SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Whether you're a Cybersecurity pro or just curious about the intersection of physical and digital security, this session is your gateway into the world of *locksport*—the art of lockpicking for learning and awareness.
In this interactive presentation, Jerome will walk you through:
You'll learn not just the "how," but the "why of informed consent, permission, and awareness are important in physical bypass. Most attendees successfully open their first lock in under 30 minutes. Will you be one of them?
Android may be an open platform, but from a forensic perspective, it’s anything but uniform. Each manufacturer adds its own layer of customization—altering system partitions, changing logging behavior, introducing proprietary apps, and modifying how data is stored and secured.
This session explores the forensic implications of these variations through practical case studies on devices from Google (Pixel), Samsung, Xiaomi, and Oppo. Attendees will learn which artifacts remain consistent across Android environments, which differ dramatically, and how to adapt acquisition analysis strategies to each ecosystem.
By the end, you’ll understand why every Android flavour truly is different—and why forensic examiners can’t rely on a one-size-fits-all approach.
As the cyber threat landscape continues to evolve, the past year has presented unique challenges and opportunities for cyber threat intelligence professionals.
For 2025, availability has become a critical focus within the CIA triad, with ransomware and service outages high on the agenda, and network defenders and CTI analysts acutely aware of the impact of large-scale network disruptions. Additionally, AI remains a double-edged sword, with both adversarial and beneficial applications advancing rapidly.