Secure Your Fortress: Building Robust and Resilient Defenses for 2025

Strengthen Your Cyber Defense with World-Class Expertise

Join us for SANS Secure Your Fortress: Building Robust and Resilient Defenses for 2025, where cutting-edge techniques meet hands-on practicality. Designed for cybersecurity professionals at all levels, this event equips you with the tools, strategies, and insights needed to overcome today’s toughest challenges and prepare for tomorrow’s emerging threats.

What to Expect:

  • Actionable Insights: Learn proven, practical techniques directly from SANS Cyber Defense authors and instructors. Each session is designed to provide clear, implementable takeaways to elevate your defenses.
  • Robust Strategies: Explore innovative tools and approaches to build strong, resilient defenses against the ever-evolving threat landscape.
  • Live Demonstrations: See cutting-edge tools in action with expert- led demonstrations that reveal how to integrate these technologies into your defense strategies.
  • Emerging Trends: Stay ahead of the curve with insights into 2025’s most critical developments, from advanced AI implementations to Zero Trust methodologies.
  • Expert Perspectives: Hear directly from SANS instructors and authors, whose real-world experience brings unmatched insights into modern cyber threats.

Whether you’re a seasoned practitioner or new to the field, this event is tailored to help you sharpen your skills, expand your knowledge, and strengthen your defenses.

Don’t miss your chance to master the techniques that will define cybersecurity success in 2025. Secure your spot today and join the experts shaping the future of cyber defense.

Agenda

9:00 am – Opening Remarks from John Hubbard

9:15 – 9:45 am – Modern Phishing Tactics and How to Spot Them

9:45 – 10:15 am - Hacking Flask: Mastering Command Injection Attacks Through Hands-On Exploitation and Defense

10:15 – 10:45 am - Stay Ahead of Attackers: Build a Powerful Detection Lab

10:45 – 11:00 am  - Break

11:00 – 11:30 am - Social Engineering – Evaluating Your Organization’s Risk

11:30 am – 12:00 pm - Let's create some Magic(packets)

12:00 – 12:30 pm - Fraud and Remote Workers - OSINT Solutions

12:30 – 1:00 pm – Break

1:00 – 1:30 pm - Harnessing Hardware-Based Security for Resilient Defenses in 2025

1:30 – 2:00 pm - AI-Powered BladeRunners, Part 2: Threat Intelligence Meets Zero Trust

2:00 – 2:30 pm - Threat(ening) Models

2:30 - 2:45 pm -  Break

2:45 – 3:15 pm - Building and Scaling SBOM Programs

3:15 – 3:45 pm - Exposing the Blind Spots: Mapping the Attack Surface of GenAI & LLM Applications

3:45 – 4:15 pm - Level Up! A Threat Detection and Response Walkthrough

4:15 – 4:30 pm – Break

4:30 – 5:00 pm - Agentic AI and Security

5:00 – 5:30 pm – Removing the Friction Between Us and AI

Full Agenda

9:15 – 9:45 am

John Hubbard

Modern Phishing Tactics and How to Spot Them
Phishing remains one of the most effective attack vectors, constantly evolving to bypass security measures and exploit human psychology. In this talk, Modern Phishing Tactics and How to Spot Them, we’ll methodically break down the different types of phishing attacks while analyzing the tactics attackers use to deceive their targets. By understanding these evolving techniques, cybersecurity defenders can sharpen their ability to detect and disrupt phishing attempts before they succeed. This session will provide practical insights and real-world examples to help security professionals stay ahead of attackers and protect their organizations.

