SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals



Dean Parsons, CEO of ICS Defense Force, teaches ICS515 and co-authors ICS418, emphasizing ICS-specific detection, incident response, and security programs that support OT operations—aligning practitioners and leaders on clear, defensible action.
Virtual
AI is accelerating the speed and complexity of cyber-attacks, and OT environments are increasingly in scope. As attackers adopt advanced capabilities, incidents are unfolding faster than many organizations are prepared to handle.
This session will examine how OT has quickly become a prime target, how the threat landscape is evolving, and how new AI-driven capabilities and tools are reshaping the way attacks are executed. We will also address why OT environments remain uniquely vulnerable and what existing best practices fail to address.
The discussion will focus on a critical gap: maintaining operational continuity when disruption occurs. The session will conclude with a live demonstration, showing how an attack unfolds and how operations can be restored fast and in real time.
*Sponsored by Salvador Tech
Virtual
Industrial AI is no longer a roadmap item; it's arriving on the plant floor. Agentic systems are connecting OT environments to cloud workloads, decision engines, and data pipelines that didn't exist a year ago. The productivity upside is real — and so is the expanded attack surface. Attackers are moving just as fast. AI is rewriting the offensive playbook in real time: automating reconnaissance, generating exploit code on demand, and lowering the skill floor for adversaries who previously couldn't touch an industrial environment. The window between disclosure and weaponization is collapsing — and so is the window for defenders to find unknown assets first. The organizations that thrive in the AI era won't be the ones with the most tools. They'll be the ones who got the architecture right before the wave hit. In this session, we'll break down what that architecture requires: network-native visibility, segmentation that's implementable without risking uptime, and secure remote access built for OT.
*Sponsored by Cisco
Virtual
In developing a business continuity plan, an important consideration is that the organization may not be capable of sustaining normal operations on-site. The ability to securely support employees and contractors working remotely is essential to ensuring OT business continuity. OT organizations also need secure remote access because they may need to commission new equipment, apply critical patches, or deal with repairs and troubleshooting activities remotely. Additionally, OT organizations may perform remote monitoring and diagnostics or use remote operation centers to affordably take care of geographically distributed assets. Security is critical because a breach in an OT environment could lead to outages of services and the loss of human life or damage critical infrastructures. During this demonstration session, you’ll learn: - Risks associated with unsecured remote access - Key regulations and security standards around remote access requirements - Security considerations when implementing remote access in OT environments - Overview of technology solutions available for secure remote access - FortiPAM Overview – Fortinet’ privileged access management solution to support secure remote access for OT.
*Sponsored by Fortinet
Virtual
Modern attackers are business people. They look for the highest ROI. In this session, we will talk about the disproportionate Asset Value versus Protection Cost in the context of OT cyber investment. We have seen that the cost of a breach can destabilize global supply chains. We will discuss approaches to rebalance this scale with the right investments, short term and long term. As OT architects, operators and cyber professionals, this talk will give you the way to sell adaptive OT security initiatives to your leadership and financially-driven decision makers in a language they understand - Risk, ROI, and the Economics of OT Cyber.
*Sponsored by Corsha
Virtual
Virtual
CISOs are no longer just securing IT—they’re accountable for protecting cyber-physical systems (CPS) and the operational outcomes they support. But in most organizations, OT risk remains fragmented, hard to quantify, and even harder to operationalize. Without a structured approach, risk can’t be consistently measured, prioritized, or reduced. This webinar cuts through the noise. Join Zane Blomgren for a practical look at how to operationalize OT risk as part of a broader CPS Protection Program—turning visibility into measurable, actionable outcomes.
*Sponsored by Claroty
Virtual
*Sponsored by Opswat
OT environments still carry blind spots – unknown assets, unmanaged vulnerabilities, and misconfigurations. Adversaries can turn those openings into impact in days or hours. This session focuses on the work that changes outcomes: building a living picture of your environment through OT/IoT monitoring, reducing opportunities for lateral movement, and enabling responders to move faster from signal to coordinated action. Gain Visibility – Build a complete, up-to-date picture of assets and vulnerabilities to reduce blind spots, support key operational use cases, and strengthen defenses Detect Threats – Surface real threats quickly with intelligence-driven monitoring to shorten detection timelines and cut through the noise Respond with Confidence – Accelerate investigations and resolve issues to keep operations safe and limit business impact.
*Sponsored by Dragos
Virtual
Virtual