SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

In-Person
In-Person
This keynote will explore the high-stakes intersection of geopolitics and critical infrastructure protection in an era where cyber conflict is no longer an occasional event, but a constant state of global competition. Participants will hear how nation-states leverage "low and slow" stealth tactics to pre-position themselves within vital networks—such as energy, water, and transportation—transforming essential services into instruments of geopolitical leverage.
In-Person
Industrial environments are not being compromised by deployed AI models, but by uncontrolled AI use by engineers, analysts, and vendors interacting with OT data. This session presents a real world case study where shadow AI introduced new risks to safety, availability, and integrity in an ICS adjacent environment.
In-Person
In-Person
Network segmentation is a core requirement of a defensible ICS architecture, yet many OT networks remain flat or rely on segmentation approaches that are difficult to deploy and sustain. This session focuses on SANS Critical Control 2 (Defensible Architecture) and Critical Control 3 (ICS Network Visibility and Monitoring), presenting a practical crawl, walk, run approach to segmentation in industrial environments.
In-Person
Many industrial architectures never move beyond diagrams, often dismissed as too complex, too expensive, or too risky for production environments. This session explores the practical, iterative deployment of the Purdue Model in brownfield factories,
In-Person
This talk will focus on introducing a novel idea on Consequence-driven Cyber-informed Engineering championed by Idaho National Labs in USA.
In-Person
In-Person
We built command-and-control over DNP3. Then we realized we'd solved the wrong problem.
In-Person
Defenders of industrial control systems are often focused to respond late in the attack lifecycle, after adversaries have already reached sensitive operational environments. This session presents findings from Palo Alto Networks’ OT Threat Research Lab based on large-scale analysis of 2023/2024/2025 security telemetry collected from more than 61,000 firewalls inspecting industrial application traffic.
In-Person
Industrial Control Systems rarely fail because of “advanced hackers.” They fail because governance, engineering, and security do not meet where real work happens.
In-Person
MITRE recently hosted the Critical Infrastructure Cybersecurity Tabletop Exercise (CICS TTX), bringing together approximately 200 participants from 70 organizations—including federal, state, and local governments, emergency managers, and industry representatives from pipelines, electricity, IT, communications, and rail—across five metropolitan areas.
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
This presentation pulls back the curtain on how a protocol meant to simplify industrial data can instead become a powerful weapon in the wrong hands.
In-Person
In-Person
The first 72 hours after an OT-ICS incident are dominated by operational constraints: safety, uptime, vendor dependencies, and limited maintenance windows.
In-Person
Much like MITRE ATT&CK has done for collating attacker methods, D3FEND was built to fundamentally describe the assets and subsequent countermeasures vital for defense.
In-Person
Over the last several years, the SANS State of ICS/OT Security surveys show a consistent pattern: detection and containment timelines are improving, but remediation/recovery remains the long pole—sometimes stretching into weeks or longer.
In-Person
In-Person
AI is the latest craze that makes the world go round, and to satisfy the demand we are witnessing a desperate gold rush of compute. This has transformed data centers from boring server farms into the critical infrastructure of the modern era, diverting supply chains and packing as much compute to feed the LLM machine.
In-Person
As businesses accelerate AI adoption, the demand for real-time OT data is skyrocketing. This creates a unique challenge: how do we enable AI-driven insights without compromising operational integrity or cybersecurity?
In-Person
Based on my experience supporting and later leading an OT cybersecurity program, this talk explores the evolution from a NIST Cybersecurity Framework–aligned strategy to a more operations-driven approach built on the SANS Five Critical Controls for OT Cybersecurity.
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
Modern security teams are overwhelmed—drowning in alerts, disconnected tools, and reactive “fire drill” responses. Cyber Fusion Centers (CFCs) offer a path out of this chaos,
In-Person
Speaker: Steven Green
As industrial environments become more connected, OT security must evolve without disrupting safety, reliability, or uptime.
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person
In-Person & Virtual
In-Person
In-Person
In-Person
Registration: All students who register for a 4–6 day course will be eligible to play NetWars for free. Registration for this event will be through your SANS Account Dashboard the week of the event.
About ICS NetWars: Focused on factory machinery operations, this experience brings players onto the factory floor, exposing them to the challenges of detecting and defending physical equipment and manufacturing components from cyberattacks.
In-Person & Virtual
Registration: All students who register for a 4–6 day course will be eligible to play NetWars for free. Registration for this event will be through your SANS Account Dashboard the week of the event.
About ICS NetWars: Focused on factory machinery operations, this experience brings players onto the factory floor, exposing them to the challenges of detecting and defending physical equipment and manufacturing components from cyberattacks.
In-Person & Virtual