9:45 – 10:15 am

Mark Baggett

Hacking Flask: Mastering Command Injection Attacks Through Hands-On Exploitation and Defense
Get ready to dive into the thrilling world of command injection attacks with a live, hands-on journey that every Infosec professional will love! In this fast-paced 25-minute talk, we’ll build a vulnerable Flask web application, expose its weaknesses, and exploit it like a seasoned attacker—executing system commands with nothing but a cleverly crafted input. But the excitement doesn’t stop there! We’ll then flip the script, dissecting the attack step-by-step and hardening the app with practical, real-world fixes you can apply immediately. Whether you’re a penetration tester, developer, or security enthusiast, this session will arm you with the skills to spot, exploit, and eliminate command injection vulnerabilities—leaving you both inspired and ready to tackle your next challenge. Bring your curiosity; leave with a hacker’s mindset and a defender’s toolkit!

10:15 – 10:45 am

Nick Mitropoulos

Stay Ahead of Attackers: Build a Powerful Detection Lab
Attackers are evolving — are your defenses keeping up? Before investing in new security tools, focus on what truly matters: visibility. The key to staying ahead is crafting effective detection rules that spot threats before it's too late. Join Nick Mitropoulos, SANS Certified Instructor and author of SEC555, for a power-packed webinar on building a detection lab—your foundation for creating, testing, and deploying high-quality detection rules. Don’t just react—anticipate. Secure your spot now!

10:45 – 11:00 am

BREAK

11:00 – 11:30 am

Sean Thomas

Social Engineering – Evaluating Your Organization’s Risk
Today's unfortunate reality is that every organization is under threat from social engineering attacks. The people in our organization are often a primary target – not because of who they are, but because of the systems those people have access to, and that attackers seek to compromise.

Understanding the various threats, and the risks they pose, is vital to being able to increase our people's awareness of them. With awareness comes a chance to better defend themselves.

This presentation will explore several social engineering attack methods, give ideas for assessing the social engineering threats your organization may face, and look at ways to increase your people's awareness of and resistance to those risks.

11:30 am – 12:00 pm

Andy Laman

Let's create some Magic(packets)
Recently, there have been several malicious campaigns that are using "magic packets" to wake listening agents to initiate reverse shells or open backdoors for skulking attackers. In this session, we are going to look at the proprieties of a couple of these packets and create them to test on our network. How do we know if our defenses are working if we don't test them? Plus, it's always fun to craft packets!

12:00 – 12:30 pm

Jeff Lomas

Fraud and Remote Workers - OSINT Solutions
Remote work and AI have brought the globe together to bring the best possible candidates and high levels of productivity to organizations without the logistical challenges of relocation. The simultaneous development of AI and remote work have also created the perfect storm for attackers to infiltrate companies using the latest advancements in AI and the TTPs seen with fraud actors using synethetic identities. Join Jeff has he explores the current threat landscape and identifies how to identify and fend off these threats by melding OSINT and security controls.

12:30 – 1:00 pm

BREAK

1:00 – 1:30 pm

Bryan Simon

Harnessing Hardware-Based Security for Resilient Defenses in 2025
As cyber threats grow increasingly sophisticated, the need for robust defenses has never been greater. In this session, we explore the critical role of hardware-based security in building a resilient cybersecurity strategy for 2025 and beyond. From Secure Boot and Trusted Platform Modules (TPMs) ensuring system integrity, to advanced hardware-based endpoint protection safeguarding sensitive data, this presentation will provide practical insights into the latest innovations for Windows and macOS. Join Bryan Simon, SANS Senior Instructor, to discover how leveraging these cutting-edge solutions can strengthen your defenses and help secure your organization’s digital fortress.

1:30 – 2:00 pm

Ismael Valenzuela

AI-Powered BladeRunners, Part 2: Threat Intelligence Meets Zero Trust
Return to the dystopian world of Tyrell Corp—where ‘more human than human’ AI meets cutting-edge cyberdefense. This session dives deeper into how ‘All Around Defenders’ can harness automation and orchestration to ‘follow the weapons’ and outsmart adversaries. Drawing on SANS Security 530 concepts, we’ll show how Large Language Models (LLMs) can map MITRE ATT&CK coverage, generate test data, and speed up threat analysis. Learn how to integrate AI-driven threat intelligence into your defenses—just like a modern-day BladeRunner.

