SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsTraditionally, vendor intelligence requirements programs either result in a prioritized list that is too specific, making it difficult to address all stakeholder needs, or too broad, overextending teams and resulting in shallow coverage. These programs are also generally difficult to integrate into established workflows, leading to less impact and lower value for the consumers of intelligence products.
This talk will use real-world case studies and lessons learned to explore why traditional methods are unsuitable when trying to navigate the complex needs of multiple disparate stakeholders. It will introduce a practical alternative: a prioritization matrix that we will release to the community alongside the talk. This matrix is tailored to the fast-moving, multi-vertical nature of CTI operations and designed to increase value for stakeholders while enhancing operational agility.


Alex is the Senior Manager of the Intelligence Team at Red Canary. She has worked in the threat intelligence field for seventeen years.
Read more about Alex Berninger













