SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe value of Priority Intelligence Requirements (PIRs) is well-known in CTI, yet many teams, including ours, struggle to translate these high-level concepts into tangible, day-to-day actions of Security Operations, and Cyber Defense activities.
This presentation offers a direct, no-fluff walkthrough of how to transform PIRs from a strategic document into an **engine for proactive cyber defense**. It moves beyond theory, providing a practical, step-by-step guide to operationalizing PIRs.
This talk will equip attendees with the immediate, actionable methodology required to transform strategic Priority Intelligence Requirements (PIRs) from a document into an engine for proactive cyber defense. Participants will leave prepared to integrate intelligence directly into their detection rules, threat hunts, and red team exercises, thereby ensuring a truly threat-informed security posture.


Ondra Rojcik is a Principal Cyber Threat Intelligence Analyst at Red Hat's CTI team, where he provides intelligence analysis and strategic perspective to the program and its analytical outputs.
Read more about Ondra Rojcik

Keith has 10 years of IT experience, and previous security experience in Incident Response, Vulnerability Management, and Compliance in private sector and federal contracting roles.
Read more about Keith Swagler













