SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
This webcast will provide a detailed overview of all the products and pricing offered to accredited educational institutions, in the US and Canada through the SANS Educational Institutions Summer Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
Implementing cloud security controls is hard. Implementing them at scale is harder.
During offensive operations engagements, We often find ourselves repeating the same playbooks over and over again, getting success every time. Are we actually becoming better as an industry in improving security posture? Attend the talk to find out! Warning: Rants inside!
In this brief, informative, and useful session, Christopher Crowley will discuss the concept of a variational autoencoder, then show how you could implement this to train an autoencoder based on your logs.
大規模言語モデル (LLM)に基づくGPT(Generative Pretrained Transformers)は、多くの課題に対して優れた性能を発揮します。しかし、ログデータ内の異常値を見つけるためのトレーニングはされていません。
Outages happen—even in the cloud. As more organizations move critical operations to cloud platforms, the risks of downtime, identity service disruption, and security gaps are rising fast. The question isn’t if your cloud provider might fail you—it’s whether your continuity strategy is ready when it does.
Are you struggling to get both executives and your workforce to buy into cybersecurity? Do you feel overwhelmed and need to scale the impact of your security team? Learn how to engage and transform your organization into the biggest believers and supporters of cybersecurity by institutionalizing a strong security culture.• What is security culture and how it enables you and your team.• Indicators of both a weak and strong security culture.• Top three drivers of a strong security culture.• Proven framework on how to build the culture you want.• The most common mistakes security teams and leaders make.• How to quantify and action your security culture.
As the cyber threat landscape continues to evolve, the past year has presented unique challenges and opportunities for cyber threat intelligence professionals. For 2025, availability has become a critical focus within the CIA triad, with ransomware and service outages high on the agenda, and network defenders and CTI analysts acutely aware of the impact of large-scale network disruptions. Additionally, AI remains a double-edged sword, with both adversarial and beneficial applications advancing rapidly.
Mobile app security is more critical—and more complex—than ever. With growing pressure to release quickly, mobile security teams often face tough trade-offs: limited access to devices, remote team coordination challenges, and slow, unreliable emulators that fail to mirror real-world behavior.
Traditional compliance and risk management techniques don’t scale in cloud-native environments—manual processes are now an anti-pattern for good security.
To achieve their objectives in our environment, attackers must move beyond their initial compromise and interact with our environment. Which means that we have the home field advantage - *if* we enable appropriate auditing and monitoring. This session will dig into some specific tactics that leverage that home field advantage and make it easier for us to effectively detect and respond.
From an open-source project used by millions through proprietary Java code to a Fortune 500 developer company's software product, we will look at the mistakes made by programmers to demonstrate the truth in the common (although not very elaborate) saying in the industry; "cryptography is hard!" We will try to understand why these issues were still a thing in 2024 (and most likely, they will still exist in 2025) and what we can do about them.