SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

As businesses grow more intertwined, threats tend to focus on vulnerable points, suchas external partners and supply networks. Whether it's tampered software patches or illicit intrusion into vendors' systems, malevolent actors manipulate trust and interconnections to achieve widespread access.
In October, an innocuous-looking exchange on a well-known underground forum caught the attention of only a handful of seasoned threat watchers.
Within weeks, that conversation evolved into something far more dangerous—a fully operational ransomware group calling itself HELLCAT.
Large Language Models (LLMs) are rapidly being embedded into enterprise workflows. By 2025, 67% of organizations worldwide have adopted LLMs to support their operations, yet few defenders recognize them as a potential attack surface.
How do Advanced Persistent Teenagers (APTEENS) pose a risk to enterprises and the defenders who protect them? This session explores how APTEENS have become a dominant threat in 2025, with groups like Scattered Spider turning intrusions into multi-domain crises that demand coordination across Incident Response, Legal, Executive, Communications, and Threat Intelligence teams.
For months, Check Point Research has tracked Nimbus Manticore, a threat group whose tactics and targets align with Iran’s IRGC, also known as UNC1549 or Smoke Sandstorm. Its focus – Strategic. Its hallmark – Human first deception. Targets receive convincing job offers via personalised HR emails, each containing a unique link to a fake career portal. Every credential is custom issued, allowing attackers to track victims individually.
Evasion techniques are among the most damaging tactics malware can employ, yet recent advances in both attacks and defenses have not been widely covered.
While some samples rely on popular and easy to defeat tricks copy-pasted from open-source GitHub projects, others reveal the hand of highly skilled developers who demonstrate deep insights of operating system internals and nearly push the techniques into an art form.
Drones are recognised now as a disruptive battlefield technology, particularly in the context of the war in Ukraine. Attacks in the Middle East and ambiguous incidents over critical infrastructure in Europe add to this narrative. Meanwhile the available counter-drone defences have either been absent or suffer from being point-solutions to particular problems. Detection is difficult, mitigation is hazardous and determining attribution often impossible. These are all familiar issues to practitioners of cyber security.
The war in Ukraine has become a proving ground for cyber warfare, proxy attacks, and international digital defense collaboration. This session examines the lessons learned about coalition-based cyber defense, scalable policy responses, and how global partnerships can rapidly adapt to evolving threats in a high-stakes conflict zone.
Since early 2023, a Chinese APT group tracked as CL-STA-0049 has been running an intricate campaign against government, defense, telecom, education, and aviation targets across Southeast Asia and South America.
This operation showcases exceptional tradecraft: Multi-stage attacks, stealthy evasion, and a backdoor unlike any we’ve seen before.
At its core lies “Squidoor”, a cross-platform backdoor with 10 distinct C2 channels—including rare techniques like abusing Outlook for command-and-control.
Russia-based threat actors remain a top concern for organizations across North America and Europe. In this session, PwC will share 2025 case studies on groups such as Blue Python (Turla), Blue Echidna (Sandworm), and Blue Dev 17 (Void Blizzard), exploring their tactics, tools, and infrastructure.
We stand at the dawn of a new security paradigm where autonomous systems on both sides of the battlefield are changing the dynamics of attack and defense. Drawing on recent Google Threat Intelligence findings, this session reveals how nation-state actors and cybercriminals are already weaponizing AI while showcasing how defensive AI agents can create self-improving security systems.
Learn how the constraints of cost, latency, and efficacy are shaping this machine-vs-machine future, and discover how autonomous agents and domain-specific languages enable a continuous feedback loop to rapidly strengthen defenses.
*Sponsored by Sublime Security
Proofpoint Threat Research has uncovered a striking trend: State-sponsored actors increasingly adopting the tools and tactics of cybercriminals. Tactics once used by criminals for profit are now showing up in espionage attacks. Across both emerging and established threat groups, we are seeing criminal techniques such as social engineering tricks, abuse of cloud services, and rapid vulnerability exploitation, all repurposed for intelligence gathering.
That promising Senior Software Engineer applicant with a Minion avatar on GitHub? They might just be a North Korean IT Worker.
Active since at least 2018, these operatives—Tracked as PurpleDelta—have targeted organizations across every sector, from government and finance to aerospace, e-commerce, and crypto.
Artificial Intelligence is transforming the cybersecurity landscape, promising faster threat detection, streamlined incident response, and predictive defense. But behind these advancements lies an urgent challenge: AI is not just augmenting cybersecurity work—it’s automating it. And in doing so, it threatens to displace the very skilled workers it was meant to empower.
Cyber conflict no longer stops at the battlefield. Civilians are increasingly caught in the crossfire. This keynote explores the humanitarian consequences of cyberattacks, from hospital outages to critical service disruption, and highlights the role of international cooperation and ethics in reducing harm to society.