SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
Join us for a panel discussion presented by Emerson and Dragos, as they share their insights around OT cybersecurity as partners - while also depicting the unique expertise, experience, and responsibilities that they bring to the table to defend customer installations and environments together. Although the core focus of the conversation will be on DeltaV systems, a high-level overview of OT cybersecurity and the Industrial Control Systems (ICS) landscape will be covered and relevant to multiple industry segments, including Oil & Gas, Chemicals, Life Sciences, and Metals & Mining.

In this session we’ll draw from the CrowdStrike 2023 Cloud Risk Report to gain a clear understanding of key cloud security challenges facing organizations and recommendations for staying secure at scale, while gaining the benefits of cloud agility.

With survey data from active SOC managers and analysts, this webcast will cover the escalating movement to the cloud, orchestration, and tool changes. It explores the developing promise of deception, AI and machine learning.

This will be the first part in a series of workshops that introduce students to the C programming language, specifically for the Windows platform. The items discussed in this workshop series will serve as a prerequisite for those interested in taking the SEC670 course. This first part will cover basic items such as, setting up Visual Studio Community, creating a project, developing your first project, etc. We will then dive into C itself covering data types, the anatomy of a function, statements, variables, directives, and debugging.

Topics for this Cyber Solutions Fest track include:* The principles of zero trust architecture and best practices.* How organizations are approaching zero trust implementations, given modern enterprise complexities.* The role of advanced technology, like AI and ML in zero trust.* Real-world case studies and analysis of the challenges and opportunities of implementing a zero trust architecture.Please join us on June 9th for the opportunity to learn from industry leaders and security experts to review the latest trends and capabilities of, and how your organization can benefit from, zero trust architecture. We hope to see you there!

Hands-on Workshop: Work through the process of creating a detection that we can use as defenders to spot an adversary performing attack techniques against our Azure environments.

Industrial control systems (ICS) are critical to the operation of many essential services, including power grids, water treatment plants, and transportation systems. These systems are often connected to the enterprise, which opens the door for potential cyber-attacks. In ICS environments, access equals control, with exposed remote services being one of the most common attack vectors. Remote services are software applications that allow users to connect to an ICS from a remote location. These services can be used for various purposes, such as troubleshooting, maintenance, and updates. However, if these services are not properly understood or secured, they can be used by attackers to gain unauthorized access to ICS systems. In this presentation we will explore with the audience a deeper understanding of the attack surface challenge for industrial environments, how to identify remote services exposures, and recommendations on how to gain control of your remote logical access.

Use the newest tool to self-assess your organization's vulnerability management maturity, built on the renowned SANS Vulnerability Management Maturity Model (VMMM).

Pivoting, tunneling, and redirection are essential skills that separate the junior and senior operators in the offensive security landscape. This workshop describes various techniques used to creatively route traffic through multiple network segments.

The constant and uncharted way in which workloads and cloud services are provisioned creates an expanding and dynamic attack surface that is hard to secure with tools and processes designed for legacy data centers. Bad actors are adapting to this new landscape and taking advantage of the growing vulnerabilities and security weaknesses. The cloud necessitates a significant overhaul of many tools, services, processes, and skills that security operations teams have relied upon for

This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS / CIS partnership program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.

In today’s cybersecurity landscape, zero-day vulnerabilities pose significant threats to software applications, and their discovery is crucial for effective mitigations. Join us in this webinar as we will share our journey in uncovering vulnerabilities in Adobe Acrobat and Foxit PDF Editor, the two most widely used PDF processing applications.