2:00 – 2:30 pm

Ben Barnes

Threat(ening) Models
Large Language Models (LLMs) are rapidly transforming software development, offering unprecedented capabilities but also introducing novel security risks. What happens when AI is enabled in your organization and how can it be implemented securely? This talk explores the crucial role of threat modeling in securing software solutions that incorporate LLMs. We will examine the unique threat landscape posed by LLMs and how to design systems that can harness their power without needlessly increasing risk. Attendees will learn how to identify what could go wrong and what can be done about to build secure environments for powerful AI models.

2:30 – 2:45 pm

BREAK

2:45 – 3:15 pm

Tony Turner

Building and Scaling SBOM Programs
Software bill of materials (SBOM) has been a topic of conversation ever since US EO 14028 made them required in federal procurement. As we move from SBOM generation into SBOM management in pursuit of scalable risk management there are several obstacles that stand in our way. This presentation will cover the lifecycle and maturity phases for an SBOM program for suppliers, third party consultants and tool providers, and consumers of software and SBOM and how we can effectively navigate these issues. Attendees will receive a SBOM Maturity and Process Flow infographic to help understand and communicate how to develop, build, and optimize for SBOM scale.

3:15 – 3:45 pm

Seth Misenar

Exposing the Blind Spots: Mapping the Attack Surface of GenAI & LLM Applications
As organizations race to integrate GenAI and LLM applications, many remain unaware of the expanding cybersecurity and privacy risks beneath the surface. Whether deploying proprietary models, leveraging APIs, fine-tuning open architectures, or implementing RAG and agentic AI, each choice introduces unique attack vectors. In this session, SANS Fellow and Author Seth Misenar demystifies the rapidly evolving GenAI/LLM attack surface, breaking down critical security challenges across different implementation patterns. Through real-world examples and practical security strategies, attendees will learn how to identify vulnerabilities, implement effective safeguards, and maintain resilience against emerging AI threats. AI's potential is undeniable, but realizing its promise requires first understanding its risks.

3:45 – 4:15 pm

Dave Shackleford

Level Up! A Threat Detection and Response Walkthrough
Boost Your Cybersecurity Skills with a Hands-On Threat Detection & Response Walkthrough!

In today’s fast-evolving threat landscape, security operations teams need to be at the top of their game—constantly sharpening their skills to identify vulnerabilities, detect unusual behavior, and respond to threats with precision. The ability to analyze malicious activity at both the system and network levels isn’t just valuable—it’s essential.

Join Dave Shackleford, SANS Senior Instructor and co-author of SEC501, for an action-packed, deep-dive session into threat detection and response. This isn’t just theory—Dave will walk you through real-world attack scenarios, covering everything from vulnerability assessment and exploitation to malware execution, network forensics, and incident response. You’ll gain practical insights and hands-on knowledge to elevate your security expertise and stay ahead of attackers.

Don’t miss this chance to level up your detection and response skills!

4:15 – 4:30 pm

BREAK

4:30 – 5:00 pm

Dave Hoelzer

Agentic AI and Security
AI continues to have amazing applications and potential. What kinds of things are possible today? Are agents and LLMs the way forward, or are we reaching a limit? Come and see some practical applications of AI in cybersecurity today and hear about where this field is likely going. Equip yourself with the answers to the questions your organization’s leadership are asking you!

5:00 – 5:30 pm

Matt Edmondson

Removing the Friction Between Us and AI
Face it: AI is going to continue to improve with or without us. As individuals, shouldn't our focus shift to reducing the friction between ourselves and AI capabilities to be as effective and efficient with the technology as possible? In this fun, short talk, I'll demonstrate ways that I've changed how I use AI in 2025 and show some recent examples that prove AI isn't just about improving efficiency, but also adding entirely new capabilities that didn't exist three years ago.