SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Android may be an open platform, but from a forensic perspective, it’s anything but uniform. Each manufacturer adds its own layer of customization—altering system partitions, changing logging behavior, introducing proprietary apps, and modifying how data is stored and secured.
This session explores the forensic implications of these variations through practical case studies on devices from Google (Pixel), Samsung, Xiaomi, and Oppo. Attendees will learn which artifacts remain consistent across Android environments, which differ dramatically, and how to adapt acquisition analysis strategies to each ecosystem.
By the end, you’ll understand why every Android flavour truly is different—and why forensic examiners can’t rely on a one-size-fits-all approach.
Balancing the scales between safeguarding information assets and enabling business growth demands not just technical acumen but a strategic mindset. "Cybersecurity Without the Chaos: A Step-by-Step Roadmap" is a presentation tailored to demystify the complexities of cybersecurity risk management, offering actionable insights and practical strategies for CISOs and cybersecurity leaders.
In this presentation, James Tarala, Senior Faculty at the SANS Institute and Managing Partner at Cyverity, will delve into the core principles of effective cyber risk management, emphasizing the necessity of making informed decisions when allocating limited resources among good, better, and best safeguards.
Attendees will gain a deeper understanding of how to assess their organization's current cybersecurity posture, identify gaps against their target state, and develop targeted plans to advance their cybersecurity maturity. Drawing upon the structured pathway provided by the Cybersecurity Risk Foundation (CRF) Governance and Risk Model (GRM), this webcast provides a roadmap for navigating the challenges of cybersecurity enhancement. It emphasizes a systematic approach to improving defenses, ensuring resilience against evolving threats, and embedding cybersecurity as a cornerstone of operational and strategic planning.
Join us to learn how to turn the theoretical aspects of cybersecurity into a repeatable, annual cycle that aligns with your organization's strategic goals and operational needs.
Whether you're looking to refine your organization's cybersecurity strategy or seeking practical tips on managing cyber risks more effectively, this webcast is designed to equip you with the knowledge and tools necessary to elevate your organization's cybersecurity posture. Perfect for CISOs, cybersecurity leaders, and anyone involved in managing cybersecurity practices, "Cybersecurity Without the Chaos: A Step-by-Step Roadmap" is your guide to understanding and implementing a robust cyber risk management program.