SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsRed teams often rely on generic playbooks that don’t reflect how adversaries truly operate. Meanwhile, CTI produces detailed insights into campaigns and TTPs that too often go unused. This talk will show how to bridge that gap by using CTI as the “receipts” to design red team operations that emulate actual threats.
We’ll walk through practical workflows for turning CTI into adversary playbooks, highlight tools for operationalizing intelligence, and share lessons from real-world scenarios, including how intelligence on Black Basta ransomware was operationalized into a red team exercise. This case study will illustrate how threat reporting was mapped to MITRE ATT&CK, converted into testable scenarios, and used to drive realistic adversary emulation that provided value to defenders and leadership alike.
Actionable Takeaways:
- How to transform CTI reports into red team playbooks grounded in real threats
- Workflows and tools to operationalize CTI in adversary emulation
- Case study: operationalizing Black Basta intelligence into a red team exercise
- Metrics to demonstrate business and security value


A Senior Threat Intelligence Analyst with 4 years of experience operationalizing CTI to drive red team exercises, vulnerability remediation, and executive reporting.
Read more about Nigel Boston

Ralph Hittell is a dynamic and innovative offensive security expert at Grainger, where he plays a pivotal role in fortifying the company’s digital defenses through offensive means.
Read more about Ralph Hittell













