SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsBeyond the Perimeter: Securing What You Don’t Control
As software and hardware supply chains grow more complex and globally interconnected, they have also become prime targets for attackers. From deeply embedded vulnerabilities in third-party components to subtle software compromises and counterfeit hardware, today’s supply chain threats are stealthy, sophisticated, and increasingly difficult to detect.
Join us for a focused 3-hour forum where experts and practitioners tackle one of cybersecurity’s most pressing challenges: how to secure the digital supply chain from code to component.
This forum brings together offensive and defensive insights from the field — grounded in hands-on experience — to equip you with practical strategies, tools, and frameworks to:
Whether you’re in the trenches dissecting firmware or leading enterprise risk discussions with executives and suppliers, this forum is designed to help you enhance your supply chain security.
Agenda
9:00 AM – 9:10 AM - Welcome & Opening Remarks Doug McKee & Tony Turner
9:10 AM – 9:45 AM - Know Your AI: Scanning the Hidden Layers of Open Source Models with w/ Kasimir Schulz
10:20 AM – 10:30 AM - Break
10:30 AM – 11:05 AM - Beyond the SBOM: Advancing Transparency with the BOM Maturity Model w/ Steve Springett
11:05 AM – 11:40 AM - Unseen and Unsecured: Firmware Attacks Expanding the Enterprise Attack Surface w/ Paul Asadoorian
11:40 AM – 12:00 PM - Closing Remarks
Join the forum discussion on Slack.
Who Should Attend: Security engineers, product security professionals, PSIRT teams, risk managers, incident responders, SOC analysts, and cybersecurity leaders responsible for securing their organization’s technology stack and third-party ecosystems.
Douglas McKee, Executive Director of Threat Research at SonicWall, revolutionized cybersecurity by spearheading the detection of over 210,000 novel malware variants and pioneering real-time threat intelligence that accelerates defense responses.
Learn moreTony Turner has reshaped critical infrastructure security by advancing SBOM maturity and Cyber-Informed Engineering, while pioneering adversarial AI simulations and digital twin technologies as VP at Frenos.
Learn more