SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

In-Person
In-Person
In-Person
This keynote will explore the high-stakes intersection of geopolitics and critical infrastructure protection in an era where cyber conflict is no longer an occasional event, but a constant state of global competition. Participants will hear how nation-states leverage "low and slow" stealth tactics to pre-position themselves within vital networks—such as energy, water, and transportation—transforming essential services into instruments of geopolitical leverage.
In-Person
Industrial environments are not being compromised by deployed AI models, but by uncontrolled AI use by engineers, analysts, and vendors interacting with OT data. This session presents a real world case study where shadow AI introduced new risks to safety, availability, and integrity in an ICS adjacent environment.
In-Person
Network segmentation is a core requirement of a defensible ICS architecture, yet many OT networks remain flat or rely on segmentation approaches that are difficult to deploy and sustain. This session focuses on SANS Critical Control 2 (Defensible Architecture) and Critical Control 3 (ICS Network Visibility and Monitoring), presenting a practical crawl, walk, run approach to segmentation in industrial environments.
In-Person
In-Person
Many industrial architectures never move beyond diagrams, often dismissed as too complex, too expensive, or too risky for production environments. This session explores the practical, iterative deployment of the Purdue Model in brownfield factories,
In-Person
This talk will focus on introducing a novel idea on Consequence-driven Cyber-informed Engineering championed by Idaho National Labs in USA.
In-Person
We built command-and-control over DNP3. Then we realized we'd solved the wrong problem.
In-Person
In-Person
Defenders of industrial control systems are often focused to respond late in the attack lifecycle, after adversaries have already reached sensitive operational environments. This session presents findings from Palo Alto Networks’ OT Threat Research Lab based on large-scale analysis of 2023/2024/2025 security telemetry collected from more than 61,000 firewalls inspecting industrial application traffic.
In-Person
Industrial Control Systems rarely fail because of “advanced hackers.” They fail because governance, engineering, and security do not meet where real work happens.
In-Person
MITRE recently hosted the Critical Infrastructure Cybersecurity Tabletop Exercise (CICS TTX), bringing together approximately 200 participants from 70 organizations—including federal, state, and local governments, emergency managers, and industry representatives from pipelines, electricity, IT, communications, and rail—across five metropolitan areas.
In-Person
In-Person
In this workshop, Gordon Moreau and Jeff Shearer will provide an introductory understanding of OT security in the context of integration with cloud computing.
In-Person
As one of the top Five ICS Cybersecurity Critical Controls, Industrial Control System (ICS) network visibility is no longer a “nice to have” — it is a foundational defense that provides four critical values for effective industrial incident response, engineering root cause analysis, safe vulnerability discovery, and engineering asset identification.
In-Person
Vendor access is one of the most persistent and least honestly addressed sources of risk in industrial environments. This two-hour instructor-led workshop focuses on how vendor access actually works in ICS, from routine support to emergency response, system commissioning, and major maintenance events where security controls are often relaxed under pressure.
In-Person
Historically, the ICS/OT community has emphasized preventing threat actors from breaching parameter controls and entering the lower levels of the environment. Although these efforts were valiant, they ultimately failed, leading to ever-increasing security breaches.
In-Person
Being able to perform OT Cyber Security Risk Assessments is becoming more essential with each year. Drivers to perform a risk assessments vary: regulatory requirement, internal justification for modernization upgrades or simply to better understand operational risk and to communicate it further to leadership.
In-Person
Some ICS/OT cybersecurity failures occur because teams lack technical controls. More often, gaps occur because trust breaks down between cybersecurity, engineering, and operations. Emotional intelligence is not a “soft skill” – it is an operational capability that determines whether security programs succeed or stall.
In-Person
In-Person
In-Person
In-Person
This presentation pulls back the curtain on how a protocol meant to simplify industrial data can instead become a powerful weapon in the wrong hands.
In-Person
In industrial environments, the network cable is often the most reliable sensor in the facility. While control systems and PLC logs provide a high-level view of "what" happened, they usually fail to explain the "why" behind intermittent communication drops, command latency, or unexpected physical state changes.
In-Person
In-Person
Much like MITRE ATT&CK has done for collating attacker methods, D3FEND was built to fundamentally describe the assets and subsequent countermeasures vital for defense.
In-Person
Over the last several years, the SANS State of ICS/OT Security surveys show a consistent pattern: detection and containment timelines are improving, but remediation/recovery remains the long pole—sometimes stretching into weeks or longer.
In-Person
AI is the latest craze that makes the world go round, and to satisfy the demand we are witnessing a desperate gold rush of compute. This has transformed data centers from boring server farms into the critical infrastructure of the modern era, diverting supply chains and packing as much compute to feed the LLM machine.
In-Person
In-Person
As businesses accelerate AI adoption, the demand for real-time OT data is skyrocketing. This creates a unique challenge: how do we enable AI-driven insights without compromising operational integrity or cybersecurity?
In-Person
Based on my experience supporting and later leading an OT cybersecurity program, this talk explores the evolution from a NIST Cybersecurity Framework–aligned strategy to a more operations-driven approach built on the SANS Five Critical Controls for OT Cybersecurity.
In-Person
In-Person
Building Control Systems (BCS/BAS) are critical to safety and operations but are often poorly understood and inconsistently secured. This workshop introduces a practical methodology for assessing these environments—from defining scope and the System Under Consideration (SUC) to conducting safe, on-site evaluations and validating real-world conditions against documentation.
