SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

The rise of fragmented, cross-platform extremist ecosystems requires OSINT practitioners to blend traditional tradecraft with AI-accelerated workflows. This presentation demonstrates how human expertise and Generative AI can work together to rapidly surface, triage, and contextualize violent-ideology content originating from any online source.
It’s 7pm, I’m on a train in Venice, and suddenly the phone rings – it’s my boss.
‘A client of ours operates in Equatorial Guinea. They’ve just heard that the president has been assassinated and that Russian-backed mercenaries are attempting to overthrow the state. They need to know if there’s any truth to this before they repatriate all of their staff. Given the situation, this needs to be done as quickly as possible.'
'No pressure or anything.'
Open Source Intelligence (OSINT) is often viewed as a checklist of tools, platforms, and steps—but true methodology is far more deliberate.
This presentation redefines OSINT methodology through the targeting cycle, showing how clear objectives and structured analysis lead to real-world impact.
What begins as a casual research project for an unrelated blog post turns into a life-saving investigation. While exploring a dark web forum, I came across a disturbing post from someone asking for advice on kidnapping people and selling their organs.
In this talk, I’ll walk through how an ordinary OSINT inquiry escalated into identifying a real person operating under an anonymous identity, and how that information was passed on and ultimately led to an arrest in another country.
The rapid adoption of AI has created a powerful new class of OSINT-ready data sources: exposed private LLM conversations and, secondarily, leaked system prompts. Over the past year, users and organizations have inadvertently exposed millions of private ChatGPT-style conversations through public share links, misconfigured integrations, browser extensions, API logs, and app-side vulnerabilities.
As OSINT practitioners, we often find ourselves on the hunt for that key piece of information critical to our intelligence requirements. Looking for that proverbial needle in the massive haystack that is the internet. Specialized search engine queries using Boolean logic or sifting through a collection of reliable sources can be used to accomplish this, but what if there was another way?
As open-source information grows more powerful, and more weaponized, adversaries are increasingly using OSINT to map, target, and exploit critical U.S. technologies and research programs.
This presentation exposes how nation-state collectors, foreign intelligence services, and corporate competitors leverage open sources to identify vulnerabilities across the defense and emerging-tech landscape.
Many law enforcement agencies do not have budgets for advanced tools, but access to the Microsoft Office software suite is almost universal.
This session will present practical tips for how to use the common programs of Excel and PowerPoint in OSINT investigations, with Excel being used primarily for data clarity and PowerPoint for story clarity.
This talk will discuss how to conduct video-forward OSINT investigations from start to finish. Covering all aspects of the video investigation lifecycle, from content acquisition and preservation, to video analysis and presenting the findings.