SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals



Ismael is a Senior SANS Instructor and Arctic Wolf VP. Author of SEC530 and a prestigious GSE-certified expert, he blends decades of SOC, threat research, and community contributions to equip defenders with resilient, adversary-aware strategies.
Virtual
The rise of AI-driven attacks —like the recent Anthropic-generated multi-stage attack—shows AI-orchestrated attacks at every stage. Bad actors are now using AI to execute recon, gain lateral movement, and achieve privilege escalation at machine speed using massive parallelism. This reality forces a new approach to threat hunting, challenging CTI assumptions as AI agents adapt rapidly and bypass traditional controls. This session will demonstrate how deception technology delivers high-fidelity, intent-based signals to disrupt AI-driven kill chains. We will detail the Anthropic attack case study and demonstrate how deception-based detection provides CTI teams with repeatable, high-context intelligence on AI-enabled threats.
You will learn how to:
*Sponsored by Zscaler
Virtual
Join Eric Clay, CMO and Research Team Co-Lead at Flare, for a straightforward walkthrough of the cybercrime underground. This session breaks down the structure of dark web forums, marketplaces, and closed communities, explaining what they are, how they function, and why they matter to defenders. The session will conclude with a live demo of Flare, illustrating how organizations can monitor these underground spaces to identify threats and exposures earlier.
*Sponsored by Flare
Virtual
CTI based Agentic AI is changing the face of the SOC operations. This talk will dive into a case study of how a Managed Security Services Provider is leveraging Agentic AI for scaling out analyst’s operations and dramatically improving mean-time-to-detection (MTTD). The following Agentic AI driven SOC use cases will be discussed: Alert Triage True / False Positive Validation True Positive Alert Prioritization IOC Harvesting and AI Driven Detection Engineering Participants will learn about the target use cases, the impacts on real world operations, the training data used, and key requirements for success.
*Sponsored by ReversingLabs
Virtual
Virtual
Manual analysis creates critical bottlenecks. Join Global Solutions Architect Rob Lowe to witness how Google Threat Intelligence’s Agentic capabilities compress days of research into a workflow that takes minutes. Rob will demonstrate transforming a single IOC into a comprehensive hunting methodology.
In this session, learn to:
Automate Context:
Instantly correlate raw IOCs with threat actors and campaigns.
Generate Code:
Build production-ready YARA, YARA-L, and Sigma rules automatically.
Map Frameworks:
Extract tactical behaviors directly to MITRE ATT&CK without manual effort.
Register now to operationalize defense and multiply your team's speed.
*Sponsored by Google Cloud
Virtual
In the broader geopolitical landscape of Central Asia, Hydra Saiga - also known as Yorotrooper - has emerged as a persistent predator. With at least 34 organizations compromised across 8 countries, this state-sponsored actor has moved beyond simple intrusions to master the art of long-term persistence within water and energy infrastructure. This session dives into the specific telemetry CTI professionals need to track Hydra Saiga’s tradecraft. We will move past high-level attribution to dissect their post-exploitation behavior, focusing on: Custom & Commodity Blends: How they weaponize experimental commodity malware alongside bespoke tools to complicate detection and attribution. Infrastructure & Evasion: A breakdown of their C2 architecture and the specific techniques used to bypass defenses. Strategic Targeting: Why their consistent focus on the Water and Energy verticals serves as a digital mirror to Central Asian geopolitical interests.
Join us as we bridge the gap between regional signal and global threat intelligence, emphasizing the critical importance of greater threat research focus on less-covered regions.
*Sponsored by VMRay
Virtual
Virtual
Virtual
Virtual