SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Virtual
Cloud providers give you the basics, but "basic" is a liability when you're moving sensitive data. Most teams sacrifice security for speed, or visibility for cost. We are tearing down the standard deployment models to show you how to build a highly secure and Scalable network that can keep up with your companies demands. This is about architectural dominance: achieving total inspection without giving up security.
*Sponsored by Fortinet
Virtual
Every day, new AI adoption patterns and use cases emerge, as well as new AI-powered threat vectors and vulnerabilities. Many security leaders are wondering if the old paradigms still hold, and many practitioners are looking for a framework to help them breakdown and tackle what needs to be done to secure the use of AI and defend against AI threats.
Come join for a session on how the principles of Zero Trust still apply in the age of AI, a reference architecture for how to do end to end security in the age of AI and rich set of tools you can use to build your organization's journey to secure AI usage end to end.
*Sponsored by Microsoft
Virtual
Virtual
Cloud misconfigurations remain a leading cause of security incidents, even as organizations continue to accelerate the migration of critical workloads to public cloud platforms. In this session, we’ll show how teams can reduce risk from the start by deploying CIS Hardened Images, pre-configured virtual machine images built to the consensus-based recommendations of the CIS Benchmarks. Attendees will learn how CIS Hardened Images help organizations take ownership of their responsibilities within the cloud shared responsibility model, avoid insecure default configurations, and support compliance-aligned security practices without slowing deployment. The session includes a short technical demo that walks through launching a CIS Hardened Image from a cloud marketplace to secure your cloud environment. Participants will leave with practical guidance for incorporating CIS Hardened Images into their cloud environments and security workflows to start secure, scale consistently, and reduce the operational burden of manual hardening.
*Sponsored by Center for Internet Security
Virtual
*Sponsored by Seemplicity
Virtual
*Sponsored by Palo Alto Networks
Virtual
Virtual
Virtual
Virtual