SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Virtual
Financial institutions now operate across complex hybrid environments—cloud, on‑premises, legacy systems, third‑party integrations, and rapidly growing AI deployments—creating risks that traditional, point‑in‑time security programs can’t keep up with. Misconfigurations, identity sprawl, shadow APIs, insecure AI integrations, and fragmented visibility are widening attack surfaces while adversaries exploit these gaps and move seamlessly across environments. This session explores how leading financial organizations are shifting to continuous exposure management to detect risk in real time, prioritize threats by business impact, and automate remediation. Attendees will gain actionable strategies for securing AI adoption, maintaining unified visibility, and strengthening resilience without slowing innovation.
*Sponsored by TrendAI
Virtual
In this session, we demonstrate how XBOW autonomously emulates real attacker behavior to uncover and validate exploitable weaknesses in financial applications. XBOW’s AI agents chain vulnerabilities, execute targeted exploits, and produce reproducible proof, enabling security teams to focus on real risk rather than manual validation. Learn how banks can operationalize continuous, autonomous penetration testing to strengthen security posture while meeting regulatory and delivery demands.
*Sponsored by XBOW
Virtual
The rapid adoption of private AI has accelerated virtualization growth—putting hypervisors at the center of modern infrastructure. As a result, they’ve also become a prime attack surface, with attacks targeting ESX surging more than 700% in 2025. Today’s threat actors are bypassing traditional controls entirely, leading to breaches that cost organizations hundreds of millions of dollars and months of operational downtime—particularly across the financial sector. Join Vali Cyber’s Threat Intelligence Lead, Nathan Montierth, as he breaks down real-world attacker playbooks and demonstrates ZeroLock—the first preemptive hypervisor security designed to stop these attacks before damage occurs.
*Sponsored by Valicyber
Virtual
Software supply chain attacks like Shai-Hulud demonstrate how attackers can bypass traditional security controls by exploiting automated dependency consumption rather than vulnerable code. By publishing poisoned releases through compromised maintainer accounts, adversaries can move faster than human review and CI/CD defenses. This session examines Shai-Hulud as a modern software supply chain attack and explains why continuous upgrading is not a reliable security strategy in adversarial ecosystems. Attendees will learn how a pinned-first dependency strategy reduces exposure to upstream compromise while preserving operational stability. A practical demonstration shows how pinned libraries and container images can remain secure and eliminate critical and high vulnerabilities through targeted remediation and controlled upgrades, using the Root Automated Vulnerability Remediation platform as an example.
*Sponsored by Root
Virtual
Virtual