SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals



Ismael is a Senior SANS Instructor and Arctic Wolf VP. Author of SEC530 and a prestigious GSE-certified expert, he blends decades of SOC, threat research, and community contributions to equip defenders with resilient, adversary-aware strategies.
Virtual
Cyber threats are evolving faster than ever, driven by generative AI and advanced automation. The volume of stolen money crossing borders and leaving the western economies is now at a pivotal point where it has effects on geo-political power, similar to the golden age of piracy. Traditional security measures can no longer keep up, leaving organizations vulnerable to attacks and whole nations reeling from the macro effects. But what if you could identify and stop cyber threats before they even begin?
In this session, Matt Lembright, Senior Solutions Engineer at Silent Push will demonstrate how a shift from reactive to preemptive cybersecurity is not only possible, but necessary.
*Sponsored by Silent Push
Virtual
Threat actors are constantly evolving their tactics, forcing defenders to adapt just as quickly. Every new campaign brings fresh techniques designed to evade traditional detection and exploit blind spots. And once attackers establish a foothold, lateral movement becomes their fastest route to high-value assets.
But what if the earliest indicators of compromise are hiding in plain sight? Encrypted network protocols—the very ones that enable legitimate operations across your environment—also provide attackers with built-in cover for their movement.
In this session, Jamie Moles of ExtraHop will explore how modern Network Detection and Response (NDR) exposes those encrypted pathways to detect adversaries long before they complete their mission. You’ll learn which tools and protocols threat actors rely on for lateral movement, how encryption conceals malicious behavior, and how decryption and traffic analysis techniques can power precise detections and efficient investigations.
*Sponsored by ExtraHop
Virtual
Virtual
As artificial intelligence becomes increasingly accessible, cybercriminals are harnessing its power to mimic legitimate user behavior with alarming precision. From evading traditional detection systems to staging sophisticated social engineering attacks, AI-driven threat actors are blurring the line between real and synthetic activity.
This webinar will explore how organizations can leverage IP and network-layer intelligence to counter these evolving threats. We’ll break down real-world examples of AI-driven impersonation, highlight the weaknesses of legacy security approaches, and demonstrate how enriched IP data, traffic analysis, and behavioral baselining help expose anomalies that AI-generated activity can’t fully conceal.
*Sponsored by Spur
Virtual
Learn how to build custom threat intelligence feeds that integrate directly with AI to strengthen defenses. This session covers data collection, curation, and enrichment techniques that enhance AI accuracy, reduce bias, and improve detection of subtle attack patterns.
*Sponsored by ReversingLabs
Virtual
Meet the cunning Latrodectus loader, first emerged in 2023, which has become a "go-to" tool for cybercriminals in the past year. Mainly functioning as a downloader, it employs advanced anti-analysis, evasion techniques, and encryption schemes, which all have hardened the loader to evade traditional malware detection. By examining its rapid development cycle and potential trajectory during the year of 2024 and 2025, we offer insights into its growing popularity as a preferred downloader in the cybercrime ecosystem.
*Sponsored by VMRay
Virtual
Take a guided tour of the Silent Push preemptive cyber defense platform and see how TTP-led defense, focused on pre-attack behaviors, uncovers malicious infrastructure before it is weaponized. Learn how using Indicators of Future Attack helps organizations move beyond reactive detection to achieve a truly proactive security posture.
*Sponsored by Silent Push
Virtual
Virtual
This session explores how Agentic AI is reshaping cybersecurity, evolving from task-based assistants to autonomous defenders capable of proactive threat detection, incident response, and adaptive defense. We will cover practical use cases in financial services, risks and safeguards of AI adoption, and how organizations can prepare for an AI-driven threat landscape. Attendees will gain actionable insights into leveraging Agentic AI responsibly to enhance resilience against advanced cyber adversaries.
*Sponsored by SOCRadar
Virtual
There's been a cyberattack at Baskerville Bank! Production systems have been encrypted, the customer portal's been down for 12 hours, and data exfiltration has been suspected. Can Threatlock Holmes, armed only with a threat intelligence platform and his keen intellect, crack the case?
In this talk, we conduct a "back to basics" review of the benefits of legacy threat intelligence platforms, then dive into what to look for in a more modern TIP.
*Sponsored by ThreatConnect
Virtual
This presentation redefines the security analyst's experience, demonstrating how AI empowers defenders to conversationally interrogate their SIEM using plain English. Discover how an NDR MCP server provides the rich, real-time context necessary for AI to understand your natural language questions and deliver immediate, actionable insights without writing a single complex query or correlation rule.
*Sponsored by Corelight
Virtual
Cloud threat intelligence should simplify detection—but often creates noise instead. With vast TI data and automated attacks flooding alerts, many teams struggle to separate real threats from background noise.
This session introduces the Zero Noise Approach—a methodology for ingesting and operationalizing Cloud TI through attacker-based baselines, continuous feedback loops, and a “no alert left behind” mindset. Learn how this approach turns TI from overwhelming to actionable, with real-world case studies showing how organizations achieved higher fidelity detections and clearer visibility into attacker TTPs.
*Sponsored by Wiz
Virtual
Virtual
In this presentation of Censys's 2025 State of the Internet Report, we'll examine malicious infrastructure from multiple angles: Internet-scale trends across malware families, geographies, and networks; the lifespans of C2 services measured both by network availability and content signals; and how these structural patterns play out in real incidents and disruption efforts.
Threat research often focuses on the mechanics of malware and threat actor tooling, but in this talk, we'll explore how studying infrastructure can provide complementary insights and help practitioners investigate and track nefarious activity.
*Sponsored by Censys
Virtual
AI has fundamentally altered the way threats are created and detected. Hype aside, the reality is AI has empowered adversaries to create malware that generates, obfuscates, and modifies its own code. AI enables dynamic payloads that evade detection by never writing to disk and running solely in memory instead. This introduces a new class of malware that significantly weakens the effectiveness of traditional antivirus signature matching and static detection methods.
This webinar will examine how polymorphic AI malware works by demoing a live PoC example, then review its usage in real-world threats. Best of all, we’ll cover how to go beyond known signatures and other static, predictable patterns to detect its usage and build threat-informed defenses.
Join us to learn:
*Sponsored by CardinalOps
Virtual
Virtual
Virtual