SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWhen most people think of malware analysis, what typically comes to mind are complex disassemblers and a maze of indecipherable assembly code. However, there are some great community tools that can provide actionable insights without reverse engineering.
This talk will cover how to find valuable data for Intelligence analysis without a deep dive into disassembly. Often this initial information can allow you to deepen your threat analysis picture and provide additional pivot points to run with.
If you work as an Intel analyst, you probably already do some malware analysis, but don’t realize it. And if you don’t (but would like to), we will discuss the tools and knowledge you should focus on first to effectively incorporate malware analysis into your threat intelligence workflows, without needing to memorize the Intel x86 manual.


Christina Johns is a Principal Malware Analyst at Red Canary with 15 years experience.
Read more about Christina Johns













