SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe attribution of cybercrime remains one of the greatest challenges for investigators, largely due to the extensive concealment measures employed by threat actors. While much research focuses on tactics, techniques, and procedures (TTPs) used in the execution of cyberattacks, little attention has been given to the methods criminals use to hide their identities and activities. This session introduces CLOAK (Concealment Layers for Online Anonymity and Knowledge). Developed through the qualitative analysis of countless operational security guides from the clear and dark web, CLOAK catalogues more than 1,300 unique concealment TTPs spanning technical, behavioural, and physical domains. Attendees will gain new insights into the most common concealment practices, understand the limitations of current frameworks such as MITRE ATT&CK, and learn practical applications of CLOAK for intelligence, cybersecurity, and law enforcement.


Mick is a seasoned cybersecurity professional with over 12 years of experience in information security management and cybersecurity consulting.
Read more about Mick Deben













