SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
In The 2021 State of Enterprise Breaches, Forrester® found that enterprises spend a median of 37 days and a mean of $2.4 million to find and recover from a breach.
Year after year successful phishing attacks on end users and system administrators are found to be the factor that enables over 80% damaging security incidents. This points out the need for two key security initiatives: replacing reusable passwords with multifactor authentication and making users less likely to fall for fraudulent messages.
Do you know what OSINT is?OSINT is an abbreviation for "Open Source Intelligence" and is mainly used in the information security world. It is a method of collecting data from many sources, including the Internet, and analyzing, scrutinizing, and discarding the data to conduct research on specific individuals, systems, or organizations.
OSINTという言葉をご存知でしょうか?OSINTとは「Open Source Intelligence」を略した用語で、主に情報セキュリティの世界で使われています。インターネットをはじめとする多くの情報源からデータを収集し、分析・精査・取捨選択を行い、特定の個人やシステム、組織などについての調査を行う手法です。今回は、OSINTの基本的な要素についてご紹介した後、いくつかのデータ収集・探索・分析手法のデモを行い、押さえておくべき技術やツール、トレーニングについてもご紹介します。
More visibility. Most (if not, every?) cybersecurity professional will tell you they need more visibility into the threat landscape, but also their own security posture. Join SANS Analyst, Jake Williams and Chas Clawson, CTO for security with Sumo Logic, as they talk about the importance of correlating security alerts across your entire cloud and on-prem environment, and enriching with threat intelligence and other feeds for context and improving threat investigations.
Windows puts a lot into logs, but it puts even more into forensic artefacts you may not be aware of. This talk will explore some of the artefacts that, without the knowledge of the user, records more than just metadata. I think it's pretty cool, maybe after this talk you will do....or disable it all...or both?
Windowsのログには多くの情報が記録されていますが、それに加えてフォレンジックに活用できる様々なアーティファクトから情報を読み取ることができます。この講演では、ユーザーの知らない間に、単なるメタデータとは言い切れないような情報を記録しているアーティファクトをいくつかご紹介します。この講演を聞いたあと、あなたはキャッシュを無効にしますか?キャッシュの面白さを感じてもらえたら嬉しいです。
Save your SOC team hundreds of hours on daily tasks.What does an ideal day in the SOC look like? It certainly wouldn’t include what you’re facing now with an endless stream of alerts, user requests and ad hoc fire drills. But you’re not alone. According to USNews, security analyst jobs rank in the top 25 most stressful jobs.
Connect with the crew behind the annual SANS Holiday Hack Challenge for this special webcast to wrap up another year and name the big winners. Plus, get a sneak peek and a few tips for next year’s challenge, already well under development.Chief creator Ed Skoudis will be joined by members of his team to offer an exclusive behind-the-scenes look at the 2022 event, share how the various challenges came together, cover how players performed, and more. In addition to announcing the winners, they’ll share statistics from the game, including those of the quirky variety such as how many cumulative miles were walked by the nearly 20,000 players who joined in the fun this year.Join us for this one-of-a-kind presentation to tie a bow on the 2022 Challenge and get a head start thinking about what awaits you with the Holiday Hack Challenge 2023.
Metadata is a vital part of digital forensics work but is often glanced over for OSINT. In this workshop, we'll discuss why metadata is far more useful than most analysts give it credit for. We'll cover why many people miss metadata and how it could potentially reveal hidden information. We'll even set up some hands-on exercises so you can practice your skills.
DNS provides one of the best methods for command and control, covert tunneling, and blind data exfiltration. Burp Collaborator provides a great way to both confirm blind injection, and also exfiltrate data. Penetration testers may prepend names to each DNS request, allowing data exfiltration subject to DNS's length limitations (63 characters per label, 255 characters total name) and character limitations. This webcast will describe methods for blind data exfiltration using Burp Collaborator (using both public and private servers), as well as using DNS without Burp. Content directly from SEC542: Web App Penetration Testing and Ethical Hacking.
In today’s world of enterprise security, many technology options are available—perhaps too many. Despite all the options available, security teams still ask the same questions: What is the “right” telemetry? How do we best integrate, and where can we find the best return on our investment?