SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsData can end up in the unlikeliest of places, even for those organizations that have developed formal data governance policies and implemented technical controls to (try to) keep data in central data stores. Especially troublesome is data stored and worked with on user endpoints—workstations, laptops, devices—such as original unstructured files or containing data extracted from structured data sources.
With this survey, SANS is seeking insight into the amount and makeup of data that exists on user endpoints versus central data stores, along with the rigor and effectiveness of policies that either restrict or support storing data on user endpoints. We are especially interested in the need for strategies organizations are using (or have used) to protect against the loss of such data, whether completely through deletion or through some unauthorized change to the original data.
Greg has over 30 years of hands-on experience in IT security and is experienced in desktop and server support, network design and implementation, application development and programming, IT service management, IT security, and information assurance.
Learn moreTodd brings more than 15 years of information security experience across various disciplines and a proven track record of building and leading security programs to CrashPlan as its Chief Information Security Officer. He leads all security aspects, including global security operations, risk and compliance, incident response, resilience, and data protection. Before CrashPlan, Todd held several senior leadership roles on the Security team at Code42 and at Target Corporation. He led many key information security and data privacy functions, including building and managing the FedRAMP authorization initiative at Code42.
Learn more