SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Virtual
The modern adversary demands you move at the speed of news, not the speed of analysis. In this session, we'll unveil the Emerging Threats Center in Google Security Operations—a real-time, AI-powered news feed that closes the critical awareness-to-action gap. Built with Mandiant's frontline intelligence, it instantly provides your SOC with answers to the questions that matter most: "Are we impacted? Have we been impacted? Are we protected going forward?" Tune in for a live product demo to see exactly how AI-generated detection rules are deployed, allowing your team to operationalize threat intelligence into instant defense and eliminate manual work.
*Sponsored by Google Cloud Security
Virtual
Endace has been fortunate to be invited to be part of the SOCs at RSAC, Cisco Live and Blackhat. In this session we'll look at the trends we see in next-gen SOCs and some of the things we've seen at these high-profile securit events.
*Sponsored by Endace
Virtual
Virtual
The importance of exposure management is well understood among security teams, but traditional exposure management tools have limitations. These technical limitations leave many stones unturned, potentially leaving major risks exposed. The challenge is that in today’s world–with sprawling, complex corporate digital footprints and an extremely hostile threat landscape–legacy exposure management tools are no longer getting the job done. Sophisticated threat actors exhaustively enumerate an organization’s attack surface before striking, so any vulnerabilities left undetected are simply waiting to be exploited.
In this session, Edgardo Vega, VP of Engineering at SixMap, will drill down on some of the challenges with running a continuous exposure management program, highlight the importance of conducting comprehensive assessments across all assets and ports, and discuss solutions for getting better visibility on Internet-facing exposures. “Know thy enemy and know thyself, and you need not fear the result of a hundred battles.”
*Sponsored by SixMap
Virtual
Modern cybersecurity faces a critical detection gap. Organizations depend heavily on traditional detection rules embedded in endpoints, firewalls, SIEMs, and XDRs—but these reactive systems miss sophisticated threats that evade predefined signatures. While threat hunting provides a proactive approach to actively searching for hidden adversaries, it’s human manual processes which are inherently limited. Security teams can't match the volume, velocity, and complexity of today's attack landscape through manual investigation alone.
TandemTrace closes this gap by transforming threat hunting with autonomous AI agents. Our specialized AI works independently of pre-configured detection rules. It continuously analyzes your security data and organizational context 24/7, adapting to emerging attack patterns and uncovering advanced threats that traditional tools miss.
This session will explore how autonomous AI agents overcome the limitations of manual threat hunting and reactive detection rules. Discover how TandemTrace provides 24/7 continuous analysis to proactively find hidden adversaries in your environment.
*Sponsored by TandemTrace
Virtual
Is your security team constantly playing catch-up, operating above the risk curve where incidents have already happened?
In today's threat landscape, reactive security is a failed strategy. With adversaries leveraging AI to accelerate attack velocity, the window from initial access to data exfiltration has shrunk to minutes, not days. A modern SOC cannot simply respond faster; it must operate with predictive intelligence to stay ahead of threats.
This session introduces a new operational model for the SOC, built on an AI-driven platform like Cortex. We'll explore how to shift your team's focus from chasing endless alerts to proactively neutralizing threats before they can cause business impact. This is about transforming your analysts from fatigued ticket-closers into supercharged strategic defenders.
In this session: Super Charge the Analyst: Leverage AI and automation to handle the manual, repetitive tasks of data correlation and investigation, freeing up your human experts to focus on complex threat hunting and incident command. Automate the Full Incident Lifecycle: Achieve autonomous detection, investigation, and response grounded in a unified data foundation that spans endpoints, cloud, network, and identity. Master Proactive Defense and reduce the friction: Discover how to use integrated threat intelligence and AI-based behavior analytics to understand your unique attack surface and preempt adversary techniques before they are weaponized against you. Rethink Your SOC Metrics: Learn to measure what truly matters. We'll show you how to move beyond MTTR (Mean Time to Respond) and focus on metrics that demonstrate genuine risk reduction and operational efficiency. This is not a session on what you should buy. It’s a session on what you must transform to build a security operation that truly protects the business.
*Sponsored by Palo Alto Networks
Virtual
Virtual
Virtual
Perimeter defenses are nothing new, and when it comes to cybercriminals and ransomware purveyors, they’re getting better at evading defenses. Once they’ve gotten in, they’re hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. What if you could turn this behavior to your advantage? During this discussion, Fortinet cybersecurity experts will discuss how to use these attackers’ strengths against them and how SOC teams can proactively hunt for attackers.
*Sponsored by Fortinet
Virtual
In this session, we'll review how the SOC-in-a-Box at RSAC, Cisco Live and Black Hat is put together and how the various solutions are integrated to provide visibility into threats on the network.
*Sponored by Endace
Virtual
Virtual
Virtual
Virtual