SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Virtual
According to Gartner, by 2028 over 95% of enterprises will have used Generative AI APIs or models, or deployed GenAI-enabled applications in production. In the meantime, security leaders face a rapidly evolving threat landscape, rising expectations, and the challenge of balancing innovation with risk management.
Join Elad Schulman’s session to learn how to navigate this fast-moving AI security landscape. We will present a transformative approach using next-generation Agentic Purple Teaming solutions, combining Red Teaming and Blue Teaming for AI.
Key Takeaways: See a live demo showcasing how to identify and remediate vulnerabilities across agentic and generative AI environments. Experience Lasso’s Purple Teaming in action, closing security gaps across agentic and generative AI. Learn strategies to proactively secure AI agents, enforce compliance, and turn complex AI risks into a fully managed defense.
*Sponsored by Lasso Security
Virtual
Artificial Intelligence has taken the cybersecurity community by storm, fundamentally changing how we think about both threats and defenses. Malicious actors are leveraging AI with increasingly devastating results, yet we still lack a consistent, secure playbook for defending against them using these same powerful tools. Join this presentation as we cover strategies and perspectives on AI and the long-term implications for security teams.
*Sponsored by DefectDojo
Virtual
AI is fundamentally changing how applications are built, but this shift introduces new security challenges such as identity blind spots and hidden user consent. Okta has worked with leading industry partners to develop a new open extension to OAuth, named Cross App Access (XAA), to directly address these AI security risks.
This session will provide an overview of XAA, a proposed standard currently under review, and its value in accelerating AI adoption.
Specific Takeaways:
What attendees will walk away with:
*Sponsored by Okta
Virtual
Virtual
Vibe coding with AI tools like Cursor is changing how software gets written: natural language in, working code out. But with that speed comes real risk. AI models are trained on massive public repos that often lack secure patterns, and they generate more code than ever before, frequently bypassing the security standards your team worked hard to define. Semgrep’s Model Context Protocol (MCP) server brings security into the loop. It gives your team a seat at the table, right alongside the developer and their AI copilot, by delivering real-time feedback as code is generated. That means you can scale your security coverage without needing to grow your AppSec team one-to-one with engineering. AI moves fast, and now security can too.
*Sponsored by Semgrep
Virtual
As organizations increasingly deploy AI agents to automate and augment human workflows, security, compliance, and operational challenges arise. AI agents and non-human identities (NHIs) and are fast becoming a dominant part of the identity landscape and its most significant blind spot—outnumbering human identities by orders of magnitude.
Yet, many IAM programs remain under-prepared for these dynamic, and autonomous identities.
In this session, we’ll explore how to:
*Sponsored by Astrix Security
Virtual
Security teams are under pressure to do more with less—AI features too often show up as a "black box" or as add-ons practitioners can't trust.
In this session, you'll see how Elastic Security takes a different approach: AI that is built-in, transparent, and designed to help with the work you do every day. We'll dive into practical use cases where predefined agents already accelerate tasks like triage, enrichment, and guided response, and preview what's coming next in Elastic's agentic roadmap.
*Sponsored by Elastic
Virtual
Virtual
AI is set to redefine offensive security, but it's critical to separate marketing hype from operational reality. Join this pragmatic briefing to cut through the hype of agentic AI pentesting to examine what today’s technology can actually deliver, from automating triage of findings to augmenting human testers, and explore how to balance these new AI-driven methods with traditional expert-led approaches.
You’ll learn how to:
*Sponsored by Cobalt
Virtual
Security teams drown in threat intelligence, yet manually translating this data into actionable tests to validate defenses is slow and inconsistent, leaving critical gaps.
This session introduces an AI-driven engine that automates adversary emulation, converting unstructured intel from CISA alerts to research blogs into ATT&CK-mapped attack scenarios in minutes.
Attendees will leave with a practical roadmap to implement this workflow, shifting their teams from reactive defense to a proactive, evidence-based security posture.
*Sponsored by Picus Security
Virtual
Virtual
As organizations rapidly deploy AI agents, understanding the unique attack surface they create is critical for security leaders.
This session examines the ForcedLeak vulnerability (CVSS 9.4) discovered in Salesforce Agentforce, demonstrating how attackers can leverage content security policy weaknesses, indirect prompt injection, and human-AI interaction patterns to extract and exfiltrate sensitive enterprise data.
Drawing from Noma Security research, CISO Diana Kelley will walk through the complete attack chain and reveal practical lessons about the four critical security boundaries that failed. Attendees will gain actionable guidance for secu ring agentic AI and understanding the expanded threat landscape that autonomous AI agents introduce to enterprise environments.
*Sponsored by Noma Security
Virtual
Virtual