SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
This talk explores how AI challenges cybersecurity and how it can help redefine it.

Cybersecurity leaders and compliance professionals are under increasing pressure to meet a growing array of global regulations—all while maintaining effective threat detection and response capabilities. Traditional monitoring is no longer enough. Full Packet Capture (FPC) is rapidly emerging as a foundational requirement—not only for real-time visibility and forensic analysis, but as a direct response to regulatory mandates in the U.S., EU, and beyond.

As organizations prepare for 2026, security leaders face a challenging audit environment shaped by new regulations, updated standards, and an evolving threat landscape.

Join Matt Bromiley and Chris Schwind for a first look at Tanium Autonomous Endpoint Management (AEM), a next-generation platform that unifies IT and Security operations with AI-driven intelligence.

The cloud landscape is a double-edged sword: It offers incredible agility and scalability but also introduces a new set of security complexities.

Modern security leaders must deal with an endless barrage of changes to the business, technology, and threat landscape.

Many people want to consult so they can choose their work, have more freedom, and have more opportunities to make great money. Yet many never start or start late.

Join leading experts as they discuss how AI is transforming business operations, enhancing decision-making, and creating new opportunities for growth.

In 2025, with AI and automation everywhere, it’s more important than ever to stay ahead of attackers, arming yourself with clear intelligence, full visibility, and smart processes to catch problems before they become crises.

This talk will highlight pitfalls of incorporating artificial intelligence into analytical workflows, explore areas where it may add value, and aim to provide a somewhat-sceptical, somewhat-optimistic outlook on where CTI may go in the age of AI.

This focused track explores the ever-evolving world of Cloud IAM, diving into modern strategies, common missteps, and emerging tools designed to help organizations reclaim control over sprawling identities and creeping permissions.

Join us to hear how others are succeeding and failing to maintain an operational balance between competing internal priorities and threats which seem to relentlessly improve.
