SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
Whether it's a brick-and-mortar storefront or an e-commerce platform, no player in the retail space is safe from cyberattacks. Over the past decade, we have seen major breaches of big-name stores, resulting in multi-million dollar settlements and hundreds of millions of affected users. But what exactly is going on here? We will examine the mechanisms cybercriminals use to exploit retail stores and platforms, what they look for, and, most importantly, what can be done to thwart threats and leave cyber criminals on the shelf.

Presentation 1 - The Five ICS Cybersecurity Critical Controls for APAC PractitionersPeter Jackson, Certified Instructor CandidatePresentation 2 - Establishing the Link Between Corruption and CybercrimeJason Jordaan, Principal Instructor

This webcast takes a deep dive into the threats highlighted during the annual SANS keynote panel discussion at the RSA® Conference 2023. This webcast will include insight from SANS instructors Ed Skoudis, Heather Mahalik, Dr. Johannes Ullrich, and Katie Nickels on the dangerous new attacks techniques they see emerging. You’ll get actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks.Register for this webcast now and be among the first to receive this whitepaper from SANS author and Director of Emerging Security Trends John Pescatore and SANS Certified Instructor Domenica Crognale.

Join SANS experts for an informative webcast where we delve into Verizon’s recently released annual Data Breach Investigations Report (DBIR) a leading source of insights into the primary causes of the most significant data breaches around the world. This publication presents a unique opportunity for both awareness and technical teams to better understand recent attack methodologies and their effect on their operations.

As cloud migration and modernization gain momentum in 2023, organizations are increasingly leveraging cloud technologies to enhance operational efficiency and improve application performance. However, many encounter a discrepancy between their anticipated cloud outcomes and the reality they face. A significant barrier preventing organizations from realizing the full benefits of the cloud is the absence of DevSecOps practices.

Operational technology (OT) cyber threats have evolved over the past decade. Combined with increased connectivity from digital transformation projects, it is more critical than ever to implement industrial control system (ICS)-specific visibility capabilities to quickly detect, respond, and recover from potential cyber incidents.To explore this topic, SANS conducted a survey to collect information around industry practices.

Security teams need to build consistent, reusable design patterns for cloud security controls that can be automated and maintained readily over time. Within cloud infrastructure, many controls can be provisioned and enabled ahead of time and operate autonomously in any deployment scenario. Commonly termed “guardrails,” these controls ensure that security capabilities are always enabled and operate within the context of deployments without any required interaction from security operations or cloud engineering teams.

Have you ever stumbled across a file that you wanted to access but couldn’t due to the fact that it was password protected? Password cracking is a topic covered in depth in penetration testing courses but rarely in digital forensics or OSINT, even though it’s extremely applicable.

In this webcast you will learn best practices for applying CI/CD security across the entire SDLC, evaluating and implementing security tools that automate the security function, and developing a shared responsibility security culture involving all stakeholders.

世の中には様々なセキュリティソリューションがあります。あなたは適切な選択とその利用をしているでしょうか?PCのEDRの盲点、マリシャスアプリ対策だけでは不十分なスマホセキュリティ、クラウドセキュリティ機能のよくある誤解、isolation技術の情報漏洩対策への転用など、企業のセキュリティ担当者が一度は考えたことがあるこれらのトピックを皆さんと一緒に考えていきましょう。

There are various security solutions out there but are you making the right choice by selecting the right one? Blind spots in EDR for PCs, smartphone security where MALICIOUS app countermeasures are not enough, common misunderstandings of cloud security features, and the conversion of ISOLATION technology to information leak prevention - these are some of the topics that corporate security personnel have thought about at least once, and we will consider these topics with you.

Detecting attacks in their earliest stages—before they impact your business—is a key element of an effective threat detection and incident response (TDIR) strategy.
