponsored Lunch SessionThu, April 5 | 12:00pm-1:30pm

Location: Regency Rotunda (CONVENTION LEVEL)Sign up at the SANS vendor table to receive a ticket for a free lunch brought to you by sponsoring vendors. Please note, by accepting a lunch ticket your badge will be scanned and your contact information shared with the sponsoring vendors. Join these sponsoring vendors and others on the expo floor for an introduction to leading solutions and services that showcase the leading options in information security. Take time to browse the expo floor and get introduced to providers and their solutions that align with the security challenges being discussed in class.

Luncheon sponsors are:

Vendor-Sponsored Lunch & LearnsSince SANS course material is product neutral, these presentations provide the opportunity to evaluate vendor tools in an interactive environment to increase your effectiveness, productivity, and knowledge gained from the conference. These sessions feature a light meal or refreshments provided by the sponsor. Sign-Up Sheets for the events below are located on the are located at the Vendor Registration Desk.

L U N C H A N D L E A R N

Unmasking the Fog: Improving Situational AwarenessSpeaker: Brian Roy, Sr. Sales Engineer

Wed, April 4 | 12:30pm - 1:15pm | Location: Regency S (CONVENTION LEVEL) Situational awareness is a key factor in good threat intelligence. There is no such thing as perfect intelligence, as humans need to make decisions with incomplete data. The session will discuss how your organization can improve its situational awareness with a few techniques to include the aid of people, process and technology.

LogRhythm Qualys

Anomali Terbium Labs

MobileIron F5 Networks

Sophos Rapid7

ExtraHop Demisto

Awake Security Corelight

Cylance Garrison

Technology, Ltd.TripwireRisk IQ

Page 11: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

V E N D O R E V E N T S

L U N C H A N D L E A R N

Identity Awareness: Do We Have It? Do We Need It?Speaker: Nathan McKay, Security Solutions Engineer

Wed, April 4 | 12:30pm - 1:15pm | Location: Celebration 9/10 (CONVENTION LEVEL) With the millions upon millions of identities, passwords, and accounts compromised every year, it is safe to say that we don’t – at least not all of us do, and not in practice in the real world. We’ll discuss what constitutes “ identity” today, and how it is used out in the wild. What does it mean to be able to identify someone and why does it actually matter? How has technology allowed us to make better use of identity and how has it failed us? We will also challenge some current assumptions about identity and discuss how the rapid rise of technologies such blockchain can impact or augment the idea of verifiable identity.

L U N C H A N D L E A R N

Navigating the Dark Web: A Case Study in Fraud and Risk Exposure

Speaker: Tyler Carbone, Chief Product O¡cer Wed, April 4 | 12:30pm - 1:15pm | Location: Regency T (CONVENTION LEVEL)

Terbium Labs and its customer, Baxter Credit Union (BCU), will discuss the problem of establishing a risk baseline as a medium size enterprise, and the necessity of ongoing visibility into exposure of payment card, financial, and personal data which may leak to, or be for sale, on the dark web. In this session, BCU will walk through its initial pain points and reasons for seeking a dark web data provider.

L U N C H A N D L E A R N

The Next Evolution of Protection: Introduction to Deep Learning

Speaker: Brandon Carden, Enterprise Sales Engineer Wed, April 4 | 12:30pm - 1:15pm | Location: Regency U (CONVENTION LEVEL)

Sophos has over 30 years of experience in creating an effective defense against ever-changing threats. One constant truth is that there is no silver bullet in security, solutions need to evolve to adapt the ever changing threat landscape. In this presentation we review the latest trends, and how implementing the best Deep Learning techniques can combat these threats.

L U N C H A N D L E A R N

The New Cyber Security EcosystemSpeaker: Laura Seletos, Technical Account Manager, Post-Sales

Wed, April 4 | 12:30pm - 1:15pm | Location: Regency V (CONVENTION LEVEL) Digital transformation is allowing companies to rapidly disrupt markets with new products and services that leverage cloud, mobile and IoT technology. This talk looks at the expanding ecosystem of cybersecurity products that help companies focus on evolving their security strategy along with business to accommodate common challenges this introduces.

L U N C H A N D L E A R N

Today’s Mobility and Cloud Cybersecurity MissionSpeaker: Loay Oweis, Federal Mobility Specialist

Fri, April 6 | 12:30pm - 1:15pm | Location: Regency U (CONVENTION LEVEL) The world today is evolving with burgeoning technology and business transformations. We can login to any user endpoint from a mobile device to a laptop, and have the same applications and content at our disposal to complete the daily tasks from anywhere. This is the experience we are growing accustomed to and are learning to expect to become ubiquitous from the workplace to the home place. Technology vendors are striving to standardize what once was innovation to become an expectation.

L U N C H A N D L E A R N

ICS Down...it’s go time!Speaker: Jason DelyTechnical Director, ICS and Critical Infrastructure

Fri, April 6 | 12:30pm - 1:15pm | Location: Regency V (CONVENTION LEVEL) For years, we have read about security risks to companies that produce what we need that help run our society. Time and money have been spent, precautions have been taken and protections are in place. The moment of truth has now arrived to put security investments to the test. Yet, there’s direct evidence we’re not ready to defend and respond. Where have we gone wrong? Did we prepare for the right attacks? Have we admired threats yet ignored our ability to respond and recover? Direct from the battlefield, let’s examine where we are and how ready we are for a fight.

L U N C H A N D L E A R N

Fri, April 6 | 12:30pm - 1:15pm | Location: Regency T (CONVENTION LEVEL)

18 SANS 2018 | Orlando, FL | April 3-10, 2018 SANS 2018 | Orlando, FL | April 3-10, 2018 19

Page 12: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

H O T E L F L O O R P L A N S

20 SANS 2018 | Orlando, FL | April 3-10, 2018 SANS 2018 | Orlando, FL | April 3-10, 2018 21

LOBBY LEVEL

MGT525

DEV540

SEC617

LEG523

SEC660 SEC760

SEC599

SEC545

MGT414

SEC555

SEC542

MGT517

MGT512

MGT514

SEC561

SEC573 SEC575

SEC564

SEC567

SEC524

MGT433

MGT433

SEC580

CONVENTION LEVELEvent Check-In

Registration Support (APR 3-9)

Registration Support (APR 10)

Internet Café

SEC401

SEC503

SEC642SEC440

SEC455FOR518

SEC566

SEC511

SEC301

SEC501AUD507

DEV540

FOR572

FOR610SEC505

SEC506HOSTEDDEV531

DFIR NetWars

Core NetWars

Cyber Defense NetWars

Vendor Solutions Expo

Page 13: Guide3 SANS2018 - content.sans.org · MGT414: SANS Training Program for CISSP® Certification Eric Conrad..... .Location: Bayhill 21 ˜LOBBY LEVEL Bootcamp Hours: 8:00am - 9:00am

Save the Date

and

Join us again

in 2019!

SANS 2019Orlando, Florida

April 1-6