SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


We're living through the most fundamental shift in cybersecurity since the advent of the Internet itself. AI isn't replacing security practitioners (yet), but it's creating augmented adversaries who operate at unprecedented scale. A single attacker can now use AI to force multiply themself as if they were an entire team. Nation-state actors are leveraging AI to maintain fraudulent positions at Fortune 500 companies. Non-technical criminals are deploying sophisticated ransomware. The question isn't whether AI will disrupt security, it's whether you'll be the disruptor or the disrupted.
Social engineering remains one of the most effective and widely used attack vectors in modern cybersecurity operations. John McAfee once stated, “Social engineering has become 75% of an average hacker’s toolkit, and for the most successful hackers, it reaches 90% or more.” Despite its overwhelming real-world application, providing a hands-on, safe, and realistic environment to learn and test these techniques has remained elusive. Until now. Introducing Social Hacktics, a next-generation social engineering CTF that merges AI innovation with an immersive strategy to create one of the most authentic human exploitation experiences to date.
Traditionally, security monitoring assumes that SIEM technologies will be accurate and provide a comprehensive picture of network activity, but what happens when we find that the events recorded by these technologies are insufficient, and we don't have the proper telemetry?
Artificial Intelligence has taken the world by storm. From leveraging AI for cancer detection to powering the latest fully autonomous smart toaster, this technology is finding its way into every industry and every walk of life.
Technical findings alone don't drive change-risk-informed insights do. In this talk, we'll explore how red and purple team activities can evolve from isolated exercises into enterprise-level enablers that directly inform mission resilience, operational risk decisions, and business prioritization.
As attackers evolve beyond malware and implants, defenders must learn to hunt compromise that never triggers an alert.
With technologies like Credential Guard and LSA Protection becoming defaults in new versions of Windows, red teamers need to find new ways to loot credentials on compromised Windows systems, and it just so happens that one of the most practical alternatives to tradional lsass.exe dumping for passwords is looting credentials stored in web browsers
Tasks in the SOC are critical for detecting malicious activity and driving the appropriate response. However, some workflows are not optimized, resulting in SOC analysts having to conduct tasks that are highly repetitive or that involve significant manual effort. This workshop will provide a model for optimizing common tasks in the SOC, showing an evolution of manual processes to more efficient approaches then to automation to free up the analysis for high-value tasks.
The speed at which AI security products are being released is unlike anything we've seen in the past. The opportunities to weaponize this technology for offensive operations are endless!
Endpoint protection systems regularly identify credential harvesting and session hijacking attacks, but crash dumps represent an unmonitored attack surface with the potential to contain the same valuable information. Windows crash dumps routinely preserve domain credentials, browser authentication tokens, and sensitive documents from multiple applications and sessions, yet organizations rarely consider their exploitation potential. This presentation demonstrates how offline analysis of these naturally occurring artifacts can lead to intelligence extraction using chained memory analysis tools after initial acquisition without ongoing endpoint interaction or detection.
Get ready for the ultimate showdown at "Hacker Feud"—SANS' electrifying twist on Family Feud that's all about cybersecurity—offense, defense, and everything in between! Picture this: two fierce teams battling it out, buzzing in with answers to quirky topics like "Name the top vulnerability hackers exploit" or “The most annoying phishing scam tactic," all based on real surveys from 100 sharp-minded hackers and cybersecurity pros. With fast-paced rounds, hilarious wrong answers, and epic steals, this event promises non-stop laughter, brain-teasing fun, and insider insights into the cyber world. Whether you're a seasoned pro or a curious newbie, join the frenzy, cheer on your squad, and see if you can outwit the crowd. Hosted by Ed Skoudis, this event will be the highlight of your evening.
Cap off the day with an authentic Texas BBQ buffet and casual networking with fellow attendees—a true taste of Austin hospitality.
Social engineering remains one of the most effective and widely used attack vectors in modern cybersecurity operations. John McAfee once stated, “Social engineering has become 75% of an average hacker’s toolkit, and for the most successful hackers, it reaches 90% or more.” Despite its overwhelming real-world application, providing a hands-on, safe, and realistic environment to learn and test these techniques has remained elusive. Until now. Introducing Social Hacktics, a next-generation social engineering CTF that merges AI innovation with an immersive strategy to create one of the most authentic human exploitation experiences to date.
Welcome to the era of vibe coding—where AI isn’t just a tool, but a creative partner in cyber operations. This talk explores how red teamers can leverage AI to rapidly develop malware, ransomware, exploits, and other offensive tools with unprecedented speed and precision.
A NetWars Tournament is an interactive cyber range event designed to reinforce your learning through hands-on, gamified challenges. Cyber Defense NetWars is focused on preventing, analyzing, and defending against complex real-world attack scenarios, including brute-force attacks and ransomware campaigns. Compete against your peers, on a team or individually, for bragging rights and a chance to take home a NetWars challenge coin!
macOS combines a layered security model with a variety of enforcement mechanisms, including consent-based controls, code integrity validation, sandboxing, and runtime protections.
Large Language Models (LLMs) like ChatGPT, Claude and Gemini are increasingly being integrated into enterprise environments for the purposes of automation, analytics, and decision-making.
Adversarial exploitation of medical devices, robotics, and smart hospital systems has emerged as a critical challenge as healthcare environments embrace interconnected, IoT enabled equipment.
Living off the cloud attacks are on the rise. Executing rapid, cloud-native techniques to escalate privileges, move laterally between environments, and access critical assets, attackers are targeting the cloud more effectively than ever.
Virtual
The SOC of the future isn’t a glossy demo—it’s a system built to survive and thrive across complexity, scale, and human limits. This keynote challenges legacy models and lays out a pragmatic vision for SOCs that prioritize signal, resilience, and analyst experience.
Keyloggers have long been a tool of choice for both penetration testers and cybercriminals. However, traditional options, like Meterpreter, are easily flagged by antivirus solutions, while writing a custom keylogger from scratch can be cumbersome and technically demanding. But with the rise of Generative AI, that challenge has all but disappeared.
In this hands-on workshop, we'll harness the power of AI to build a fully functional keylogger from the ground up. Taking an iterative approach, we'll start with a basic keylogger before progressively refining it with quality-of-life enhancements such as output cleanup, window monitoring, timestamps, and clipboard capture.
In the evolving landscape of cybersecurity, defenders face the challenge of distinguishing malicious activities from benign ones, particularly when dealing with ambiguous techniques--those whose observables lack sufficient clarity to determine intent with certainty.
A practical look at how real-world threat intelligence is built. This session shares lessons from developing large-scale CTI and leak intelligence systems, showing how defenders can turn exposure data, telemetry, and context into faster decisions and measurable impact without losing sight of what really matters.
A live, audience-driven Q&A session with SANS Blue Team instructors covering topics in detection, response, and cyber defense. An open conversation designed to give practical insight into today’s most pressing Blue Team challenges.
Registration: All students who register for a 4–6 day course will be eligible to play NetWars for free. Registration for this event will be through your SANS Account Dashboard the week of the event.
Registration: All students who register for a 4–6 day course will be eligible to play NetWars for free. Registration for this event will be through your SANS Account Dashboard the week of the event.