SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
AI seems to have taken the world by storm lately. From ChatGPT to automated spear phishing techniques, the security world has already seen changes in processes, automation, and threat detection - not to mention attack techniques! The recent surge of AI opens up opportunities for both defenders and adversaries alike. What can we build? What can we automate? How can we use AI to augment security to buy time and add another layer of defense to our enterprise?In this AI-focused solutions forum, we’ll examine how AI will continue to change the security landscape. After all - tools for one are tools for many. Just as defenders benefit from AI capabilities, adversaries have found their own uses. From writing malware to discovering vulnerable systems, threat actors have found efficiencies using AI capabilities. Defenders must be prepared for how AI will help bolster defenses, while adversaries use it to ramp up their attacks.Join us for our first-ever SANS AI & ChatGPT Solutions Forum, where we will discuss the risks, vulnerabilities, and benefits linked with the rapid introduction of machine learning and artificial intelligence in the world. Information security experts will bring their ideas, theories, and case studies of how AI will impact security for years to come.Join in on the action! Connect with fellow attendees and our event chairs in the SANS Solutions Forum Interactive Slack Workspace. Sign in once and you'll be all set for the rest of our 2023 Solutions Forums. We'll see you there!

This program, from SANS and Sinclair Community College, in collaboration with the National Science Foundation (NSF), is designed to engage and empower underrepresented student groups, including women, Black, African American, Latino(a), Hispanic and Indigenous students, providing them with an opportunity to excel in cybersecurity education this summer and prepare them for future jobs.

Everyone has alerts and everyone has different forms of intelligence they use to try and detect, research, and respond to a threat within their environment. As a security practitioner, you know the process and time involved to “connect the dots” between the intelligence available and what is in your environment is often time consuming and requires a good deal of knowledge to correlate. These are all the realities of the world we currently live in as cybersecurity professionals…. but what if we could leverage a new approach to automate these efforts and also better protect your organization in ways that weren’t possible before?

In the world of application security, the influx of alerts has reached overwhelming levels, making it increasingly challenging to effectively monitor and respond. This surge in alerts often leads to unresolved issues and persistent vulnerabilities. Are we sounding the alert too frequently? Is there a way to strike a balance between reducing the noise and maintaining robust security?

When a cloud service provider (CSP) says they are using encryption, that’s when you know you need to dig deeper into the details rather than succumb to the Jedi mind tricks of encryption.

Pointers that point, loops that make you dizzy, and functions that do something. For Part 3 of our series we'll continue where Part 2 left off and then introduce pointers, loops, and functions and their stack frames.

"This workshop is a hands-on session focused on creating custom Nmap NSE scripts tailored for the CISA Known Exploited Vulnerabilities Catalog. In this 2-hour workshop, participants will learn essential NSE scripting skills, with a specific emphasis on detecting vulnerabilities listed in the catalog.

Detection engineering has evolved into an art, contributing to the success rates of endpoint and network detection and response tooling capabilities. Used to effectively counter the increasing complexity of today’s cyber threat actors, high-fidelity detections can help an organization discover threats earlier, neutralizing them before further damage can occur.

Successful phishing attacks on end users and system administrators continue to be the factor that enables nearly 80% of damaging security incidents. Many companies are spending on user awareness and education programs but find it is hard to sustain initial gains in phishing awareness, recognition, and resilience and are lacking the data needed to develop and track meaningful awareness metrics.

Intelligence can only be called intelligence if the product can be consumed, actions can be taken or decisions can be made and the product can be shared in a timely manner with everyone who needs to receive it.

インテリジェンスは、その成果物が活用され、アクションを起こし、意思決定がなされ、その成果物を受け取る必要のあるすべての人にタイムリーに共有できる場合にのみ、インテリジェンスと呼ぶことができます。

Does centralizing log data still make sense, or should we be thinking about decentralized approaches such as federated data storage or distributed data storage, leveraging security data lakes and other repositories?
