SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsJay Lillie is VP Customer Success for CardinalOps where he helps organizations around the world improve their SIEM-based detection posture. After an early career in business process management and Big Data, his more recent experience in cybersecurity ranges from machine learning behavioral analytics to identity governance. He has paired his career in technology startups with a parallel career as a member of the US Marine Corps Reserves. Before he retired, his capstone military tour was as the Senior Enlisted Advisor for the Reserve component of the Marine Corps Cyber Warfare Group.
Explore content featuring this instructor’s insights and expertise.
In the age of artificial intelligence (AI) and ever-evolving cyber threats, the landscape of security operations has witnessed a transformative shift. Our 2024 Detection & Response Survey delves into how organizations address critical aspects of detection, response, and the integration of these vital functions within organizations. On this webcast, SANS Certified Instructor Josh Lemon will provide insights into the prevalence of organizations maintaining separate detection and response teams, shedding light on the reasons behind such decisions and their implications for overall security posture. Register for this webcast now, and you will automatically receive the companion white paper upon publication.
On this webcast, Chris Crowley examines the 2024 SOC Survey results to understand how SOCs are architectured, favorite and frustrating technologies, staffing, funding, threat intel, and automation.
On the Cloud Security Track, leading solution providers and practitioners will highlight the newest techniques and technologies that organizations of all types and sizes are leveraging to better secure and manage their cloud services and environments.
“IT heroism” can be defined as relying on “individuals taking upon themselves to make up for a systemic problem.” As those who have seen the inside of a SOC can attest, this is not entirely uncommon in many Security Operations Centers!