SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

In today’s volatile threat landscape, defense-in-depth is not just a layered stack of tools—it’s a mindset. Rooted in Sun Tzu’s enduring principle, “Know thy enemy, but first know thyself,” this presentation guides CISOs through practical, actionable strategies that begin with understanding their organization from the inside out. Devon Bryan—5-time global CISO—will deliver a modern framework to help security leaders align internal visibility, asset prioritization, and cultural awareness with advanced threat modeling and adversarial behavior mapping.
Cybersecurity risk isn’t a side dish—it belongs at the head table of enterprise risk management. In this session, Ian Frist, Director of Governance, Risk and Compliance at Corning, explores how organizations can stop treating cyber risk as a siloed technical concern and start integrating it into their broader risk appetite framework.
Infrastructure Susceptibility Analysis (ISA) is MITRE-developed methodology to help organizations understand how disruptions (whether cyber, physical, or operational) could affect the systems they depend on most. ISA combines elements of risk analysis, system modeling, and threat intelligence to illuminate the often-hidden dependencies between digital and physical infrastructure. This approach enables leaders to identify where adversaries could cause the most harm, quantify the potential business and operational consequences, and prioritize the most effective resilience investments.
Remember when ChatGPT was going to revolutionize your security program overnight? Two years into production deployments, it's time for an honest conversation about what actually happened when LLMs met the reality of 24/7 security operations, application security and cyber threat intelligence.
As security incidents grow faster, louder, and more complex, endurance alone is no longer a strategy—resilience is. Today’s leaders must create environments where teams can perform under constant pressure without sacrificing well-being or long-term effectiveness.
The latest estimates from the Non-Human Identity Working group put the ratio of non-human identities to humans at 80:1. With increased pressure on CISOs to protect not only human threats, but now an exponentially increasing number of non-human threats, how can the CISO role, and the role of the evolving Chief Identity Officer (CiDO), increase security posture while moving at the speed of innovation and increased usage?
The reason organizations choose a particular CISO is fundamentally because they trust the CISO's judgement. A CISO draws from their experience, which includes domain, industry, managerial and leadership background, etc. which provides them with the intuition to manage an organization's cybersecurity program effectively. People refer to this intuition as an art, and it usually works. Unfortunately, when it fails, it can create a massive failure. Similarly, a large part of the success of a program depends upon the CISOs ability to sell the program to executives and the board of directors. This ability to sell is likewise considered an art.