SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Virtual
Cloud providers give you the basics, but "basic" is a liability when you're moving sensitive data. Most teams sacrifice security for speed, or visibility for cost. We are tearing down the standard deployment models to show you how to build a highly secure and Scalable network that can keep up with your companies demands. This is about architectural dominance: achieving total inspection without giving up security.
*Sponsored by Fortinet
Virtual
Every day, new AI adoption patterns and use cases emerge, as well as new AI-powered threat vectors and vulnerabilities. Many security leaders are wondering if the old paradigms still hold, and many practitioners are looking for a framework to help them breakdown and tackle what needs to be done to secure the use of AI and defend against AI threats.
Come join for a session on how the principles of Zero Trust still apply in the age of AI, a reference architecture for how to do end to end security in the age of AI and rich set of tools you can use to build your organization's journey to secure AI usage end to end.
*Sponsored by Microsoft
Virtual
Virtual
Cloud misconfigurations remain a leading cause of security incidents, even as organizations continue to accelerate the migration of critical workloads to public cloud platforms. In this session, we’ll show how teams can reduce risk from the start by deploying CIS Hardened Images, pre-configured virtual machine images built to the consensus-based recommendations of the CIS Benchmarks. Attendees will learn how CIS Hardened Images help organizations take ownership of their responsibilities within the cloud shared responsibility model, avoid insecure default configurations, and support compliance-aligned security practices without slowing deployment. The session includes a short technical demo that walks through launching a CIS Hardened Image from a cloud marketplace to secure your cloud environment. Participants will leave with practical guidance for incorporating CIS Hardened Images into their cloud environments and security workflows to start secure, scale consistently, and reduce the operational burden of manual hardening.
*Sponsored by Center for Internet Security
Virtual
Virtual
The cloud has fundamentally changed but most security models have not. AI-driven workloads, autonomous agents, and non-human identities are introducing a new class of risk that traditional, infrastructure-centric security tools were never designed to handle. These systems are non-deterministic by nature. They generate new data, interact across environments, and operate with levels of access and speed that break conventional assumptions about visibility and control.
In this session, we break down how the modern cloud attack surface has shifted from infrastructure to three interconnected control planes: identity, data, and AI. We will show why cloud security must evolve beyond traditional CSPM to a unified model that provides code-to-cloud context across these domains.
Using real-world examples, attendees will learn how to:
Attendees will leave with a clear, practical framework for securing modern cloud environments where infrastructure is dynamic, identities are autonomous, and data is constantly in motion.
*Sponsored by Palo Alto Networks
Virtual
Virtual
Virtual
Virtual