In-Person
This hands-on workshop provides a foundational understanding of ICS/OT malware: how it's categorized, how it works and how to begin analyzing it. Topics include a brief history of ICS malware, the types of ICS malware, and a focused look at control protocol malware such as FrostyGoop.
In-Person
This is not your typical code vulnerabilities workshop but specifically we will go hunting through ICS code to find those vulnerabilities related to abusing the mechanical or process components. We will cover the basics of understanding some mechanical systems so you can add this domain to your assessment methodology.
In-Person
Vendor access is one of the most persistent and least honestly addressed sources of risk in industrial environments. This two-hour instructor-led workshop focuses on how vendor access actually works in ICS, from routine support to emergency response, system commissioning, and major maintenance events where security controls are often relaxed under pressure.
In-Person
Are you prepared to take charge during a cyber crisis that threatens the backbone of the ONE industry? In this high-stakes interactive exercise, you’ll step into the role of a Crisis Management Team (Fusion Team) and navigate the complexities of a simulated cyberattack targeting a major fuel enterprise.
In-Person
Please join Bruce for a workshop on how to set up your OT SOC for Success. The workshop will start with the foundations by ensuring you have a SOC Charter that considers and addresses OT Security. The workshop will then help attendees define their threat profile to get on paper their critical assets, their likely threat actors and relevant TTPs.
In-Person
In-Person
In-Person
In-Person
In-Person
Speaker: Luis Luque, Global OT Security Lead, Accenture
In-Person
Modern security teams are overwhelmed—drowning in alerts, disconnected tools, and reactive “fire drill” responses. Cyber Fusion Centers (CFCs) offer a path out of this chaos,
In-Person
As industrial environments become more connected, OT security must evolve without disrupting safety, reliability, or uptime. In this session, Waste Management address their approach to modernizing OT security programs, expanding attack surfaces, IT/OT convergence, and legacy constraints
In-Person
In-Person
In this workshop, Gordon Moreau and Jeff Shearer will provide an introductory understanding of OT security in the context of integration with cloud computing. We will explore key aspects of this topic such as the popularity of the cloud and the business reasons to explore the technology, the migration of business applications to the cloud, and the ways in which cloud security in the context of OT may be different from traditional cloud security approaches.
In-Person
Building Control Systems (BCS/BAS) are critical to safety and operations but are often poorly understood and inconsistently secured. This workshop introduces a practical methodology for assessing these environments—from defining scope and the System Under Consideration (SUC) to conducting safe, on-site evaluations and validating real-world conditions against documentation.
In-Person
Historically, the ICS/OT community has emphasized preventing threat actors from breaching parameter controls and entering the lower levels of the environment. Although these efforts were valiant, they ultimately failed, leading to ever-increasing security breaches.
In-Person
In-Person
Some ICS/OT cybersecurity failures occur because teams lack technical controls. More often, gaps occur because trust breaks down between cybersecurity, engineering, and operations. Emotional intelligence is not a “soft skill” – it is an operational capability that determines whether security programs succeed or stall.
In-Person
Please join Bruce for a workshop on how to set up your OT SOC for Success. The workshop will start with the foundations by ensuring you have a SOC Charter that considers and addresses OT Security. The workshop will then help attendees define their threat profile to get on paper their critical assets, their likely threat actors and relevant TTPs.
In-Person
In-Person & Virtual
As one of the top Five ICS Cybersecurity Critical Controls, Industrial Control System (ICS) network visibility is no longer a “nice to have” — it is a foundational defense that provides four critical values for effective industrial incident response, engineering root cause analysis, safe vulnerability discovery, and engineering asset identification. This hands-on workshop demonstrates why visibility matters, with a heavy focus on ICS incident response, and how visibility directly enables faster detection, engineering-informed response, and safer control system recovery in real ICS/OT environments.
In-Person
This hands-on workshop provides a foundational understanding of ICS/OT malware: how it's categorized, how it works and how to begin analyzing it. Topics include a brief history of ICS malware, the types of ICS malware, and a focused look at control protocol malware such as FrostyGoop. Students will complete beginner-friendly malware analysis labs to learn how to analyze “unknown” malware and identify targeted ICS protocols and manipulated process values.
In-Person
Most of the embedded devices we work with in OT/ICS use a proprietary vendor protocol for device programming, configuration, and calibration. In many cases, the vendor exposes this over a serial bus. Have you ever wondered how to capture and analyze these proprietary vendor protocols over serial buses? This workshop will teach you how.
In-Person
This is not your typical code vulnerabilities workshop but specifically we will go hunting through ICS code to find those vulnerabilities related to abusing the mechanical or process components. We will cover the basics of understanding some mechanical systems so you can add this domain to your assessment methodology.
In-Person
Being able to perform OT Cyber Security Risk Assessments is becoming more essential with each year. Drivers to perform a risk assessments vary: regulatory requirement, internal justification for modernization upgrades or simply to better understand operational risk and to communicate it further to leadership.
In-Person
Registration: All students who register for a 4–6 day course will be eligible to play NetWars for free. Registration for this event will be through your SANS Account Dashboard the week of the event.
About ICS NetWars: Focused on factory machinery operations, this experience brings players onto the factory floor, exposing them to the challenges of detecting and defending physical equipment and manufacturing components from cyberattacks.
In-Person & Virtual
Registration: All students who register for a 4–6 day course will be eligible to play NetWars for free. Registration for this event will be through your SANS Account Dashboard the week of the event.
About ICS NetWars: Focused on factory machinery operations, this experience brings players onto the factory floor, exposing them to the challenges of detecting and defending physical equipment and manufacturing components from cyberattacks.
In-Person & Virtual