SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsLogs are foundational to nearly all DFIR engagements, yet reliably extracting logs from sources such as network appliances, SaaS applications, and cloud environments can be challenging. When standard UI-based exports fail, due to volume restrictions, technical limitations, or undocumented interfaces, investigators must turn to APIs for programmatic log collection. This session will share practical tips for API-driven log extraction, including a detailed real-life case study involving extraction from an undocumented API of a proprietary client application. Additionally, we will discuss real-life cases where log data was discovered to be incomplete during collection and highlight the impact this could have had on investigative outcomes. This presentation will also introduce an open-source log-analysis tool designed to assist DFIR professionals in quickly identifying potential issues in collected logs. The tool helps quickly highlight suspicious patterns, such as unexpected time gaps, duplicate events, suspiciously rounded event counts, JSON formatting errors, or indicators of potential redactions. Incorporating this tool into investigative workflows helps examiners proactively recognize potential data-quality concerns, supporting more informed decisions in high-stakes investigations.
Colin Meek is a Consultant in Aon’s Stroz Friedberg Digital Forensics and Incident Response practice, where he has led and contributed to high-stakes investigations involving ransomware, unauthorized access, and other complex security incidents.
Read more about Colin Meek