SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
It started with a phone call that seemed completely ordinary. “Hello, Mrs. Patel? This is Michael from your bank’s fraud department. We’ve noticed unusual activity on your account. Did you recently make a $1,200 purchase at an electronics store?” Mrs. Patel’s heart skipped. She hadn’t bought anything like that.
To make things more convincing, “Michael” confirmed her home address and her birth date—information she assumed only her bank would know. He explained that to reverse the charge she would need to verify her identity by providing her credit card details and bank login and password. Feeling anxious, she did as he asked. The caller thanked her and assured her the issue would be fixed, but a few hours later, Mrs. Patel could no longer access her bank account. Then she started getting notifications of thousands of dollars being transferred overseas from her account.
What Mrs. Patel did not realize was that the scammer had obtained her personal information from a previous data breach and used it to sound credible. Everything about the call was fake. She had just been scammed.
In today’s connected world, privacy has become one of the hardest things to protect. Every time we shop online, stream a movie, use a credit card, drive on the highway, or use a mobile app, our information is being collected, analyzed, and shared. In addition, much of our personal data may be a matter of public record, stored in government voter registration databases, tax records or data on home purchases. Even something as simple as walking in a parking lot can involve being recorded by security cameras in most modern cars.
Regardless of who is collecting the information or why, the result is the same: A massive amount of personal information is stored in databases around the world, which is data you have no control over. And once that data exists, it can be stolen, sold, shared or misused. Achieving true privacy is nearly impossible.
Attackers often use all of this accessible information about you to make their scams more believable. For example:
The truth is, having personal information about you doesn’t make someone trustworthy, it only makes them more convincing. Always treat unexpected messages, calls, and emails with skepticism, no matter how much the sender seems to “know” about you or how urgent the message feels. Always feel comfortable hanging up and calling the institution on a trusted phone number that you know to be legitimate.
Since you can’t protect all your information, the next best line of defense is early detection. Monitoring your financial accounts gives you a critical advantage: You can catch suspicious activity before it causes real damage. The faster you notice a fraudulent charge, the easier it is to reverse it and prevent further losses. Here are simple steps anyone can take:
In today’s world, perfect privacy is no longer achievable. Always remember that just because someone knows information about you does not make them legitimate. You don’t need to be a cybersecurity expert to stay safe: just stay alert, ask questions, and keep watch over your accounts.


Dr. Litany Lineberry, Secretary of the WiCyS Education and Training Affiliate, holds a Ph.D. in Engineering with a Cybersecurity focus.
Learn more