SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsSince late 2022, CISA has conducted more than 4,300 pre-ransomware notifications, potentially preventing an estimated $9 billion in economic damage.
On August’s SANS Stay Ahead of Ransomware livestream, we hosted Dave Stern from CISA to discuss the agency’s Pre-Ransomware Notification initiative. This program represents a critical evolution in defending against ransomware attacks, shifting from reactive response to proactive prevention through community collaboration and rapid notification.
Dave Stern, who has been with CISA for over a decade, working primarily with state-level governments, shared impressive metrics about the initiative's impact. Since late 2022, CISA has conducted more than 4,300 pre-ransomware notifications, potentially preventing an estimated $9 billion in economic damage. The initiative leverages information from security researchers and industry partners who identify early-stage ransomware activity.
What makes this program particularly effective is its speed. CISA can notify potential victims in less than an hour, and most notifications happen the same day the intelligence is received. This rapid response is important, as modern ransomware operators can achieve domain admin control in as little as eight or nine minutes after initial access.
During our discussion, Dave outlined the primary attack vectors CISA observes in their notifications:
These observations align with what we teach in FOR528: ransomware actors predominantly exploit known vulnerabilities rather than zero-days. Dave emphasized that CISA's free vulnerability scanning service flags vulnerabilities known to be exploited in ransomware attacks, providing prioritization guidance for overwhelmed security teams.
We also covered why security researchers voluntarily share intelligence with CISA. Dave highlighted several key factors:
This collaborative approach extends internationally; CISA has sent notifications to over 60 national CERTs concerning affected entities in their jurisdictions.
We also discussed real-world challenges CISA faces when notifying potential victims. Some organizations are skeptical, thinking the outreach might be a scam. Dave noted this often reflects the maturity level of an organization's security program—specifically, whether it can quickly internalize and act on external threat intelligence.
Dave shared several practical tips:
Throughout our conversation, we emphasized strategies to make the ransomware business model unsustainable. Beyond CISA's official stance of not recommending payment (noting that there's no guarantee of data recovery or deletion even after paying), Dave stressed the importance of sharing anonymized feedback with CISA. This information doesn't just help the government—it's "crowdsourced" to help protect future potential victims.
To learn more, watch the August 2025 episode of the SANS Stay Ahead of Ransomware livestream.
You can also review the SANS Stay Ahead of Ransomware livestream playlist on YouTube.
Join us next month on the first Tuesday at 1:00 PM Eastern for our next livestream, and check out upcoming SANS training events, including FOR528: Ransomware and Cyber Extortion, where we dive into the technical details of preventing, detecting, and responding to these attacks.
Mari DeGrazia loves the satisfaction of solving a good puzzle. That fascination paired with her technical abilities has made digital forensics the perfect career fit. She has 20 years of experience in the IT industry, including 10 years in DFIR.
Read more about Mari DeGrazia