SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsMany practitioners attempt to apply traditional endpoint forensics concepts directly to the cloud, but this approach quickly falls short.

On the November 2025 episode of the SANS Stay Ahead of Ransomware livestream, special guest Megan Roddie-Fonseca joined host Mari DeGrazia and guest host Eric Taylor to discuss how ransomware and cyber extortion operations are manifesting in the cloud.
One of the most significant challenges organizations face when performing digital forensics in the cloud is the fundamental mindset shift required. Many practitioners attempt to apply traditional endpoint forensics concepts directly to the cloud, but this approach quickly falls short. When it comes down to it, cloud forensics focuses less on traditional methods and more on log analysis.
The cloud fundamentally changes how we approach investigations. Unlike traditional forensics, where we have direct access to systems and artifacts, in the cloud we work with the visibility and tools provided by various cloud providers. This requires understanding that different cloud providers (e.g., AWS, Microsoft Azure, Google Cloud) each have their own terminology, tools, and logging capabilities that investigators must master.
Throughout the discussion, I emphasized that understanding cloud-based logging is absolutely critical to the success of cloud-based incident response. Unfortunately, many organizations discover far too late that essential logs weren't enabled or that log retention wasn’t configured for long enough. Based on her experience teaching SANS FOR509, most incident responders come into the course not knowing what their organization is actually logging in their cloud environments, let alone for how long those logs are stored.
Key cloud-based logging considerations include:
Cloud ransomware and cyber extortion have evolved significantly in recent years. While early attacks were primarily data theft and extortion, threat actors have now developed sophisticated techniques for encryption-based attacks in cloud environments.
Current attack techniques include:
The primary entry point for cloud-based ransomware and cyber extortion remains Identity and Access Management (IAM), with leaked long-term access keys and over-permissioned roles being common vulnerabilities. Initial Access Brokers (IABs) are also active in cloud environments, gaining access and then eventually selling access to multiple threat actors simultaneously.
Based on my experience, the following essential steps organizations should take to prepare for cloud-based incident response:
The cloud security landscape evolves rapidly, and staying current is essential. Whether it involves attending conferences, reading technical blogs and newsletters, or taking courses, it's important to stay educated when it comes to the cloud. Don't wait for an incident to start learning – even examining sample CloudTrail or Azure Activity logs and exploring cloud admin portals can provide valuable familiarity.
For those interested in deepening their cloud forensics expertise, FOR509: Enterprise Cloud Forensics and Incident Response provides instructor-led training and hands-on labs that teach how to run investigations across AWS, Azure, and Google Cloud.
As organizations continue their cloud journey, the intersection of traditional forensics knowledge and cloud-specific expertise becomes increasingly valuable. While the tools and artifacts may differ, the investigative mindset and problem-solving skills remain fundamental. The key is adapting these skills to the unique challenges and opportunities the cloud presents.
To learn more, watch the November 2025 episode of the SANS Stay Ahead of Ransomware livestream. You can also review the SANS Stay Ahead of Ransomware livestream playlist on YouTube.
Join us on the first Tuesday of each month at 1:00 PM Eastern | 10:00 AM Pacific to take part in the SANS Stay Ahead of Ransomware show.
To learn more about preventing, detecting, and responding to ransomware, check out SANS FOR528: Ransomware and Cyber Extortion.


Megan is a Senior Security Engineer at Datadog, SANS DFIR faculty, and co-author of FOR509. She holds two master’s degrees, serves as CFO of Mental Health Hackers, and is a strong advocate for hands-on cloud forensics training and mental wellness.
Read more about Megan Roddie-Fonseca