SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Android may be an open platform, but from a forensic perspective, it’s anything but uniform. Each manufacturer adds its own layer of customization—altering system partitions, changing logging behavior, introducing proprietary apps, and modifying how data is stored and secured.
This session explores the forensic implications of these variations through practical case studies on devices from Google (Pixel), Samsung, Xiaomi, and Oppo. Attendees will learn which artifacts remain consistent across Android environments, which differ dramatically, and how to adapt acquisition analysis strategies to each ecosystem.
By the end, you’ll understand why every Android flavour truly is different—and why forensic examiners can’t rely on a one-size-fits-all approach.
As the cyber threat landscape continues to evolve, the past year has presented unique challenges and opportunities for cyber threat intelligence professionals.
For 2025, availability has become a critical focus within the CIA triad, with ransomware and service outages high on the agenda, and network defenders and CTI analysts acutely aware of the impact of large-scale network disruptions. Additionally, AI remains a double-edged sword, with both adversarial and beneficial applications advancing rapidly.