SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Data can end up in the unlikeliest of places, even for those organizations that have developed formal data governance policies and implemented technical controls to (try to) keep data in central data stores. Especially troublesome is data stored and worked with on user endpoints—workstations, laptops, devices—such as original unstructured files or containing data extracted from structured data sources.
With this survey, SANS is seeking insight into the amount and makeup of data that exists on user endpoints versus central data stores, along with the rigor and effectiveness of policies that either restrict or support storing data on user endpoints. We are especially interested in the need for strategies organizations are using (or have used) to protect against the loss of such data, whether completely through deletion or through some unauthorized change to the original data.
In this white paper, SANS Certified Instructor Greg Scheidel provides insights into the amount and makeup of data that exists on user endpoints versus central data stores, along with the rigor and effectiveness of policies that either restrict or support storing data on user endpoints.



Greg Scheidel, SANS Instructor and Chief Cyber Security Officer at ECS, draws on three decades of IT and cyber leadership to show how hands-on defense and strategic decision-making unite to strengthen enterprise security.
Learn moreTodd brings more than 15 years of information security experience across various disciplines and a proven track record of building and leading security programs to CrashPlan as its Chief Information Security Officer.
Learn more