SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsIn cybersecurity, adversaries continuously develop innovative methods to circumvent traditional security controls. This presentation delves into these unconventional techniques and highlights how they bypass established defense mechanisms. Based on real-world case studies, we examine many of these abnormal approaches, including non-standard tools, novel C2 methods, and developer tools used to subvert security controls. Understanding the diversity in adversary sophistication is crucial. Some groups use highly technical hacks, developing custom exploits and advanced malware.
In contrast, most others repurpose readily available tools and techniques, demonstrating that significant threats can arise from advanced and nonstandard approaches. Organizations can enhance their defenses and improve resilience against sophisticated cyber threats by understanding and anticipating these abnormal techniques. This presentation aims to equip cybersecurity professionals with the knowledge to identify and counteract these unconventional tactics, contributing to a more robust and responsive cybersecurity posture.
With a background of 20+ years in cybersecurity, Brian currently holds the position of Principal Security Researcher at Presidio. In this role, he plays a crucial part in implementing security solutions that safeguard organizational assets and data.
Read more about Brian Almond