Talk With an Expert

Fear the Dark: Preventing Lack of Data in Digital Forensic Incident Response

White Paper

Author: Heather Barnhart, SANS Fellow and Head of Faculty

Heather explores how gaps in forensic artifacts and logging create “dark periods” that blind defenders during critical incidents. Drawing lessons from high-profile cases and recent breaches, this research provides essential guidance for achieving forensic readiness and ensuring visibility.

Join the RSAC™ Membership for free to access this white paper and other exclusive content.

(This link will take you to our partner site, RSAC.)

Eye

Explore more on this topic

From Asymmetry to Parity: Building a Safe Harbor for AI-Driven Cyber Defense

White Paper

Author: Rob T. Lee, SANS Chief of Research and Chief AI Officer

Examine how privacy and AI laws constrain defenders, and why creating a cybersecurity safe harbor is essential to keep pace with adversaries.

Join the RSAC™ Membership for free to access this white paper and other exclusive content.

(This link will take you to our partner site, RSAC.)

Big Eye

Explore more on this topic

Authorization Sprawl: The Vulnerability Reshaping Modern Attacks

White Paper

Author: Joshua Wright, SANS Fellow

Understand how attackers exploit identity sprawl across SSO, tokens, and SaaS to evade detection, and what defenders can do to regain visibility and control.

Join the RSAC™ Membership for free to access this white paper and other exclusive content.

(This link will take you to our partner site, RSAC.)

Hand

Explore more on this topic

ICS Ransomware and Attacks: Extortion and Sabotage in Critical Infrastructure

White Paper

Author: Tim Conway, SANS Fellow  From production outages to targeted sabotage, Tim Conway examines how criminal and nation-state actors exploit ICS vulnerabilities to create cascading consequences for critical infrastructure. 

Release Date: November 3

Pen and Screen

Join the Experts Live

Join us on November 13 for the exclusive launch of the Most Dangerous New Attack Techniques eBook and a live webcast with the RSAC keynote experts. We’ll connect the dots across four emerging threat domains, from forensics blind spots to AI regulations, authorization sprawl, and destructive ICS threats— and break down what they mean for today’s security leaders.

Reserve Your Spot

Access all these reports, connect with peers, and get more exclusive insights—join the RSAC™ Community.

Become a Member!