SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Virtual
Anthropic's unreleased Mythos model represents a step-change in AI-driven vulnerability discovery, but the security community is fractured between dismissing AI completely and calling it the next security apocalypse. This talk cuts through both extremes to find the truth: why this trend clearly favors attackers, and what security teams can do right now to respond, from layering AI with deterministic tooling to building real defense-in-depth before the attackers find your zero-days first.
*Sponsored by Semgrep
Virtual
Every security team knows the drill: compliance requests pile up, audits consume weeks, and manual evidence gathering pulls your best people off mission-critical work. What if AI could eliminate that friction entirely? This session explores how purpose-built AI — embedded directly into a compliance-as-code platform — is fundamentally changing how organizations manage risk, respond to regulatory change, and stay audit-ready in real time. You'll see how capabilities like automated policy generation, intelligent evidence reuse, and AI-powered audit evaluation compress months of work into minutes, delivering results like: • 80% increase in accuracy across compliance documentation • 10x boost in staff productivity • 92% reduction in time to stand up new compliance programs Walk away with a practical understanding of what embedded AI in GRC actually looks like, why it matters to security teams — not just compliance teams — and how compliance-as-code turns your program from an organizational tax into a force multiplier.
*Sponsored by RegScale
Virtual
Agentic AI lets adversaries execute attacks up to 100x faster. New frontier models help them uncover zero-days earlier and compress attacks that once took days into minutes. Legacy, manual security cannot keep pace. You need to operate at machine speed.
In this session, see how agentic security operations help you reduce attack surface, cut noise by up to 99%, and respond in real time.
A live demo shows how an agentic AI workforce investigates and stops AI-fueled threats while enabling analysts, regardless of experience, to operate like experts.
*Sponsored by Palo Alto Networks
Virtual
The window between vulnerability discovery and weaponization has collapsed into mere hours. When AI agents can autonomously chain exploits across networks, any blind spot—be it a rogue IoT device or a forgotten OT gateway—becomes a dangerous entry point. In this session, HD Moore (founder of Metasploit and runZero) breaks down why truly complete attack surface management is the only viable countermeasure.
Moore will demonstrate how to regain control using runZero’s latest capabilities for discovery, exposure detection, and attack path mapping. We’ll go beyond basic CVEs to uncover the "soft" exposures attackers love: default credentials, multi-homed devices, misconfigurations and more. Whether you’re securing a hybrid cloud or a complex industrial environment, you’ll walk away with a blueprint for finding the unknown and closing critical pathways that invite lateral movement.
Key Takeaways:
*Sponsored by RunZero
Virtual
Most incident response plans fail under real-world conditions, when identity systems are compromised, communication tools are down, and teams can’t coordinate effectively.
Today’s attacks don’t just target endpoints. They disrupt the very systems organizations rely on to respond. As a result, security teams are shifting toward a new model: incident command, powered by out-of-band technologies that operate independently of compromised environments.
In this session Nick Scozzaro, Co-founder and CEO at ShadowHQ, will explore how this emerging approach is reshaping modern response by enabling teams to activate playbooks instantly, coordinate across business stakeholders, and accelerate containment and recovery under pressure. Through real-world scenarios and a live walkthrough, you’ll see how to build a response strategy that holds up when your core systems don’t.
*Sponsored by Shadow HQ
Virtual
AI adoption is driving a "Context Crisis" as AI-generated code ships 100x faster than traditional software. This rapid innovation has outpaced legacy security tools, leaving teams blind to their AI footprint and the "toxic combinations" of risk created by interconnected models, agents, and cloud data. Join us for a demo of Wiz AI-APP, the end-to-end platform built to secure AI from development to production. You’ll learn how to unify cross-layer context across infrastructure, models, and application behavior to operationalize AI security.
*Sponsored by Wiz
Virtual