SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals



Ismael is a Senior SANS Instructor and Arctic Wolf VP. Author of SEC530 and a prestigious GSE-certified expert, he blends decades of SOC, threat research, and community contributions to equip defenders with resilient, adversary-aware strategies.
Virtual
Threat Intelligence is no longer just data, it’s actionable insight embedded directly into your security operations. In this session, we’ll explore the latest insights from the Microsoft Digital Defense Report and how Microsoft is transforming intelligence into dynamic, curated intelligence within our security ecosystem, empowering your team. Learn how the latest innovations, including enhanced workflows and threat intelligence specific agents, are helping analysts to move faster and act on better intel than ever before.
*Sponsored by Microsoft
Virtual
Virtual
Chris Jacob presents “The Agentic AI Advantage in the Modern SOC: Every Decision Sharper. Every Second Faster.” at the SANS CTI Summit on January 26–27, 2026. The talk frames the SOC at a crossroads as teams face faster threats, tighter budgets, and rising board expectations. Chris outlines how unified defense, outcome-driven security, and modular Agentic AI shift operations from reactive detection to autonomous decision-making. Real results show major reductions in noise, MTTR, and cost, proving the SOC can become a strategic advantage.
*Sponsored by Securonix
Virtual
Virtual
In the next 3 to 5 years, the acceleration of AI and geopolitical conflict will make yesterday's defenses obsolete. Is your threat intelligence program ready for the shift?Steve Stone, SentinelOne’s Chief Customer Officer will discuss what he predicts the next 3 years will look like in cyber, based on SentinelOne's latest intelligence.You will gain a deep understanding of the future threat landscape driven by: Geopolitical Escalation: The expansion of state-sponsored cyber operations, including globally impactful campaigns from adversaries like Russia and North Korea that increasingly target critical infrastructure. The Convergence of Motives: Analyzing how nation-state actors and sophisticated cybercrime groups are increasingly sharing TTPs and tooling, blurring the lines of attribution and defense. The AI Multiplier: How the malicious deployment of Artificial Intelligence in the attack chain will fundamentally alter the speed and severity of breaches, compressing timelines and redefining the status quo. Get the essential intelligence you need to make the right decisions in the present to prepare yourself for the future, ensuring your defensive strategy keeps pace with the rapidly collapsing threat horizon.
Virtual
Ransomware negotiation is a high-pressure battlefield combining psychology, economics, and threat intelligence. This session shares operational lessons from real-world engagements, revealing negotiation patterns, deception tactics, and mistakes that determine payment outcomes. Attendees will learn practical methods to profile ransomware crews in the first 30 minutes, control the negotiation tempo, and avoid psychological traps that lead to panic payments. The talk offers actionable, intelligence-driven playbooks to reduce ransom demands by up to 90%. Participants leave with communication templates and decision frameworks based on anonymized transcripts and tactical breakdowns.
*Sponsored by SOCRadar
Virtual
More security teams are using the Tactics & Techniques from MITRE ATT&CK® successfully for strategic assessments and risk management. But technical defenders, such as detection & emulation engineers, need more detailed & granular CTI to do their jobs - they need the data contained within Procedures. No widely accepted standard for Procedures has ever existed, greatly limiting their adoption. This session covers how Tidal Cyber is solving the persistent Procedure challenge by adopting an accurate but practical definition of and data model for Procedures, and using large-scale data analysis powered by an original artificial intelligence solution to create and maintain a living, easily searchable library of adversarial Procedures.
*Sponsored by Tidal Cyber
Virtual
Most CTI analysts don't work in a SCIF surrounded by peers ready to poke holes in their analysis. They work from home. They might be the only dedicated analyst at their company. Or they're staring down a 4-hour deadline with no time to schedule a peer review.
Structured analytic techniques exist precisely for these moments. But tools like Key Assumptions Check, Analysis of Competing Hypotheses, and Devil's Advocacy were built for collaboration in mind. What happens when you're working alone or with a small team?
In this talk, we’ll cover practical examples of how we use an LLM to assess attribution and intent for a recent campaign. You'll see how the model helps run a Key Assumptions Check, generate competing hypotheses from the same evidence, challenge your conclusions, and conduct a pre-mortem to spot potential flaws in your analysis.
This isn't about AI replacing analytic tradecraft. It's about using AI to enforce it when working in less-than-ideal conditions (which is most of the time).
Attendees will leave with a list of prompts they can apply immediately to their own analysis, along with practical guidance for setting up an LLM as an effective sparring partner.
*Sponsored by Feedly
Virtual
Organizations continue to invest heavily in threat intelligence (TI), yet most never fully realize its value. Feeds are purchased, dashboards are populated, and reports circulate—but few environments translate intelligence into reliable, automated defense actions. This requires a closed-loop approach: converting raw threat information into relevant contextual detection and response while reducing false positives.
This session will discuss operationalizing cyber threat intelligence (CTI) with a closed-loop approach that leverages components such as SIEM, SOAR, XDR etc. We will present approaches to establishing a structured pipeline, automating enrichment, creating risk-scored detections, and executing conditional responses that minimize noise while maximizing defensive impact.
*Sponsored by Cyware
Virtual
Virtual
Virtual
Virtual